Tuesday, April 21, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
How a 40-Year-Old Protocol Is Leaving Critical Infrastructure Exposed
April 20, 2026
A decades-old industrial communications protocol still used to connect controllers, sensors, and monitoring equipment is leaving some critical infrastructure systems exposed online. Researchers at Comparitech said they identified 179 likely real industrial control system devices…
Read More >
Ivanti Exploitation Underscores the Fragility of Mobile Infrastructures
April 18, 2026
The active exploitation (CVE-2026-1340) of the Ivanti Endpoint Manager Mobile solution lays bare an uncomfortable irony at the heart of enterprise security: The platforms organizations deploy to govern and protect mobile devices have become high-value…
Read More >
The Axios Supply Chain Attack and What It Reveals About Open Source's Invisible Risk
April 17, 2026
In modern cybersecurity, open-source tools can often provide the perfect avenue for attackers due to widespread access and dependencies. The Axios promise-based HTTP client is present in around 80% of cloud and code environments, making…
Read More >
How North Korean Hackers Turned GitHub Into a Spy Network Hiding in Plain Sight
April 14, 2026
Attackers are constantly looking to develop their tactics and technologies for increased success, requiring ongoing intelligence and advancement in security to account for the evolution of risk. Recently, threat actors linked to the DPRK have…
Read More >
CISA Flags Actively Exploited Citrix NetScaler Vulnerability
April 13, 2026
CISA has elevated Citrix CVE-2026-3055 from a vendor advisory to an active response issue. On March 30, the agency added the NetScaler flaw to its Known Exploited Vulnerabilities catalog and directed federal civilian agencies to…
Read More >
Why Enterprise Permissions Are AI's Most Dangerous Inheritance
April 08, 2026
Broken access control has led the OWASP Top 10 for six straight years, affecting 100% of tested applications in 2025. However, nobody had ever measured actual permission usage in production to answer the question of…
Read More >
Ubuntu Patches Snap Flaw That Could Let Local Users Gain Root
April 07, 2026
Ubuntu has patched a local privilege-escalation flaw tied to Snap that could let an unprivileged local user gain root access on affected systems. Qualys disclosed the vulnerability this month, saying it stems from the interaction…
Read More >
How Manufacturing's Identity Crisis Is Turning Access Gaps Into Attack Vectors
April 06, 2026
One of the main competitive advantages of the manufacturing sector, provided by rapid scaling, seasonal agility, and third-party integration, is also its identity security liability. In manufacturing environments, access is provisioned at operational speed, and…
Read More >
AI Pipeline Code Flaw Exposes Patch Cycle Times
April 03, 2026
The cybersecurity community has long operated under an implicit assumption: When security alert organizations disclose a vulnerability, defenders have at least a few days—perhaps weeks—to assess, test, and deploy a patch before attackers catch up.…
Read More >
Researchers Say Claude Flaws Could Be Chained to Silently Exfiltrate User Data
April 01, 2026
Researchers at Oasis Security say they found a three-part exploit chain involving Claude features and related claude.com infrastructure that could silently extract sensitive data from a user’s conversation history. The attack abused trusted platform features…
Read More >
How a Single DNS Loophole Exposes AI Agents to Command-and-Control Attacks
March 31, 2026
The Amazon Web Services (AWS) Bedrock AgentCore Code Interpreter is a managed service enabling AI agents to execute Python code dynamically and securely within a managed cloud environment. The service’s sandbox mode was positioned by…
Read More >
The Bank in Your Pocket Is Now the Front Door for Fraud
March 30, 2026
Traditional defenses against fraud have been designed for traditional kinds of threats, prioritizing hardened servers, network perimeters, and layered authentication to defend against the attacks that were prevalent at the time. These measures are increasingly…
Read More >
Signed And Trusted But Still Dangerous
March 24, 2026
Microsoft Defender Experts recently found a series of phishing campaigns abusing legitimate signatures to deceive targets. Identified in February 2026, the phishing lures consisted of crafted meeting invitations and PDF attachments leading to false pages…
Read More >
Cybercrime Group Targets Salesforce Misconfigurations
March 23, 2026
A renewed cyberattack campaign on Salesforce by the cybercrime group ShinyHunters highlights a key consideration for security teams. Simple configuration mistakes can expose enterprise data—at scale. As this recent campaign unfolded, Salesforce warned customers about…
Read More >
Identity Overload Is Creating a New Cybersecurity Breaking Point
March 21, 2026
Autonomous Identity Platform provider Lumos recently published the “AI, Automation, and Risk in 2026: Identity at a Breaking Point” report, exploring the state of identity in the age of AI. According to the report, identity-based…
Read More >
How AI Browsers Turn Ordinary Content Into an Attack Surface
March 17, 2026
Agentic AI browsers are being sold as the next productivity leap, tools that can summarize content, move across tabs, connect tasks across apps and services, and act on a user’s behalf. But new research from…
Read More >
Preparing the Web for the Post-Quantum Era
March 17, 2026
While threats continue to ramp up and security efforts struggle to keep pace, a more existential technological challenge looms: the potential for quantum computing to undermine current public-key cryptography. Understanding the gravity of not meeting…
Read More >
The Hidden Risk of AI Agents Running on Your Laptop
March 17, 2026
Oasis Security researchers disclosed a vulnerability chain that they said allowed a malicious website to take over a locally running OpenClaw AI agent, exposing how browser-accessible local services can become a new attack surface for…
Read More >
Subscribe for the Latest News
Webinars
Wednesday, Apr. 22
1pm ET / 10am PT
When Your Cloud Directory Goes Dark: Recovering Entra ID After a Cyberattack
Wednesday, Apr. 22
1pm ET / 10am PT
Takeaways from Major Open Source Library Attacks
Wednesday, Apr. 22
1pm ET / 10am PT
Scaling Secure Development: Modern Code Security Without Slowing Innovation