Latest from todayNorth Korean hackers abuse LNKs and GitHub repos in ongoing campaignThe multi-stage campaign targeting South Korea uses weaponized Windows shortcuts and GitHub-based command-and-control to evade detection.By Shweta SharmaApr 6, 20264 minsCyberattacksCybercrimeSecurity Security lapse lets researchers view React2Shell hackers’ dashboardBy Howard SolomonApr 3, 20265 minsCybercrimeMalwareSecurity A core infrastructure engineer pleads guilty to federal charges in insider attackBy Evan SchumanApr 3, 20263 minsCyberattacksCybercrimeLegalGoogle patches fourth Chrome zero-day so far this yearBy Maxwell Cooter Apr 3, 20262 minsBrowser SecurityEndpoint ProtectionVulnerabilities Internet Bug Bounty program hits pause on payoutsBy Maxwell Cooter Apr 3, 20262 minsBugsOpen SourceVulnerabilities Claude Code is still vulnerable to an attack Anthropic has already fixedBy Maxwell Cooter Apr 3, 20262 minsCode SecurityDevelopment ToolsVulnerabilities CERT-EU blames Trivy supply chain attack for Europa.eu data breachBy John E. Dunn Apr 3, 20264 minsCloud SecurityCode SecuritySecurity Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternativeBy Evan Schuman Apr 2, 20267 minsBusinessEnterpriseInternet Security Cisco fixes critical IMC auth bypass present in many productsBy Lucian Constantin Apr 2, 20264 minsNetwork SecuritySecurityVulnerabilities Lloyds Bank reveals how IT bug exposed transaction data The bank is still investigating full details of a glitch that showed users of its mobile app transaction data belonging to other customers. By Maxwell Cooter Mar 27, 2026 2 mins Banking Data Privacy Financial Services Industry Attackers exploit critical Langflow RCE within hours as CISA sounds alarm Attackers weaponized critical RCE within hours, prompting CISA to add the flaw to its KEV catalog and set an urgent patch deadline. By Shweta Sharma Mar 27, 2026 4 mins Security Vulnerabilities Zero-Day Vulnerabilities Google: The quantum apocalypse is coming sooner than we thought The company has advanced its timeline for viable quantum computing, and thus the necessity of migrating to quantum-safe encryption, to 2029. By Maria Korolov Mar 26, 2026 4 mins Data and Information Security Encryption Security Databricks pitches Lakewatch as a cheaper SIEM — but is it really? The agentic SIEM shifts costs from ingestion to compute, promising cheaper retention and deeper analytics on enterprise security data. By Anirban Ghoshal Mar 26, 2026 4 mins Analytics Security Information and Event Management Software Security Software GitHub phishers use fake OpenClaw tokens to drain crypto wallets Attackers exploit OpenClaw hype with fake “CLAW” airdrops, luring developers from GitHub into wallet-draining phishing sites. By Shweta Sharma Mar 26, 2026 4 mins Cybercrime Phishing Social Engineering New critical Citrix NetScaler hole of similar severity to CitrixBleed2, says expert Unpatched, it allows an unauthenticated remote attacker to leak potentially sensitive information from the appliance's memory. By Howard Solomon Mar 25, 2026 4 mins Network Security Security Vulnerabilities Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service A weakness in a humble lobby account enabled Opswat researchers to elevate privileges. By John E. Dunn Mar 25, 2026 4 mins Network Security Security Vulnerabilities Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave Socket and Wiz confirm widespread credential theft and worm‑like propagation, with cached malicious Trivy artifacts still circulating across mirror infrastructure despite takedowns. By Gyana Swain Mar 25, 2026 5 mins Cybercrime Malware Security PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials The compromised packages, linked to the Trivy breach, executed a three‑stage payload targeting AWS, GCP, Azure, Kubernetes configs, SSH keys, and automation pipelines before being removed. By Shweta Sharma Mar 25, 2026 4 mins Cybercrime Malware Security HP launches TPM Guard to help defeat physical TPM attacks Current TPMs can be compromised with $20 of hardware, allowing attackers to bypass BitLocker and