The Latest
-
Asian government’s espionage campaign breached critical infrastructure in 37 countries
The victims included national telecommunications firms, finance ministries and police agencies, with most targets suggesting an economic focus, Palo Alto Networks said.
-
Sponsored by Tines
New research: 3 big challenges facing security teams (and how to overcome them)
New research from Tines shows AI adoption is high, but manual workloads and burnout persist.
-
React2Shell exploitation undergoes significant change in threat activity
Researchers see a sudden consolidation of source IPs since late January.
Updated Feb. 4, 2026 -
Critical flaw in SolarWinds Web Help Desk under exploitation
The vulnerability could allow an attacker to achieve remote code execution.
Updated Feb. 5, 2026 -
Autonomous attacks ushered cybercrime into AI era in 2025
Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.
-
National cyber director solicits industry help in fixing regulations, threat information-sharing
President Donald Trump’s chief cybersecurity adviser said a forthcoming national strategy will kick off ambitious projects.
-
AI-ISAC inches forward under Trump administration
The U.S. government is exploring different options for how the information-sharing organization should work, an official said.
-
Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts
Security researchers warn that the initial threat activity was highly targeted, as a limited number of users were impacted prior to disclosure.
-
National cybersecurity strategies depend on public-private trust, report warns
An influential cybersecurity think tank urged governments to consult extensively with a wide variety of business stakeholders before making ambitious plans.
-
FCC urges telecoms to boost cybersecurity amid growing ransomware threat
The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.
-
ShinyHunters escalates tactics in extortion campaign linked to Okta environments
Researchers are tracking multiple clusters that are using social engineering to gain access to victims.
-
Deep Dive
Manufacturers fortify cyber defenses in response to dramatic surge in attacks
IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.
-
Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat
A look at the most important trends and issues in cyber this year.
-
Cisco sees vulnerability exploitation top phishing in Q4
The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.
-
CISA, security researchers warn FortiCloud SSO flaw is under attack
The exploitation activity comes weeks after a similar authentication bypass vulnerability was found.
-
Federal pivot on software security oversight could complicate vendor strategies
Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy.
-
AI tools break quickly, underscoring need for governance
In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.
-
Corporate workers lean on shadow AI to enhance speed
A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.
Updated Jan. 28, 2026 -
Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority
A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.
-
Cybercrime group claims credit for voice phishing attacks
Security researchers at Okta previously disclosed a social engineering campaign involving custom phishing kits.
Updated Jan. 27, 2026 -
Federal agencies abruptly pull out of RSAC after organizer hires Easterly
The decision fits a pattern of government withdrawal from the cybersecurity community under the Trump administration.
-
Deep Dive
5 cybersecurity trends to watch in 2026
Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.
-
R. Eskalis/NIST. Retrieved from NIST.
NIST is rethinking its role in analyzing software vulnerabilities
As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.
-
Acting CISA chief defends workforce cuts, declares agency ‘back on mission’
Lawmakers in both parties expressed concerns about CISA losing roughly a thousand employees.
-
IT teams aren’t equipped to stop rogue AI agents
Autonomous systems represent an attack surface existing cybersecurity services models aren’t designed to protect.
-
LastPass warns backup request is phishing campaign in disguise
Customers received deceptive emails over the holiday weekend claiming the company was doing maintenance.
Updated Jan. 23, 2026