Skip to main content
Logo-300x300-colored-3
  • Home
  • Services
    • Offensive Security
    • Defensive Security
    • Privacy Engineering
    • AI Advisory
    • AI Assessment
    • AI Integration
  • Products
  • About
    • About Us
    • FAQ's
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Get a Free Assessment

Insights for the Modern Frontier

Suzu Labs Blog

Exploring the breakthroughs and challenges shaping our industry. Stay informed, stay secure, and stay ahead.

Get the Brief
Evolve Defend Lead
Filtered by: Clear All
Data Privacy
May 19, 2026 Jacob Krell

Five Years of US Privacy Breach Data Tell a Story Security Leaders Cannot Ignore

In April 2026 alone, the ShinyHunters extortion group breached ADT (5.5 million customers), Amtrak (2.1 million confirmed records), and McGraw-Hill ...

Read More: Five Years of US Privacy Breach Data Tell a Story Security Leaders Cannot Ignore
Vulnerability Management
May 05, 2026 Jacob Krell

Mean Time to Exploit Has Gone Negative. Security Strategy Has to Change.

Mandiant's M-Trends 2026 report puts estimated mean time to exploit at negative seven days. That number should reset how security leaders think about ...

Read More: Mean Time to Exploit Has Gone Negative. Security Strategy Has to Change.
Prompt Injection
Apr 30, 2026 Hannah Perez

When AI Billing Breaks Trust: What the Claude Code Backlash Says About AI Governance

When AI Billing Breaks Trust: Lessons from the Claude Code Backlash AI adoption is accelerating, but trust is still fragile. Recently, users of ...

Read More: When AI Billing Breaks Trust: What the Claude Code Backlash Says About AI Governance
Cybersecurity
Apr 29, 2026 Suzu Labs

From Army Ranger to Ethical Hacker: What Cybersecurity Can Learn from the Battlefield

Cybersecurity doesn’t start with tools, it starts with mindset. In this episode featuring Aaron Colclough, we get a rare look at how military ...

Read More: From Army Ranger to Ethical Hacker: What Cybersecurity Can Learn from the Battlefield
Cybersecurity
Apr 23, 2026 Jacob Krell

When Elite Cyber Teams Can't Crack Web Security

HTB's 2025 benchmark tested 796 security teams. Only 21% passed web security challenges. The Security Illusion Security certifications line your ...

Read More: When Elite Cyber Teams Can't Crack Web Security
Cybersecurity
Apr 22, 2026 Jacob Krell

The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them

In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. These are the business logic ...

Read More: The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them
Apr 20, 2026 Hannah Perez

Suzu Labs Acquires Emulated Criminals

Bridging the gap between theory and the threat reality, Suzu Labs is proud to announce the acquisition of Emulated Criminals. This strategic merger ...

Read More: Suzu Labs Acquires Emulated Criminals
Cybersecurity
Apr 17, 2026 Suzu Labs

The Wall Around Claude 4.7 Does Not Extend to Dread

Anthropic released Claude Opus 4.7 on April 16, 2026 with automated cybersecurity safeguards and a Cyber Verification Program. Dark web intelligence ...

Read More: The Wall Around Claude 4.7 Does Not Extend to Dread
youtube
Apr 10, 2026 Jacob Krell

The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control

Earlier this year, YouTube began rolling out a row of algorithmically recommended videos at the top of the Subscriptions page. The section, labeled ...

Read More: The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control
Cybersecurity
Apr 07, 2026 Suzu Labs

The AI Revolution: How Jobs Will Change by 2030

Host Phillip Wylie sits down with Nicolas Chaillan to discuss the sobering reality of AI replacement, the critical need for technical urgency in the ...

Read More: The AI Revolution: How Jobs Will Change by 2030
Generative AI
Apr 01, 2026 Hannah Perez

The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?

In late 2024, Sydney tech entrepreneur Paul Conyngham was told his rescue dog, Rosie, had months to live. She was battling a tennis ball-sized mast ...

Read More: The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?
Cybersecurity
Mar 30, 2026 Suzu Labs

From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone

The world of cybersecurity has undergone a massive transformation in just a few decades. In this episode of Simply Offensive, host Phillip Wylie is ...

Read More: From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone
Critical Infrastructure
Mar 30, 2026 Jacob Krell

While TSA Made Headlines, CISA Went Dark

The Department of Homeland Security has been partially shut down for over 45 days. In that time, 460 TSA officers have quit, absences at major ...

Read More: While TSA Made Headlines, CISA Went Dark
AI Security
Mar 30, 2026 Suzu Labs

The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks

In cybersecurity, we often operate in silos. The red team breaks things, the blue team fixes them, and management focuses on compliance. But what ...

Read More: The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks
Threat Intelligence
Mar 27, 2026 Jacob Krell

Claude Mythos and the Cybersecurity Risk That Was Already Here

On March 26, Anthropic confirmed the existence of Claude Mythos, an unreleased AI model described internally as "a step change" in capabilities, ...

