Posted inCISSP
When organisations talk about security, the conversation often starts with controls: Encryption.Access control.Monitoring. But CISSP starts with a different question: Are you applying the right controls to the right data?…
Beyond Prompts: Engineering the LLM Security Control Plane
Introduction As organizations operationalize large language models (LLMs) across customer support, code generation, decision support, and autonomous agents, the attack surface has expanded beyond traditional application boundaries. Unlike conventional software…
Posted by
PravinKarthik
Cisco Patches Two Critical and Six High-Severity Vulnerabilities
Cisco shipped fixes for eight vulnerabilities on Wednesday — two rated critical and six high-severity — spanning multiple products including Integrated Management Controller (IMC), Smart Software Manager On-Prem (SSM On-Prem),…
Posted by
PravinKarthik
CVE-2026-5281 — Google Chrome Dawn Use-After-Free Under Active Exploitation
CISA has added CVE-2026-5281 to its Known Exploited Vulnerabilities catalog, marking the fourth Chrome zero-day exploited in the wild during 2026 alone. Federal agencies are required to remediate by April…
Posted by
PravinKarthik
Anthropic Code Exposed in Two incidents
Incident 1 — CMS Data Exposure (~March 26, 2026) What happened technically:Anthropic's content management system, used to publish information to sections of the company's website, was misconfigured — leaving draft…
Posted by
PravinKarthik
Axios npm Hijacked: 100 Million Weekly Downloads Turned Into a RAT Dropper
What Happened On March 31, 2026, a threat actor hijacked the npm account of the lead Axios maintainer and published two malicious versions of one of the most widely used…
Posted by
PravinKarthik









