Technology

Related News

Radware Discloses ZombieAgent Technique to Compromise AI Agents

  • Michael Vizard
  • Published date: 2026-01-09 00:00:00

None

<p>Radware this week announced it has discovered a zero-click indirect prompt injection (IPI) vulnerability targeting the Deep Research agent developed by OpenAI.</p><p>Dubbed <a href="https://www.radware.com/newsevents/pressreleases/2026/radware-unveils-zombieagent/">ZombieAgent</a>, Radware researchers have discovered that it is possible to implant malicious rules directly into the long-term memory or working notes of an AI agent. That technique enables a malicious actor to establish persistence in a way that enables hidden executions of actions every time the agent is used.</p><p>Pascal Geenens, vice president of threat intelligence for Radware, said cybercriminals can, for example, silently collect sensitive information over time or initiate actions across any set of tools or applications that an AI agent has been given access to without having to re-engage with the target account after the initial compromise.</p><p>Radware has yet to see this particular type of attack in the wild, but like most prompt injection attacks it’s relatively trivial for cybercriminals to insert via an AI account that they have managed to gain access to via a stolen set of credentials, noted Geenens.</p><p>The defining characteristic of a ZombieAgent is that all malicious actions occur within OpenAI’s cloud infrastructure, he added. As a result, no endpoint logs record the activity. Nor is there network traffic that passes through, for example, a firewall or gateway, which means no alerts are generated, noted Geenens.</p><p><a href="https://securityboulevard.com/wp-content/uploads/2026/01/Radware.jpg"><img fetchpriority="high" decoding="async" class=" wp-image-2080948 aligncenter" src="https://securityboulevard.com/wp-content/uploads/2026/01/Radware-300x163.jpg" alt="" width="776" height="422" srcset="https://securityboulevard.com/wp-content/uploads/2026/01/Radware-300x163.jpg 300w, https://securityboulevard.com/wp-content/uploads/2026/01/Radware-1024x557.jpg 1024w, https://securityboulevard.com/wp-content/uploads/2026/01/Radware-768x417.jpg 768w, https://securityboulevard.com/wp-content/uploads/2026/01/Radware.jpg 1400w" sizes="(max-width: 776px) 100vw, 776px"></a></p><p>The ZombieAgent research builds on previous Radware disclosure of a ShadowLeak vulnerability that showed how compromised AI agents could be used to read emails, interact with corporate systems, initiate workflows, and make decisions autonomously. Radware disclosed the vulnerability to OpenAI, which subsequently put guardrails in place to thwart this type of attack.</p><p>However, the ZombieAgent technique shows just how easy it is to end run those guardrails, said Geenens. More troubling still, there are no tools to continuously monitor the activities of an AI agent, he added.</p><p>Of course, <a href="https://techstrong.ai/features/survey-surfaces-rapid-adoption-of-ai-agents-across-the-enterprise/">adoption of AI agents is already outpacing the ability of cybersecurity teams to put the proper controls and policies in place</a>. It’s now more a question of how often and to what degree these AI agents will be compromised before cybersecurity teams have the tools needed to secure them.</p><p>The level of risk, unfortunately, is also rising as more AI agents are deployed. In addition to increasing the overall size of the attack surface that needs to be defended, AI agents also provide a mechanism that could enable cybercriminals to compromise an entire business process.</p><p>Ideally, organizations should carefully consider the cybersecurity implications of deploying AI agents, especially when it comes to monitoring privileges assigned to AI agents and the sensitivity of the data they are allowed to access. Organizations should also review the licensing agreement that providers of these tools ask end users to sign to ensure that no data is being retained for training purposes, noted Geenens.</p><p>In the meantime, however, cybersecurity teams should be preparing now to respond as quickly as possible to the AI agent security incident that is now all but inevitable.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/radware-discloses-zombieagent-technique-to-compromise-ai-agents/" data-a2a-title="Radware Discloses ZombieAgent Technique to Compromise AI Agents"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fradware-discloses-zombieagent-technique-to-compromise-ai-agents%2F&amp;linkname=Radware%20Discloses%20ZombieAgent%20Technique%20to%20Compromise%20AI%20Agents" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fradware-discloses-zombieagent-technique-to-compromise-ai-agents%2F&amp;linkname=Radware%20Discloses%20ZombieAgent%20Technique%20to%20Compromise%20AI%20Agents" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fradware-discloses-zombieagent-technique-to-compromise-ai-agents%2F&amp;linkname=Radware%20Discloses%20ZombieAgent%20Technique%20to%20Compromise%20AI%20Agents" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fradware-discloses-zombieagent-technique-to-compromise-ai-agents%2F&amp;linkname=Radware%20Discloses%20ZombieAgent%20Technique%20to%20Compromise%20AI%20Agents" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fradware-discloses-zombieagent-technique-to-compromise-ai-agents%2F&amp;linkname=Radware%20Discloses%20ZombieAgent%20Technique%20to%20Compromise%20AI%20Agents" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Randall Munroe’s XKCD ‘Apples’

  • None
  • Published date: 2026-01-09 00:00:00

None

<figure class=" sqs-block-image-figure intrinsic "> <p> <a class=" sqs-block-image-link " href="https://xkcd.com/3180/"></a></p> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png" data-image-dimensions="263x364" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=1000w" width="263" height="364" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/84da8ced-6a76-4004-a4b1-127d84aa0062/apples.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"></p> <p> <figcaption class="image-caption-wrapper"> <p class=""><strong>via the comic artistry and dry wit of Randall Munroe, creator of XKCD</strong></p> <p data-rte-preserve-empty="true" class=""> </p></figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2026/1/9/randall-munroes-xkcd-apples">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/randall-munroes-xkcd-apples/" data-a2a-title="Randall Munroe’s XKCD ‘Apples’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frandall-munroes-xkcd-apples%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Apples%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frandall-munroes-xkcd-apples%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Apples%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frandall-munroes-xkcd-apples%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Apples%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frandall-munroes-xkcd-apples%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Apples%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Frandall-munroes-xkcd-apples%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Apples%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3180/">https://xkcd.com/3180/</a> </p>

The Definitive Guide to ISO 42001

  • None
  • Published date: 2026-01-09 00:00:00

None

<div class="hs-featured-image-wrapper"> <a href="https://www.cybersaint.io/blog/the-definitive-guide-to-iso-42001" title="" class="hs-featured-image-link"> <img decoding="async" src="https://www.cybersaint.io/hubfs/Blog%20Image_ISO%2042001.png" alt="The Definitive Guide to ISO 42001" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div><h2><strong><span style="color: #000000;">Understanding ISO 42001</span></strong></h2><p><strong>ISO/IEC 42001</strong> is the world’s first international standard for establishing, implementing, maintaining, and continually improving an <strong>Artificial Intelligence Management System (AIMS)</strong>. Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), ISO 42001 provides a structured framework for governing AI systems responsibly, securely, and transparently across their entire lifecycle.</p><p><img decoding="async" src="https://track.hubspot.com/__ptq.gif?a=3936746&amp;k=14&amp;r=https%3A%2F%2Fwww.cybersaint.io%2Fblog%2Fthe-definitive-guide-to-iso-42001&amp;bu=https%253A%252F%252Fwww.cybersaint.io%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/the-definitive-guide-to-iso-42001/" data-a2a-title="The Definitive Guide to ISO 42001"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-definitive-guide-to-iso-42001%2F&amp;linkname=The%20Definitive%20Guide%20to%20ISO%2042001" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-definitive-guide-to-iso-42001%2F&amp;linkname=The%20Definitive%20Guide%20to%20ISO%2042001" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-definitive-guide-to-iso-42001%2F&amp;linkname=The%20Definitive%20Guide%20to%20ISO%2042001" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-definitive-guide-to-iso-42001%2F&amp;linkname=The%20Definitive%20Guide%20to%20ISO%2042001" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-definitive-guide-to-iso-42001%2F&amp;linkname=The%20Definitive%20Guide%20to%20ISO%2042001" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.cybersaint.io/blog">CyberSaint Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Maahnoor Siddiqui">Maahnoor Siddiqui</a>. Read the original post at: <a href="https://www.cybersaint.io/blog/the-definitive-guide-to-iso-42001">https://www.cybersaint.io/blog/the-definitive-guide-to-iso-42001</a> </p>

Are There IDORs Lurking in Your Code? LLMs Are Finding Critical Business Logic Vulns—and They’re Everywhere

  • Erik Buchanan
  • Published date: 2026-01-09 00:00:00

None

<p>Security teams have always known that insecure direct object references (IDORs) and broken authorization vulnerabilities exist in their codebases. Ask any AppSec leader if they have IDOR issues, and most would readily admit they do. But here’s the uncomfortable truth: they’ve been dramatically underestimating the scope of the problem.</p><p>Recent bug bounty data tells a stark story. <a href="https://global.ptsecurity.com/en/research/analytics/standoff-bug-bounty-in-review-november-2024/">Roughly half</a> of all high and critical severity findings now involve broken access control vulnerabilities – IDORs, authorization bypasses, and similar business logic flaws. These aren’t theoretical concerns. Each IDOR reported through a bug bounty program typically signals several more lurking undiscovered in the same codebase. Security teams know they’re there, but finding them has always been time-intensive, manual work that gets deprioritized against other pressing demands.</p><p>Now, large language models (LLMS) are changing that equation – and revealing just how pervasive these vulnerabilities actually are.</p><h3><strong>Why Traditional Tools Miss Business Logic Flaws</strong></h3><p>Traditional static analysis tools <a href="https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#:~:text=SAST%20can%20identify%20a%20variety,of%20the%20application%20%E2%80%94%20before%20deployment.">excel at finding certain classes of vulnerabilities</a>. They’re effective at catching SQL injection, cross-site scripting, and other issues that follow predictable patterns of data flow. These tools work by tracing how user input moves through code – mechanically following the path from source to sink.</p><p>IDORs and authorization flaws are fundamentally different. They’re not about contaminated data flowing to dangerous functions. Rather, they’re about missing context and misunderstood intent. Consider a typical IDOR scenario: an API endpoint accepts a user ID parameter and returns that user’s profile data. The code fetches the data correctly. It returns it properly formatted. From a structural standpoint, everything looks fine. The vulnerability exists not in what the code does, but in what it doesn’t do. It fails to verify that the requesting user has permission to access that particular profile.</p><p>Traditional static analyzers struggle in this scenario because the vulnerability is semantic, not structural. If the data returned were intended to be public, such as a list of published articles, authorization might be unnecessary. Distinguishing between these requires understanding what the developer intended, what the business rules should be, and what security controls are missing. That’s exactly where LLMs are useful.</p><h3><strong>Understanding Context and Intent</strong></h3><p>LLMs read code differently than rule-based analyzers. They understand variable names, function purposes, code comments, and broader application context. When an LLM sees a function called “getUserInvoice(invoiceId)” that returns sensitive financial data based solely on an ID parameter, it can reason that it requires an authorization check.</p><p>This contextual understanding extends beyond individual functions. LLMs can assess whether the data being returned is sensitive, whether the endpoint appears to be public or private, and whether appropriate safeguards exist elsewhere in the call chain. They can infer developer intent and compare it against what the code actually implements.</p><p>Security teams that have begun incorporating AI-powered analysis into their scanning workflows report finding previously unknown authorization vulnerabilities across their codebases, often multiple instances of similar flaws that had gone undetected for extended periods. For many teams, this represents their first comprehensive view of how extensively these business logic vulnerabilities permeate their applications, revealing a problem far larger than what periodic penetration tests or bug bounty programs had suggested.</p><h3><strong>The Limitations of Pure LLM Approaches</strong></h3><p>Before we get carried away with their ability, note that LLMs still have significant limitations that make them unsuitable as standalone security tools.</p><ul> <li>First, they’re not deterministic. Run the same LLM against the same code twice, and you’ll likely get different results. Independent security researchers have documented this extensively. <a href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">In a study led by Sean Heelan,</a> an LLM found a critical kernel vulnerability in only 8 of 100 runs against the same benchmark. The other 92 runs missed it entirely, and many produced false positives.</li> <li>Second, LLMs are expensive at scale. Running comprehensive LLM analysis across a large codebase costs 2-3 orders of magnitude more than traditional static analysis. For organizations scanning millions of lines of code regularly, pure LLM approaches become economically impractical.</li> <li>Third, LLMs perform poorly on the vulnerability classes where traditional SAST excels. <a href="https://semgrep.dev/blog/2025/finding-vulnerabilities-in-modern-web-apps-using-claude-code-and-openai-codex/">When tested on SQL injection detection</a>, LLM-based approaches showed false positive rates between 95% and 100%. They struggle with complex data flow tracing across many files and miss sanitization performed in framework layers they don’t fully understand.</li> </ul><p>This isn’t a failure of LLMs. It’s simply the wrong tool for that job. LLMs excel at semantic reasoning about business logic, not mechanical tracing of data flows through complex application layers.</p><h3><strong>The Case for Hybrid Detection</strong></h3><p>The answer isn’t choosing between traditional static analysis and LLMs. It’s combining both approaches strategically.</p><p>Static analysis does what it does best: comprehensive, fast, deterministic scanning. It can enumerate every API endpoint in an application, trace every user input parameter, and identify every database query reliably and repeatedly.</p><p>LLMs then apply contextual reasoning to those outputs. Given a list of 500 API endpoints that accept user-controlled identifiers, an LLM can systematically evaluate whether each endpoint implements appropriate authorization checks. It can distinguish between intentionally public data and sensitive information that requires protection. It can assess whether the authorization logic makes sense given the apparent business context.</p><p>This hybrid approach delivers something neither technique achieves alone: comprehensive coverage of both traditional vulnerabilities and business logic flaws, with practical false positive rates that security teams can actually manage.</p><h3><strong>The Attacker Advantage</strong></h3><p>Here’s what should keep security leaders awake at night: attackers <a href="https://www.anthropic.com/news/disrupting-AI-espionage">also have access to LLMs</a>. While defenders build out security programs and experiment with new strategies for detecting logic vulnerabilities, attackers are gearing up to scan for and exploit them with the same LLMs.</p><p>This creates an urgent asymmetry. Offensive use of AI is fast, widely scalable, and easily replicated. A single attacker with access to commercial LLMs can scan for IDORs across numerous endpoints, automating what previously required manual expertise. Defensive security, by contrast, requires careful integration into existing development workflows, prioritization systems, and remediation processes.</p><p>Organizations that dismiss this as hype or defer investment until “later” are making a dangerous bet. The window to get ahead of AI-enabled attacks is narrowing.</p><h3><strong>A Practical Roadmap</strong></h3><p>For security teams already stretched thin, the future depends on organizational maturity. If you’re just establishing an application security program, focus on building the fundamentals. Deploy scanning tools that catch both traditional vulnerabilities and business logic flaws. Start with critical, high-impact issues and build the habit of regular remediation.</p><p>For security-mature organizations drowning in alert volume, the priorities are different. You need detection systems that genuinely prioritize and reduce noise. The most advanced teams are moving beyond basic vulnerability scanners toward platforms that understand their specific business context and adapt to their unique applications.</p><p>The economic reality is straightforward: security teams need automated detection for business logic vulnerabilities. The alternative (i.e. manually finding and fixing IDORs through pen tests and bug bounties) doesn’t scale. By the time external researchers find these issues, they’ve likely already been exposed for months or years.</p><p>Over the next several years, I expect the relationship between traditional SAST, LLM-based detection, and human security expertise to evolve significantly. Humans will remain in control but progressively move out of the tactical weeds. AI will increasingly handle tasks that previously required human security engineers: triaging findings, applying business context, designing remediations, etc. But AI will not replace the deterministic, reliable static analysis engines that form the foundation of modern application security. Agents are assisting and increasingly replacing simple human tasks. They’re too unreliable and too expensive to replace the fast, deterministic code analysis that humans have already handed over to computers.</p><p>The future belongs to platforms that thoughtfully blend both: powerful deterministic engines for comprehensive coverage and structural analysis, orchestrated by increasingly sophisticated AI that understands context, personalizes findings, and adapts to each organization’s unique environment.</p><p>The IDORs are already in your code. The only question is whether you’ll find them before someone else does.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/are-there-idors-lurking-in-your-code-llms-are-finding-critical-business-logic-vulns-and-theyre-everywhere/" data-a2a-title="Are There IDORs Lurking in Your Code? LLMs Are Finding Critical Business Logic Vulns—and They’re Everywhere"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fare-there-idors-lurking-in-your-code-llms-are-finding-critical-business-logic-vulns-and-theyre-everywhere%2F&amp;linkname=Are%20There%20IDORs%20Lurking%20in%20Your%20Code%3F%20LLMs%20Are%20Finding%20Critical%20Business%20Logic%20Vulns%E2%80%94and%20They%E2%80%99re%20Everywhere" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fare-there-idors-lurking-in-your-code-llms-are-finding-critical-business-logic-vulns-and-theyre-everywhere%2F&amp;linkname=Are%20There%20IDORs%20Lurking%20in%20Your%20Code%3F%20LLMs%20Are%20Finding%20Critical%20Business%20Logic%20Vulns%E2%80%94and%20They%E2%80%99re%20Everywhere" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fare-there-idors-lurking-in-your-code-llms-are-finding-critical-business-logic-vulns-and-theyre-everywhere%2F&amp;linkname=Are%20There%20IDORs%20Lurking%20in%20Your%20Code%3F%20LLMs%20Are%20Finding%20Critical%20Business%20Logic%20Vulns%E2%80%94and%20They%E2%80%99re%20Everywhere" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fare-there-idors-lurking-in-your-code-llms-are-finding-critical-business-logic-vulns-and-theyre-everywhere%2F&amp;linkname=Are%20There%20IDORs%20Lurking%20in%20Your%20Code%3F%20LLMs%20Are%20Finding%20Critical%20Business%20Logic%20Vulns%E2%80%94and%20They%E2%80%99re%20Everywhere" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fare-there-idors-lurking-in-your-code-llms-are-finding-critical-business-logic-vulns-and-theyre-everywhere%2F&amp;linkname=Are%20There%20IDORs%20Lurking%20in%20Your%20Code%3F%20LLMs%20Are%20Finding%20Critical%20Business%20Logic%20Vulns%E2%80%94and%20They%E2%80%99re%20Everywhere" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Why Senior Software Engineers Will Matter More (In 2026) in an AI-First World