Read More: Claude Mythos and the Cybersecurity Risk That Was Already Here
Critical Infrastructure
Mar 26, 2026 Mike Bell

BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It

Rapid7's research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here's what BPFdoor is, how it evolved, and what ...

Read More: BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
Cybersecurity
Mar 23, 2026 Hannah Perez

Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026

We are incredibly proud to announce a monumental achievement. At this year’s Global InfoSec Awards 2026, hosted by Cyber Defense Magazine, Suzu Labs ...

Read More: Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
Cybersecurity
Mar 17, 2026 Suzu Labs

From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity

In the world of cybersecurity, we often talk about "gatekeeping" or the "skills gap," but rarely do we find individuals dedicated to building the ...

Read More: From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity
Cybersecurity
Mar 16, 2026 Phillip Wylie

Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, Philip Wylie welcomes Dan ...

Read More: Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
Critical Infrastructure
Mar 13, 2026 Denis Calderone

From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time

On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The pro-Iran group Handala claimed ...

Read More: From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
Social Engineering
Mar 09, 2026 Suzu Labs Intelligence

Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation

Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. The core pitch: no camera, no ...

Read More: Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
Threat Intelligence
Mar 06, 2026 Mike Bell

The Company Reviewing Your Meta Glasses Footage Has a Security Problem

Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data annotators at Sama, a San ...

Read More: The Company Reviewing Your Meta Glasses Footage Has a Security Problem
CTF
Mar 03, 2026 Jacob Krell

The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the cybersecurity community has acknowledged. ...

Read More: The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
Cybersecurity
Mar 03, 2026 Phillip Wylie

Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell

In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration tester and researcher at Suzu ...

Read More: Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
Supply Chain Security
Feb 26, 2026 Hannah Perez

Anthropic and Claude: 2026 AI Powerhouse

In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by its reality: a $380 billion ...

Read More: Anthropic and Claude: 2026 AI Powerhouse
Cybersecurity
Feb 24, 2026 Phillip Wylie

Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle

In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and Assurance expert at Trail of Bits. ...

Read More: Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
Cybersecurity
Feb 17, 2026 Phillip Wylie

Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown

In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware hacker, content creator, and ...

Read More: Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
Cybersecurity
Feb 12, 2026 Phillip Wylie

Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity is becoming increasingly ...

Read More: Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
Threat Intelligence
Feb 10, 2026 Phillip Wylie

Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the assumption that a clean ...

Read More: Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
Threat Intelligence
Jan 30, 2026 Mike Bell

Under Armour Breach: What The Forum Data Actually Shows

On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to BreachForums. Two months ...

Read More: Under Armour Breach: What The Forum Data Actually Shows
Briefing Room
Jan 29, 2026 Dahvid Schloss

SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers

This article is in reference to our newest POC hosted on GitHub here: https://github.com/Emulated-Criminals/SilentFrame For the last two weeks, the ...

Read More: SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers
Threat Intelligence
Jan 20, 2026 Mike Bell

Brightspeed Breach: Crimson Collective and the Infostealer Problem

Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data they claim to have accessed ...

Read More: Brightspeed Breach: Crimson Collective and the Infostealer Problem
Power Grid
Jan 19, 2026 Mike Bell

When Grid Data Goes Dark Web

Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a U.S. power infrastructure company ...

Read More: When Grid Data Goes Dark Web
Critical Infrastructure
Jan 19, 2026 Mike Bell

The $150,000 Password

How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a single threat actor posted 25 ...

Read More: The $150,000 Password
Briefing Room
Jan 16, 2026 Dahvid Schloss

Seeing Everything, Understanding Nothing

To help you get a head start on making your environment safer and in keeping with the theme of January’s “New Year, New Priorities,” we thought it ...

Read More: Seeing Everything, Understanding Nothing
Briefing Room
Jan 08, 2026 Dahvid Schloss

New Year, New Priorities - So, what to fix first?

The most common phrase we hear from our prospects is, “We are overwhelmed, and we aren’t sure what to tackle first.” It’s a tale as old as time when ...

Read More: New Year, New Priorities - So, what to fix first?
Briefing Room
Nov 21, 2025 Dahvid Schloss

UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)

Repository purpose: this research was to evaluate the feasiabilty of using Alternate Data Stream (ADS) in staging and conducting ransomware-esk ...

Read More: UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)
Search & Filter

Search

Categories

Subscribe via RSS

Subscribe to RSS Feed

Stay Updated

Get the latest posts delivered to your inbox.

Stay Updated

Logo copy 3-1

Fortified Security. Intelligent Innovation.

+1 (702) 766-6257
P.O. Box 750111
Las Vegas, Nevada 89136

Follow Us

About

  • About Us
  • Contact
  • FAQ's

Solutions

  • Products
  • AI Advisory
  • AI Assessment
  • Offensive Security
  • Defensive Security
  • Adversarial Operations
  • Social Engineering

Resources

  • Blog
  • In The Media
  • Podcasts
© 2026 All rights reserved.
  • Privacy Policy
  • Terms & Conditions