Qilin ransomware now harvests cached RDP connection logs from Windows servers to map internal networks and prioritize targets for encryption.
Researchers identified that the threat actor 'Harvester' uses a Go-based backdoor named GOGRA, exploiting unpatched Linux server vulnerabilities for stealthy…
Attackers have exploited an authentication bypass in cPanel and WHM since February 2026, with widespread scanning for vulnerable servers detected…
The startup secured $42 million in combined seed and Series A funding from Ballistic Ventures and Notable Capital.
Anthropic's Claude Security product targets automated, AI-generated threats like malware and phishing by embedding continuous monitoring into its existing enterprise…
The threat actors infiltrated legitimate npm packages for SAP, Lightning, and Intercom to deploy credential-harvesting code, compromising over 1,800 developers.
A detailed analysis of thousands of arXiv submissions revealed that 88% of LaTeX source files leaked private data, including internal…
North Korean operatives are using live deepfake technology and stolen or synthetic identities to bypass remote job interviews, aiming to…
In 2025, the number of hardcoded secrets exposed in public repositories surged 47% year-over-year to 28.7 million, driven by the…
The March 2026 update introduces new and revised configuration guidelines to counter emerging threats and meet evolving compliance standards across…
Attackers are exploiting automated CI build processes by embedding credential-harvesting code into fake updates of widely-used open source packages.
Vishing calls are successfully coercing help desk staff into resetting MFA, enabling attackers to steal SSO tokens, encrypt data, and…
A custom malware and spear-phishing campaign targeted Asian governments, a NATO ally, and civil society figures to steal credentials and…
Attackers exploited Google's legitimate no-code AppSheet platform to create and host fake login pages, evading traditional security filters and stealing…
Attackers are weaponizing SEO poisoning and counterfeit GitHub repositories to trick IT administrators into downloading a remote access trojan disguised as legitimate development software.
Israeli cybersecurity startup Huskeys launches from stealth with an edge security management platform that adds an agentic layer across multi-cloud and multi-WAF environments. Israeli cybersecurity startup Huskeys emerged from stealth…
Google Cloud completes its $32 billion acquisition of Wiz, combining cloud security with Google’s Threat Intelligence and Gemini AI to create an AI-powered cybersecurity platform. Cloud security giant Wiz has…
Zurich Insurance acquires UK-based Beazley for $11 billion, creating a combined entity generating $15 billion in specialty premiums with Beazley’s cyberinsurance at its core. Swiss insurance giant Zurich has agreed…
Sevii’s Cyber Swarm Defense charges per asset protected instead of per AI token, allowing CISOs to spin up unlimited defensive…
An open-source MCP server transforms Claude AI into a security analyst with 27 tools spanning 21 APIs for CVE lookup,…
The FBI warns of a surge in cyber-enabled cargo theft where hackers compromise broker accounts and trucking load boards to…
Claude Security brings AI-powered vulnerability detection to production codebases with the Opus 4.7 model, offering scheduled scans, validation to reduce…
Ryan Goldberg and Kevin Martin, working as cybersecurity professionals, received 4-year prison sentences for conducting BlackCat/Alphv ransomware attacks against companies.…
OpenAI acquires Promptfoo, an AI security evaluation platform valued at 6 million, to integrate automated red-teaming into its Frontier enterprise…

Sign in to your account