The Latest
-
Akira engaged in ransomware attacks against critical sectors
The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.
Updated Nov. 14, 2025 -
Sponsored by Lenovo and SentinelOne
AI-driven dynamic endpoint security is redefining trust
Network perimeters are gone. Modern security solutions must be proactive, dynamic and intelligent.
-
Government funding bill temporarily revives cybersecurity information-sharing law
The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January.
-
UK authorities propose law to set minimum cyber standards for critical sectors
The legislation follows a wave of social engineering attacks that rocked the nation’s retail and automotive supply chains.
-
Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix
Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.
-
Companies want more from their threat intelligence platforms
Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.
-
Shadow AI is widespread — and executives use it the most
Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.
-
Cisco detects new attack variant targeting vulnerable firewalls
Hackers may be able to overload unpatched devices, the company said.
-
Conduent warns of further financial fallout from cyberattack
The company has incurred millions in expenses related to data breach notifications stemming from an attack earlier this year.
-
AI agents worsen IT’s capacity crunch: S&P Global
An infrastructure overhaul to support agentic systems is underway, bringing with it a new set of capacity demands and security considerations.
-
Nevada ransomware attack traced back to malware download by employee
The state refused to pay a ransom and recovered 90% of the impacted data.
-
Cyberattacks surge against IoT, mobile devices in critical infrastructure
Manufacturing and energy firms saw some of the biggest increases in malware activity targeting connected devices.
-
SonicWall says state-linked actor behind attacks against cloud backup service
CEO announces security and governance reforms inside the company, including the adoption of secure-by-design practices.
-
In financial sector, vendors lag behind customers on cybersecurity
Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.
-
Hackers targeting Cisco IOS XE devices with BadCandy implant
Security researchers and Australian authorities warn that exploitation activity is ongoing.
Updated Nov. 5, 2025 -
AI-based malware makes attacks stealthier and more adaptive
Google says it has discovered at least five malware families that use AI to reinvent themselves and hide from defenders.
-
Researchers warn of flaws that allow manipulation of Microsoft Teams messages
A report by Check Point shows hackers could forge identities and alter messages.
-
AI risks pack a punch, but governance provides a buffer
Enterprises strengthen governance and focus on responsible practices as more than 3 in 5 suffer AI risk-related losses of more than $1 million, EY data shows.
-
Identity-based attacks need more attention in cloud security strategies
Companies should lock down user accounts and scan for compromised credentials, according to a new report.
-
Cybercrime groups team with organized crime in massive cargo theft campaigns
Financially motivated hackers are abusing remote monitoring and access tools against trucking and freight companies, Proofpoint warns.
Updated Nov. 3, 2025 -
Security leaders say AI can help with governance, threat detection, SOC automation
Executives and technical leaders differ on AI priorities, according to a report from Amazon.
-
Windows Server Update Service exploitation ensnares at least 50 victims
Researchers say hackers could be gathering intelligence for future attacks, and authorities warn users to apply patches and check for compromise.
-
CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks
The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.
-
FCC will vote to scrap telecom cybersecurity requirements
The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.
Updated Oct. 31, 2025 -
CISA updates guidance and warns security teams on WSUS exploitation
The agency urges users to apply emergency patches from Microsoft to counter a serious threat.
-
Canadian authorities warn of hacktivists targeting exposed ICS devices
Hackers have manipulated critical components at water utilities, oil and gas facilities, and agricultural sites in recent weeks.
Updated Oct. 31, 2025