The Latest
-
Iran-nexus hackers target flaws in surveillance cameras
The threat activity echoes prior exploitation during the Israeli war with Hamas, a precursor to attacks against critical sectors in the U.S.
Updated 14 hours ago -
Pro-Russia actors team with Iran-linked hackers in attacks
The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S.
Updated March 3, 2026 -
Ransomware is now less about malware and more about impersonation
Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.
-
Iran-linked hackers raise threat level against US, allies
Security researchers warn that hacktivists and state-linked groups are using DDoS, phishing and other tactics against critical infrastructure.
Updated March 2, 2026 -
Deep Dive
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.
-
University of Mississippi Medical Center reopens clinics after ransomware attack
The academic medical center’s clinics can once again access patient records and are resuming normal operations more than a week after the attack.
Updated March 2, 2026 -
Trump administration removes controversial acting CISA director
The new agency chief, Nick Andersen, has significantly more senior cybersecurity leadership experience, which has given some demoralized employees hope.
Updated Feb. 27, 2026 -
‘Resurge’ malware can remain undetected on devices
CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.
Updated Feb. 27, 2026 -
UFP Technologies investigating cyberattack that impacted company data
The medical device maker warned of short-term shipment delays, but does not see a material impact.
-
AI accelerates lateral movement in cyberattacks
New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.
-
Software vulnerabilities are being weaponized faster than ever
A report by VulnCheck shows threat groups are exploiting a small percentage of critical flaws well before security teams can mitigate.
-
CISA orders agencies to patch Cisco devices now under attack
The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.
-
China-linked hackers breached dozens of telecoms, government agencies
The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.
-
Threat groups move at record speeds, as AI helps scale attacks
A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.
-
In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps
CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.
-
AI helps novice threat actor compromise FortiGate devices in dozens of countries
Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.
-
Hackers target vulnerabilities in Roundcube Webmail
CISA has added the flaws, one of which is considered critical, to its Known Exploited Vulnerabilities catalog.
-
US Treasury Department offers secure AI advice to financial services firms
The agency developed the resources in partnership with financial executives and other regulators.
-
BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools
Researchers warn that thousands of instances may still be vulnerable to exploitation activity.
Updated Feb. 20, 2026 -
Palo Alto Networks CEO sees AI as demand driver, not a threat
During a quarterly investor call, Nikesh Arora addressed growing concerns in the investment community that AI could hurt demand for cybersecurity.
Updated Feb. 19, 2026 -
AI’s ‘connective tissue’ is woefully insecure, Cisco warns
In a new report, the company also said businesses should beware of the “SolarWinds of AI.”
-
Threat groups use AI to speed up and scale cyberattacks
A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.
-
Identity and supply chain need more attention, risk intelligence firm says
Roughly a third of attacks now use stolen credentials, according to the company’s latest report.
-
Hackers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines
Threat actors linked to China have deployed a novel backdoor, according to researchers.
Updated Feb. 18, 2026 -
Newly identified hacking groups provide access to OT environments
A state-linked adversary has begun to pivot from the Ukraine war with new attacks targeting Europe and the U.S.