  • None
  • Published date: 2026-01-09 00:00:00

None

<p>In 2026, writing code is no longer the hard part. AI can generate features, refactor services, and accelerate delivery at scale. Speed is now expected, not a differentiator.</p><p>What AI removed is friction, not responsibility. Poor decisions now move faster, spread wider, and fail louder. Architecture, assumptions, and trade-offs matter more because mistakes scale instantly.</p><p>The real bottleneck has shifted from execution to judgment. Senior engineers decide what should be built, how it behaves under pressure, and where AI cannot be trusted. In an <a href="https://www.ishir.com/artificial-intelligence.htm" rel="noopener">AI solution</a> world, engineering leadership determines outcomes.</p><h4><strong>Why This Makes Senior Engineers More Valuable, Not Less</strong></h4><p><strong>AI amplifies whatever judgment it is given.</strong></p><ul> <li>With weak judgment, it produces fast, confident chaos</li> <li>With strong judgment, it becomes a force multiplier</li> </ul><p><strong>Senior engineers don’t just execute tasks. They:</strong></p><ul> <li>Recognize second- and third-order effects</li> <li>Anticipate failure modes before users discover them</li> <li>Trade off speed, cost, security, and maintainability deliberately</li> </ul><p>In 2026, the teams that win won’t be the ones using the most <a href="https://www.ishir.com/blog/90145/10-ai-tools-every-software-developer-should-be-using-in-2023-beyond.htm" rel="noopener">AI tools</a>.</p><h2>AI Makes Risk Look Invisible Until It Hits Production</h2><p>AI-generated code often looks confident, clean, and complete. That is what makes it dangerous. It optimizes for patterns it has seen before, not for the specific constraints, edge cases, and risks of your system. The result is software that appears correct but carries hidden failure points.</p><p>One common risk is silent security exposure. AI can reuse insecure patterns, mishandle authentication flows, or introduce vulnerabilities that pass reviews because nothing looks obviously wrong. The same applies to compliance. Data handling logic may violate privacy rules, retention policies, or audit requirements without raising any immediate red flags.</p><p>Senior engineers recognize these risks early because they have seen the consequences before. They question assumptions, validate boundaries, and stress-test decisions before users or regulators do it for them. In an AI-first world, risk does not announce itself upfront. Senior engineers are the ones trained to spot it while it is still preventable.</p><h2>Using AI Without Judgment Is Just Faster Mistakes</h2><h4><strong>Prompting does not equal engineering</strong></h4><p>Prompting produces outputs, not accountability. AI can generate code, suggest patterns, and respond confidently, but it does not understand system context, business constraints, or the cost of being wrong. Engineering is about making trade-offs, validating assumptions, and owning outcomes when systems fail. Prompting skips that responsibility.</p><h4><strong>How senior engineers use AI effectively</strong></h4><p>Senior engineers treat AI as a force multiplier, not a source of truth. They use it to accelerate routine work, explore alternatives, and sharpen decisions they already understand. Every output is questioned, tested against system constraints, and evaluated for long-term impact. AI speeds them up, but judgment stays human.</p><h4><strong>How junior engineers misuse AI</strong></h4><p>Junior engineers are more likely to treat AI as an authority. Confident answers reduce friction, but also reduce skepticism. This leads to skipped validation, shallow reasoning, and blind spots that only appear later. AI becomes a crutch instead of a learning accelerator.</p><h4><strong>Where the difference shows up</strong></h4><p>The gap becomes visible in edge cases, performance bottlenecks, and incident response. When systems behave unpredictably, prompts stop helping. Experience takes over. AI is a power tool. Senior engineers know where to cut. Juniors cut fingers.</p><h2>The Rise of the AI System Engineer</h2><h4><strong>Senior engineering is evolving, not disappearing</strong></h4><p>AI is not eliminating senior roles. It is reshaping them. In 2026, senior engineers are moving beyond coding speed and becoming the people who design the environment where <a href="https://www.ishir.com/software-product-development.htm" rel="noopener">AI native product development</a> can happen safely. The value is no longer measured by how much code they personally write, but by how reliably teams can ship without creating chaos.</p><h4><strong>The new job is orchestration, not just implementation</strong></h4><p>Modern systems are no longer built purely by humans. They are built by human teams working with <a href="https://www.ishir.com/blog/308207/best-vibe-coding-tools-2026.htm" rel="noopener">AI coding tools</a>, agents, copilots, and automated pipelines. Someone has to orchestrate that workflow end to end. Senior engineers become the operators of this system, deciding how AI is used, where it is restricted, and how quality is enforced.</p><h4><strong>What an AI System Engineer actually does</strong></h4><p>This new senior role blends architecture, risk management, and delivery leadership. It is less about generating output and more about setting guardrails that prevent failure at scale. Responsibilities include: defining AI-safe coding patterns, enforcing validation gates, building evaluation <a href="https://www.ishir.com/blog/121619/how-to-boost-your-workflow-with-ai-top-6-ai-workflow-automation-tools.htm" rel="noopener">AI workflows</a>, and ensuring outputs align with security, compliance, and performance requirements.</p><h4><strong>Why this role cannot be automated</strong></h4><p>AI cannot own accountability. It cannot take responsibility for outages, regulatory violations, or customer-impacting failures. When systems break, organizations need humans who can reason through ambiguity, prioritize fixes, and protect the business. That is why the AI System Engineer becomes one of the highest leverage roles in <a href="https://www.ishir.com/generative-ai-solutions.htm" rel="noopener">AI-first product development</a>.</p><h2>What Engineering Leaders Must Do Differently in 2026</h2><ul> <li>Hire for senior judgment, not headcount. AI boosts output, but only seniors prevent scalable mistakes.</li> <li>Stop measuring productivity by tickets and code volume. Measure stability, incident rate, and delivery quality.</li> <li>Put AI guardrails in place. Define where AI is allowed, restricted, and always reviewed.</li> <li>Make architecture reviews non-optional. AI speeds coding, so design decisions must be tighter.</li> <li>Enforce stricter engineering standards. Tests, security, performance, and clean boundaries are mandatory.</li> <li>Train teams on AI like production deployment. Prompting, validation, and failure patterns must be taught.</li> <li>Promote senior engineers from reviewers to risk owners. Their job is preventing failures, not approving PRs.</li> <li>Add AI quality gates in CI/CD. Assume AI code will include hidden issues and catch them early.</li> <li>Build stronger observability and incident readiness. Faster releases demand faster detection and recovery.</li> <li>Build AI-native teams, not AI-dependent teams. AI should accelerate thinking, not replace it.</li> </ul><h2>Why ISHIR for AI Native Product Development and Senior-Led AI Delivery</h2><p data-start="53" data-end="373">ISHIR fits where AI-first delivery needs real engineering discipline. We are an engineering-first AI partner focused on system correctness, scalability, and real-world constraints, not quick demos that collapse in production. We work deep in context, understand complex systems, and use AI to solve problems that matter.</p><p data-start="375" data-end="750" data-is-last-node="" data-is-only-node="">We embed senior engineers who can lead AI-assisted development responsibly. That means setting the guardrails, validating outputs, designing for failure, and helping teams ship faster without increasing risk. If your roadmap is accelerating but stability, performance, or governance is slipping, ISHIR helps you build <a href="https://www.ishir.com/agile-team-pods.htm" rel="noopener">AI-native teams</a> that can move fast and still build right.</p><div class="ctaThreeWrapper"> <div class="ctaThreeContent"> <div class="ctaThreeConList"> <div class="content"> <h2>AI is speeding up delivery, but it is also increasing risk, tech debt, and production failures.</h2> <p>ISHIR embeds senior engineers to build AI-first systems with correctness, scalability, and real-world control.</p> <div class="linkWrapper"><a href="https://www.ishir.com/get-in-touch.htm" rel="noopener">Get Started</a></div> </div> </div> </div> </div><h4><strong>About ISHIR:</strong></h4><p>ISHIR is a <a href="https://www.ishir.com/software-development-company-dallas.htm" rel="noopener">Dallas Fort Worth,</a> Texas based AI-Native System Integrator and Digital Product Innovation Studio. ISHIR serves ambitious businesses across Texas through regional teams in <a href="https://www.ishir.com/software-development-company-austin.htm" rel="noopener">Austin</a>, <a href="https://www.ishir.com/software-development-company-houston.htm" rel="noopener">Houston</a>, and <a href="https://www.ishir.com/software-development-company-san-antonio.htm" rel="noopener">San Antonio</a>, supported by an offshore delivery center in <a href="https://www.ishir.com/new-delhi.htm" rel="noopener">New Delhi</a> and Noida, India, along with Global Capability Centers (GCC) across Asia including India, Nepal, Pakistan, Philippines, Sri Lanka, and Vietnam, Eastern Europe including Estonia, Kosovo, Latvia, Lithuania, Montenegro, Romania, and Ukraine, and LATAM including Argentina, Brazil, Chile, Colombia, Costa Rica, Mexico, and Peru.</p><p>The post <a href="https://www.ishir.com/blog/312239/why-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world.htm">Why Senior Software Engineers Will Matter More (In 2026) in an AI-First World</a> appeared first on <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/why-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world/" data-a2a-title="Why Senior Software Engineers Will Matter More (In 2026) in an AI-First World"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world%2F&amp;linkname=Why%20Senior%20Software%20Engineers%20Will%20Matter%20More%20%28In%202026%29%20in%20an%20AI-First%20World" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world%2F&amp;linkname=Why%20Senior%20Software%20Engineers%20Will%20Matter%20More%20%28In%202026%29%20in%20an%20AI-First%20World" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world%2F&amp;linkname=Why%20Senior%20Software%20Engineers%20Will%20Matter%20More%20%28In%202026%29%20in%20an%20AI-First%20World" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world%2F&amp;linkname=Why%20Senior%20Software%20Engineers%20Will%20Matter%20More%20%28In%202026%29%20in%20an%20AI-First%20World" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhy-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world%2F&amp;linkname=Why%20Senior%20Software%20Engineers%20Will%20Matter%20More%20%28In%202026%29%20in%20an%20AI-First%20World" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Maneesh Parihar">Maneesh Parihar</a>. Read the original post at: <a href="https://www.ishir.com/blog/312239/why-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world.htm">https://www.ishir.com/blog/312239/why-senior-software-engineers-will-matter-more-in-2026-in-an-ai-first-world.htm</a> </p>

Use of XMRig Cryptominer by Threat Actors Expanding: Expel

  • Jeffrey Burt
  • Published date: 2026-01-09 00:00:00

None

<p>XMRig is a legitimate open-source cryptocurrency mining tool <a href="https://github.com/xmrig/xmrig" target="_blank" rel="noopener">available on GitHub</a> that hackers for years have been deploying in campaigns aiming to steal crypto – particularly Monero – from victim’s wallets.</p><p>As an example, threat researchers with Kaspersky early last year reported seeing a surge starting in late December 2024 of <a href="https://www.kaspersky.com/blog/miner-xmrig-delivered-via-torrents/53061/" target="_blank" rel="noopener">threat actors exploiting XMRig</a>, distributing the cryptominer through game torrents in a campaign dubbed “StaryDobry.”</p><p>“However, the cryptominer also surfaced on corporate networks — probably due to employees using work computers for personal use,” the researchers wrote.</p><p>More recently, some bad actors were seen by security researchers exploiting the maximum-severity <a href="https://securityboulevard.com/2025/12/attackers-worldwide-are-zeroing-in-on-react2shell-vulnerability/" target="_blank" rel="noopener">React2Shell vulnerability</a> that exploded onto the scene last month to deploy XMRig and other cryptominers. According researchers with Wiz, <a href="https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182" target="_blank" rel="noopener">one campaign</a> deployed a UPX packed version of XMRig, while a second one downloaded the standard XMRig setup from GitHub.</p><h3>Cryptominers Could Signal Security Holes</h3><p>In a blog post this week, Ben Nahorney, senior technical marketing writer with Expel, which provides AI-based managed detection and response (MDR) services, <a href="https://expel.com/blog/on-the-radar-weeding-out-xmrig/" target="_blank" rel="noopener">compared MXRig and other cryptominers to weeds</a> that will pop up in the cracks of unpatched software and compromised credentials and “like weeds … is an annoyance that should be pulled out for the health of the garden.”</p><p>“Dealing with cryptominers may not seem urgent when tackling bigger threats, and while it could be argued they’re ‘less malicious,’ they should still be prioritized,” Nahorney wrote. “The fact is the presence of an unauthorized cryptominer tends to speak to unaddressed security holes in the environment. And any attackers getting XMRig onto systems could just as easily be installing more malicious software if they so choose.”</p><p>XMRig is a legitimate tool, but its detection can signal a weakness in an organization’s.</p><p>“Threats are similarly opportunistic” as weeds are, Nahorney wrote. “They don’t limit themselves to a single attack vector or platform. The goal is to establish themselves how and where they can. Few threats illustrate this better than cryptominers. While it can be argued that cryptominers in and of themselves are not malicious, bad actors often install them without users’ or admins’ knowledge.”</p><h3>A Booming Business</h3><p>Cryptominers remain in demand among legitimate and bad actors. According to analysts with market research firm Precedence Research, the global crypto mining market was valued at $2.77 billion last year and is projected to rise to $3.12 billion in 2026. By 2035, <a href="https://www.precedenceresearch.com/cryptocurrency-mining-market" target="_blank" rel="noopener">it will be worth $9.18 billion</a>, growing an average of 12.73% a year.</p><p>“The industry is expanding primarily because of the development of distributed ledger technologies and an increase in electronic venture capital investment,” the analysts wrote. “Digital currency is now being used by developing nations as a means of financial transactions. Additionally, blockchain technology is frequently used in conjunction with virtual currency to provide decentralized and managed related capital.”</p><h3>Many Avenues for Using XMRig</h3><p>According to Expel’s Nahorney, XMRig in particular is popping up in a growing number of places. He noted that use of React2Shell to distribute the cryptominer, but noted it’s been used to compromise credentials of several remote administration application and in SSH brute-force attakcs.</p><p>It’s also been installed through commodity malware.</p><p>XMRig provides cross-platform compatibility, so hackers can use the same tool not only in Windows endpoints and Linux hosts, but also in Kubernetes pods and Amazon Web Services EC2 instances.</p><p>“Since XMRig performs CPU mining, it is an ideal choice in low-resource conditions such as these,” he wrote. “This allows attackers to efficiently monetize the platforms they compromise, regardless of their size and computing power.”</p><h3>Roaring Back</h3><p>Researchers with German cybersecurity firm G Data CyberDefense last summer wrote about a <a href="https://www.gdatasoftware.com/blog/2025/07/38228-monero-malware-xmrig-resurgence" target="_blank" rel="noopener">resurgence of malware deploying XMRig</a> after what they described as a “two-year hiatus.” The researchers noted one possible reason for the upswing was the rally of the market for Monero between January and May last year – including a spike in April – gaining 45% in value, from $196 to $285.</p><p>“The spike coincided with the high-profile bitcoin theft that was subsequently converted into Monero,” they wrote. “This theft and subsequent conversion were reportedly orchestrated by a single individual in the U.S.”</p><p>Another driver was the optimization updates introduced in April, which they wrote “may have encouraged users (including threat actors) to capitalize on the promise of the latest version.”</p><h3>‘No Smoking Gun’</h3><p>Nahorney wrote that “XMRig isn’t inherently malicious since it’s legitimate mining software, which can make detection trickier. When attempting to identify unauthorized cryptomining installations, no single indicator is a smoking gun confirming a miner’s presence on its own.”</p><p>Organizations need to look for outbound connections used by Monero mining pools, unusual encrypted connections, and high CPU use on systems that don’t tend of run intensive workloads or during off hours. They also should check for unexpected scheduled task, cron jobs, or registry startup items. With Kubernetes, they should review pod security policies and ensure baseline profiles are enabled, and in AWS C2 instances, they need to use AWS GuardDuty to detect cryptomining and turn on Runtime Monitoring.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/use-of-xmrig-cryptominer-by-threat-actors-expanding-expel/" data-a2a-title="Use of XMRig Cryptominer by Threat Actors Expanding: Expel"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fuse-of-xmrig-cryptominer-by-threat-actors-expanding-expel%2F&amp;linkname=Use%20of%20XMRig%20Cryptominer%20by%20Threat%20Actors%20Expanding%3A%20Expel" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fuse-of-xmrig-cryptominer-by-threat-actors-expanding-expel%2F&amp;linkname=Use%20of%20XMRig%20Cryptominer%20by%20Threat%20Actors%20Expanding%3A%20Expel" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fuse-of-xmrig-cryptominer-by-threat-actors-expanding-expel%2F&amp;linkname=Use%20of%20XMRig%20Cryptominer%20by%20Threat%20Actors%20Expanding%3A%20Expel" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fuse-of-xmrig-cryptominer-by-threat-actors-expanding-expel%2F&amp;linkname=Use%20of%20XMRig%20Cryptominer%20by%20Threat%20Actors%20Expanding%3A%20Expel" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fuse-of-xmrig-cryptominer-by-threat-actors-expanding-expel%2F&amp;linkname=Use%20of%20XMRig%20Cryptominer%20by%20Threat%20Actors%20Expanding%3A%20Expel" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Sectigo New Public Roots and Issuing CAs Hierarchy [2025 Migration Guide]

