The Latest
-
React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data
The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.
-
Threat cluster launches extortion campaign using social engineering
Researchers said the hackers are compromising business process outsourcers and targeting help desk support.
-
Critical flaw in FortiClient EMS under exploitation
Fortinet released an emergency hotfix after security researchers discovered the vulnerability being exploited as a zero-day.
Updated April 6, 2026 -
Hims & Hers says limited data stolen in social engineering attack
The telehealth provider said hackers gained access to a third-party customer service platform, but medical records remained secure.
-
Trump’s FY2027 budget again targets CISA
The White House reiterated accusations about CISA’s counter-misinformation work to justify a major proposed reduction.
-
Researchers warn of critical flaws in Progress ShareFile
Attackers could chain vulnerabilities together, leading to configuration changes or remote code execution.
-
Government agencies see cyber threats as major barrier to tech improvements
Federal leaders also see opportunities to accelerate cyber defense with AI, according to a new report, but most agencies are still only testing AI tools.
-
Retail and hospitality CISOs expect budget growth, new AI headaches and opportunities
More than eight in 10 security leaders in the sector say they’ve rolled out an AI governance framework to some degree, a new survey found.
-
Critical flaw in F5 BIG-IP faces wide exploitation risk
The company revised a security advisory as newly disclosed information heightens the potential impact.
-
Axios open-source library targeted in sophisticated supply chain attack
Researchers link the compromise to a North Korean adversary and warn the impacts could be wide ranging.
-
Cyberattack hits Hasbro, impacting orders and shipping
The major U.S. toymaker and entertainment company is still working to assess if company data was stolen in the attack.
Updated April 1, 2026 -
Iran-linked actors target Middle Eastern city governments to undermine missile-strike responses
The password-spraying campaign is the latest evidence that Iran is hitting back in cyberspace.
-
Deep Dive
‘Missed opportunity’: US government’s absence from RSAC Conference leaves stark void
The Trump administration’s decision to not attend the world’s biggest cybersecurity conference sent the wrong message to partners, experts said.
-
Cybersecurity risks shape AI adoption, but investment accelerates nonetheless
Companies see cybersecurity as a top investment priority within their AI budgets, according to KPMG.
-
Iran actors’ claims raise questions about larger cyber threat to US, allies
Questions are being raised about the veracity and tactics of Iran-linked actors, amid claims that a large trove of Lockheed Martin data is on the market.
Updated March 31, 2026 -
Newly observed malware campaign likely combines AI and ClickFix
Using the techniques in tandem helps hackers evade detection, a security firm said.
-
Citrix NetScaler products confirmed to be under exploitation
Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign.
Updated March 30, 2026 -
Espionage campaign targets telecom with stealthy Linux-based backdoor
A China-nexus actor has been able to gain long-term access in a bid to gather intel on government agencies and critical infrastructure providers.
-
Identity is the first line of defense, especially in an AI-fueled threat landscape
Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing.
-
Stryker restores most manufacturing after cyberattack
The medtech company has been working to restore manufacturing, ordering and shipping operations since it was hit by a cyberattack on March 11.
-
Citrix via Flickr
Critical flaw in Citrix NetScaler raises fears of new exploitation wave
Researchers warn that security teams need to take immediate mitigation steps before a public proof of concept is released.
Updated March 27, 2026 -
‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats
Experts said companies rushing to buy AI services risk letting their existing, still-vital defensive measures deteriorate.
-
Congress wants details from White House on cyber strategy, Iran resilience measures
Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.
-
Iran-linked ransomware operation targeted US healthcare provider
The Pay2Key group may have shifted its aims from extortion to destruction.
-
The CVE Program, a bedrock of global cyber defense, is teetering on the brink
A funding scare, AI and similar international initiatives are raising existential questions about the program’s future.