access encrypted content. By Lynn Greiner Mar 24, 2026 4 mins Endpoint Protection Laptop Security Security Hardware New ‘StoatWaffle’ malware auto‑executes attacks on developers The newly observed malware abuses VS Code’s “runOn:folderOpen” feature to execute automatically from trusted projects, enabling near-frictionless compromise. By Shweta Sharma Mar 24, 2026 3 mins Cybercrime Developer Malware Palo Alto updates security platform to discover AI agents The company is also adding a new platform to manage digital certificates. By Howard Solomon Mar 23, 2026 5 mins Artificial Intelligence Events Network Security Faster attacks and ‘recovery denial’ ransomware reshape threat landscape In 2025, attacker dwell time rose, voice phishing topped email phishing, and threat actors increasingly targeted backup and identity systems, according to Mandiant’s latest incident response data. By Cynthia Brumfield Mar 23, 2026 7 mins Malware RSA Conference Ransomware Chrome ABE bypass discovered: New VoidStealer malware steals passwords and cookies The infostealer uses a first‑seen‑in‑the‑wild debugging method to extract Chrome’s decryption key without privilege escalation, raising concerns about the future of browser data security. By Shweta Sharma Mar 23, 2026 3 mins Browser Security Malware Security Behavioral XDR and threat intel nab North Korean fake IT worker within 10 days of hire Insider threat remains a persistent problem that requires vigilance in onboarding processes, technical protections, and measures to restrict logins from approved regions By Rosalyn Page Mar 23, 2026 5 mins Cybercrime Risk Management Security Trivy vulnerability scanner backdoored with credential stealer in supply chain attack ‘If you suspect you were running a compromised version, treat all pipeline secrets as compromised and rotate immediately,’ Trivy maintainer says. By Lucian Constantin Mar 21, 2026 5 mins Security Vulnerabilities Are nations ready to be the cybersecurity insurers of last resort? The multi-billion dollar UK government bailout of Jaguar Land Rover is viewed as not such a good move by a security expert. By Paul Barker Mar 20, 2026 5 mins Cybercrime Government Markets Water utilities strengthen cybersecurity through cooperation Cooperation, enhanced training and greater investment will benefit industry. By Maxwell Cooter Mar 20, 2026 2 mins Markets Security Practices Utilities Industry Stop using AI to submit bug reports, says Google But here’s some cash to help process them, say Google and other AI companies. By Maxwell Cooter Mar 20, 2026 2 mins Artificial Intelligence Open Source Software Development CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group While the US has, at least temporarily, curtailed some of this group’s activities, the risk to misconfigured endpoint management systems remains high. By Howard Solomon Mar 19, 2026 6 mins Cybercrime Endpoint Protection Hacking That cheap KVM device could expose your network to remote compromise Vulnerabilities found in low-cost KVM devices can give attackers the equivalent of physical access to everything they connect to. By Lucian Constantin Mar 19, 2026 6 mins Network Security Remote Access Security Vulnerabilities Ransomware group exploited Cisco firewall vulnerability as a zero day, weeks before a patch appeared Admins have been handed a patching emergency as Amazon reveals that Interlock ransomware started targeting the FMC flaw in January. By John E. Dunn Mar 19, 2026 4 mins Malware Ransomware Zero-Day Vulnerabilities Beijing wants its own quantum-resistant encryption standards rather than adopt NIST’s Chinese experts say the post-quantum cryptography standards developed for the US may not be secure enough, and would rather wait a few years for something better. By Gyana Swain Mar 19, 2026 6 mins Data and Information Security Encryption Security Telnet vulnerability opens door to remote code execution as root The flaw in a legacy Telnet implementation enables pre-auth remote code execution, exposing affected systems to full compromise. By Shweta Sharma Mar 19, 2026 3 mins Network