  • None
  • Published date: 2026-01-09 00:00:00

None

<article id="post-4357" class="post-4357 post type-post status-publish format-standard has-post-thumbnail hentry category-https-encryption category-ssl-certificate tag-sectigo-public-root-and-intermediate-ca-migration tag-sectigo-public-root-cas-migration entry" morss_own_score="8.168627450980392" morss_score="16.048180256492977"> <p><span><a href="https://certera.com/blog/">Home</a> » <span>Sectigo New Public Roots and Issuing CAs Hierarchy [2025 Migration Guide]</span></span></p> <h1>Sectigo New Public Roots and Issuing CAs Hierarchy [2025 Migration Guide]</h1> <div><img decoding="async" src="https://certera.com/blog/wp-content/plugins/wp-postratings/images/stars/rating_on.gif" title="1 Star"><img decoding="async" src="https://certera.com/blog/wp-content/plugins/wp-postratings/images/stars/rating_on.gif" title="2 Stars"><img decoding="async" src="https://certera.com/blog/wp-content/plugins/wp-postratings/images/stars/rating_on.gif" title="3 Stars"><img decoding="async" src="https://certera.com/blog/wp-content/plugins/wp-postratings/images/stars/rating_on.gif" title="4 Stars"><img decoding="async" src="https://certera.com/blog/wp-content/plugins/wp-postratings/images/stars/rating_on.gif" title="5 Stars"> (<strong>7</strong> votes, average: <strong>5.00</strong> out of 5)</div> <p><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%2016%2016'%3E%3C/svg%3E"> </p> <figure> <img decoding="async" src="https://certera.com/blog/wp-content/uploads/2026/01/new-root-cas-migration.webp"> </figure> <div class="entry-content" morss_own_score="5.528336380255942" morss_score="205.4356232143008"> <p>The majority of certificate outages don’t begin with a breach alert. They are silent at first. One day, a browser warning appears when your website loads, causing users to hesitate and your traffic to decline. </p> <p>This is due to the fact that most certificate failures are not caused by hackers. They occur as a result of teams failing to notice subtle infrastructure changes that are taking place in the background.</p> <p><strong>That’s precisely what Sectigo’s Public Root and Intermediate CA migration for 2025 aims to achieve.</strong></p> <p>On your end, everything might appear to be fine. It still indicates that your <a href="https://certera.com/">SSL certificate</a> is valid. Reminders for renewals are still coming in. Your dashboards remain green. However, trust is actually changing at the browser level, and browsers, rather than your server, determine what is safe.</p> <p>If you don’t prepare for this migration, browsers will stop trusting certificates issued under older chains. When that happens, the impact is immediate: security warnings, broken HTTPS, failed API calls, and lost user confidence.</p> <h2>Why Sectigo Reconsidered Its Strategy of Root CA</h2> <p>Standards of security do not rest on their laurels. Nor can certificate authorities afford to either. This was the case over the last couple of years as browser vendors, as well as root programs, have set the bar high for the aspect of trust. </p> <p>The regulations that used to be the guiding force in the issuance of certificates are not sufficient to address the current security standards. With those rules being revised, old standard models of certificates became old-fashioned.</p> <p>That is why Sectigo also left the concept of multi-purpose root CAs and embraced single-purpose Public Root certificates.</p> <p>The purpose of multi-purpose routes was created at another time. They managed several types of certificates in a single umbrella that made them more complex and risky in the long term. The modern-day security model is biased towards isolation, clarity, and a narrow-scope root, and single-purpose roots provide just that.</p> <h3>Under this Change, Sectigo is assured of being able to:</h3> <ul> <li>Meet evolving <a href="https://certera.com/blog/ca-b-approved-47-day-ssl-tls-validity-by-2029-how-to-prepare/">CA/Browser Forum requirements</a> without last-minute workarounds</li> <li>Stay aligned with Chrome and Mozilla root program policies, including future enforcement changes</li> <li>Reduce long-term security exposure by limiting what each root is allowed to do</li> <li>Preserve trust across browsers, operating systems, and devices, both modern and legacy</li> </ul> <p>It is a structural change. Browsers are aggressively implementing these standards, and legacy roots are being eliminated on fixed schedules. The <a href="https://certera.com/blog/what-is-a-ca-certificate-authority-role-pki-trust-hierarchies/">certificate authorities</a> never have the privilege of not doing so, nor do the organisations in which they are entrusted.</p> <p><strong>Also Read:</strong> <a href="https://certera.com/blog/root-certificate-vs-intermediate-certificate-the-real-difference/">Root Certificate vs Intermediate Certificate</a></p> <h2>What Single-Purpose Root CAs Actually Mean</h2> <p>For years, legacy root certificates tried to do everything.</p> <p>They released various forms of certificates, had numerous applications, and the responsibility continued to expand with time. That leeway had been successful in the earlier days, but it also added complexity, risk, and long-term maintenance issues.</p> <p>Legacy roots simply did too much. Single-purpose Root CAs take the opposite approach.</p> <p>They are not generic trust anchors but rather constructed to perform one specific, well-defined purpose. In the case of Sectigo, it would be roots dedicated either to <a href="https://certera.com/buy-ssl-certificates">TLS/SSL</a> or <a href="https://certera.com/smime-certificates">S/MIME</a>, and strongly restricted certificate usage.</p> <h3>This Design Change delivers Real Security Benefits:</h3> <ul> <li>Certificate usage is limited by design, not policy alone</li> <li>Attack surface shrinks because fewer functions mean fewer ways to abuse trust</li> <li>Modern browser enforcement rules are met by default, not through exceptions</li> <li>Forced distrust timelines are avoided because these roots align with current root program expectations.</li> </ul> <p>Browsers desire predictability. They desire foundations that act predictably and have limited rules of conduct. Root CAs that are single-purpose offer such clarity.</p> <h2>The Timeline You Cannot Ignore</h2> <p>There’s one date you need to remember, and missing it has consequences.</p> <p><strong><em>Starting January 1, 2026, Sectigo will no longer re-issue SSL certificates under older root or intermediate chains.</em></strong> This isn’t a recommendation. It’s a hard stop.</p> <p><strong>Once this date passes, any certificate still tied to a legacy chain hits a dead end.</strong> You won’t be able to reissue it. You won’t be able to renew it under the same hierarchy. And waiting until the last moment won’t buy you time.</p> <p>Once this date passes, any certificate still tied to a legacy chain hits a dead end. You won’t be able to reissue it. You won’t be able to renew it under the same hierarchy. And waiting until the last moment won’t buy you time.</p> <h3>Here’s how it plays out in the real world:</h3> <ul> <li>Old chains mean no renewals</li> <li>No renewals mean expired certificates</li> <li><a href="https://certera.com/blog/expired-ssl-certificates-are-risky-14-7-million-people-affected-by-the-mr-cooper-data-breach/">Expired certificates mean outages</a></li> </ul> <p>And outages don’t just break encryption. They break user confidence, search rankings, API integrations, and <a href="https://certera.com/blog/what-is-certificate-automation-how-automation-helps-prevent-ssl-attacks/">automated workflows</a> that depend on HTTPS.</p> <p>Sectigo has already started the migration, and most certificate issuance has moved to the new public roots. The remaining transitions are happening now. The window is closing, and the safest time to act is before browsers force the issue for you.</p> <p><strong>Also Read:</strong> <a href="https://certera.com/blog/certificate-life-cycle-management-emerging-trends-to-watch-in-2026/">Certificate Management Emerging Trends to Watch in 2026</a></p> <h2>What Happens If You Stay on Legacy Roots</h2> <p>Everything looks fine on the surface. The certificate is still valid. The expiration date is months away. Monitoring tools stay quiet. And because nothing appears broken, the issue gets pushed down the priority list.</p> <p>Until it isn’t fine anymore.</p> <p>Major browser root programs now enforce mandatory distrust timelines. These aren’t theoretical policies. They are active rules that browsers already follow.</p> <h3>Here’s what that means in practice:</h3> <ul> <li>Legacy roots lose trust once their private keys hit age limits, regardless of certificate validity</li> <li>Chrome enforces SCTNotAfter dates, which silently invalidate certificates issued after a cutoff point</li> <li>Mozilla distrust propagates through NSS, impacting Linux, BSD, and countless enterprise systems</li> </ul> <p>Once distrust kicks in, the browser doesn’t care that your certificate hasn’t expired. Trust disappears anyway.</p> <p>You are just one browser update away and one policy enforcement, and suddenly, users see security warnings, APIs reject connections, and encrypted traffic stops flowing. By the time it shows up in your dashboards, your users have already noticed, and many of them have already left.</p> <p><strong>Also Read:</strong> <a href="https://certera.com/blog/what-is-certificate-management-why-do-businesses-need-centralized-certificate-management-solution/">What is Certificate Management? Why Do Businesses Need Centralized Certificate Management Solution?</a></p> <h2>How the New Sectigo Certificate Chain Works</h2> <figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20994%20902'%3E%3C/svg%3E"></figure> <p>Sectigo didn’t just replace old certificates with new ones. They redesigned the entire trust model for stability, longevity, and compatibility.</p> <p>The new <a href="https://certera.com/blog/what-is-a-ca-certificate-authority-role-pki-trust-hierarchies/">certificate chain</a> follows a clear and intentional structure.</p> <h3>First, all new certificates are now issued under modern public root CAs: </h3> <p>These roots are single-purpose, tightly scoped, and fully aligned with current browser and root program requirements. This ensures long-term trust without running into future enforcement surprises.</p> <h3>Second, cross-signed roots act as the compatibility bridge:</h3> <p>They allow certificates issued under new roots to chain back to well-established legacy roots such as USERTrust, when older devices or operating systems need them. This keeps legacy environments working without weakening security for modern platforms.</p> <h3>Lastly, legacy roots do not issue certificates anymore:</h3> <p>They exist in the form of trust anchors. They are not to establish chains but to approve those that need to be. This hugely minimizes risk and maintains compatibility.</p> <p><strong>The outcome is a pure division of roles:</strong></p> <ul> <li>New roots handle issuance</li> <li>Cross-signed roots address compatibility.</li> <li>Legacy roots only deal with trust.</li> </ul> <h2>Sectigo’s New Roots and Issuing CA for RSA, ECC Trust Path</h2> <figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20667%20271'%3E%3C/svg%3E"></figure> <figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20662%20256'%3E%3C/svg%3E"></figure> <h2>What is in your Sectigo SSL Certificate Folder?</h2> <p>Once the SSL files have been downloaded, it is easy to forget them. It is where it usually begins to create issues.</p> <p>Each file in the Sectigo folder has a purpose.</p> <figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20569%20309'%3E%3C/svg%3E"></figure> <p>You will be displayed with your domain certificate. This is the one that is attached to your site and which makes HTTPS operational.</p> <p><strong>Intermediate certificates are also present</strong>. These come in between your site and the root of Sectigo and assist the browsers in ensuring that your certificate is genuine.</p> <p>You can observe a <strong>cross-signed root certificate</strong>. This is because of older systems that have not yet been updated to the newer root, meaning that your site still functions with them.</p> <p>The <strong>USERTrust root certificate</strong> is also included with Sectigo. It is still being used by many older devices, and taking it away too soon will lead to trust errors.</p> <p>Occasionally, it has a <a href="https://certera.com/kb/what-is-a-ca-bundle-in-ssl-and-how-do-you-create-it/">CA bundle</a>, which simply bundles everything together so as to be able to ease setup.</p> <p>The lesson learned is easy: install every file you’re given. Miss one, and browsers won’t trust your site.</p> <h2>Sectigo Certificate Migration Timeline</h2> <figure> <table> <tbody> <tr> <td><strong>Certificate Type</strong></td> <td><strong>Issued </strong><strong>Before</strong><strong> This Date (Legacy Chain)</strong></td> <td><strong>Issued </strong><strong>After</strong><strong> This Date (New Chain)</strong></td> <td><strong>New Intermediate CA</strong></td> <td><strong>New Root CA (Trusted Chain)</strong></td> <td><strong>Action Required</strong></td> </tr> <tr> <td><strong><a href="https://certera.com/ssl-types/ev-ssl">EV SSL</a></strong></td> <td>Before <strong>Apr 15, 2025</strong></td> <td>On/After <strong>Apr 15, 2025</strong></td> <td>Sectigo Public Server Authentication <strong>CA EV R36 / E36</strong></td> <td>Sectigo Public Server Authentication <strong>Root R46 / E46</strong> (cross-signed via USERTrust)</td> <td>Verify chain if issued before date</td> </tr> <tr> <td><strong><a href="https://certera.com/ssl-types/ov-ssl">OV SSL</a></strong></td> <td>Before <strong>May 15, 2025</strong></td> <td>On/After <strong>May 15, 2025</strong></td> <td>Sectigo Public Server Authentication <strong>CA OV R36 / E36</strong></td> <td>Sectigo Public Server Authentication <strong>Root R46 / E46</strong> (cross-signed via USERTrust)</td> <td>Update on renewal or reissue</td> </tr> <tr> <td><strong><a href="https://certera.com/ssl-types/dv-ssl">DV SSL</a></strong></td> <td>Before <strong>June 2, 2025</strong></td> <td>On/After <strong>June 2, 2025</strong></td> <td>Sectigo Public Server Authentication <strong>CA DV R36 / E36</strong></td> <td>Sectigo Public Server Authentication <strong>Root R46 / E46</strong> (cross-signed via USERTrust)</td> <td>Check older certs immediately</td> </tr> <tr> <td><strong><a href="https://certera.com/smime/digicert-smime-email-certificate">S/MIME (Email)</a></strong></td> <td>Before <strong>Mar 1, 2025</strong></td> <td>On/After <strong>Mar 1, 2025</strong></td> <td>Sectigo Public Email Protection <strong>CA R36</strong></td> <td>Sectigo Public Email Protection <strong>Root R46 / E46</strong></td> <td>Update trust stores</td> </tr> <tr> <td><strong><a href="https://certera.com/code-signing">Code Signing (OV &amp; EV)</a></strong></td> <td>Early 2025 (legacy roots)</td> <td>2025 onward (phased)</td> <td>  Sectigo Public Code Signing <strong>CA R36</strong></td> <td>Sectigo Public Code Signing <strong>Root R46</strong> (USERTrust cross-signed)</td> <td>Mandatory for future signing</td> </tr> </tbody> </table> </figure> <p><strong>Recommended: </strong><a href="https://www.sectigo.com/knowledge-base/detail/Access-New-Sectigo-Certificate-Chain">Access New Sectigo Public Certificate Chain Here</a></p> <h2>How to Set Up the New Sectigo Certificate Chain</h2> <p>The following steps are to be taken when installing or renewing your Sectigo SSL certificate to prevent a problem of trust.</p> <ul> <li><strong>Install the entire certificate package:</strong> Use the folder of the SSL certificate as it was on your Sectigo account or email. Minimise the downloading of files.</li> <li><strong>Install your domain (leaf) certificate:</strong> It is the certificate that is issued to your domain (such as yourdomaincom.crt). Install it on your server as the main certificate for SSL.</li> <li><strong>Install the intermediate certificates:</strong> Install the appropriate intermediate CA depending on the type of certificate that you have (DV, OV, or EV – R36 or E36). Such certificates associate your domain with the public root of Sectigo.</li> <li><strong>Install the cross-signed root certificate</strong>: Install the cross-signed root, which is chained on the legacy USERTrust root. This will make it compatible with older systems and operating systems.</li> <li><strong>Install CA bundle:</strong> In case your server supports a CA bundle, it is better to install the <strong>MyCA_Bundle.ca-bundle file</strong> rather than installing the separate certificates to prevent ordering problems.</li> <li><strong>Check the complete certificate chain:</strong> Once you have installed the certificate, test the chain using an <a href="https://certera.com/ssl-tools/ssl-checker">SSL checker</a> to ensure that the chain is complete and is relied upon by the browsers.</li> </ul> <h2>Disable or Delete Untrusted Root from Microsoft Trust Store (Recommended)</h2> <p>If older devices fail to trust your certificate on a Windows server, Windows may select the <strong>self-signed Sectigo root</strong> instead of <strong>the USERTrust cross-signed root.</strong> </p> <p><strong>To fix this: </strong></p> <ul> <li>Log in to the server as an administrator and open <strong>Microsoft Management Console (mmc).</strong> </li> </ul> <ul> <li>Add the <strong>Certificates</strong> snap-in for the <strong>Local Computer.</strong> </li> </ul> <ul> <li>In <strong>Trusted Root Certification Authorities</strong>, locate the certificate: </li> </ul> <ul> <li><strong>Issued to:</strong> Sectigo Public Server Authentication Root R46 (or E46) </li> </ul> <ul> <li><strong>Issued by:</strong> Sectigo Public Server Authentication Root R46 (or E46) </li> </ul> <ul> <li>Disable or delete this certificate <strong>only if</strong> the Issued to and Issued by values are the same. </li> </ul> <ul> <li>Keep the <strong>USERTrust-issued cross-signed root</strong> enabled. </li> </ul> <p>This step is required <strong>only when trust issues occur on Windows systems.</strong> Do not remove root certificates unless the problem is confirmed. </p> <h2>Best Practices to Avoid Downtime</h2> <p>Most <a href="https://certera.com/blog/what-are-certificate-outages-how-to-avoid-ssl-certificate-outages-with-acme/">certificate outages</a> happen because of small setup mistakes, not hacking.</p> <p><strong>To avoid issues:</strong></p> <ul> <li>Install every certificate you’re given. Missing even one breaks the trust chain.</li> <li>Use the CA bundle if your server supports it. It reduces mistakes.</li> <li>Don’t pin roots or intermediates. When certificates change, pinned setups fail.</li> <li>Keep trust stores updated on servers, containers, and apps.</li> </ul> <p>SSL certificates aren’t one-time setup items. If you don’t maintain them, browsers will eventually stop trusting them.</p> <h2>Conclusion</h2> <p>The Sectigo Public Root and Intermediate CA migration isn’t a future problem. It’s a present responsibility.</p> <p>The changes are already in motion, browsers are already enforcing new trust rules, and the deadline is fixed. Teams that prepare now will transition quietly without impact. Teams that wait will discover the change only when users start seeing warnings.</p> <p>Audit your certificate chains. Install the full trust path. Move to the new public roots with confidence.</p> <p>Because when it comes to certificate trust, being proactive is the only safe option. Don’t hesitate to <a href="https://certera.com/support">contact our SSL Experts</a> for any query!</p> </div> <p><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20132%20132'%3E%3C/svg%3E"></p> <h2> Janki Mehta</h2> <p> Janki Mehta is a passionate Cyber-Security Enthusiast who keenly monitors the latest developments in the Web/Cyber Security industry. She puts her knowledge into practice and helps web users by arming them with the necessary security measures to stay safe in the digital world.</p> </article><p>The majority of certificate outages don’t begin with a breach alert. They are silent at first. One day, a browser warning appears when your website loads, causing users to hesitate and your traffic to decline. </p><p>This is due to the fact that most certificate failures are not caused by hackers. They occur as a result of teams failing to notice subtle infrastructure changes that are taking place in the background.