Latest from todayNorth Korean hackers abuse LNKs and GitHub repos in ongoing campaignThe multi-stage campaign targeting South Korea uses weaponized Windows shortcuts and GitHub-based command-and-control to evade detection.By Shweta SharmaApr 6, 20264 minsCyberattacksCybercrimeSecurity Security lapse lets researchers view React2Shell hackers’ dashboardBy Howard SolomonApr 3, 20265 minsCybercrimeMalwareSecurity A core infrastructure engineer pleads guilty to federal charges in insider attackBy Evan SchumanApr 3, 20263 minsCyberattacksCybercrimeLegalGoogle patches fourth Chrome zero-day so far this yearBy Maxwell Cooter Apr 3, 20262 minsBrowser SecurityEndpoint ProtectionVulnerabilities Internet Bug Bounty program hits pause on payoutsBy Maxwell Cooter Apr 3, 20262 minsBugsOpen SourceVulnerabilities Claude Code is still vulnerable to an attack Anthropic has already fixedBy Maxwell Cooter Apr 3, 20262 minsCode SecurityDevelopment ToolsVulnerabilities CERT-EU blames Trivy supply chain attack for Europa.eu data breachBy John E. Dunn Apr 3, 20264 minsCloud SecurityCode SecuritySecurity Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternativeBy Evan Schuman Apr 2, 20267 minsBusinessEnterpriseInternet Security Cisco fixes critical IMC auth bypass present in many productsBy Lucian Constantin Apr 2, 20264 minsNetwork SecuritySecurityVulnerabilities Post-quantum cryptography: Vendors drive forward but roadmap is fuzzy As quantum risk gains urgency, security vendors are turning PQC readiness into a structured market offering centered on discovery, inventory, and migration planning. By Shweta Sharma Mar 9, 2026 9 mins Data and Information Security Encryption Security Trump’s cyber strategy emphasizes offensive operations, deregulation, AI The White House unveiled a cybersecurity strategy built around six pillars, prioritizing offensive operations, AI adoption, and deregulation, while leaving critics to question whether cutting red tape and hardening infrastructure can coexist. By Cynthia Brumfield Mar 6, 2026 6 mins Government Government IT Security ClickFix attackers using new tactic to evade detection, says Microsoft Unwitting victims are now being tricked into installing malware via Windows Terminal, but some experts say this is old news. Regardless, they agree that infosec leaders need to educate employees about the tactic. By Howard Solomon Mar 6, 2026 5 mins Malware Phishing Social Engineering Only 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling short Research shows that both CISOs and boards need to change their approach. By Taryn Plumb Mar 6, 2026 6 mins Business CSO and CISO Enterprise FBI wiretap system tapped by hackers A system used to manage wiretaps is reportedly being investigated following suspicious activities. By Maxwell Cooter Mar 6, 2026 2 mins Communications Security Government Government IT OAuth vulnerability in n8n automation platform could lead to system compromise The configuration weakness shows the risk of centralizing credentials, says Imperva. By John E. Dunn Mar 6, 2026 3 mins Artificial Intelligence Security Vulnerabilities Targeted advertising is also targeting malware Cybersecurity should be as much about monitoring ad calls as securing fire-walls, according to a cybersecurity firm. By Maxwell Cooter Mar 6, 2026 2 mins Cybercrime Malware Marketing and Advertising Industry Teenage hacker myth primed for a middle-age criminal makeover Profit motive is reshaping cybercrime as a career ladder that rewards experience. By John Leyden Mar 6, 2026 5 mins Cybercrime Security Zero-day exploits hit enterprises faster and harder Chinese state hackers and spyware vendors are fueling a rise in zero-day attacks, which increasingly target enterprise software and devices — security and networking products in particular. By Lucian Constantin Mar 6, 2026 7 mins Advanced Persistent Threats Cyberattacks Zero-Day Vulnerabilities LeakBase marketplace unplugged by cops in 14 countries The action coordinated by Europol seized two of the group's domains and captured the forum's data, as well as making arrests. By Howard Solomon Mar 5, 2026 5 mins Cybercrime