atlas news
    
Security Boulevard
06  février     17h00
Attackers Used AI to Breach an AWS Environment in 8 Minutes
Jeffrey Burt    Threat actors using LLMs needed only eight minutes to move from initial access to full admin privileges in an attack on a company’s AWS cloud environment in the latest example of cybercriminals expanding their use of AI in their operations, Sysdig researchers said. The post Attackers Used AI to...
    16h27
Microsoft Unveils LiteBox, a Rust-Based Approach to Secure Sandboxing
James Maguire    Microsoft has released LiteBox, an experimental open-source library OS designed to sandbox applications while reducing their exposure to host systems. Written in Rust and published under the MIT license, LiteBox reflects the company’s efforts to upgrade software security as confidential computing...
    15h44
Fraud Prevention Is a Latency Game
Srinivasan Seshadri    There is a time window for every act of online fraud. When a transaction occurs, a fraud system must review it and decide if it’s legitimate before the payment clears or if the account could be compromised. That window happens in a blink, often one-tenth of a second or less. During that time,...
    08h11
Why Attackers no Longer Need to Break in: The Rise of Identity-Based Attacks
Anjali Gopinadhan Nair    In 2026 stolen credentials and unmanaged machine identities drive breaches small buys, phone scams, and weak IAM make identity the real perimeter; prioritize inventory, least privilege, and stronger auth. The post Why Attackers no Longer Need to Break in: The Rise of Identity-Based Attacks appeared...
    07h31
The Human Layer of Security: Why People are Still the Weakest Link in 2026
Oluwakorede Akinsete    By 2026 humans remain cybersecurity’s weakest and most vital link as AI-enabled social engineering rises; prioritize behavioral design, real time interventions, and leadership. The post The Human Layer of Security: Why People are Still the Weakest Link in 2026 appeared first on Security Boulevard.
    07h17
Your PQC Pilot Might Fail, and That’s Okay
Mike Fleck    Start PQC pilots now not to prove readiness but to surface interoperability, vendor, inventory, and skills gaps so organizations can manage post-quantum migration risks. The post Your PQC Pilot Might Fail, and That’s Okay appeared first on Security Boulevard.
    07h00
The Other Offense and Defense
Alan Shimel    Alan discovers how the Super Bowl acts as a live-fire exercise in cybersecurity, requiring seamless coordination to manage massive attack surfaces and ensure integrity and trust in real time. The post The Other Offense and Defense appeared first on Security Boulevard.
05  février     17h25
Threat Group Running Espionage Operations Against Dozens of Governments
Jeffrey Burt    Unit 42 researchers say an Asian threat group behind what they call the Shadow Campaigns has targeted government agencies in 37 countries in a wide-ranging global cyberespionage campaign that has involved phishing attacks and the exploitation of a more than a dozen known vulnerabilities. The post...
    16h30
Orchid Security Adds Ability to Audit Behaviors by Identity
Michael Vizard    Orchid Security today added an ability to conduct audits to its platform that enables cybersecurity teams to track behaviors of specific identities. Company CEO Roy Katmor said Identity Audit is designed to make it possible to unify proprietary audit data captured from unmanaged applications with...
    14h00
Operant AI’s Agent Protector Aims to Secure Rising Tide of Autonomous AI
Jon Swartz    As the enterprise world shifts from chatbots to autonomous systems, Operant AI on Thursday launched Agent Protector, a real-time security solution designed to govern and shield artificial intelligence (AI) agents. The launch comes at a critical inflection point for corporate technology. Gartner...