</p><p><strong>That’s precisely what Sectigo’s Public Root and Intermediate CA migration for 2025 aims to achieve.</strong></p><p>On your end, everything might appear to be fine. It still indicates that your <a href="https://certera.com/">SSL certificate</a> is valid. Reminders for renewals are still coming in. Your dashboards remain green. However, trust is actually changing at the browser level, and browsers, rather than your server, determine what is safe.</p><p>If you don’t prepare for this migration, browsers will stop trusting certificates issued under older chains. When that happens, the impact is immediate: security warnings, broken HTTPS, failed API calls, and lost user confidence.</p><h2>Why Sectigo Reconsidered Its Strategy of Root CA</h2><p>Standards of security do not rest on their laurels. Nor can certificate authorities afford to either. This was the case over the last couple of years as browser vendors, as well as root programs, have set the bar high for the aspect of trust. </p><p>The regulations that used to be the guiding force in the issuance of certificates are not sufficient to address the current security standards. With those rules being revised, old standard models of certificates became old-fashioned.</p><p>That is why Sectigo also left the concept of multi-purpose root CAs and embraced single-purpose Public Root certificates.</p><p>The purpose of multi-purpose routes was created at another time. They managed several types of certificates in a single umbrella that made them more complex and risky in the long term. The modern-day security model is biased towards isolation, clarity, and a narrow-scope root, and single-purpose roots provide just that.</p><h3>Under this Change, Sectigo is assured of being able to:</h3><ul> <li>Meet evolving <a href="https://certera.com/blog/ca-b-approved-47-day-ssl-tls-validity-by-2029-how-to-prepare/">CA/Browser Forum requirements</a> without last-minute workarounds</li> <li>Stay aligned with Chrome and Mozilla root program policies, including future enforcement changes</li> <li>Reduce long-term security exposure by limiting what each root is allowed to do</li> <li>Preserve trust across browsers, operating systems, and devices, both modern and legacy</li> </ul><p>It is a structural change. Browsers are aggressively implementing these standards, and legacy roots are being eliminated on fixed schedules. The <a href="https://certera.com/blog/what-is-a-ca-certificate-authority-role-pki-trust-hierarchies/">certificate authorities</a> never have the privilege of not doing so, nor do the organisations in which they are entrusted.</p><p><strong>Also Read:</strong> <a href="https://certera.com/blog/root-certificate-vs-intermediate-certificate-the-real-difference/">Root Certificate vs Intermediate Certificate</a></p><h2>What Single-Purpose Root CAs Actually Mean</h2><p>For years, legacy root certificates tried to do everything.</p><p>They released various forms of certificates, had numerous applications, and the responsibility continued to expand with time. That leeway had been successful in the earlier days, but it also added complexity, risk, and long-term maintenance issues.</p><p>Legacy roots simply did too much. Single-purpose Root CAs take the opposite approach.</p><p>They are not generic trust anchors but rather constructed to perform one specific, well-defined purpose. In the case of Sectigo, it would be roots dedicated either to <a href="https://certera.com/buy-ssl-certificates">TLS/SSL</a> or <a href="https://certera.com/smime-certificates">S/MIME</a>, and strongly restricted certificate usage.</p><h3>This Design Change delivers Real Security Benefits:</h3><ul> <li>Certificate usage is limited by design, not policy alone</li> <li>Attack surface shrinks because fewer functions mean fewer ways to abuse trust</li> <li>Modern browser enforcement rules are met by default, not through exceptions</li> <li>Forced distrust timelines are avoided because these roots align with current root program expectations.</li> </ul><p>Browsers desire predictability. They desire foundations that act predictably and have limited rules of conduct. Root CAs that are single-purpose offer such clarity.</p><h2>The Timeline You Cannot Ignore</h2><p>There’s one date you need to remember, and missing it has consequences.</p><p><strong><em>Starting January 1, 2026, Sectigo will no longer re-issue SSL certificates under older root or intermediate chains.</em></strong> This isn’t a recommendation. It’s a hard stop.</p><p><strong>Once this date passes, any certificate still tied to a legacy chain hits a dead end.</strong> You won’t be able to reissue it. You won’t be able to renew it under the same hierarchy. And waiting until the last moment won’t buy you time.</p><p>Once this date passes, any certificate still tied to a legacy chain hits a dead end. You won’t be able to reissue it. You won’t be able to renew it under the same hierarchy. And waiting until the last moment won’t buy you time.</p><h3>Here’s how it plays out in the real world:</h3><ul> <li>Old chains mean no renewals</li> <li>No renewals mean expired certificates</li> <li><a href="https://certera.com/blog/expired-ssl-certificates-are-risky-14-7-million-people-affected-by-the-mr-cooper-data-breach/">Expired certificates mean outages</a></li> </ul><p>And outages don’t just break encryption. They break user confidence, search rankings, API integrations, and <a href="https://certera.com/blog/what-is-certificate-automation-how-automation-helps-prevent-ssl-attacks/">automated workflows</a> that depend on HTTPS.</p><p>Sectigo has already started the migration, and most certificate issuance has moved to the new public roots. The remaining transitions are happening now. The window is closing, and the safest time to act is before browsers force the issue for you.</p><p><strong>Also Read:</strong> <a href="https://certera.com/blog/certificate-life-cycle-management-emerging-trends-to-watch-in-2026/">Certificate Management Emerging Trends to Watch in 2026</a></p><h2>What Happens If You Stay on Legacy Roots</h2><p>Everything looks fine on the surface. The certificate is still valid. The expiration date is months away. Monitoring tools stay quiet. And because nothing appears broken, the issue gets pushed down the priority list.</p><p>Until it isn’t fine anymore.</p><p>Major browser root programs now enforce mandatory distrust timelines. These aren’t theoretical policies. They are active rules that browsers already follow.</p><h3>Here’s what that means in practice:</h3><ul> <li>Legacy roots lose trust once their private keys hit age limits, regardless of certificate validity</li> <li>Chrome enforces SCTNotAfter dates, which silently invalidate certificates issued after a cutoff point</li> <li>Mozilla distrust propagates through NSS, impacting Linux, BSD, and countless enterprise systems</li> </ul><p>Once distrust kicks in, the browser doesn’t care that your certificate hasn’t expired. Trust disappears anyway.</p><p>You are just one browser update away and one policy enforcement, and suddenly, users see security warnings, APIs reject connections, and encrypted traffic stops flowing. By the time it shows up in your dashboards, your users have already noticed, and many of them have already left.</p><p><strong>Also Read:</strong> <a href="https://certera.com/blog/what-is-certificate-management-why-do-businesses-need-centralized-certificate-management-solution/">What is Certificate Management? Why Do Businesses Need Centralized Certificate Management Solution?</a></p><h2>How the New Sectigo Certificate Chain Works</h2><figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20994%20902'%3E%3C/svg%3E"></figure><p>Sectigo didn’t just replace old certificates with new ones. They redesigned the entire trust model for stability, longevity, and compatibility.</p><p>The new <a href="https://certera.com/blog/what-is-a-ca-certificate-authority-role-pki-trust-hierarchies/">certificate chain</a> follows a clear and intentional structure.</p><h3>First, all new certificates are now issued under modern public root CAs: </h3><p>These roots are single-purpose, tightly scoped, and fully aligned with current browser and root program requirements. This ensures long-term trust without running into future enforcement surprises.</p><h3>Second, cross-signed roots act as the compatibility bridge:</h3><p>They allow certificates issued under new roots to chain back to well-established legacy roots such as USERTrust, when older devices or operating systems need them. This keeps legacy environments working without weakening security for modern platforms.</p><h3>Lastly, legacy roots do not issue certificates anymore:</h3><p>They exist in the form of trust anchors. They are not to establish chains but to approve those that need to be. This hugely minimizes risk and maintains compatibility.</p><p><strong>The outcome is a pure division of roles:</strong></p><ul> <li>New roots handle issuance</li> <li>Cross-signed roots address compatibility.</li> <li>Legacy roots only deal with trust.</li> </ul><h2>Sectigo’s New Roots and Issuing CA for RSA, ECC Trust Path</h2><figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20667%20271'%3E%3C/svg%3E"></figure><figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20662%20256'%3E%3C/svg%3E"></figure><h2>What is in your Sectigo SSL Certificate Folder?</h2><p>Once the SSL files have been downloaded, it is easy to forget them. It is where it usually begins to create issues.</p><p>Each file in the Sectigo folder has a purpose.</p><figure><img decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20569%20309'%3E%3C/svg%3E"></figure><p>You will be displayed with your domain certificate. This is the one that is attached to your site and which makes HTTPS operational.</p><p><strong>Intermediate certificates are also present</strong>. These come in between your site and the root of Sectigo and assist the browsers in ensuring that your certificate is genuine.</p><p>You can observe a <strong>cross-signed root certificate</strong>. This is because of older systems that have not yet been updated to the newer root, meaning that your site still functions with them.</p><p>The <strong>USERTrust root certificate</strong> is also included with Sectigo. It is still being used by many older devices, and taking it away too soon will lead to trust errors.</p><p>Occasionally, it has a <a href="https://certera.com/kb/what-is-a-ca-bundle-in-ssl-and-how-do-you-create-it/">CA bundle</a>, which simply bundles everything together so as to be able to ease setup.</p><p>The lesson learned is easy: install every file you’re given. Miss one, and browsers won’t trust your site.</p><h2>Sectigo Certificate Migration Timeline</h2><figure> <table> <tbody> <tr> <td><strong>Certificate Type</strong></td> <td><strong>Issued </strong><strong>Before</strong><strong> This Date (Legacy Chain)</strong></td> <td><strong>Issued </strong><strong>After</strong><strong> This Date (New Chain)</strong></td> <td><strong>New Intermediate CA</strong></td> <td><strong>New Root CA (Trusted Chain)</strong></td> <td><strong>Action Required</strong></td> </tr> <tr> <td><strong><a href="https://certera.com/ssl-types/ev-ssl">EV SSL</a></strong></td> <td>Before <strong>Apr 15, 2025</strong></td> <td>On/After <strong>Apr 15, 2025</strong></td> <td>Sectigo Public Server Authentication <strong>CA EV R36 / E36</strong></td> <td>Sectigo Public Server Authentication <strong>Root R46 / E46</strong> (cross-signed via USERTrust)</td> <td>Verify chain if issued before date</td> </tr> <tr> <td><strong><a href="https://certera.com/ssl-types/ov-ssl">OV SSL</a></strong></td> <td>Before <strong>May 15, 2025</strong></td> <td>On/After <strong>May 15, 2025</strong></td> <td>Sectigo Public Server Authentication <strong>CA OV R36 / E36</strong></td> <td>Sectigo Public Server Authentication <strong>Root R46 / E46</strong> (cross-signed via USERTrust)</td> <td>Update on renewal or reissue</td> </tr> <tr> <td><strong><a href="https://certera.com/ssl-types/dv-ssl">DV SSL</a></strong></td> <td>Before <strong>June 2, 2025</strong></td> <td>On/After <strong>June 2, 2025</strong></td> <td>Sectigo Public Server Authentication <strong>CA DV R36 / E36</strong></td> <td>Sectigo Public Server Authentication <strong>Root R46 / E46</strong> (cross-signed via USERTrust)</td> <td>Check older certs immediately</td> </tr> <tr> <td><strong><a href="https://certera.com/smime/digicert-smime-email-certificate">S/MIME (Email)</a></strong></td> <td>Before <strong>Mar 1, 2025</strong></td> <td>On/After <strong>Mar 1, 2025</strong></td> <td>Sectigo Public Email Protection <strong>CA R36</strong></td> <td>Sectigo Public Email Protection <strong>Root R46 / E46</strong></td> <td>Update trust stores</td> </tr> <tr> <td><strong><a href="https://certera.com/code-signing">Code Signing (OV &amp; EV)</a></strong></td> <td>Early 2025 (legacy roots)</td> <td>2025 onward (phased)</td> <td>  Sectigo Public Code Signing <strong>CA R36</strong></td> <td>Sectigo Public Code Signing <strong>Root R46</strong> (USERTrust cross-signed)</td> <td>Mandatory for future signing</td> </tr> </tbody> </table> </figure><p><strong>Recommended: </strong><a href="https://www.sectigo.com/knowledge-base/detail/Access-New-Sectigo-Certificate-Chain">Access New Sectigo Public Certificate Chain Here</a></p><h2>How to Set Up the New Sectigo Certificate Chain</h2><p>The following steps are to be taken when installing or renewing your Sectigo SSL certificate to prevent a problem of trust.</p><ul> <li><strong>Install the entire certificate package:</strong> Use the folder of the SSL certificate as it was on your Sectigo account or email. Minimise the downloading of files.</li> <li><strong>Install your domain (leaf) certificate:</strong> It is the certificate that is issued to your domain (such as yourdomaincom.crt). Install it on your server as the main certificate for SSL.</li> <li><strong>Install the intermediate certificates:</strong> Install the appropriate intermediate CA depending on the type of certificate that you have (DV, OV, or EV – R36 or E36). Such certificates associate your domain with the public root of Sectigo.</li> <li><strong>Install the cross-signed root certificate</strong>: Install the cross-signed root, which is chained on the legacy USERTrust root. This will make it compatible with older systems and operating systems.</li> <li><strong>Install CA bundle:</strong> In case your server supports a CA bundle, it is better to install the <strong>MyCA_Bundle.ca-bundle file</strong> rather than installing the separate certificates to prevent ordering problems.</li> <li><strong>Check the complete certificate chain:</strong> Once you have installed the certificate, test the chain using an <a href="https://certera.com/ssl-tools/ssl-checker">SSL checker</a> to ensure that the chain is complete and is relied upon by the browsers.</li> </ul><h2>Disable or Delete Untrusted Root from Microsoft Trust Store (Recommended)</h2><p>If older devices fail to trust your certificate on a Windows server, Windows may select the <strong>self-signed Sectigo root</strong> instead of <strong>the USERTrust cross-signed root.</strong> </p><p><strong>To fix this: </strong></p><ul> <li>Log in to the server as an administrator and open <strong>Microsoft Management Console (mmc).</strong> </li> </ul><ul> <li>Add the <strong>Certificates</strong> snap-in for the <strong>Local Computer.</strong> </li> </ul><ul> <li>In <strong>Trusted Root Certification Authorities</strong>, locate the certificate: </li> </ul><ul> <li><strong>Issued to:</strong> Sectigo Public Server Authentication Root R46 (or E46) </li> </ul><ul> <li><strong>Issued by:</strong> Sectigo Public Server Authentication Root R46 (or E46) </li> </ul><ul> <li>Disable or delete this certificate <strong>only if</strong> the Issued to and Issued by values are the same. </li> </ul><ul> <li>Keep the <strong>USERTrust-issued cross-signed root</strong> enabled. </li> </ul><p>This step is required <strong>only when trust issues occur on Windows systems.</strong> Do not remove root certificates unless the problem is confirmed. </p><h2>Best Practices to Avoid Downtime</h2><p>Most <a href="https://certera.com/blog/what-are-certificate-outages-how-to-avoid-ssl-certificate-outages-with-acme/">certificate outages</a> happen because of small setup mistakes, not hacking.</p><p><strong>To avoid issues:</strong></p><ul> <li>Install every certificate you’re given. Missing even one breaks the trust chain.</li> <li>Use the CA bundle if your server supports it. It reduces mistakes.</li> <li>Don’t pin roots or intermediates. When certificates change, pinned setups fail.</li> <li>Keep trust stores updated on servers, containers, and apps.</li> </ul><p>SSL certificates aren’t one-time setup items. If you don’t maintain them, browsers will eventually stop trusting them.</p><h2>Conclusion</h2><p>The Sectigo Public Root and Intermediate CA migration isn’t a future problem. It’s a present responsibility.</p><p>The changes are already in motion, browsers are already enforcing new trust rules, and the deadline is fixed. Teams that prepare now will transition quietly without impact. Teams that wait will discover the change only when users start seeing warnings.</p><p>Audit your certificate chains. Install the full trust path. Move to the new public roots with confidence.</p><p>Because when it comes to certificate trust, being proactive is the only safe option. Don’t hesitate to <a href="https://certera.com/support">contact our SSL Experts</a> for any query!</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/sectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide/" data-a2a-title="Sectigo New Public Roots and Issuing CAs Hierarchy [2025 Migration Guide]"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fsectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide%2F&amp;linkname=Sectigo%20New%20Public%20Roots%20and%20Issuing%20CAs%20Hierarchy%20%5B2025%20Migration%20Guide%5D" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fsectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide%2F&amp;linkname=Sectigo%20New%20Public%20Roots%20and%20Issuing%20CAs%20Hierarchy%20%5B2025%20Migration%20Guide%5D" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fsectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide%2F&amp;linkname=Sectigo%20New%20Public%20Roots%20and%20Issuing%20CAs%20Hierarchy%20%5B2025%20Migration%20Guide%5D" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fsectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide%2F&amp;linkname=Sectigo%20New%20Public%20Roots%20and%20Issuing%20CAs%20Hierarchy%20%5B2025%20Migration%20Guide%5D" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fsectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide%2F&amp;linkname=Sectigo%20New%20Public%20Roots%20and%20Issuing%20CAs%20Hierarchy%20%5B2025%20Migration%20Guide%5D" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://certera.com/blog/">EncryptedFence by Certera – Web &amp;amp; Cyber Security Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Janki Mehta">Janki Mehta</a>. Read the original post at: <a href="https://certera.com/blog/sectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide/">https://certera.com/blog/sectigo-new-public-roots-and-issuing-cas-hierarchy-2025-migration-guide/</a> </p>

How Hackers Are Fighting Back Against ICE

  • Cooper Quintin
  • Published date: 2026-01-08 22:16:16

ICE has been invading U.S. cities, targeting, surveilling, harassing, assaulting, detaining, and torturing people who are undocumented immigrants. They also have targeted people with work permits, asylum seekers, permanent residents (people holding “green car…

ICE has been invading U.S. cities, targeting, surveilling, harassing, assaulting, detaining, and torturing people who are undocumented immigrants. They also have targeted people with work permits, as… [+5599 chars]

Cyera valued at $9 billion as data security firm raises $400 million

  • Reuters
  • Published date: 2026-01-08 16:22:27

Data security firm Cyera said on ‍Thursday it raised $400 ​million in a late-stage funding round, with ⁠its valuation tripling in little over a year to $9 billion, highlighting the surge in demand for AI-driven data ‌protection tools.