Security Cisco issues emergency patches for critical firewall vulnerabilities Flaws in the web management interface give unauthenticated attackers remote root access. By John E. Dunn Mar 5, 2026 4 mins Network Security Security Vulnerabilities Coruna iOS exploit kit moved from spy tool to mass criminal campaign in under a year Google and iVerify researchers say the case points to a thriving secondary market for high-end zero-day exploits. By Gyana Swain Mar 5, 2026 5 mins Endpoint Protection Mobile Security iOS Security State-affiliated hackers set up for critical OT attacks that operators may not detect Threat groups are weaponizing industrial control access they’ve gained over the years, but critical infrastructure operators remain unprepared for what comes next, research from Dragos suggests. By Lucian Constantin Mar 5, 2026 9 mins Critical Infrastructure Cyberattacks Government IT Microsoft leads takedown of Tycoon2FA phishing service infrastructure The SaaS operation was used to push millions of malicious emails a month. By Howard Solomon Mar 4, 2026 6 mins Cybercrime Phishing Social Engineering Iranian cyberattacks fail to materialize but threat remains acute US-Israeli military attacks on Iran have caused a lull in cyberactivity, but Iranian groups will turn to destructive wiper attacks at some point, experts warn. By John E. Dunn Mar 4, 2026 6 mins Cyberattacks Cybercrime DDoS AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning CyberStrikeAI lowers the barrier to complex cyberattacks by combining AI orchestration, MCP integration, and more than 100 offensive tools into a single, public GitHub repository. By Taryn Plumb Mar 3, 2026 5 mins Cyberattacks Cybercrime Open Source OAuth phishers make ‘check where the link points’ advice ineffective Microsoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware downloads. By Gyana Swain Mar 3, 2026 5 mins Access Control Authentication Phishing Vulnerability monitoring service secures public-sector websites faster The service cut DNS-specific fix times by 84% across 6,000 public bodies in the UK. By Gyana Swain Mar 2, 2026 5 mins Government Government IT Threat and Vulnerability Management Security hole could let hackers take over Juniper Networks PTX core routers The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or redirect data, says an expert. By Howard Solomon Feb 27, 2026 4 mins Network Security Security Vulnerabilities ‘Silent’ Google API key change exposed Gemini AI data Billing ID keys were turned into Gemini authentication credentials without informing developers. By John E. Dunn Feb 27, 2026 4 mins APIs Access Control Authentication One of the ‘most influential cybersecurity’ roles will pay under $175,000 Would you be willing to take responsibility for protecting national IT security for that little? By Maxwell Cooter Feb 27, 2026 2 mins CSO and CISO Government Government IT Your personal OpenClaw agent may also be taking orders from malicious websites A critical OpenClaw flaw allowed malicious websites to connect to locally running agents, brute-force passwords without limits, and take full control by exploiting implicit trust in localhost connections. By Shweta Sharma Feb 27, 2026 4 mins Artificial Intelligence Security Vulnerabilities US authorities punish sellers of malware and spyware Prison for trading malware for crypto, sanctions for selling US cyberweapons to its enemies. By Maxwell Cooter Feb 27, 2026 2 mins Cybercrime Legal Vulnerabilities Ransomware groups switch to stealthy attacks and long-term access Attackers are shifting from smash-and-grab operations to “parasitic” residency. CISOs must emphasize identity controls, monitor trusted applications and integrations, and focused detection strategies on persistence. By John Leyden Feb 27, 2026 5 mins Cybercrime Malware Ransomware China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries The GRIDTIDE backdoor concealed its traffic within routine spreadsheet activity for years before Google shut down the operation last week. By Gyana Swain Feb 26, 2026 5 mins Cybercrime Hacker Groups Hacking Steaelite RAT combines data theft and