Latest from todayNewsNorth Korean hackers abuse LNKs and GitHub repos in ongoing campaignThe multi-stage campaign targeting South Korea uses weaponized Windows shortcuts and GitHub-based command-and-control to evade detection.By Shweta Sharma6 Apr 20264 minsCyberattacksCybercrimeSecurity Opinion Authentication is broken: Here’s how security leaders can actually fix itBy Bhanu Handa6 Apr 20269 minsAccess ControlAuthenticationIdentity and Access ManagementFeature 6 ways attackers abuse AI services to hack your businessBy John Leyden6 Apr 20267 minsArtificial IntelligenceCyberattacksCybercrime OpinionEscaping the COTS trapBy Anant Wairagade 6 Apr 20269 minsArtificial IntelligenceEnterprise ArchitectureSecurity Software NewsSecurity lapse lets researchers view React2Shell hackers’ dashboardBy Howard Solomon 4 Apr 20265 minsCybercrimeMalwareSecurity NewsA core infrastructure engineer pleads guilty to federal charges in insider attackBy Evan Schuman 4 Apr 20263 minsCyberattacksCybercrimeLegal NewsGoogle patches fourth Chrome zero-day so far this yearBy Maxwell Cooter 4 Apr 20262 minsBrowser SecurityEndpoint ProtectionVulnerabilities NewsInternet Bug Bounty program hits pause on payoutsBy Maxwell Cooter 4 Apr 20262 minsBugsOpen SourceVulnerabilities NewsClaude Code is still vulnerable to an attack Anthropic has already fixedBy Maxwell Cooter 4 Apr 20262 minsCode SecurityDevelopment ToolsVulnerabilities More security newsnewsCERT-EU blames Trivy supply chain attack for Europa.eu data breachAttackers exploited a vulnerability scanner to steal 350GB of data that they then leaked on the dark web.By John E. Dunn 4 Apr 2026 4 minsCloud SecurityCode SecuritySecuritynewsCloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternativeWordPress's massive installed base isn't going anywhere, but many developers and AI agents are not opting for the product for new sites. Will they go for Cloudflare instead?By Evan Schuman 3 Apr 2026 7 minsBusinessEnterpriseInternet SecuritynewsCisco fixes critical IMC auth bypass present in many productsThe Integrated Management Controller (IMC) flaw gives attackers admin access and remote control over servers even when main OS is shut down.By Lucian Constantin 3 Apr 2026 4 minsNetwork SecuritySecurityVulnerabilitiesnewsEvilTokens abuses Microsoft device code flow for account takeoversThe phishing-as-a-service toolkit leverages legitimate authentication to capture tokens and access Microsoft 365 services. By Shweta Sharma 2 Apr 2026 4 minsPhishingSecuritySocial EngineeringnewsVim and GNU Emacs: Claude Code helpfully found zero-day exploits for bothA simple prompt sent Claude Code on a mission that uncovered major security vulnerabilities in popular text editors — and then suggested ways to exploit them.By John E. Dunn 2 Apr 2026 4 minsCode EditorsDevelopment ToolsVulnerabilitiesnewsWhatsApp malware campaign uses malicious VBS files to gain persistent accessThe attack chain relies on delayed execution, trusted Windows utilities, and legitimate hosting services to maintain persistence and evade detection.By Shweta Sharma 1 Apr 2026 3 minsCybercrimeMalwareSecuritynewsAnthropic employee error exposes Claude Code source A version of the AI coding tool in Anthropic's npm registry included a source map file, which leads to the full proprietary source code.By Howard Solomon 1 Apr 2026 5 minsArtificial IntelligenceData BreachSecuritynews analysisAttackers trojanize Axios HTTP library in highest-impact npm supply chain attackWith almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how quickly a compromised package can propagate through the ecosystem.By Lucian Constantin 1 Apr 2026 7 minsCyberattacksDevSecOpsNode.jsnews5-month-old F5 BIG-IP DoS bug becomes critical RCE exploited in the wildReclassified as a remote code execution flaw, the F5 BIG-IP APM vulnerability has been upgraded to CVSS 9.8, requiring immediate patching and compromise assessment.By Lucian Constantin 1 Apr 2026 4 minsSecurityVulnerabilitiesnewsOpenAI patches twin leaks as Codex slips and ChatGPT spillsCommand injection in Codex and a hidden outbound channel in ChatGPT exposed risks of credential theft and covert data exfiltration.By Shweta Sharma 31 Mar 2026 4 minsArtificial IntelligenceSecurityVulnerabilitiesnewsFortinet hit by another exploited cybersecurity flawA critical SQL injection flaw in FortiClient EMS allows remote code execution and data exfiltration, leaving