Data security firm Cyera said on Thursday it raised $400 million in a late-stage funding round, with its valuation tripling in little over a year to $9 billion, highlighting the surge in demand for A… [+1203 chars]

Transparency in upcoming passport refresh is just as vital as security

  • ALLISON LAI
  • Published date: 2026-01-08 16:00:00

PETALING JAYA: The government needs to ensure open ­procurement, independent oversight and robust governance to protect public funds and ­strengthen public trust as Malaysia's upcoming passport refresh involves hundreds of millions of ringgit in technology co…

PETALING JAYA: The government needs to ensure open ­procurement, independent oversight and robust governance to protect public funds and ­strengthen public trust as Malaysias upcoming passport refres… [+4231 chars]

A user-centric, privacy-preserving, and verifiable ecosystem for personal data management and utilization

  • None
  • Published date: 2026-01-08 12:09:01

Zafar, Osama, Namazi, Mina, Xu, Yuqiao, Yoo, Youngjin ORCID: 0000-0001-8548-3475 and Ayday, Erman (2026) A user-centric, privacy-preserving, and verifiable ecosystem for personal data management and utilization. In: Nicomette, Vincent, Benzekri, Abdelmalek, B…

Zafar, Osama, Namazi, Mina, Xu, Yuqiao, Yoo, YoungjinORCID: 0000-0001-8548-3475 and Ayday, Erman (2026) A user-centric, privacy-preserving, and verifiable ecosystem for personal data management an… [+1774 chars]

Best RFID Wallet Consumer Search Analysis January 2026: CardShield Carbon Fiber Wallet Examined as RFID-Blocking Technology Adoption Accelerates

  • CARDshield
  • Published date: 2026-01-08 00:32:00

Consumer search analysis examines CardShield carbon fiber RFID-blocking wallet specifications as contactless payment security awareness grows....

SAN FRANCISCO, CA, Jan. 07, 2026 (GLOBE NEWSWIRE) -- Disclaimer: This article is for informational purposes only. It is not security advice, financial advice, or professional guidance. This article m… [+26854 chars]

When the Vendor Becomes the Customer: Building Internal Tools on an Agentic IAM Platform

  • None
  • Published date: 2026-01-08 00:00:00

None

<div data-elementor-type="wp-post" data-elementor-id="52782" class="elementor elementor-52782" data-elementor-post-type="post"> <div class="elementor-element elementor-element-024fa2f ccustom_blogdetail_topsec e-flex e-con-boxed e-con e-parent" data-id="024fa2f" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="e-con-inner"> <div class="elementor-element elementor-element-988554d elementor-widget elementor-widget-text-editor" data-id="988554d" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p dir="ltr">It began, as an engineer’s attempt to fix a nagging problem often does, with irritation.</p> <p dir="ltr">Each night, automated test pipelines ran across an expanding surface area of the <a href="https://aembit.io/product-overview/" rel="noopener">Aembit Workload IAM Platform</a>, validating that core components behave as expected across environments. </p> <p dir="ltr">By morning, the results existed, but they were scattered across interfaces and notifications that required patience to reconstruct into a coherent picture. TestOps platform Qase.io stored the data, and Slack delivered partial summaries from individual repositories and pipelines – but neither provided a clear answer to the question engineers needed to answer at the start of each day: <em>Is everything actually working like it should?</em></p> <p dir="ltr">Sebastian Ostrowski, Aembit’s lead test automation engineer, decided to build a dashboard to bring those results into one place.</p> </div> </div> </div> </div> <div class="elementor-element elementor-element-3a23c12a e-con-full e-flex e-con e-parent" data-id="3a23c12a" data-element_type="container"> <div class="elementor-element elementor-element-72e3c5cd elementor-widget elementor-widget-image" data-id="72e3c5cd" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <figure class="wp-caption"> <a href="https://aembit.io/wp-content/uploads/2026/01/image3.png" data-elementor-open-lightbox="yes" data-elementor-lightbox-title="image3" data-e-action-hash="#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTI4NDIsInVybCI6Imh0dHBzOlwvXC9hZW1iaXQuaW9cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjZcLzAxXC9pbWFnZTMucG5nIn0%3D"><br> <img fetchpriority="high" decoding="async" width="1999" height="996" src="https://aembit.io/wp-content/uploads/2026/01/image3.png" class="attachment-full size-full wp-image-52842" alt="Screenshot of Aembit Test Dashboard." srcset="https://aembit.io/wp-content/uploads/2026/01/image3.png 1999w, https://aembit.io/wp-content/uploads/2026/01/image3-300x149.png 300w, https://aembit.io/wp-content/uploads/2026/01/image3-1024x510.png 1024w, https://aembit.io/wp-content/uploads/2026/01/image3-768x383.png 768w, https://aembit.io/wp-content/uploads/2026/01/image3-1536x765.png 1536w" sizes="(max-width: 1999px) 100vw, 1999px"> </a><figcaption class="widget-image-caption wp-caption-text"></figcaption></figure> </div> </div> </div> <div class="elementor-section elementor-top-section elementor-element elementor-element-7541b5c2 custom_blogdetail_topsec elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default" data-id="7541b5c2" data-element_type="section" data-settings='{"background_background":"classic","stretch_section":"section-stretched"}'> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6d1fe123" data-id="6d1fe123" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-47faf35 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="47faf35" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5eaef706" data-id="5eaef706" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-759fa442 elementor-widget elementor-widget-text-editor" data-id="759fa442" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Almost immediately, the work drifted into familiar territory: The application would run inside Kubernetes and depend on app-to-service connections (interactions that <a href="https://aembit.io/blog/identity-security-trends/" rel="noopener">have become routine</a> as non-human workloads take on more responsibility.)</p> <p>It would need access to Qase.io and Slack every night. But rather than introducing environment variables and long-lived tokens, Sebastian chose to use the Aembit Workload IAM Platform itself to handle access for the dashboard.</p> <p>At the time, this decision did not feel especially consequential. It was simply the cleanest option available. The dashboard would live in Kubernetes, it would be deployed through Argo CD, and it would need to authenticate itself repeatedly to external services. Using Aembit meant those credentials <a href="https://docs.aembit.io/get-started/how-aembit-works" rel="noopener">could be injected</a> at runtime, defined centrally and based on policy, and enforced through the platform rather than embedded into application code or configuration files.</p> </div> </div> </div> </div> </div> </section></div> </div> </div> </div> <div class="elementor-element elementor-element-2621b08 e-flex e-con-boxed e-con e-parent" data-id="2621b08" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="e-con-inner"> <div class="elementor-element elementor-element-67240ccf elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="67240ccf" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"><br> </span> </div> </div> </div> <div class="elementor-element elementor-element-2519cf0a elementor-widget elementor-widget-text-editor" data-id="2519cf0a" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Embark on a technical deep dive to our Docs site to read <a href="https://docs.aembit.io/get-started/how-aembit-works" rel="noopener"><em>How Aembit Works</em></a></p> </div> </div> <div class="elementor-element elementor-element-590d6d41 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="590d6d41" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"><br> </span> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-1de73ce5 e-flex e-con-boxed e-con e-parent" data-id="1de73ce5" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="e-con-inner"> <div class="elementor-element elementor-element-319123a8 elementor-widget elementor-widget-text-editor" data-id="319123a8" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>The implications of that choice became clearer as the work progressed.</p> <p>Sebastian built the dashboard as a Python Flask application with a Vue.js front end, backed by MongoDB. The service pulled test automation results from Qase.io on a regular cadence, stored them locally, and rendered them in a format that made nightly runs easier to interpret. It also posted summarized results into Slack, providing the team with a single, consistent signal each morning.</p> </div> </div> </div> </div> <section class="elementor-section elementor-top-section elementor-element elementor-element-67df0c13 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="67df0c13" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-574cd47d" data-id="574cd47d" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-74945ded elementor-widget elementor-widget-image" data-id="74945ded" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://aembit.io/wp-content/uploads/2026/01/image1.png" data-elementor-open-lightbox="yes" data-elementor-lightbox-title="image1" data-e-action-hash="#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTI4NDQsInVybCI6Imh0dHBzOlwvXC9hZW1iaXQuaW9cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjZcLzAxXC9pbWFnZTEucG5nIn0%3D"><br> <img decoding="async" width="800" height="377" src="https://aembit.io/wp-content/uploads/2026/01/image1-1024x482.png" class="attachment-large size-large wp-image-52844" alt="Aembit Workload IAM screenshot." srcset="https://aembit.io/wp-content/uploads/2026/01/image1-1024x482.png 1024w, https://aembit.io/wp-content/uploads/2026/01/image1-300x141.png 300w, https://aembit.io/wp-content/uploads/2026/01/image1-768x362.png 768w, https://aembit.io/wp-content/uploads/2026/01/image1-1536x723.png 1536w, https://aembit.io/wp-content/uploads/2026/01/image1.png 1999w" sizes="(max-width: 800px) 100vw, 800px"> </a> </div> </div> </div> </div> </div> </section> <div class="elementor-section elementor-top-section elementor-element elementor-element-49a32f04 custom_blogdetail_topsec elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default" data-id="49a32f04" data-element_type="section" data-settings='{"background_background":"classic","stretch_section":"section-stretched"}'> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73dffa1e" data-id="73dffa1e" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-1b18b5a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1b18b5a7" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-50717e2a" data-id="50717e2a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-3eb05c9e elementor-widget elementor-widget-text-editor" data-id="3eb05c9e" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Throughout that process, Sebastian never handled a Qase.io API key or a Slack token. He did not copy credentials between environments or keep temporary secrets on his machine, avoiding a set of practices that remain common in many engineering workflows. Developers <a href="https://aembit.io/blog/why-devs-arent-responsible-for-non-human-credential-hygiene/" rel="noopener">often end up</a> handling credentials and writing authorization logic themselves, tolerated because it is familiar and expedient, despite the risk and operational inefficiencies. </p> <p>In this case, it simply never entered the picture.</p> <p>“As a developer, I didn’t have to worry about secrets,” Sebastian said. “I just built the dashboard.”</p> </div> </div> </div> </div> </div> </section></div> </div> </div> </div> <div class="elementor-element elementor-element-582da65 e-con-full e-flex e-con e-parent" data-id="582da65" data-element_type="container"> <div class="elementor-element elementor-element-277890a9 e-con-full e-flex e-con e-child" data-id="277890a9" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="elementor-element elementor-element-1fa2e783 elementor-widget elementor-widget-image" data-id="1fa2e783" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img decoding="async" width="34" height="29" src="https://aembit.io/wp-content/uploads/2023/07/quotation-marks.svg" class="attachment-full size-full wp-image-4547" alt="quotation-mark-icon"> </div> </div> <div class="elementor-element elementor-element-53b07a1c elementor-widget elementor-widget-heading" data-id="53b07a1c" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">“As a developer, I didn’t have to worry about secrets.”</h4> </div> </div> </div> <div class="elementor-element elementor-element-4e7c92bf elementor-widget elementor-widget-text-editor" data-id="4e7c92bf" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <h2>When Debugging Doesn’t Mean Hunting for Secrets</h2> <p>The dashboard Sebastian built addressed one kind of failure: understanding test outcomes. Each morning, he could see what ran overnight, which components passed, and where tests failed. That clarity made regressions easier to spot and reduced the time spent reconstructing what happened across multiple systems.</p> <p>A different class of failure sat beneath the test results themselves. When a run failed because a service could not be reached or an API call was rejected, Sebastian could inspect the Aembit tenant to determine whether access had been granted as expected. He did not need to log in to machines or trace environment variables across repositories. The access layer was visible, inspectable, and separate from application logic.</p> <p>That separation mattered in practice. Sebastian did not begin the project as a Kubernetes specialist, and part of the work involved learning how an application fits into a real deployment workflow where responsibilities are divided and access is treated as shared infrastructure rather than developer-owned configuration.</p> <p>Using Aembit internally turned the dashboard into a practical test of that separation.</p> </div> </div> <div class="elementor-element elementor-element-272fd791 elementor-widget elementor-widget-image" data-id="272fd791" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://aembit.io/wp-content/uploads/2026/01/image2.png" data-elementor-open-lightbox="yes" data-elementor-lightbox-title="image2" data-e-action-hash="#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NTI4NDMsInVybCI6Imh0dHBzOlwvXC9hZW1iaXQuaW9cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjZcLzAxXC9pbWFnZTIucG5nIn0%3D"><br> <img loading="lazy" decoding="async" width="800" height="655" src="https://aembit.io/wp-content/uploads/2026/01/image2-1024x839.png" class="attachment-large size-large wp-image-52843" alt="Screenshot of Daily Activity Report." srcset="https://aembit.io/wp-content/uploads/2026/01/image2-1024x839.png 1024w, https://aembit.io/wp-content/uploads/2026/01/image2-300x246.png 300w, https://aembit.io/wp-content/uploads/2026/01/image2-768x629.png 768w, https://aembit.io/wp-content/uploads/2026/01/image2-1536x1258.png 1536w, https://aembit.io/wp-content/uploads/2026/01/image2.png 1978w" sizes="auto, (max-width: 800px) 100vw, 800px"> </a> </div> </div> </div> <div class="elementor-element elementor-element-80b7413 e-flex e-con-boxed e-con e-parent" data-id="80b7413" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="e-con-inner"> <div class="elementor-element elementor-element-601f9a63 elementor-widget elementor-widget-text-editor" data-id="601f9a63" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>The distinction grows more important as software <a href="https://aembit.io/blog/the-emerging-identity-imperatives-of-agentic-ai/" rel="noopener">takes on more autonomous behavior</a>. Non-human workloads already outnumber human users by orders of magnitude in most environments, and <a href="https://aembit.io/blog/ai-agent-identity-security/" rel="noopener">agentic AI systems amplify that imbalance</a> and introduce greater liability. </p> <p>Access needs to be scoped, short-lived, and enforced through identity-based policy<a style="letter-spacing: -0.1px;" href="https://aembit.io/blog/static-credentials-in-cloud-native-environments/" rel="noopener">rather than static secrets.</a></p> <p>Sebastian experienced that reality firsthand. Even though the dashboard was not an AI system, it behaved like one in the ways that mattered operationally. It ran on a schedule, acted without human intervention, and required trusted access to external services.</p> <p>Now to start each day, the team checks the dashboard and the clean Slack summary it produces. Typically everything is green. But if something does break, the signal is immediate and clear.</p> <p>“It sure made mornings easier,” Sebastian said.</p> </div> </div> </div> </div> <div class="elementor-element elementor-element-391d3de3 e-con-full e-flex e-con e-child" data-id="391d3de3" data-element_type="container"> <div class="elementor-element elementor-element-5cd982c5 e-con-full e-flex e-con e-child" data-id="5cd982c5" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="elementor-element elementor-element-5ee445fa e-con-full e-flex e-con e-child" data-id="5ee445fa" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="elementor-element elementor-element-7ec45937 elementor-widget elementor-widget-heading" data-id="7ec45937" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h3 class="elementor-heading-title elementor-size-default">Ready to Try Aembit?</h3> </div> </div> <div class="elementor-element elementor-element-7b435bcc elementor-widget__width-initial elementor-widget elementor-widget-text-editor" data-id="7b435bcc" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Get started in minutes, with no sales calls required. Our free- forever tier is just a click away.</p> </div> </div> <div class="elementor-element elementor-element-2133aac2 elementor-align-left elementor-mobile-align-left elementor-widget elementor-widget-button" data-id="2133aac2" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-sm" href="https://useast2.aembit.io/signup" id="requestdemobutton_home_bottomcta"><br> <span class="elementor-button-content-wrapper"><br> <span class="elementor-button-icon"><br> <i aria-hidden="true" class="far fa-arrow-right"></i> </span><br> <span class="elementor-button-text">TRY AEMBIT TODAY</span><br> </span><br> </a> </div> </div> </div> </div> <div class="elementor-element elementor-element-5c31d1e3 e-con-full e-flex e-con e-child" data-id="5c31d1e3" data-element_type="container"> <div class="elementor-element elementor-element-52e00aa1 e-con-full e-flex e-con e-child" data-id="52e00aa1" data-element_type="container" data-settings='{"background_background":"classic","position":"absolute"}'> </div> </div> </div> </div> </div><p>The post <a href="https://aembit.io/blog/when-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform/">When the Vendor Becomes the Customer: Building Internal Tools on an Agentic IAM Platform</a> appeared first on <a href="https://aembit.io/">Aembit</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/when-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform/" data-a2a-title="When the Vendor Becomes the Customer: Building Internal Tools on an Agentic IAM Platform"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhen-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform%2F&amp;linkname=When%20the%20Vendor%20Becomes%20the%20Customer%3A%20Building%20Internal%20Tools%20on%20an%20Agentic%20IAM%20Platform" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhen-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform%2F&amp;linkname=When%20the%20Vendor%20Becomes%20the%20Customer%3A%20Building%20Internal%20Tools%20on%20an%20Agentic%20IAM%20Platform" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhen-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform%2F&amp;linkname=When%20the%20Vendor%20Becomes%20the%20Customer%3A%20Building%20Internal%20Tools%20on%20an%20Agentic%20IAM%20Platform" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhen-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform%2F&amp;linkname=When%20the%20Vendor%20Becomes%20the%20Customer%3A%20Building%20Internal%20Tools%20on%20an%20Agentic%20IAM%20Platform" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fwhen-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform%2F&amp;linkname=When%20the%20Vendor%20Becomes%20the%20Customer%3A%20Building%20Internal%20Tools%20on%20an%20Agentic%20IAM%20Platform" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://aembit.io/">Aembit</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Dan Kaplan">Dan Kaplan</a>. Read the original post at: <a href="https://aembit.io/blog/when-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform/">https://aembit.io/blog/when-the-vendor-becomes-the-customer-building-internal-tools-on-an-agentic-iam-platform/</a> </p>

