ChannelLife UK - Industry insider news for technology resellers

Red Teaming stories

Ethical hacker structured pentest multi monitors robot scanner

Survey shows pentesters favour PTaaS over bug bounties

Last week
#
devops
#
application security
#
devsecops
New research from Cobalt finds 98% of surveyed pentesters prefer PTaaS to bug bounties and show almost no faith in AI-only security scanning.
Nighttime cybersecurity ops center email alerts ai shield scene

IRONSCALES adds AI agents to counter next‑gen phishing

Last week
#
uc
#
data protection
#
cloud security
IRONSCALES' Winter 2026 Release debuts three AI agents, outbound encryption and Teams deepfake defences to counter next‑gen phishing.
Bd jade brown

Why cybersecurity needs women from non-tech careers

Last week
#
ransomware
#
devops
#
advanced persistent threat protection
Cybersecurity is missing vital human insight; drawing in women and non‑STEM talent could close both the threat and perspective gaps.
Night corporate office cybersecurity team incident response scene

LevelBlue unveils flexible funds-based cyber IR retainer

Last week
#
ransomware
#
devops
#
apm
LevelBlue launches Resilience Retainer, a flexible funds-based cyber incident response service with rapid SLAs and rollover security spend.
Aisle jaya 1200x677

Why diversity in cybersecurity leadership is vital

Last week
#
devops
#
apm
#
risk & compliance
Homogeneous cybersecurity leadership is a critical, overlooked point of failure; true defence in depth demands diversity as a core control.
Ai brain circuit shields security icons blocking red attacks

F5 Labs unveils monthly AI model security leaderboards

Last week
#
data protection
#
devops
#
application security
F5 Labs launches monthly AI security leaderboards, ranking popular models on new indices of risk, resilience and cost under live attack.
Secure dev workstation multi monitors code warnings shield icon

Anthropic unveils Claude Code Security to scan codebases

Last month
#
devops
#
cloud security
#
application security
Anthropic unveils Claude Code Security, an AI tool that scans codebases for complex bugs, verifies risks and suggests patches for developers.
Untitled design  80

Horizon3.ai names Dan Bird MBE Field CTO for EMEA cyber push

Last month
#
devops
#
digital transformation
#
hyperscale
Horizon3.ai appoints defence veteran Dan Bird MBE as EMEA field CTO to sharpen offensive security amid rising regional cyber threats.
Smartphone face scan with concentric shields anti deepfake security

3DiVi sets four-layer defence for face authentication

Last month
#
data protection
#
devops
#
surveillance
3DiVi unveils four-layer defence model to harden face authentication against deepfakes and spoofing as remote ID checks surge globally.
Modern cybersecurity war room ai brain shield team collab

CompTIA launches SecAI+ to tackle AI security skills

Last month
#
malware
#
data protection
#
devops
CompTIA unveils SecAI+ certification to equip cybersecurity professionals with AI security, risk management and governance skills.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Last month
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.
Soc cisos overwhelmed by red alerts few highlighted in focus

Cyber firms face 'verification crisis' on real risk

Last month
#
firewalls
#
devops
#
digital transformation
Cyber firms warned over 'verification crisis' as tools flag floods of flaws but only 0.47% prove exploitable, leaving real risk unresolved.
Untitled design  67

EC-Council unveils new AI risk & CISO training suite

Last month
#
digital transformation
#
supply chain
#
ai security
EC-Council rolls out its biggest training expansion in 25 years, unveiling an AI risk credential suite and revamped CISO leadership course.
Corporate it soc monitors network diagrams red attack path analysis

SpecterOps unveils BloodHound Scentry identity risk service

Last month
#
devops
#
pam
#
cloud security
SpecterOps has launched BloodHound Scentry, a managed identity risk service to find and remediate attack paths across complex environments.
Cloud fortress metal shields with gated data streams ai security

SentinelOne debuts lifecycle platform for AI security

Last month
#
storage
#
data protection
#
cloud security
SentinelOne has launched an end-to-end AI security lifecycle platform, adding DSPM, CSPM and runtime protections for enterprise AI deployments.
Managed soc analysts threat monitoring network graphs blue tones

Flare sees rapid MSSP uptake of external threat intel

Last month
#
devops
#
soc
#
partner programmes
Flare reports 114% annual growth among MSSPs as providers consolidate threat intelligence tools to boost services without extra analyst strain.
Moody soc analyst overwhelmed by chaotic ai cyberattack alerts

AI-driven attacks overwhelm security teams in 2026

Fri, 30th Jan 2026
#
devops
#
advanced persistent threat protection
#
soc
AI-fuelled cyberattacks overwhelm defenders as false positives swamp security teams and critical threats slip through in 2026, Hadrian warns.
Enterprise cloud soc shielding hidden ai nonhuman traffic

Zscaler unveils AI Security Suite to close visibility gap

Thu, 29th Jan 2026
#
saas
#
firewalls
#
digital transformation
Zscaler launches an AI Security Suite to tackle soaring enterprise AI risks, promising visibility into shadow AI and non-human traffic.
Cinematic cloud datacenter ai silhouette protecting data streams

AI reshapes data privacy as firms shift to real-time defence

Thu, 29th Jan 2026
#
saas
#
data protection
#
devops
AI-driven cloud adoption is forcing firms to swap static privacy checklists for continuous, real-time defence of sensitive data flows.
Cloud computing classroom open padlocks security risk training

Misconfigured cloud training labs open paths to attacks

Fri, 23rd Jan 2026
#
firewalls
#
hyperscale
#
cloud security
Misconfigured cloud training labs on AWS, Google Cloud and Azure expose major firms to live attacks via overly permissive access roles.