CSec Weekly
Archive
Subscribe
Search
Log In
Eyal Estrin

✍ Author of Cloud Security Handbook & Security for Cloud Native Applications ☁ AWS · Azure · GCP 💭 All opinions are my own 🌐


Apr 14, 2026

byEyal Estrin

The Third-Party SaaS Supply Chain Threat

Identity governance gaps grow as AI agents increase and third-party software breaches disrupt critical health and cultural infrastructure worldwide

The Third-Party SaaS Supply Chain Threat

Apr 7, 2026

byEyal Estrin

Source Code Stolen in Dev Environment Breach

Critical data leaks at major brands and a full AI code tool exposure reinforce the need for stronger oversight of external vendors and dev tools

Source Code Stolen in Dev Environment Breach

Mar 31, 2026

byEyal Estrin

European Commission Confirms AWS Cloud Breach

Navigate the impact of hardware import bans and divergent encryption standards while managing vendor transparency and the rise of shadow AI tools

European Commission Confirms AWS Cloud Breach

Mar 24, 2026

byEyal Estrin

Meta AI Agent Triggers Major Unauthorized Security Event

Global authorities disrupt massive botnets while the Pentagon eyes AI training on secret data and UK infrastructure faces relentless attacks

Meta AI Agent Triggers Major Unauthorized Security Event

Mar 17, 2026

byEyal Estrin

The harsh reality of AI vulnerabilities for CISOs

Master new AI defense strategies and secure Salesforce guest settings to prevent the cloud abuse seen in the Telus and Stryker breaches

The harsh reality of AI vulnerabilities for CISOs

Mar 10, 2026

byEyal Estrin

Urgent Patch Required for Cisco Catalyst SD WAN Flaws

Major data breaches at LexisNexis and Star Citizen join urgent VMware warnings as global law enforcement disrupts a key phishing infrastructure hub

Urgent Patch Required for Cisco Catalyst SD WAN Flaws

Mar 3, 2026

byEyal Estrin

US History Largest Breach Risk

Microsoft confirms Copilot email bugs as rogue AI activity and agentic threats push the annual cost of insider risk to nearly 20 million dollars

US History Largest Breach Risk

Feb 24, 2026

byEyal Estrin

The CISO Guide to Enforcing Business Accountability

Identity vishing and infrastructure risk take center stage as luxury brands pay millions for SaaS breaches and the EU halts internal AI use

The CISO Guide to Enforcing Business Accountability

Feb 17, 2026

byEyal Estrin

Ten Major Mistakes That Can End a CISO Career

Fintech and social media breaches highlight a year of supply chain chaos where meeting industry standards is no longer a shield against attacks

Ten Major Mistakes That Can End a CISO Career

Feb 10, 2026

byEyal Estrin

Protecting your firm from autonomous AI threats in 2026

Global threats rise as billions of records leaks and companies struggle to secure AI tools and privileged user accounts

Protecting your firm from autonomous AI threats in 2026

Feb 4, 2026

byEyal Estrin

SolarWinds Critical RCE Flaws Demand Immediate Patching

New data shows soaring GDPR reports, rampant unsanctioned AI tools in use and access gaps for former staff as agencies warn about AI risk

SolarWinds Critical RCE Flaws Demand Immediate Patching

Jan 27, 2026

byEyal Estrin

AI Adoption Creates Huge Cyber Risk Gaps

Supply chain risk rules move forward in Europe while security teams digest ransomware backdoor lessons and phishing threats in energy

AI Adoption Creates Huge Cyber Risk Gaps

Jan 20, 2026

byEyal Estrin

CISOs Shift Focus to Keeping Business Running

Breaking cybercrime nodes and growing AI platform risk show how fraud and source code theft are reshaping security priorities for teams and boards

CISOs Shift Focus to Keeping Business Running

Jan 13, 2026

byEyal Estrin

Security Leaders Must Own AI Agent Identity Risk

Data theft attempts on cloud sharing sites and rising AI risks show why identity verification and compliance focus are top priorities for security teams

Security Leaders Must Own AI Agent Identity Risk

Jan 6, 2026

byEyal Estrin

AI Misuse and Emerging Attack Techniques in 2025

High impact breaches and evolving AI threat landscape underscore need for leadership strategy and hybrid risk frameworks

AI Misuse and Emerging Attack Techniques in 2025

Dec 30, 2025

byEyal Estrin

OWASP Top 10 Brings Clarity to AI Agent Risks

Security leaders face AI agent risk's identity threats and hard lessons from real scenes into ransomware and maritime malware

OWASP Top 10 Brings Clarity to AI Agent Risks

Dec 23, 2025

byEyal Estrin

Enterprise VPNs Targeted with Massive Password Probing

What security leaders are watching as credential attacks and OT risk rise

Enterprise VPNs Targeted with Massive Password Probing

Dec 16, 2025

byEyal Estrin

AI Now Tops the List of Cybersecurity Threats

Learnings from AI danger, fake access and a major airline hack

AI Now Tops the List of Cybersecurity Threats

Dec 9, 2025

byEyal Estrin

npm Supply Chain Breach Exposes Cloud Secrets

Why every CISO should audit dependencies, review third‐party apps and vet AI tools

npm Supply Chain Breach Exposes Cloud Secrets

Dec 2, 2025

byEyal Estrin

OpenAI breach exposes analytics‐partner phishing risk

Email phishing and insider leaks show third‐party risks remain high

OpenAI breach exposes analytics‐partner phishing risk

Nov 25, 2025

byEyal Estrin

Fortinet’s critical bug quietly exploited in the wild

Cloud outages and exploited flaws highlight the need for stronger security

Fortinet’s critical bug quietly exploited in the wild

Nov 18, 2025

byEyal Estrin

Why Your Enterprise Credentials Are Still the Weakest Link

Still vulnerable: credentials, legacy tech and regulatory change

Why Your Enterprise Credentials Are Still the Weakest Link

Nov 11, 2025

byEyal Estrin

Key Findings from The CrowdStrike 2025 Threat Report

AI, Ransomware, and Emerging Enterprise Cyber Risks

Key Findings from The CrowdStrike 2025 Threat Report

Nov 4, 2025

byEyal Estrin

Why Paying Ransoms Still Costs You Your Data

Ransomware risks, AI guardrails, and data control challenges every CISO must tackle today

Why Paying Ransoms Still Costs You Your Data

Oct 28, 2025

byEyal Estrin

Top Priority: National Security Breach

From Nuclear Breaches to AI Threats: What CISOs Must Watch This Month

Top Priority: National Security Breach
Load more posts
arrow-right

CSec Weekly

The Cyber Security News That Matter to Leaders


Quick Links

Subscription

Search

© 2026 CSec Weekly by SmartClouds.ai.
Report abusePrivacy policyTerms of use
beehiivPowered by beehiiv