SCIM Provisioning Explained: Automating User Lifecycle Management with SSO

  • None
  • Published date: 2026-01-08 00:00:00

None

<h2>Why Local Media Still Matters for Your Business</h2><p>Ever feel like everyone is so obsessed with going viral on "X" or TikTok that they forget about the people living right down the street? It’s a huge mistake because local media still has a massive grip on how people spend their money. (<a href="https://san.com/cc/the-decline-of-local-news-is-accelerating-and-costing-you-money/">The decline of local news is accelerating and costing you money</a>)</p><p>Getting a shoutout from a local journalist isn't just about ego—it’s about borrowing their years of built-up trust. People might scroll past a Facebook ad, but they pay attention when the neighborhood paper mentions a new clinic or shop.</p><ul> <li><strong>High Credibility:</strong> Local outlets are seen as "one of us." When a local healthcare provider gets featured for a community wellness day, neighbors view them as a trusted pillar, not just another business.</li> <li><strong>Better Conversions:</strong> If you run a boutique retail store, a mention in the city’s weekend guide drives actual foot traffic. Those readers are ready to buy because they’re physically right there.</li> <li><strong>SEO and local ai:</strong> Getting a link from a .gov or local news site is gold. It tells google (and those new ai search tools) that you’re the most relevant answer for local searches. Partnering with local government initiatives or city-sponsored events often leads to mentions on official municipal (.gov) websites, which is a total win for your rankings. (<a href="https://outreachcrayon.com/google-i-o-how-ai-search-local-context-links-now-interact/">Google I/O: How AI Search, Local Context &amp; Links Now Interact</a>)</li> </ul><blockquote> <p>According to a 2024 report by Pew Research Center, Americans continue to trust local news outlets significantly more than national ones for accurate information. (<a href="https://www.pewresearch.org/short-reads/2025/10/29/how-americans-trust-in-information-from-news-organizations-and-social-media-sites-has-changed-over-time/">How trust in info from news outlets and social media has changed …</a>)</p> </blockquote><p><img decoding="async" src="https://cdn.pseo.one/685a569b9ffb6033e0079596/68776f17361e7a2bc51de86e/press-release-writing-101-local-media-attention-business/mermaid-diagram-1.svg" alt="Diagram 1"><br> <em>Diagram 1: Trust levels in local vs. national news outlets.</em></p><p>I've seen small finance firms double their client inquiries just by getting a "money tips" column in the local Gazette. It works because it’s personal.</p><p>Next, let's look at how to structure your news so it actually gets read.</p><h2>Finding Your Newsworthy Hook</h2><p>Finding a hook is basically like trying to figure out why anyone should care about your news while they're eating their breakfast. If you just tell a journalist you "opened a new office," they're gonna yawn and hit delete.</p><p>The secret is to stop thinking about your business and start thinking about the people living around it. You need to find the "human" angle that makes your story worth a mention over the local high school sports scores.</p><ul> <li><strong>Community impact over sales pitches:</strong> If you're a real estate agent, don't just announce a new listing. Talk about how you're donating a portion of commissions to the local park—that’s a story.</li> <li><strong>New product launches with a local twist:</strong> A tech startup launching an app isn't news, but a tech startup partnering with the town library to teach seniors how to use that app? That is definitely news.</li> <li><strong>Milestones with history:</strong> Instead of just saying "we've been open 10 years," find the employee who has been there since day one or talk about how the neighborhood has changed since you started.</li> </ul><blockquote> <p>A 2024 report by Muck Rack found that 73% of journalists say "relevance to their beat" is the most important factor when deciding to cover a story.</p> </blockquote><p><img decoding="async" src="https://cdn.pseo.one/685a569b9ffb6033e0079596/68776f17361e7a2bc51de86e/press-release-writing-101-local-media-attention-business/mermaid-diagram-4.svg" alt="Diagram 4"><br> <em>Diagram 2: Top factors that influence a journalist's decision to cover a story.</em></p><p>I once saw a local accounting firm get a full page spread not because they were good at taxes, but because they offered free "financial literacy" workshops for local teenagers. It’s all about the angle.</p><p>Next, let's look at how to structure your news so it actually gets read.</p><h2>The Anatomy of a Perfect Press Release</h2><p>Ever wonder why some boring business news gets a front-page spread while your "groundbreaking" launch gets ignored? It usually comes down to the fact that journalists are drowning in emails and have about four seconds to decide if you're worth their time.</p><p>Your headline is basically a subject line for a busy human who's probably on their third cup of coffee and running late. If it sounds like an ad, it’s going in the trash. You gotta make it punchy and local—think "New Downtown Clinic Offers Free Diabetes Screenings" rather than "Local Healthcare Provider Announces New Community Initiative."</p><p>The lead paragraph is where you drop the 5 Ws: Who, what, where, when, and why. Don't bury the lead! If you're a construction firm opening a new sustainable housing project, say that in the first sentence. </p><p>According to Cision, journalists cited "relevance to my audience" as the top reason they pursue a story. They don't care about your profit margins; they care about how you’re changing the neighborhood.</p><p><img decoding="async" src="https://cdn.pseo.one/685a569b9ffb6033e0079596/68776f17361e7a2bc51de86e/press-release-writing-101-local-media-attention-business/mermaid-diagram-2.svg" alt="Diagram 2"><br> <em>Diagram 3: The inverted pyramid structure for news writing.</em></p><p>The body is where you add the "flavor," mostly through quotes. Please, for the love of god, don't use quotes that sound like a robot wrote them. Instead of "We are excited to leverage our synergies," try "We saw families struggling to find affordable tax help, so we decided to open our doors on Saturdays." It makes you feel like a real person.</p><p>Finally, you need a boilerplate. This is just a tiny "About Us" section at the very bottom. Keep it under 50 words. Include a link to your site and a media contact who actually answers their phone. I’ve seen so many good stories die because the "media contact" was an unmonitored info@ email address.</p><p>Next, we’ll explore how to use modern tools to speed up the actual writing process.</p><h2>Using AI Tools to Speed Up the Writing Process</h2><p>Look, I get it. Staring at a blank screen while trying to sound "professional" is the worst part of any marketing job. Most of us aren't natural-born PR pros, and that is exactly where ai comes in to save your afternoon.</p><p>You don't need a massive agency budget to sound like you have one. Tools like <a href="https://logicballs.com/">LogicBalls</a> have these specialized ai generators built specifically for press releases. Instead of guessing the format, you just plug in your basic facts and it spits out a document that actually follows those annoying industry standards journalists expect.</p><ul> <li><strong>Angle Testing:</strong> One story can be told ten ways. A retail shop might focus on "grand opening" for one outlet and "new jobs created" for another. ai lets you generate multiple angles in seconds to see which one feels most "newsy" for your local area.</li> <li><strong>Fact-to-Pro Transformation:</strong> You can literally just dump a messy list of bullet points—like "opening Saturday, free coffee, first 50 people get a mug"—and the platform turns it into a structured, professional document instantly. </li> <li><strong>Zero Technical Hurdles:</strong> You don't need to be a prompt engineer. These tools are designed for busy shop owners and real estate agents who just need a media kit that doesn't look like a middle school project.</li> </ul><p><img decoding="async" src="https://cdn.pseo.one/685a569b9ffb6033e0079596/68776f17361e7a2bc51de86e/press-release-writing-101-local-media-attention-business/mermaid-diagram-3.svg" alt="Diagram 3"><br> <em>Diagram 4: Efficiency gains when using ai for content drafting.</em></p><p>According to a 2023 report by Muck Rack, about 61% of PR pros are already using ai or at least exploring it to speed up their workflows. It's not cheating; it's just being efficient so you can get back to actually running your business. </p><p>I've used this to help a small construction firm announce a new park project. We went from "we're building a fence" to a compelling story about community safety in about five minutes. Just remember to read it over once to make sure it still sounds like <em>you</em>.</p><p>Now that you've got a solid draft, let's figure out how to actually get a human to read it.</p><h2>Distribution Secrets for Local Success</h2><p>So you finally have a press release that doesn't sound like a snooze-fest. Now comes the part where most people mess up—actually getting it into a human's inbox without being labeled as spam. </p><p>Don't just blast every email address on a "Contact Us" page. You need to find the specific reporter who covers your specific area of coverage (their beat). If you're opening a new bistro, look for the food critic or the "business happenings" columnist.</p><ul> <li><strong>Hunt for the direct email:</strong> Check the bottom of recent articles or look at the journalist's "X" profile. Most local reporters include their work email right there because they're actually looking for tips.</li> <li><strong>Personalize like your life depends on it:</strong> Mention a recent story they wrote. "Hey Sarah, loved your piece on the downtown revitalization—I think our new bookstore fits right into that trend." It shows you aren't a bot.</li> <li><strong>Timing is everything:</strong> According to Propel, the best time to pitch is Tuesday or Thursday mornings. Most folks are clearing out Monday's mess or mentally checking out by Friday.</li> </ul><p><img decoding="async" src="https://cdn.pseo.one/685a569b9ffb6033e0079596/68776f17361e7a2bc51de86e/press-release-writing-101-local-media-attention-business/mermaid-diagram-5.svg" alt="Diagram 5"><br> <em>Diagram 5: Optimal days and times for pitching to journalists.</em></p><p>I've seen a local gym owner get a massive feature just by sending a simple, three-sentance email to the health editor at 9:15 am on a Tuesday. It wasn't fancy, it was just well-timed.</p><p>As we discussed earlier, using tools like logicballs can help you polish the draft, but the "last mile" of distribution is all about that human connection. Get out there and start talking to your local media—they need good stories just as much as you need the coverage.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/scim-provisioning-explained-automating-user-lifecycle-management-with-sso/" data-a2a-title="SCIM Provisioning Explained: Automating User Lifecycle Management with SSO"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fscim-provisioning-explained-automating-user-lifecycle-management-with-sso%2F&amp;linkname=SCIM%20Provisioning%20Explained%3A%20Automating%20User%20Lifecycle%20Management%20with%20SSO" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fscim-provisioning-explained-automating-user-lifecycle-management-with-sso%2F&amp;linkname=SCIM%20Provisioning%20Explained%3A%20Automating%20User%20Lifecycle%20Management%20with%20SSO" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fscim-provisioning-explained-automating-user-lifecycle-management-with-sso%2F&amp;linkname=SCIM%20Provisioning%20Explained%3A%20Automating%20User%20Lifecycle%20Management%20with%20SSO" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fscim-provisioning-explained-automating-user-lifecycle-management-with-sso%2F&amp;linkname=SCIM%20Provisioning%20Explained%3A%20Automating%20User%20Lifecycle%20Management%20with%20SSO" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fscim-provisioning-explained-automating-user-lifecycle-management-with-sso%2F&amp;linkname=SCIM%20Provisioning%20Explained%3A%20Automating%20User%20Lifecycle%20Management%20with%20SSO" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ssojet.com/blog">SSOJet - Enterprise SSO &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by SSOJet - Enterprise SSO &amp; Identity Solutions">SSOJet - Enterprise SSO &amp; Identity Solutions</a>. Read the original post at: <a href="https://ssojet.com/blog/scim-provisioning-explained-automating-user-lifecycle-management-with-sso">https://ssojet.com/blog/scim-provisioning-explained-automating-user-lifecycle-management-with-sso</a> </p>

Building Trusted AI Development With Antigravity and Sonatype Guide

  • None
  • Published date: 2026-01-08 00:00:00

None

<div class="hs-featured-image-wrapper"> <a href="https://www.sonatype.com/blog/building-trusted-ai-development-with-antigravity-and-sonatype-guide" title="" class="hs-featured-image-link"> <img decoding="async" src="https://www.sonatype.com/hubfs/blog_antigravity.png" alt="Digital screen of vulnerability indicators, maintenance health, malware warnings" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div><p>AI development workflows are evolving quickly. Agent managers need to coordinate tasks and tools to share artifacts, and AI agents need to make decisions quickly.</p><p><img decoding="async" src="https://track.hubspot.com/__ptq.gif?a=1958393&amp;k=14&amp;r=https%3A%2F%2Fwww.sonatype.com%2Fblog%2Fbuilding-trusted-ai-development-with-antigravity-and-sonatype-guide&amp;bu=https%253A%252F%252Fwww.sonatype.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/building-trusted-ai-development-with-antigravity-and-sonatype-guide/" data-a2a-title="Building Trusted AI Development With Antigravity and Sonatype Guide"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fbuilding-trusted-ai-development-with-antigravity-and-sonatype-guide%2F&amp;linkname=Building%20Trusted%20AI%20Development%20With%20Antigravity%20and%20Sonatype%20Guide" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fbuilding-trusted-ai-development-with-antigravity-and-sonatype-guide%2F&amp;linkname=Building%20Trusted%20AI%20Development%20With%20Antigravity%20and%20Sonatype%20Guide" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fbuilding-trusted-ai-development-with-antigravity-and-sonatype-guide%2F&amp;linkname=Building%20Trusted%20AI%20Development%20With%20Antigravity%20and%20Sonatype%20Guide" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fbuilding-trusted-ai-development-with-antigravity-and-sonatype-guide%2F&amp;linkname=Building%20Trusted%20AI%20Development%20With%20Antigravity%20and%20Sonatype%20Guide" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fbuilding-trusted-ai-development-with-antigravity-and-sonatype-guide%2F&amp;linkname=Building%20Trusted%20AI%20Development%20With%20Antigravity%20and%20Sonatype%20Guide" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.sonatype.com/blog">2024 Sonatype Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Aaron Linskens">Aaron Linskens</a>. Read the original post at: <a href="https://www.sonatype.com/blog/building-trusted-ai-development-with-antigravity-and-sonatype-guide">https://www.sonatype.com/blog/building-trusted-ai-development-with-antigravity-and-sonatype-guide</a> </p>

Critical impact of automobile industry with advanced decision support system and Aczél-Alsina Hammy mean operators

  • Abrar Hussain, Kifayat Ullah, Zeeshan Ali, Dragan Pamucar
  • Published date: 2026-01-08 00:00:00

Scientific Reports - Critical impact of automobile industry with advanced decision support system and Aczél-Alsina Hammy mean operators

<li>Atanasov, K. T. Intuitionistic fuzzy sets. Fuzzy Sets Syst.20, 8796 (1986). Google Scholar  </li><li>Zadeh, L. A. Fuzzy sets. Inf. Control8(3), 338353. https://doi.org/10.1016/S0019-9958(65)902… [+13097 chars]

The Myth of Linux Invincibility: Why Automated Patch Management is Key to Securing the Open Source Enterprise