Security Security Reco targets AI agent blind spots with new security capability Designed for Copilot, ChatGPT, Agentforce and automation platforms, the tool detects cross‑system behaviors that traditional SSPM overlooks. By Shweta Sharma Mar 18, 2026 4 mins Artificial Intelligence Security Nvidia NemoClaw promises to run OpenClaw agents securely The OpenClaw agent platform gets sandbox isolation and a 'privacy router' to address its security weaknesses. By John E. Dunn Mar 17, 2026 5 mins Artificial Intelligence Security AWS Bedrock’s ‘isolated’ sandbox comes with a DNS escape hatch BeyondTrust shows how AWS Bedrock AgentCore’s ‘isolated’ environment can be tricked into data exfiltration and command execution via DNS. By Shweta Sharma Mar 17, 2026 4 mins Cloud Security Security Vulnerabilities Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse Threat actors are publishing clean extensions that later update to depend on hidden payload packages, bypassing marketplace checks and silently installing malware onto developers’ systems. By Shweta Sharma Mar 16, 2026 3 mins Cybercrime Malware Security Nine critical vulnerabilities in Linux AppArmor put over 12M enterprise systems at risk Qualys researchers expose ‘CrackArmor’ flaws that allow unprivileged users to escalate privileges to root, break container isolation, and crash systems, with no CVE identifiers yet assigned. By Gyana Swain Mar 16, 2026 5 mins Security Vulnerabilities ClickFix techniques evolve in new infostealer campaigns Recent social engineering schemes involving WordPress and Microsoft’s Windows Terminal show that this relatively basic tactic is a growing threat. By Lucian Constantin Mar 16, 2026 4 mins Cybercrime Social Engineering Windows Security Google warns of two actively exploited Chrome zero days One allows a remote attacker to execute arbitrary code inside a sandbox, the other could result in loss of sensitive information. By Howard Solomon Mar 13, 2026 3 mins Browser Security Endpoint Protection Zero-Day Vulnerabilities Cyber criminals too are working from home… your home The FBI has warned of the threat posed by ‘residential proxies’: networks of devices, typically owned by consumers, that have been taken over by cybercriminals. By Maxwell Cooter Mar 13, 2026 2 mins Internet Security Network Security Security Veeam warns admins to patch now as critical RCE flaws hit Backup & Replication Critical vulnerabilities in Veeam Backup & Replication could allow authenticated users to execute code on backup servers, prompting calls for urgent patching. By Shweta Sharma Mar 13, 2026 3 mins Security Vulnerabilities Storm-2561 targets enterprise VPN users with SEO poisoning, fake clients The financially motivated group has been active since May 2025, impersonating Fortinet, Ivanti, Cisco, and other vendors to steal corporate credentials. By Gyana Swain Mar 13, 2026 4 mins Cybercrime Hacker Groups Hacking Telus Digital hit with massive data breach The attack is described as not ‘smash-and-grab ransomware’, but ‘strategic, disciplined, and optimized for maximum leverage.’ By Paul Barker Mar 12, 2026 4 mins Cyberattacks Cybercrime Data Breach Medical giant Stryker crippled after Iranian hackers remotely wipe computers A nation-state group claims to have wiped 200,000 devices in 79 countries after a possible Microsoft Intune compromise. By John E. Dunn Mar 12, 2026 5 mins Cyberattacks Cybercrime Healthcare Industry PhantomRaven returns to npm with 88 bad packages Researchers at Endor Labs uncovered 88 new packages tied to new waves of the campaign, which uses remote dynamic dependencies to deliver credential-stealing malware. By Shweta Sharma Mar 12, 2026 4 mins Cybercrime Malware Security North Korean fake IT worker tradecraft exposed GitLab exposes abuse of its platform to trick software developers into downloading malicious payloads and finance companies into hiring North Koreans. By John Leyden Mar 12, 2026 5 mins Cybercrime Security Resumés with malicious ISO attachments are circulating, says Aryaka HR staff need to understand that these unfamiliar files execute