Cisco SD-WAN Zero-Day Under Exploitation for 3 Years – Dark Reading
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind. – Read More
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind. – Read More
A Chinese keyboard warrior inadvertently leaked information about politically motivated influence operations through a ChatGPT account. – Read More
The vulnerabilities highlight a big drawback to integrating AI into software development workflows and the potential impact on supply chains. – Read More
Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves. – Read More
The PCI Security Standards Council experienced a record year in many regards, but its first annual report shows it needs to work even faster to stay ahead of attackers. –…
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent access to infected machines. – Read More
Attackers are bypassing email gateways through telephone-oriented attack delivery (TOAD), in which the only email payload is a phone number. – Read More
ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments. – Read More
In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than USD 4.3 million. – Read More
Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds. – Read More
The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks. – Read More
Investments in cybersecurity startups took off in 2025, as venture capital firms focused not just on AI-native tech, but talent as well. – Read More
The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.…
AI systems have to be able to show a record of what happened and how. – Read More
The long-active Iranian threat group debuted various attack strains and payloads in attacks against organizations in the Middle East and Africa. – Read More