ransomware management capability in one tool Researchers at BlackFog say the SaaS tool lowers the barrier to end-to-end ransomware campaigns. By Howard Solomon Feb 25, 2026 4 mins Cybercrime Malware Security Five Eyes issue emergency directive on exploited Cisco SD-WAN zero-day The Five Eyes cybersecurity agencies warn that a critical Cisco SD-WAN vulnerability is under active exploitation and should be patched immediately. By Cynthia Brumfield Feb 25, 2026 5 mins Network Security Security Zero-Day Vulnerabilities Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors Attackers used “technical assessment” projects with repeatable naming conventions to blend in cloning and build workflows, retrieving loader scripts from remote infrastructure, and minimizing on-disk traces. By Shweta Sharma Feb 25, 2026 3 mins Cybercrime Malware Security New Serv-U bugs extend SolarWinds’ run of high-severity disclosures Four newly disclosed critical CVEs could allow attackers to create privileged accounts and execute arbitrary code, and they reinforce SolarWinds’ status as a high-value target. By Taryn Plumb Feb 24, 2026 5 mins Security Vulnerabilities Fake Zoom meeting silently installs surveillance software, says Malwarebytes Employees are tricked by what looks like a popup fix for a bad meeting connection. By Howard Solomon Feb 24, 2026 7 mins Cyberattacks Cybercrime Malware VMware fixes command injection flaw in Aria Operations Two other flaws were patched by the virtualization vendor, impacting Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure as well. By Lucian Constantin Feb 24, 2026 2 mins Security Vulnerabilities Shai-Hulud-style NPM worm hits CI pipelines and AI coding tools Researchers warn malicious packages can harvest secrets, weaponize CI systems, and spread across projects while carrying a dormant wipe mechanism. By Shweta Sharma Feb 24, 2026 3 mins Cybercrime Malware Security The rise of the evasive adversary CrowdStrike’s latest annual Global Threat Report finds AI-driven attacks up 89%, zero-day exploitation surging, and nation-state actors doubling down on cloud and edge device compromise. By Cynthia Brumfield Feb 24, 2026 8 mins Advanced Persistent Threats Cyberattacks Cybercrime Anthropic’s Claude Code Security rollout is an industry wakeup call When Anthropic announced the start of testing on Friday, security vendors, and the markets, sat up and took notice. But is the panic warranted? By Evan Schuman Feb 24, 2026 9 mins Artificial Intelligence Code Security Security Russian group uses AI to exploit weakly-protected Fortinet firewalls, says Amazon The report warns CSOs that while AI is helping unsophisticated threat actors, failure to implement cybersecurity basics is fatal regardless of the attacker's skill. By Howard Solomon Feb 23, 2026 8 mins Artificial Intelligence Cybercrime Hacking New Arkanix stealer blends rapid Python harvesting with stealthier C++ payloads The Arkanix infostealer combines LLM-assisted development with a malware-as-a-service model, using dual language implementations to maximize reach and establish persistence. By Shweta Sharma Feb 23, 2026 3 mins Artificial Intelligence Cybercrime Malware Attackers exploit Ivanti EPMM zero-days to seize control of MDM servers Palo Alto Networks’ Unit 42 says two critical flaws are being actively abused to gain unauthenticated access, deploy persistent backdoors, and compromise entire enterprise mobile fleets even after patches are applied. By Gyana Swain Feb 23, 2026 4 mins Security Vulnerabilities Compromised npm package silently installs OpenClaw on developer machines While the AI itself wasn’t weaponized, the technique raises concerns about AI agents with broad system access. By Taryn Plumb Feb 20, 2026 5 mins Artificial Intelligence Open Source Vulnerabilities Don’t trust TrustConnect: This fake remote support tool only helps hackers A fake remote monitoring tool, supported by a subscription service and a website used to promote it, is used to manage compromised systems. By Shweta Sharma Feb 20, 2026 4 mins Malware Remote Access Security Social Engineering PayPal launches latest struggle to