commands and shouldn’t be opened. By Howard Solomon Mar 11, 2026 6 mins Malware Phishing Social Engineering CISA warns of actively exploited Ivanti EPM and Cisco SD-WAN flaws Patched vulnerabilities in Ivanti Endpoint Manager and Cisco Catalyst SD-WAN are under attack, according to the US security agency, which added reporting requirements to its previous Cisco directive. By Lucian Constantin Mar 11, 2026 3 mins Cyberattacks Security Vulnerabilities AWS expands Security Hub for multicloud security operations The update introduces a unified operations layer designed to aggregate risk signals across cloud environments and help CISOs manage threats through a single security solution. By Nidhi Singal Mar 11, 2026 6 mins Cloud Security Security Overly permissive ‘guest’ settings put Salesforce customers at risk Salesforce warns that a threat campaign is exploiting overly permissive Experience Cloud guest configurations to harvest data from public portals. By Shweta Sharma Mar 11, 2026 4 mins Cyberattacks Cybercrime Data Breach Critical flaw in HPE Aruba CX switches lets attackers seize admin control without credentials Unauthenticated password reset vulnerability in widely deployed enterprise switching hardware carries a near-maximum severity score. By Gyana Swain Mar 11, 2026 4 mins Security Vulnerabilities Jack & Jill went up the hill — and an AI tried to hack them In a red-team test, CodeWall’s autonomous agent chained together four small bugs in the Jack & Jill hiring platform to gain admin access and probe its AI's defenses. By Taryn Plumb Mar 10, 2026 7 mins Artificial Intelligence Cybercrime Hacking March Patch Tuesday: Three high severity holes in Microsoft Office Good news: No zero days. But Azure admins should note nine holes to plug. By Howard Solomon Mar 10, 2026 8 mins Endpoint Protection Vulnerabilities Windows Security Devs looking for OpenClaw get served a GhostClaw RAT GhostClaw poses as an OpenClaw installer package, stealing system credentials and sensitive data before deploying a persistent RAT. By Shweta Sharma Mar 10, 2026 3 mins Cybercrime Malware Security OpenAI to acquire Promptfoo to strengthen AI agent security testing The acquisition points to rising demand for tools that test and secure LLMs before they are deployed in enterprise workflows. By Prasanth Aby Thomas Mar 10, 2026 3 mins App Testing Artificial Intelligence Devops Hacker abusing .arpa domain to evade phishing detection, says Infoblox The tactic combines IPv6 tunnelling and domain abuse to redirect victims to malicious websites. By Howard Solomon Mar 9, 2026 6 mins Cybercrime Phishing Social Engineering CVE program funding secured, easing fears of repeat crisis The funding crisis that nearly shut down the global vulnerability tracking system last year has quietly been resolved, easing fears of another abrupt disruption to a cornerstone of the cybersecurity ecosystem. By Cynthia Brumfield Mar 9, 2026 7 mins Government Security Software Threat and Vulnerability Management OpenAI says Codex Security found 11,000 high-impact bugs in a month The new AI-driven AppSec tool reportedly uncovered hundreds of critical flaws and thousands of high-severity issues during early testing. By Shweta Sharma Mar 9, 2026 4 mins Code Security Security 12345678910…424 Show me morePopularArticlesPodcastsVideos opinion Authentication is broken: Here’s how security leaders can actually fix it By Bhanu HandaApr 6, 20269 mins Access ControlAuthenticationIdentity and Access Management feature 6 ways attackers abuse AI services to hack your business By John LeydenApr 6, 20267 mins Artificial IntelligenceCyberattacksCybercrime opinion Escaping the COTS trap By Anant WairagadeApr 6, 20269 mins Artificial IntelligenceEnterprise ArchitectureSecurity Software podcast CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CyberattacksCybercrimeRansomware podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CSO and CISOElectronic Health RecordsRansomware video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime video Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business