  • Deepak Kumar
  • Published date: 2026-01-08 00:00:00

None

<p>Users and developers have hailed Linux as the operating system that “just works,” celebrating it for decades as a symbol of open source strength, speed, and security. Linux’s architecture and permissions model have long helped maintain cybersecurity resilience, fostering a reputation for near-invincible security.</p><p>However, without additional layers of security to protect enterprise environments beyond Linux’s built-in capabilities, security will be compromised, as the SANS Institute recently <a href="https://www.sans.org/blog/linux-intrusions-a-growing-problem">warned in its report</a>. Today’s threat actors are aware that delayed updates and unpatched vulnerabilities persist in Linux environments, making them targets for exploits.</p><p>While Linux’s design alone is not enough to defend open source enterprise environments, added layers of automated security tools significantly help Linux environments maintain an edge against evolving threats. The real risk in Linux environments isn’t a lack of built-in security; it’s a culture of complacency around patching. Enterprises can overcome this only by pairing autonomous vulnerability detection and patch deployment with accountable human oversight.</p><h3><strong>The Changing Face of Linux Threats </strong></h3><p>Linux is heavily trusted and used today to power everything from enterprise servers to embedded systems. Attackers are aware of Linux’s ubiquity in data centers and cloud-native workloads, and are targeting misconfigurations, exploiting unpatched vulnerabilities, and leveraging social engineering to bypass security protocols. Here are three of the most common and overlooked threats facing Linux today.</p><ol> <li><strong>Ransomware and Supply Chain Attacks: </strong>No platform today is safe from ransomware attacks and Linux-specific payloads are seen in recent campaigns such as “Cuba” and “LockBit,” which can encrypt web and database servers at scale. The brief downtime caused by these exploits can have major ramifications for business operations, given that these systems often host production workloads.</li> <li><strong>Privilege Escalation and Kernel Exploits: </strong>Another key threat to be aware of in Linux environments is privilege escalation, which recent vulnerabilities like Dirty Pipe (CVE-2022-0847) and Looney Tunables (CVE-2023-4911) demonstrate. When attackers leverage credentials to gain access, they can move laterally within networks and further compromise systems.</li> <li><strong>Misconfigurations and Unpatched Services: </strong>Unpatched or outdated software is another common weakness found in Linux environments. According to SANS, SSH services, web servers, and databases are frequently left running on outdated versions, which leave them exposed to exploits.</li> </ol><h3><strong>The Lingering Legacy of “Known” Vulnerabilities</strong></h3><p>Many environments today are multi-platform, running Linux alongside Windows or macOS systems. Manual or semi-automated patching workflows that depend on humans to deploy, test, and update patches across complex, distributed environments can lead to fragmentation and mistakes.</p><p>Research from the <a href="https://nvd.nist.gov/">National Vulnerability Database (NVD)</a> shows that vulnerabilities are growing in volume year over year; while the NVD observed a 14% increase from 2022 to 2023, the NVD reported a 32% <a href="https://www.infosecurity-magazine.com/news/nvd-revamps-operations-cve-surge/#:~:text=NVD's%20Vulnerability%20Backlog%20Keeps%20Growing,in%20CVE%20submissions%20in%202024.">rise</a> in CVE submissions in 2024. While this research includes all platforms, Linux’s share of vulnerabilities remains significant, partly because vulnerabilities can go unpatched for years after they are detected.</p><p>IT teams are not the only ones impacted by delayed patching; the consequences of a growing attack vector are bad news for the entire organization. As such, it’s important to remember that the most concerning vulnerabilities are not only the zero-day vulnerabilities making headlines today, but also the unpatched vulnerabilities lurking in your environment.</p><h3><strong>From Manual Patching to Autonomous Security</strong></h3><p>Across Linux environments, organizations can leverage autonomous systems, not just basic automation, to eliminate bottlenecks caused by manual patching, thereby speeding up updates. Instead of taking weeks to manually deploy updates across thousands of Linux systems, autonomous patching platforms can bring the process down to just a few hours.</p><p>Unlike simple automation, which executes predefined tasks, autonomous tools analyze context, adapt to changing conditions, and make real-time decisions about which patches matter most. When organizations link automated tools together, such as vulnerability detection with autonomous patch management, the tools handle the heavy lifting of prioritizing critical risks, so teams can focus on applying and deploying critical fixes. Autonomous tools also improve efficiency in multi-platform environments by providing a single pane of glass view, unifying apps such as vulnerability detection and patch deployment across Linux, Windows, and macOS to build resilience and strategy across the entire enterprise.</p><p>However, autonomy never replaces human judgment. True resilience comes from pairing automation with control. Administrators should always retain the ability to pause, roll back, or customize deployments in real-time. By blending the efficiency of automation with the oversight and accountability of humans, enterprises can be sure that updates don’t break critical applications while simultaneously minimizing risk and exposure.</p><h3><strong>A Culture Shift for Linux Security </strong></h3><p>Ultimately, improving security in Linux environments comes down to a cultural shift, where the strong reputation of Linux doesn’t compromise the level of scrutiny that IT and security teams bring to their security practices. For example, instead of treating patching as a once-a-quarter or semi-regular practice, security teams should take a real-time approach to their patching processes in Linux environments.</p><p>The legendary security foundation for Linux environments remains strong, but the threat landscape around it is evolving. Just as attackers are leveraging automation in their exploits, enterprises should build on Linux’s strengths by implementing autonomous vulnerability detection, patch management, and other security tools with real-time human oversight to bridge the gap between reactive security and proactive protection.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/the-myth-of-linux-invincibility-why-automated-patch-management-is-key-to-securing-the-open-source-enterprise/" data-a2a-title="The Myth of Linux Invincibility: Why Automated Patch Management is Key to Securing the Open Source Enterprise"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-myth-of-linux-invincibility-why-automated-patch-management-is-key-to-securing-the-open-source-enterprise%2F&amp;linkname=The%20Myth%20of%20Linux%20Invincibility%3A%20Why%20Automated%20Patch%20Management%20is%20Key%20to%20Securing%20the%20Open%20Source%20Enterprise" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-myth-of-linux-invincibility-why-automated-patch-management-is-key-to-securing-the-open-source-enterprise%2F&amp;linkname=The%20Myth%20of%20Linux%20Invincibility%3A%20Why%20Automated%20Patch%20Management%20is%20Key%20to%20Securing%20the%20Open%20Source%20Enterprise" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-myth-of-linux-invincibility-why-automated-patch-management-is-key-to-securing-the-open-source-enterprise%2F&amp;linkname=The%20Myth%20of%20Linux%20Invincibility%3A%20Why%20Automated%20Patch%20Management%20is%20Key%20to%20Securing%20the%20Open%20Source%20Enterprise" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-myth-of-linux-invincibility-why-automated-patch-management-is-key-to-securing-the-open-source-enterprise%2F&amp;linkname=The%20Myth%20of%20Linux%20Invincibility%3A%20Why%20Automated%20Patch%20Management%20is%20Key%20to%20Securing%20the%20Open%20Source%20Enterprise" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-myth-of-linux-invincibility-why-automated-patch-management-is-key-to-securing-the-open-source-enterprise%2F&amp;linkname=The%20Myth%20of%20Linux%20Invincibility%3A%20Why%20Automated%20Patch%20Management%20is%20Key%20to%20Securing%20the%20Open%20Source%20Enterprise" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

The Silent Scourge: A Call to Action Against Burnout in Cybersecurity

  • Greg Sullivan
  • Published date: 2026-01-08 00:00:00

None

<p>Cybersecurity headlines often focus on threat actors and attack vectors, but the quietest and most dangerous threat in cybersecurity may be within our own teams. The difficulty of detecting cyber threats is accelerating, and the volume, creativity, and effectiveness of attacks show no signs of slowing. These dynamics significantly strain cybersecurity and IT professionals, causing burnout in an unceasingly high-pressure, often thankless environment where closure isn’t guaranteed.</p><p>The numbers paint a stark picture: <a href="https://www.proofpoint.com/us/resources/white-papers/voice-of-the-ciso-report">63%</a> of security practitioners report experiencing burnout, and <a href="https://www.tines.com/reports/voice-of-the-soc-2023/">62%</a> of cybersecurity leaders have experienced it at least once, with 44% experiencing it multiple times. The feeling of “never winning this constant cyber battle” can haunt vulnerability management teams, leading to profound frustration and exhaustion.</p><p>The psychological impact of this work can’t be understated; dedicated vulnerability management teams are constantly patching and mitigating, only to face new vulnerabilities each and every day. With targets shifting weekly and the feeling of being caught up remaining out of reach, even the most resilient professionals feel like they’re treading water. An eye-opening <a href="https://multiteam.solutions/wp-content/uploads/2024/06/Report-on-Stress-Burnout-in-Cybersecurity_MTS-QA-Ltd.pdf">50%</a> of cybersecurity professionals expect to experience burnout soon, driven by high workloads, threat alert fatigue, organizational pressures, and the constant evolution of new threats.</p><p>As leaders, we must acknowledge and appreciate the heroic efforts of our cyber defenders, who are always “in the breach.” We expect them to be alert and ready to respond at all times. But pressure like this without respite cannot hold, and the stress will crack anyone who works under the load. Environments such as this cannot be allowed to exist. The consequences of inaction are too severe. Organizations can’t defend their digital infrastructure with a human workforce that’s running on empty.</p><p>A highly concerning <a href="https://www.heidrick.com/en/insights/cybersecurity/2024-global-chief-information-security-officer-organization-and-compensation-survey">85%</a> of cybersecurity professionals anticipate needing to leave their jobs due to burnout, with 24% saying they’ll leave the industry entirely. But burnout doesn’t just affect retention; it directly impacts security outcomes. The research also shows that 83% of IT security professionals say burnout causes data breaches, and 77% report that stress levels at work directly affect their ability to keep customer data safe. If we fail to heed the signs of burnout, organizations risk losing good people and compromising their security.</p><h3 data-start="0" data-end="62"><strong data-start="0" data-end="62">Strategies to Build a Culture That Protects the Protectors</strong></h3><p><strong> </strong>Security leaders can’t fix the global talent shortage, but they can control the culture within their teams. Practical strategies must be implemented to mitigate burnout and strengthen morale. One simple, effective way is to highlight specific accomplishments, such as successfully patching critical vulnerabilities or completing compliance milestones. Recognition shifts the focus from what constantly needs attention to what has been accomplished.</p><p>Equally important is transparent, up-to-date policy governance, which reduces stress and confusion. The governance should include:</p><ul> <li>Proactively managing policy gaps.</li> <li>Addressing aging policies before they become risks.</li> <li>Establishing and enforcing robust exception management processes.</li> </ul><p>An overlooked part of exception management is the process of ensuring that business leaders, in lieu of just IT or cybersecurity teams, take part in the decision-making process. It is the job of IT and cybersecurity professionals to define the policies and articulate the risks driving them, but when exceptions need to occur, the policy reviews should also fall to the business decision-makers. The expectation that IT-related teams must carry the burden of authorizing policy violations places them under unnecessary pressure. There needs to be clear boundaries between IT/cybersecurity personnel and business leaders. For example, IT and cybersecurity articulate risk, and business leaders interpret that risk and make decisions to approve policy exceptions. Suppose the cybersecurity department has a policy to update devices or software, but a business reason prevents the updates. In that case, cybersecurity personnel can clearly articulate the risk, and the business leaders should approve the policy exception. Risk identification and policy exception decisions should not rest solely with IT and cybersecurity.</p><p>Policies must be practical, actionable, and clearly communicated. A mature exception management process, in particular, can significantly reduce a team’s daily burden and stress. And while process is essential, so is empathy. Visible, consistent check-ins from leadership often do more to rebuild trust and motivation than any new tool or policy ever could.</p><h3><strong>An Industrywide Imperative</strong></h3><p><strong> </strong>Beyond internal strategies, there needs to be a broader industry shift; business owners, as customers, must demand that software providers deliver products with fewer inherent vulnerabilities. Security teams are overwhelmed as they constantly battle a stream of purchased, yet-to-be-patched flaws. These battles can entail immense financial costs and place severe psychological burdens on cyber professionals.</p><p>A software bill of materials (SBOM) is a good step toward creating a less stressful environment for cybersecurity teams. Giving security professionals what equates to a nutritional label for code, an SBOM provides a full list of components, libraries, frameworks, and modules contained within a software application, enabling visibility into dependencies, quick assessment of exposure to known vulnerabilities, and a baseline for continuous risk monitoring and compliance.</p><p>Ultimately, cybersecurity maturity and IT resiliency need to be redefined to include the health and well-being of the cyber workforce. A resilient organization cannot exist without a healthy workforce. Burnout is a significant issue that demands attention. Business owners owe it to these dedicated professionals.</p><h3><b>Conclusion</b></h3><p>Burnout is not just an individual’s problem; if one team member is showing signs of exhaustion, it’s likely a symptom of an organizational issue. The ceaseless nature of cyber threats, compounded by organizational pressures on security professionals, easily leads to exhaustion, disillusionment, and disengagement. Recognizing the signs, implementing supportive strategies, and advocating for systemic changes are acts of compassion and wise investments in long-term security and resiliency.</p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/the-silent-scourge-a-call-to-action-against-burnout-in-cybersecurity/" data-a2a-title="The Silent Scourge: A Call to Action Against Burnout in Cybersecurity"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-silent-scourge-a-call-to-action-against-burnout-in-cybersecurity%2F&amp;linkname=The%20Silent%20Scourge%3A%20A%20Call%20to%20Action%20Against%20Burnout%20in%20Cybersecurity" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-silent-scourge-a-call-to-action-against-burnout-in-cybersecurity%2F&amp;linkname=The%20Silent%20Scourge%3A%20A%20Call%20to%20Action%20Against%20Burnout%20in%20Cybersecurity" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-silent-scourge-a-call-to-action-against-burnout-in-cybersecurity%2F&amp;linkname=The%20Silent%20Scourge%3A%20A%20Call%20to%20Action%20Against%20Burnout%20in%20Cybersecurity" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-silent-scourge-a-call-to-action-against-burnout-in-cybersecurity%2F&amp;linkname=The%20Silent%20Scourge%3A%20A%20Call%20to%20Action%20Against%20Burnout%20in%20Cybersecurity" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fthe-silent-scourge-a-call-to-action-against-burnout-in-cybersecurity%2F&amp;linkname=The%20Silent%20Scourge%3A%20A%20Call%20to%20Action%20Against%20Burnout%20in%20Cybersecurity" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Attackers Don’t Guess and Defenders Shouldn’t Either

  • Jon Baker
  • Published date: 2026-01-08 00:00:00

None

<p>As environments become more complex and grow, the instinctive response has been to add more tools. Organizations now manage an average of <a href="https://www.gartner.com/en/newsroom/press-releases/2025-03-03-gartner-identifiesthe-top-cybersecurity-trends-for-2025">45 cybersecurity products</a>, which gives the impression of broad protection. Yet the organizations seeing the most meaningful reductions in breaches are the ones <a href="https://www.gartner.com/en/articles/how-to-manage-cybersecurity-threats-not-episodes">using continuous threat exposure management</a> rather than those with the largest toolsets. The difference highlights a core issue. Many teams rely on what they expect their controls to do rather than how those controls perform in day-to-day conditions.</p><p>Frameworks, vendor documentation, and capability diagrams play an important role, but they often represent ideal conditions. Live environments behave differently. Integrations fall out of sync; configurations drift over time and threat activity evolves faster than planned documentation. As networks become more distributed and interconnected, theoretical coverage becomes harder to trust without ongoing validation.</p><h3><strong>The Coverage Illusion</strong></h3><p>Organizations unintentionally build their defensive posture around what should happen during an attack instead of what would happen in their actual environment.</p><p>A control that appears reliable may stop working as expected after an update or a change in workflow. For example, an EDR rule that blocked credential dumping last quarter may silently fail after a routine agent update, creating an unseen gap until validation exposes it.</p><p>Because every product supplies its own viewpoint, teams stitch together a sense of protection without verifying how these components operate when a real attacker uses known techniques. This makes it easier to plan for hypothetical threats while missing the behaviors adversaries routinely use during intrusions. The shift away from reality is rarely deliberate. It happens because environments evolve more quickly than teams can test. Without evidence of real control performance, confidence becomes rooted in design assumptions instead of operational behavior.</p><h3><strong>The Operational Fallout</strong></h3><p>When expected defensive behavior does not match real performance, organizations face increased operational and strategic risk. Incident responders struggle to determine what requires immediate attention. Engineering teams have difficulty identifying which fixes will reduce the exposure. Leadership may believe critical threats are contained when testing would reveal otherwise, increasing the likelihood of downtime, regulatory pressure, and attacker dwell time.</p><p>Over time, teams can fall into a cycle of maintaining assumptions rather than measuring real performance. They may believe they have protections in place for critical techniques, but without validation that belief becomes more aspirational than practical.</p><h3><strong>Alignment with Attacker Operations</strong></h3><p>Threat-informed defense defines a more effective approach based in knowledge of adversary operations. Instead of building defenses around compliance checklists or capability summaries, teams benefit from aligning their work with the techniques that real attackers use. Frameworks such as <a href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> help structure this understanding, but the advantage comes when these behaviors guide testing and measurement, not just planning. This shift does not require perfect visibility. It requires regular evaluation, honest analysis, and a willingness to prioritize based on observed defensive performance rather than theoretical models.</p><p>Improving defensive accuracy begins with identifying the attack behaviors that matter most to the organization. When planning starts with adversary techniques, teams can more easily determine where to focus their validation efforts. <a href="https://securityboulevard.com/2021/07/the-move-toward-continuous-testing/">Continuous testing</a> then becomes essential. Environments change often, and validation allows teams to see how these changes affect defensive reliability.</p><p>Clear results lead to better prioritization. Instead of addressing risks that look important in theory, teams can focus on the weaknesses that testing confirms. This creates a more practical and deliberate path toward strengthening the environment. If you are not validating, you are operating on blind faith.</p><h3><strong>Resilience You Can Prove</strong></h3><p>A validated approach provides a clearer and more accurate understanding of exposure. Teams can distinguish between protections that are working well and areas that need reinforcement. This clarity reduces unnecessary complexity by eliminating redundant technology and excess alert volume.</p><p>Over time, defenses become more resilient because they are measured against the techniques adversaries currently rely on rather than those organizations assume they are prepared to stop. Perfect coverage is unrealistic, but reliable visibility is achievable. When organizations replace assumptions with validated performance, they move from defending against abstract threats to defending against the ones that matter.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/attackers-dont-guess-and-defenders-shouldnt-either/" data-a2a-title="Attackers Don’t Guess and Defenders Shouldn’t Either"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fattackers-dont-guess-and-defenders-shouldnt-either%2F&amp;linkname=Attackers%20Don%E2%80%99t%20Guess%20and%20Defenders%20Shouldn%E2%80%99t%20Either" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fattackers-dont-guess-and-defenders-shouldnt-either%2F&amp;linkname=Attackers%20Don%E2%80%99t%20Guess%20and%20Defenders%20Shouldn%E2%80%99t%20Either" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fattackers-dont-guess-and-defenders-shouldnt-either%2F&amp;linkname=Attackers%20Don%E2%80%99t%20Guess%20and%20Defenders%20Shouldn%E2%80%99t%20Either" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fattackers-dont-guess-and-defenders-shouldnt-either%2F&amp;linkname=Attackers%20Don%E2%80%99t%20Guess%20and%20Defenders%20Shouldn%E2%80%99t%20Either" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fattackers-dont-guess-and-defenders-shouldnt-either%2F&amp;linkname=Attackers%20Don%E2%80%99t%20Guess%20and%20Defenders%20Shouldn%E2%80%99t%20Either" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Zero-Knowledge Compliance: How Privacy-Preserving Verification Is Transforming Regulatory Technology