get rid of SMS for MFA Security experts have been nearly unanimous in their dislike of unencrypted SMS authentication for over a decade, but business executives — and customers — love its convenience. Cost-cutting may finally do it in for enterprise SMS usage. By Evan Schuman Feb 20, 2026 7 mins Access Control Authentication Multifactor Authentication New phishing campaign tricks employees into bypassing Microsoft 365 MFA Unwitting employees register a hacker’s device to their account; the crook then uses the resulting OAuth tokens to maintain persistent access. By Howard Solomon Feb 19, 2026 6 mins Authentication Multifactor Authentication Phishing US dominance of agentic AI at the heart of new NIST initiative The standards body is soliciting industry views on agentic security risks while ‘cementing US dominance at the technological frontier.’ By John E. Dunn Feb 19, 2026 4 mins Artificial Intelligence Security Six flaws found hiding in OpenClaw’s plumbing Researchers say an AI-powered code scanner traced untrusted data across layers of OpenClaw, exposing exploitable weaknesses including SSRF, authentication bypass, and path traversal. By Shweta Sharma Feb 19, 2026 3 mins Artificial Intelligence Generative AI Security Hackers can turn Grok, Copilot into covert command-and-control channels, researchers warn Permissive AI access and limited monitoring could allow malware to hide within trusted enterprise traffic, thereby accelerating adaptive, AI-driven attacks. By Prasanth Aby Thomas Feb 19, 2026 4 mins Artificial Intelligence Generative AI Security Notepad++ author says fixes make update mechanism ‘effectively unexploitable’ Hardening had to be done after a threat actor compromised updates with a custom backdoor. By Howard Solomon Feb 18, 2026 5 mins Cybercrime Devops Software Deployment Chinese hackers exploited zero-day Dell RecoverPoint flaw for 1.5 years A suspected Chinese espionage group exploited hardcoded admin credentials in Dell RecoverPoint for Virtual Machines to deploy web shells and maintain persistence in enterprise VMware environments. By Lucian Constantin Feb 18, 2026 4 mins Security Vulnerabilities Zero-Day Vulnerabilities Flaws in four popular VS Code extensions left 128 million installs open to attack Three of the four vulnerabilities remained unpatched months after OX Security reported them to the maintainers. By Gyana Swain Feb 18, 2026 4 mins Security Vulnerabilities Keenadu: Android malware that comes preinstalled and can’t be removed by users Keenadu infiltrated devices by posing as legitimate system components, prompting calls for tighter controls on firmware integrity across manufacturing and supply‑chain pipelines. By Shweta Sharma Feb 18, 2026 4 mins Endpoint Protection Malware Mobile Security Cyber attacks enabled by basic failings, Palo Alto analysis finds Time to exploit drops to 72 minutes as AI automation accelerates cyberattacks. By John E. Dunn Feb 17, 2026 4 mins Artificial Intelligence Cyberattacks Cybercrime ZeroDayRAT spyware targets Android and iOS devices via commercial toolkit Researchers said the openly available spyware enables surveillance, credential theft, and financial targeting across a wide range of mobile OS versions. By Shweta Sharma Feb 17, 2026 4 mins Endpoint Protection Mobile Security Security 12345678910…424 Show me morePopularArticlesPodcastsVideos opinion Authentication is broken: Here’s how security leaders can actually fix it By Bhanu HandaApr 6, 20269 mins Access ControlAuthenticationIdentity and Access Management feature 6 ways attackers abuse AI services to hack your business By John LeydenApr 6, 20267 mins Artificial IntelligenceCyberattacksCybercrime opinion Escaping the COTS trap By Anant WairagadeApr 6, 20269 mins Artificial IntelligenceEnterprise ArchitectureSecurity Software podcast CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CyberattacksCybercrimeRansomware podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CSO and CISOElectronic Health RecordsRansomware video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime video Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business