The Latest
-
Cybersecurity risks shape AI adoption, but investment accelerates nonetheless
Companies see cybersecurity as a top investment priority within their AI budgets, according to KPMG.
-
Sponsored by Zurich Resilience Solutions
Why user behavior is the primary entry point for cyberattacks
Human error still drives 60% of breaches — here’s why attackers keep targeting users.
-
Iran actors’ claims raise questions about larger cyber threat to US, allies
Questions are being raised about the veracity and tactics of Iran-linked actors, amid claims that a large trove of Lockheed Martin data is on the market.
Updated March 31, 2026 -
Newly observed malware campaign likely combines AI and ClickFix
Using the techniques in tandem helps hackers evade detection, a security firm said.
-
Citrix NetScaler products confirmed to be under exploitation
Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign.
Updated March 30, 2026 -
Espionage campaign targets telecom with stealthy Linux-based backdoor
A China-nexus actor has been able to gain long-term access in a bid to gather intel on government agencies and critical infrastructure providers.
-
Identity is the first line of defense, especially in an AI-fueled threat landscape
Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing.
-
Stryker restores most manufacturing after cyberattack
The medtech company has been working to restore manufacturing, ordering and shipping operations since it was hit by a cyberattack on March 11.
-
Citrix via Flickr
Critical flaw in Citrix NetScaler raises fears of new exploitation wave
Researchers warn that security teams need to take immediate mitigation steps before a public proof of concept is released.
Updated March 27, 2026 -
‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats
Experts said companies rushing to buy AI services risk letting their existing, still-vital defensive measures deteriorate.
-
Congress wants details from White House on cyber strategy, Iran resilience measures
Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.
-
Iran-linked ransomware operation targeted US healthcare provider
The Pay2Key group may have shifted its aims from extortion to destruction.
-
The CVE Program, a bedrock of global cyber defense, is teetering on the brink
A funding scare, AI and similar international initiatives are raising existential questions about the program’s future.
-
Companies face difficult choices in blaming hackers for an attack
Publicly naming a hacking group can affect everything from retaliation to insurance coverage.
-
FCC bans import of consumer-grade routers amid national security concerns
The decision follows years of escalating attacks against the U.S. from state-linked threat groups targeting routers and edge devices.
Updated March 24, 2026 -
Cybercrime groups speed up initial access handoff through planning, coordination
A report by Google Threat Intelligence Group also shows voice-based phishing has surged amid a rise in social engineering tactics.
-
AI poised to help low-skilled hackers in the near term
The expected rise in automated cyberattacks means more work for defenders — but they can use AI to fight back.
-
ISACs confront AI’s promise and peril for threat intelligence-sharing
Any use of AI for ISAC work must preserve members’ trust, representatives of three critical infrastructure sectors said.
-
Stryker confirms cyberattack is contained and restoration underway
An assurance letter from Palo Alto Networks provides insight into the forensic investigation at the medical technology firm.
-
Lockheed Martin targeted in alleged breach by pro-Iran hacktivist
The group is demanding millions of dollars to not sell the information to U.S. adversaries.
-
Network edge devices still widely used after reaching end-of-life status
A report by VulnCheck shows nation-state hackers often target flaws in aging routers, firewalls and VPNs.
-
DOJ confirms seizure of domains linked to Iran-backed threat actor
A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker.
-
Companies know AI is essential for cyber defense but aren’t yet seeing returns
The maturity of organizations’ AI oversight also varies significantly, according to a new EY survey of cybersecurity leaders.
-
US, allies move to dismantle four high-volume IoT botnets
The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.
-
CISA urges organizations to harden endpoint security following Stryker attack
The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune.
-
Water utilities need hands-on cybersecurity help, not just free guidance, pilot program finds
In a new report, Microsoft criticized the federal government for scaling back support to critical infrastructure operators.