  • Devin Partida
  • Published date: 2026-01-08 00:00:00

None

<p>Traditional compliance often forces companies to expose sensitive information to prove they follow the rules. This approach increases the risk of breaches and raises severe privacy concerns. With rising regulatory pressure and stricter data sovereignty laws, more organizations are exploring zero-knowledge frameworks as a safer alternative.</p><p>Zero-knowledge proofs (ZKPs) allow businesses to prove adherence without revealing the data. They offer a breakthrough in privacy-preserving verification that is already gaining traction in finance, health care and cybersecurity.</p><h3><strong>The Case for Zero-Knowledge Compliance</strong></h3><p>Highly regulated sectors like finance, health care and defense face a growing challenge — how to prove compliance. In 2024, <a href="https://www.hipaajournal.com/healthcare-data-breach-statistics/">over 276 million individuals</a> had their protected health data exposed or stolen, which underscores the urgent need for more secure verification methods. ZKPs offer a robust solution by allowing organizations to confirm the validity of their processes without revealing the actual content. This approach preserves confidentiality while still meeting the rigorous demands of industry regulators.</p><p>The rise in cyberattacks only adds to the pressure. A <a href="https://insights.bdo.com/2024-BDO-Board-Survey.html">quarter of board directors</a> now say cyberthreats are the most significant risk to their business over the next year. ZKPs give companies a way to stay ahead by reducing exposure while proving conformance.</p><p>They also help align with global data privacy mandates like the General Data Protection Regulation and the Health Insurance Portability and Accountability Act, which call for transparency and data minimization. For enterprises navigating this tricky landscape, ZKPs offer a practical, forward-looking path to safer and smarter alignment.</p><h3><strong>How ZKPs Power Confidential Verification</strong></h3><p>Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (ZK-SNARK) and Zero-Knowledge Scalable Transparent Arguments of Knowledge (ZK-STARK) are two of the most popular proof protocols, each with distinct advantages and trade-offs. ZK-SNARKs deliver fast verification and small proof sizes but require a trusted setup. At the same time, ZK-STARKs offer greater transparency and post-quantum security at the cost of larger proofs.</p><p>Behind the scenes, both rely on advanced cryptography — like elliptic curve systems and polynomial commitments — to build secure, private proofs. Many modern implementations use noninteractive formats to be scalable and efficient. A common architecture involves off-chain computation and on-chain verification, ideal for regtech Software as a Service (SaaS) platforms and blockchain audit trails that need real-time alignment without compromising data confidentiality.</p><h3><strong>Application in Regulatory Reporting and Audit Automation</strong></h3><p>Anti-money laundering (AML) compliance has become a massive financial burden, with the U.S. spending <a href="https://rehack.com/ai/applications-of-artificial-intelligence-in-finance/">over $23 billion yearly</a> to meet regulatory demands. Much of that cost goes into data collection, reporting and audits, often exposing sensitive customer information. ZKPs offer an alternative by allowing financial institutions to prove conformance. This means organizations can demonstrate that they have flagged suspicious activity or met thresholds without handing over raw data to regulators.</p><p>ZKPs also support on-demand attestations, which give regulatory agencies instant cryptographic proof without back-and-forth paperwork. When paired with programmable frameworks and smart contracts, ZKPs can automate routine checks and reduce the need for manual audits altogether. Instead of combing through reports, regulators can rely on real-time dashboards powered by verified proofs. It is a faster, more secure and more efficient way to meet AML requirements.</p><h3><strong>Barriers to Mainstream Adoption and What Is Ahead</strong></h3><p>ZKPs hold huge potential but face a few hurdles before mainstream adoption. One of the biggest challenges is computational overheating. Generating and verifying proofs can be resource-intensive, especially at enterprise scale. Many organizations also find themselves waiting for regulatory frameworks to catch up. Without clear guidance or standardized formats for ZKP-based attestations, it is tough for teams to make the switch confidently. Aside from performance bottlenecks and policy gaps, the benefits are too significant to ignore.</p><p>Fortunately, regtech is already becoming influential. By leveraging cloud computing, machine learning and blockchain, companies can <a href="https://www.sciencedirect.com/science/article/abs/pii/S0160791X22002913">scale compliance faster and more affordably</a> without building massive in-house teams. Zero-knowledge tools are starting to integrate with these technologies, which bridge the gap between privacy and performance.</p><p>As interoperability improves, so does adoption. And with a growing number of ZKP-as-a-service providers entering the market, businesses no longer need deep cryptography expertise to deploy these solutions. Instead, they can tap in to ready-made platforms built for speed, security and modern needs.</p><h3><strong>The Future of Compliance Is Private, Verifiable and Built for Speed</strong></h3><p>ZKPs unlock a new era of privacy-first compliance. Early adopters benefit from greater agility, faster reporting and reduced exposure to data breaches. As regulatory demands grow, ZKP infrastructure gives companies a smarter, more resilient way to stay ahead.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/zero-knowledge-compliance-how-privacy-preserving-verification-is-transforming-regulatory-technology/" data-a2a-title="Zero-Knowledge Compliance: How Privacy-Preserving Verification Is Transforming Regulatory Technology"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fzero-knowledge-compliance-how-privacy-preserving-verification-is-transforming-regulatory-technology%2F&amp;linkname=Zero-Knowledge%20Compliance%3A%20How%20Privacy-Preserving%20Verification%20Is%20Transforming%20Regulatory%20Technology" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fzero-knowledge-compliance-how-privacy-preserving-verification-is-transforming-regulatory-technology%2F&amp;linkname=Zero-Knowledge%20Compliance%3A%20How%20Privacy-Preserving%20Verification%20Is%20Transforming%20Regulatory%20Technology" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fzero-knowledge-compliance-how-privacy-preserving-verification-is-transforming-regulatory-technology%2F&amp;linkname=Zero-Knowledge%20Compliance%3A%20How%20Privacy-Preserving%20Verification%20Is%20Transforming%20Regulatory%20Technology" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fzero-knowledge-compliance-how-privacy-preserving-verification-is-transforming-regulatory-technology%2F&amp;linkname=Zero-Knowledge%20Compliance%3A%20How%20Privacy-Preserving%20Verification%20Is%20Transforming%20Regulatory%20Technology" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fzero-knowledge-compliance-how-privacy-preserving-verification-is-transforming-regulatory-technology%2F&amp;linkname=Zero-Knowledge%20Compliance%3A%20How%20Privacy-Preserving%20Verification%20Is%20Transforming%20Regulatory%20Technology" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

PayPal email scam: How it worked before the fix

  • None
  • Published date: 2026-01-08 00:00:00

None

<div data-elementor-type="wp-post" data-elementor-id="42115" class="elementor elementor-42115" data-elementor-post-type="post"> <div class="elementor-element elementor-element-063dbcb e-flex e-con-boxed e-con e-parent" data-id="063dbcb" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="e-con-inner"> <div class="elementor-element elementor-element-9b963cd elementor-widget__width-inherit elementor-widget elementor-widget-heading" data-id="9b963cd" data-element_type="widget" data-widget_type="heading.default"> <p class="elementor-heading-title elementor-size-default">Blog article</p> </div> <div class="elementor-element elementor-element-41550d0 elementor-widget elementor-widget-text-editor" data-id="41550d0" data-element_type="widget" data-widget_type="text-editor.default"> <h1 id="paypal-email-scam-how-the-subscriptions-loophole-worked">PayPal email scam: How the subscriptions loophole worked</h1> </div> <div class="elementor-element elementor-element-e3b237e elementor-widget elementor-widget-image" data-id="e3b237e" data-element_type="widget" data-widget_type="image.default"> <img fetchpriority="high" decoding="async" width="800" height="470" src="https://sendmarc.com/wp-content/uploads/Paypal-email-scam-Blog-Inline-Image-1-1024x601.jpg" class="attachment-large size-large wp-image-42124" alt="Paypal email scam - Blog Inline Image" title="PayPal email scam: How it worked before the fix 2"> </div> <div class="elementor-element elementor-element-4a745f3 elementor-widget elementor-widget-text-editor" data-id="4a745f3" data-element_type="widget" data-widget_type="text-editor.default"> <p>In December 2025, a new PayPal email scam stood out for one reason: The messages didn’t just look authentic – they were genuinely sent from PayPal’s infrastructure and arrived from <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="52213720243b31371222332b22333e7c313d3f">[email protected]</a>.</p> <p>That made this campaign far more convincing than the usual lookalike-domain phishing attempts. Instead of spoofing PayPal’s domain, scammers abused PayPal subscriptions to trigger legitimate notification emails, then used those messages to display fake “purchase” details and a phone number designed to lure recipients into a callback scam.</p> <p>Attackers don’t always need to spoof a sender to get clicks or calls – they can also abuse trusted services to deliver convincing messages. But spoofing remains a major risk for companies: If your domain can be faked, scammers can impersonate your brand and reach inboxes at scale.</p> <p>To make that harder, you need strong email authentication: Sender Policy Framework (<a href="https://sendmarc.com/spf/">SPF</a>), DomainKeys Identified Mail (<a href="https://sendmarc.com/dkim/">DKIM</a>), and Domain-based Message Authentication, Reporting, and Conformance (<a href="https://sendmarc.com/dmarc/">DMARC</a>).</p> <p><strong>Book a demo to see how Sendmarc helps you enforce DMARC safely, monitor SPF and DKIM alignment, and spot spoofing and misconfigurations before they become incidents.</strong></p> </div> <div class="elementor-element elementor-element-55e8e53 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button" data-id="55e8e53" data-element_type="widget" data-widget_type="button.default"> <a class="elementor-button elementor-button-link elementor-size-sm" href="https://sendmarc.com/contact/"><br> <span class="elementor-button-content-wrapper"><br> <span class="elementor-button-text">Book a demo</span><br> </span><br> </a> </div> <div class="elementor-element elementor-element-312a140 elementor-widget elementor-widget-text-editor" data-id="312a140" data-element_type="widget" data-widget_type="text-editor.default"> <h2 id="how-the-paypal-email-scam-worksthis-paypal-email-scam-started-with-a-legitimate-paypal-process-that-was-twisted-into-a-fraudulent-notification-bleepingcomputer-reported-that-scammers-used-paypal">How the PayPal email scam works</h2> <p>This PayPal email scam started with a legitimate PayPal process that was twisted into a fraudulent notification.</p> <p>BleepingComputer reported that scammers used PayPal’s “Subscriptions” billing feature to create a subscription and then pause it. That pause triggers PayPal’s real notification email: “Your automatic payment is no longer active.”</p> <p>Inside the email, the attackers abused the “Customer service URL” field. Instead of a clean support link, the field displayed text that looked like a URL, followed by a fake purchase confirmation and a phone number to “cancel” the payment. Attackers also used a fake subscriber account (likely a Google Workspace mailing list) to automatically forward incoming messages to group members.</p> <p>BleepingComputer’s example included a fake high-value charge and an unsolicited support number. The message also used Unicode characters to make parts of the text appear bold or visually unusual, which can help it dodge spam filters and keyword-based detection.</p> <p>The goal wasn’t to steal your PayPal password in a browser. It was to get a person to call, panic, and follow instructions that lead to remote access, malware, or financial fraud.</p> <h2>What to do if you receive a suspicious PayPal email</h2> <p>Similar scams keep resurfacing in new forms. The safest approach is to treat any unexpected “purchase” or “urgent action” email as untrusted until you verify it through official channels.</p> <h3><strong>Here is what to do:</strong></h3> <ul class="cross"> <li>Do not call phone numbers in the email, and don’t click through unexpected links.</li> </ul> <ul class="check"> <li>Log in to PayPal directly (type the address or use the app) and check your recent activity.</li> <li>If the message looks suspicious, forward it to <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="6b1b0302180302050c2b1b0a121b0a0745080406">[email protected]</a> and delete it.</li> </ul> <p>If you manage an organization, alert your help desk so other employees don’t follow the callback instructions.</p> <h3><strong>Safe verification checklist</strong></h3> <table> <tbody> <tr> <td width="349"><strong>Verify this</strong></td> <td width="349"><strong>Safe action</strong></td> </tr> <tr> <td width="349">Was there actually a transaction?</td> <td width="349">Check in the PayPal app/site (not the email)</td> </tr> <tr> <td width="349">Does the email push you to call?</td> <td width="349">Ignore the number and use official support paths</td> </tr> <tr> <td width="349">Is the message unexpected or urgent?</td> <td width="349">Treat it as suspicious until verified</td> </tr> </tbody> </table></div> <div class="elementor-element elementor-element-ed9b51e elementor-widget elementor-widget-text-editor" data-id="ed9b51e" data-element_type="widget" data-widget_type="text-editor.default"> <h2 id="paypals-response-loophole-closed-in-december-2025paypal-told-bleepingcomputer-it-was-actively-mitigating-the-matter-sayingwe-are-actively-mitigating-this-matter-and-encourage-peo">PayPal’s response: Loophole closed in December 2025</h2> <p>PayPal told BleepingComputer it was <a class="external" href="https://www.bleepingcomputer.com/news/security/beware-paypal-subscriptions-abused-to-send-fake-purchase-emails/" rel="noopener">actively mitigating the matter</a>, saying,</p> <blockquote> <p>“We are actively mitigating this matter, and encourage people to always be vigilant online and mindful of unexpected messages.</p> <p>If customers suspect they are a target of a scam, we recommend they contact Customer Support directly through the PayPal app or our Contact page for assistance.”</p> </blockquote> <p>After BleepingComputer’s investigation, it was reported that PayPal closed the loophole that allowed scammers to send legitimate emails from <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="d5a6b0a7a3bcb6b095a5b4aca5b4b9fbb6bab8">[email protected]</a> containing fake purchase notifications.</p> <p>Even with a fix in place, this is a useful reminder for security teams: Attackers will keep looking for ways to exploit trusted channels and human urgency. That is why businesses can’t rely on brand recognition alone. You also need to ensure your own domain can’t be impersonated.</p> <h2>Make it harder to spoof your company with DMARC</h2> <p>DMARC tells mailbox providers what to do when an email claims to come from your domain, but fails authentication checks.</p> <p><strong>When DMARC is properly implemented and enforced:</strong></p> <ul class="check"> <li>Spoofed emails that pretend to be from your organization are far more likely to be <a href="https://sendmarc.com/dmarc/policy/">quarantined or rejected</a>.</li> <li>You get reporting that shows which systems are sending as your domain and where authentication fails.</li> <li>You reduce the chance of your domain being used in impersonation attempts and protect your brand reputation.</li> </ul> <p>A practical path is to get SPF and DKIM working reliably across all legitimate senders, then move DMARC from monitoring to enforcement – aiming for <em>p=reject</em> once you’ve validated your sending sources.</p> <p>Sendmarc helps you do that without guesswork by mapping your real sending landscape, flagging misalignment and unknown senders early, and supporting safe progression to enforcement.</p> <p><strong>Book a demo to see how DMARC enforcement, monitoring, and real-time alerts can make your business significantly harder to spoof.</strong></p> </div> <div class="elementor-element elementor-element-69ef494 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button" data-id="69ef494" data-element_type="widget" data-widget_type="button.default"> <a class="elementor-button elementor-button-link elementor-size-sm" href="https://sendmarc.com/contact/"><br> <span class="elementor-button-content-wrapper"><br> <span class="elementor-button-text">Book a demo</span><br> </span><br> </a> </div> </div> </div> </div><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/01/paypal-email-scam-how-it-worked-before-the-fix/" data-a2a-title="PayPal email scam: How it worked before the fix"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fpaypal-email-scam-how-it-worked-before-the-fix%2F&amp;linkname=PayPal%20email%20scam%3A%20How%20it%20worked%20before%20the%20fix" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fpaypal-email-scam-how-it-worked-before-the-fix%2F&amp;linkname=PayPal%20email%20scam%3A%20How%20it%20worked%20before%20the%20fix" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fpaypal-email-scam-how-it-worked-before-the-fix%2F&amp;linkname=PayPal%20email%20scam%3A%20How%20it%20worked%20before%20the%20fix" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fpaypal-email-scam-how-it-worked-before-the-fix%2F&amp;linkname=PayPal%20email%20scam%3A%20How%20it%20worked%20before%20the%20fix" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F01%2Fpaypal-email-scam-how-it-worked-before-the-fix%2F&amp;linkname=PayPal%20email%20scam%3A%20How%20it%20worked%20before%20the%20fix" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://sendmarc.com">Sendmarc</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Kiara Saloojee">Kiara Saloojee</a>. Read the original post at: <a href="https://sendmarc.com/blog/paypal-email-scam/">https://sendmarc.com/blog/paypal-email-scam/</a> </p>

2026 Predictions Scorecard

  • calvinfo
  • Published date: 2026-01-07 21:40:41

Article URL: https://rodneybrooks.com/predictions-scorecard-2026-january-01/ Comments URL: https://news.ycombinator.com/item?id=46533343 Points: 3 # Comments: 1

Nothing is ever as good as it first seems and nothing is ever as bad as it first seems. — A best memory paraphrase of advice given to me by Vice Admiral Joe Dyer, former chief test pilot of the US N… [+142476 chars]

Watch: We opened up Lenovo’s uber-repairable ThinkPad at CES 2026

  • Joel Lee
  • Published date: 2026-01-07 17:07:21

CES 2026 is in full swing and there’s a surprising amount of cool stuff on the show floor, and it’s all pretty exciting even with high memory prices and uncertain availability throwing cold water on the party. Laptops in particular are turning heads, but ther…

Skip to contentWhen you purchase through links in our articles, we may earn a small commission. This doesn't affect our editorial independence . CES 2026 is in full swing and there’s a surprising a… [+2223 chars]

Best RFID Blocking Card: Consumer Verification Analysis Examines Wallet Defender Signal-Blocking Technology as January Search Volume Reaches Post-Holiday Peak

  • Wallet Defender
  • Published date: 2026-01-07 02:21:00

Consumer verification analysis examines Wallet Defender RFID blocking technology as January searches for contactless card protection reach peak...

NEW YORK CITY, NY, Jan. 06, 2026 (GLOBE NEWSWIRE) -- Disclaimer: This article is for informational purposes only and does not constitute security advice, financial guidance, or professional recommend… [+53981 chars]