Friday, April 24, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
View More
UNC6783 Is Turning Enterprise Support Channels into Extortion Entry Points
April 24, 2026
Google Threat Intelligence Group (GTIG) says a financially motivated threat cluster it tracks as UNC6783 is targeting business process outsourcers, help desks, and other enterprise support teams as an entry point into larger organizations. The…
Read More >
What Mythos and Glasswing Should Signal to Every Security Leader
April 23, 2026
The recent announcement of the Claude Mythos Preview and Project Glasswing represents a step forward in AI-empowered security initiatives. The fact that the Mythos model is being withheld from public release is an implicit acknowledgment…
Read More >
How a 40-Year-Old Protocol Is Leaving Critical Infrastructure Exposed
April 20, 2026
A decades-old industrial communications protocol still used to connect controllers, sensors, and monitoring equipment is leaving some critical infrastructure systems exposed online. Researchers at Comparitech said they identified 179 likely real industrial control system devices…
Read More >
Ivanti Exploitation Underscores the Fragility of Mobile Infrastructures
April 18, 2026
The active exploitation (CVE-2026-1340) of the Ivanti Endpoint Manager Mobile solution lays bare an uncomfortable irony at the heart of enterprise security: The platforms organizations deploy to govern and protect mobile devices have become high-value…
Read More >
The Axios Supply Chain Attack and What It Reveals About Open Source's Invisible Risk
April 17, 2026
In modern cybersecurity, open-source tools can often provide the perfect avenue for attackers due to widespread access and dependencies. The Axios promise-based HTTP client is present in around 80% of cloud and code environments, making…
Read More >
How North Korean Hackers Turned GitHub Into a Spy Network Hiding in Plain Sight
April 14, 2026
Attackers are constantly looking to develop their tactics and technologies for increased success, requiring ongoing intelligence and advancement in security to account for the evolution of risk. Recently, threat actors linked to the DPRK have…
Read More >
CISA Flags Actively Exploited Citrix NetScaler Vulnerability
April 13, 2026
CISA has elevated Citrix CVE-2026-3055 from a vendor advisory to an active response issue. On March 30, the agency added the NetScaler flaw to its Known Exploited Vulnerabilities catalog and directed federal civilian agencies to…
Read More >
Why Enterprise Permissions Are AI's Most Dangerous Inheritance
April 08, 2026
Broken access control has led the OWASP Top 10 for six straight years, affecting 100% of tested applications in 2025. However, nobody had ever measured actual permission usage in production to answer the question of…
Read More >
Ubuntu Patches Snap Flaw That Could Let Local Users Gain Root
April 07, 2026
Ubuntu has patched a local privilege-escalation flaw tied to Snap that could let an unprivileged local user gain root access on affected systems. Qualys disclosed the vulnerability this month, saying it stems from the interaction…
Read More >
Industry News
View More
Cisco's Acquisition of Galileo and the Rise of Agentic Observability
April 20, 2026
The AI boom continues to bring new developments and shows no sign of stopping anytime soon. Agentic AI systems are now embedded in software development, content creation, and customer support workflows in an effort to…
Read More >
How Fortra's Acquisition of Zero-Point Security Is Redefining Offensive Security Education
April 15, 2026
The dangerous gap between tool sophistication and operator readiness continues to widen, creating security risks that compound over time. Red team platforms like Cobalt Strike have outpaced available education, making it difficult to adequately conduct…
Read More >
AppViewX Acquires Eos to Secure the AI Agent Identity Frontier
April 09, 2026
The rapid proliferation of AI agents inside enterprise environments has been a major development in recent years of the AI boom. Their autonomous, privileged nature makes them fundamentally different from any identity category that came…
Read More >
OpenAI Bets on AI Security With Promptfoo Acquisition
March 26, 2026
The AI explosion of the past several years, marked by the booming popularity of generative AI for personal and professional functions, has been largely focused on ensuring performance and quality of these tools. Agentic AI…
Read More >
Booz Allen’s Cybersecurity Pivot Signals a New Battle for the Enterprise Security Market
March 22, 2026
Booz Allen Hamilton is a company with over 100 years of history, today known primarily for specialization in digital transformation and artificial intelligence services. The company has a legacy in government consulting and national security,…
Read More >
Arctic Wolf Expands Beyond MDR with Sevco Deal to Tackle the Exposure Management Gap
March 13, 2026
Cybersecurity vendor Arctic Wolf has a foundation in managed detection and response (MDR), offering solutions, expertise, and resources for security coverage at scale. In recent years, there has been a mounting market pressure to move…
Read More >
Proofpoint Bets on the Agentic Future with Acuvity Acquisition
March 08, 2026
On February 12, 2026, cybersecurity and compliance leader Proofpoint announced the acquisition of AI security and governance firm Acuvity. This deal is a significant step in securing the agentic workspace, an increasingly common enterprise environment…
Read More >
Zscaler’s SquareX Acquisition Signals a New Era in Zero Trust Cybersecurity
February 20, 2026
In the traditional castle-and-moat model of security, legacy Virtual Private Networks (VPNs) act as “digital drawbridges,” a measure that is no longer effective in protecting a castle without walls like the modern distributed enterprise. As…
Read More >
LevelBlue Bets Big on MDR as MSSPs Consolidate for Scale
February 10, 2026
Managed detection and response (MDR), once an optional add-on service to comprehensively handle threat hunting and mitigation, has evolved into a core operating layer for managed security service providers (MSSPs). With advanced threats and sprawling…
Read More >
Subscribe for the Latest News
Webinars
Tuesday, Apr. 28
1pm ET / 10am PT
AI SOC Made Real: Autonomous Cloud Threat Ops at Machine Speed
Wednesday, Apr. 29
1pm ET / 10am PT
Banking on Identity with Practical Playbooks for Resilience
Wednesday, Apr. 29
1pm ET / 10am PT
From Ticket to Threat: Preserving Context Across Security Teams