thousands of internet facing systems at risk.By Taryn Plumb 31 Mar 2026 5 minsSecurityVulnerabilitiesnewsLangChain path traversal bug adds to input validation woes in AI pipelinesThe path traversal flaw, allowing access to arbitrary files, adds to a growing set of input validation issues in AI pipelines. By Shweta Sharma 30 Mar 2026 4 minsSecurityVulnerabilities Show more Show less Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipPhysical SecurityPrivacyRisk ManagementView all topics Hear from the Experts FeatureWhat CISOs need to know about the OpenClaw security nightmareClawdbot, I mean, Moltbot, I mean, OpenClaw may be an immediate cybersecurity nightmare for enterprises, so here are its dangers and what to consider to prevent inadvertent access to company’s data or how to experiment with it in a controlled environment — if you dare to.By Maria Korolov12 Feb 202612 mins Artificial IntelligenceData and Information SecurityGenerative AI Spotlight: Setting the 2026 IT agenda Articles Buyer’s Guide Our annual State of the CIO Survey, now in its 25th year, highlights the ongoing evolution of the CIO role from IT operator to strategic business leader. The data is brought to life in conversations with IT leaders about their experience shaping enterprise strategy, enabling business growth, and leading cultural change. State of the CIO illuminates key areas of business and technology investment and this focus provides an ideal opportunity for sponsors to align with the opportunities highlighted by the research. View all Popular topicsIT Leadership opinion12 cyber industry trends revealed at RSAC 2026By Jon Oltsik 3 Apr 2026 8 minsEventsRSA ConferenceSecurity Practices featureEnterprise Spotlight: Setting the 2026 IT agendaBy CSO Staff 1 Apr 2026 1 minArtificial IntelligenceEnterprise Buyer’s GuidesIT Leadership feature8 ways to bolster your security posture on the cheapBy John Edwards 31 Mar 2026 7 minsBudgetingIT LeadershipRisk Management View topic Generative AI featureThe CISO’s guide to responding to shadow AIBy Carrie Pallardy 27 Mar 2026 8 minsArtificial IntelligenceGenerative AISecurity opinionA 5-step approach to taming shadow AIBy Greg Neville 11 Mar 2026 7 minsArtificial IntelligenceGenerative AIRisk Management opinionHow to make LLMs a defensive advantage without creating a new attack surfaceBy Ankit Gupta 27 Feb 2026 9 minsGenerative AISecurity InfrastructureSecurity Operations Center View topic Careers featureWhat it takes to win that CSO roleBy David Weldon 16 Mar 2026 9 minsC-SuiteCSO and CISOCareers events promotionAnnouncing the 2026 CSO Hall of Fame honoreesBy CSO events 11 Mar 2026 5 minsCareersData and Information SecurityRisk Management featureHow to know you’re a real-deal CSO — and whether that job opening truly seeks oneBy David Weldon 4 Mar 2026 10 minsCSO and CISOCareersIT Leadership View topic Upcoming EventsApr/16 in-person event CIO 100 Leadership Live Los Angeles 202616 Apr 20268:30 am-4:30 pm (PT)Torrance Marriott Redondo Beach CIOCIO 100CIO Leadership Live Apr/28 in-person event CIO 100 Leadership Live Singapore28 Apr 2026Singapore IT Leadership May/11-May/13 conference CSO Cybersecurity Awards & Conference US 202611 May 2026Loews Nashville Hotel at Vanderbilt Plaza, Nashville, TN CSO and CISOCSO50IT Leadership View all events Show me moreLatestArticlesPodcastsVideos opinion Cybersecurity in the age of instant software By Bruce Schneier2 Apr 202610 mins Artificial IntelligencePatch Management SoftwareSecurity brandpost Sponsored by N-able 7 ways to improve your business resilience with backup and recovery By N-able2 Apr 20265 mins Security brandpost Sponsored by N-able 5 Steps to break free from alert fatigue and build resilient security operations By N-able2 Apr 20265 mins Security podcast CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle Quek25 Feb 202623 mins CyberattacksCybercrimeRansomware podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan Goodchild5 Feb 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan Goodchild14 Jan 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle Quek25 Feb 202623 mins CSO and CISOElectronic Health RecordsRansomware video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan Goodchild5 Feb 202628 mins CyberattacksCybercrime video Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan Goodchild14 Jan 202623 mins CybercrimeSmall and Medium Business