Tuesday, May 12, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
What Zealot Reveals About AI's Cloud Offensive Capabilities
May 11, 2026
A disclosure from AI giant Anthropic in November 2025 confirmed that AI autonomously executed between 80% and 90% of a particular state-sponsored espionage campaign, effectively shifting the debate from hypothetical to a documented reality. Unit…
Read More >
How the Cloud Security Reckoning Is Reshaping Defense
May 07, 2026
Cloud security company Sysdig recently published the 2026 Cloud-Native Security and Usage Report, detailing trends and needs in modern cloud operations and security. The report shows that cloud environments have scaled past what human-driven security…
Read More >
Okta Vishing Attacks Put Identity Help Desks in the Crosshairs
May 05, 2026
A new report from LevelBlue’s SpiderLabs team warns that threat actors are increasingly using voice phishing, or vishing, to manipulate Okta authentication processes, including MFA resets and new-device enrollment. Rather than relying only on malicious…
Read More >
DVRs Now Turning Into DDoS Attack Infrastructures
May 04, 2026
The IoT attack surface has never been larger—or more neglected. This trend was captured by FortiGuard Labs, which tracked a campaign in which a Mirai-variant botnet (dubbed Nexcorium) exploits CVE-2024-3721. The command injection vulnerability found…
Read More >
How GrafanaGhost Turned Your Observability Stack Into an Exfiltration Engine
May 01, 2026
Data analytics and monitoring platform Grafana serves as the central nervous system for enterprise telemetry, financials, and customer data in over 7,000 enterprises across the globe, including 70% of Fortune 50. While the consolidation and…
Read More >
Why Enterprises Must Rethink Trust From the Inside Out
April 29, 2026
In modern enterprise environments, credential compromise serves as the dominant pathway for breaches. The rise of techniques such as deepfake technology and job candidate fraud exposes gaps in identity security that cannot be closed by…
Read More >
Why AI Agents Are Outrunning Enterprise Security Controls
April 27, 2026
The AI boom and other ongoing developments in recent years have led to a fundamental shift in the identity landscape. Keeper Security’s recent AI and Non-Human Identities Are Outpacing Security Controls report details a continuing…
Read More >
UNC6783 Is Turning Enterprise Support Channels into Extortion Entry Points
April 24, 2026
Google Threat Intelligence Group (GTIG) says a financially motivated threat cluster it tracks as UNC6783 is targeting business process outsourcers, help desks, and other enterprise support teams as an entry point into larger organizations. The…
Read More >
What Mythos and Glasswing Should Signal to Every Security Leader
April 23, 2026
The recent announcement of the Claude Mythos Preview and Project Glasswing represents a step forward in AI-empowered security initiatives. The fact that the Mythos model is being withheld from public release is an implicit acknowledgment…
Read More >
How a 40-Year-Old Protocol Is Leaving Critical Infrastructure Exposed
April 20, 2026
A decades-old industrial communications protocol still used to connect controllers, sensors, and monitoring equipment is leaving some critical infrastructure systems exposed online. Researchers at Comparitech said they identified 179 likely real industrial control system devices…
Read More >
Ivanti Exploitation Underscores the Fragility of Mobile Infrastructures
April 18, 2026
The active exploitation (CVE-2026-1340) of the Ivanti Endpoint Manager Mobile solution lays bare an uncomfortable irony at the heart of enterprise security: The platforms organizations deploy to govern and protect mobile devices have become high-value…
Read More >
The Axios Supply Chain Attack and What It Reveals About Open Source's Invisible Risk
April 17, 2026
In modern cybersecurity, open-source tools can often provide the perfect avenue for attackers due to widespread access and dependencies. The Axios promise-based HTTP client is present in around 80% of cloud and code environments, making…
Read More >
How North Korean Hackers Turned GitHub Into a Spy Network Hiding in Plain Sight
April 14, 2026
Attackers are constantly looking to develop their tactics and technologies for increased success, requiring ongoing intelligence and advancement in security to account for the evolution of risk. Recently, threat actors linked to the DPRK have…
Read More >
CISA Flags Actively Exploited Citrix NetScaler Vulnerability
April 13, 2026
CISA has elevated Citrix CVE-2026-3055 from a vendor advisory to an active response issue. On March 30, the agency added the NetScaler flaw to its Known Exploited Vulnerabilities catalog and directed federal civilian agencies to…
Read More >
Why Enterprise Permissions Are AI's Most Dangerous Inheritance
April 08, 2026
Broken access control has led the OWASP Top 10 for six straight years, affecting 100% of tested applications in 2025. However, nobody had ever measured actual permission usage in production to answer the question of…
Read More >
Ubuntu Patches Snap Flaw That Could Let Local Users Gain Root
April 07, 2026
Ubuntu has patched a local privilege-escalation flaw tied to Snap that could let an unprivileged local user gain root access on affected systems. Qualys disclosed the vulnerability this month, saying it stems from the interaction…
Read More >
How Manufacturing's Identity Crisis Is Turning Access Gaps Into Attack Vectors
April 06, 2026
One of the main competitive advantages of the manufacturing sector, provided by rapid scaling, seasonal agility, and third-party integration, is also its identity security liability. In manufacturing environments, access is provisioned at operational speed, and…
Read More >
AI Pipeline Code Flaw Exposes Patch Cycle Times
April 03, 2026
The cybersecurity community has long operated under an implicit assumption: When security alert organizations disclose a vulnerability, defenders have at least a few days—perhaps weeks—to assess, test, and deploy a patch before attackers catch up.…
Read More >
Subscribe for the Latest News
Webinars
Tuesday, May. 12
1pm ET / 10am PT
Scaling Code Security for Builders Beyond Developer-First
Wednesday, May. 13
1pm ET / 10am PT
Cyber Resilience in Action: How IBM and Index Engines Deliver a Detection-to-Recovery Pipeline
Wednesday, May. 27
1pm ET / 10am PT
Passwordless Authentication: A Practical Approach to Modernizing Access