CYBERSECURITY

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet has released out-of-band patches to fix a serious security hole in FortiClient EMS This article explores vulnerable versions forticlient.

Six months of social engineering by the DPRK led to the $285 million Drift Hack.

Six months of social engineering by the DPRK led to the $285 million Drift Hack.

Drift has revealed that a cyberattack on April 1, 2026, that stole $285 million was the result of months of social engineering campaigns run by North.

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The person in charge of the Axios package has said that North Korean hackers known as UNC1069 were behind the supply chain breach This article explores.

Zero Trust Is the Big Idea. 2026 Is the Year It Got Small and Specific.

Zero Trust Is the Big Idea. 2026 Is the Year It Got Small and Specific.

Zero trust is now a key part of cybersecurity plans This article explores 2026 zero trust. . It requires strict authentication and constant monitoring to.

Vasu Murthy on AI Resilience, Recovery Gaps, and Agentic Risk

Vasu Murthy on AI Resilience, Recovery Gaps, and Agentic Risk

Cohesity's Chief Product Officer is Vasu Murthy This article explores recovery agent resilience. . He says that companies spend a lot of money on.

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of the SparkCat malware is spreading through the Google Play Store and Apple's App Store This article explores version sparkcat malware.

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

Google has put out security updates for its Chrome web browser This article explores chrome zero days. . The business says that real-world attacks have.

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors are using cookies as a secret way to talk to PHP-based web shells on Linux servers This article explores cookies threat actors. . This.

Inconsistent Privacy Labels Don't Tell Users What They Are Getting

Inconsistent Privacy Labels Don't Tell Users What They Are Getting

Apple and Google recently said they would add privacy labels to the apps in their stores. Lorrie Cranor, director and Bosch distinguished professor at.

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

Since the middle of 2025, a cyber actor backed by China has been going after European government and diplomatic groups This article explores diplomatic.

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

The European Commission and Mercor have both made public reports about TeamPCP violations This article explores teampcp using stolen. . Threat actors are.

Apple breaks the rules and fixes DarkSword for iOS 18

Apple breaks the rules and fixes DarkSword for iOS 18

Apple has fixed the security holes that the DarkSword exploit chain took advantage of for all affected users, even those who haven't yet upgraded to iOS.

AI is making SOC teams rethink how fast and big they can go.

AI is making SOC teams rethink how fast and big they can go.

Cyberattacks are happening at record speeds thanks to artificial intelligence This article explores ai based socs. . Attackers are using AI to make their.

Security Bosses Are All-In on AI. Here's Why

Security Bosses Are All-In on AI. Here's Why

This is part of our ongoing series about what we learned about AI, cybersecurity, and geopolitics at RSAC 2026. We're concentrating on machine learning.

Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate

Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate

Hasbro, the company that makes toys and games, recently had a cybersecurity breach, but they said they would still take orders and ship products, even if.

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google has officially connected the breach of Axios's popular npm package to an operation run by a North Korean cyber threat group called UNC1069 that is.

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Drift, a decentralized exchange built on Solana, has revealed that an unauthorized person used a new attack involving durable nonces to break into their.

Ash Hunt on Securing Agentic AI With Data-Centric Strategies

Ash Hunt on Securing Agentic AI With Data-Centric Strategies

Ash Hunt, VP of Strategy for EMEA at Cyera, says, "95% of what we see in secure AI management has to do with data and identity." When agents work together.

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

WhatsApp told about 200 people who were the victims of a phishing attempt that they had unknowingly installed a fake version of the iOS app that was meant.

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The FBI is warning people about the security risks that come with using mobile apps that were made in other countries This article explores money.

The State of Trusted Open Source Report

The State of Trusted Open Source Report

AI is now a part of every step of the development process, from writing code to automating infrastructure This article explores cves chainguard. . This.

The Forgotten Endpoint: Security Risks of Dormant Devices

The Forgotten Endpoint: Security Risks of Dormant Devices

Study: 76% of IT decision-makers said that their devices had been stolen in the last two years This article explores lost stolen devices. . 46% of people.

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Discover how Since November 2023, there has been a financially-driven operation called REF1695. It uses fake installers to install cryptocurrency miners.

Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense

Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense

During a planned downtime, Joseph Izzo, the chief medical information officer at San Joaquin General Hospital, learned how to deal with ransomware This.

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Discover how Microsoft talks about a campaign that uses WhatsApp messages to spread harmful Visual Basic Script (VBS) files. We still don't know who the.

Leslie Nielsen on AI Agents, Human Risks, and the Concept of Shadow AI

Leslie Nielsen on AI Agents, Human Risks, and the Concept of Shadow AI

AI is changing the way we protect our computers from hackers, so security teams need to use AI-based defenses. Leslie Nielsen, Mimecast's CISO, talks.

LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut

LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut

Businesses in Latin America need to cast a wider net when hiring and help develop untapped talent This article explores cybersecurity latin america. . The.

Immutable Backups Matter Even More in the AI Era

Immutable Backups Matter Even More in the AI Era

AI is making attacks harder to keep up with and prevention less effective because it makes offensive capabilities available to everyone This article.

Top 5 this week

Page 1 of 21