Tuesday, May 12, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
Qualys TRU Uncovers Fileless PowerShell Loader Delivering Remcos RAT
May 27, 2025
The Qualys Threat Research Unit (TRU) recently uncovered a sophisticated new malware campaign that exemplifies the growing threat of fileless attacks. The culprit is a novel PowerShell-based shellcode loader, informally known as “K-Loader,” that delivers…
Read More >
Cyber Claims Stabilize, But Business Email Compromise and Ransomware Still Reign
May 26, 2025
Cybersecurity insurance provider Coalition recently released its 2025 Cyber Claims Report, exploring the cyber threat landscape throughout 2024. The report details trends including a 7% decrease in overall claims frequency among Coalition policyholders, a 3%…
Read More >
The Five Most Dangerous Cyber Threats Emerging in 2025
May 26, 2025
The SANS Institute, a leader in cybersecurity training and certificates, presents a keynote session at RSAC every year, looking at the threat landscape and outlining attack techniques of pressing concern in the upcoming year. Experts…
Read More >
Cybersecurity Awareness Soars, but SMBs Still Falling Behind on AI Defenses
May 23, 2025
Cybersecurity technology provider CrowdStrike, an industry leader in endpoint protection, recently published a report on its State of SMB Cybersecurity Survey. The report explores pressing concerns and evolving trends in the cybersecurity postures of small-…
Read More >
TeleMessage Breach Undermines Secure Messaging for Government Officials
May 22, 2025
TeleMessage, a secure messaging app used by government officials, has suspended all operations following claims by hackers that they breached the company’s internal systems. According to a report by NBC News, the attackers say they…
Read More >
Critical Flaw in Commvault Exposes Command Center to Remote Code Execution
May 20, 2025
Data protection and data management software company Commvault is an industry leader in cloud data protection, providing cyber resilience solutions to thousands of organizations. Recently, a critical vulnerability was discovered in the Commvault Command Center,…
Read More >
APT Surge Marks Historic High in Cyber Activity Targeting U.S. Telecom
May 15, 2025
The cybersecurity threat landscape has entered a new era of intensity. Trellix’s recently released April 2025 CyberThreat Report revealed what may be the most active period of cyberattacks in U.S. history. Based on telemetry from…
Read More >
Mobile Threats Surge in 2025: Phishing, Sideloading, and Supply Chain Blind Spots
May 14, 2025
Mobile threats are an important consideration in any security strategy, especially as hybrid working environments and bring-your-own-device (BYOD) setups are popular in modern organizations. Mobile security leader Zimperium recently published its 2025 Global Mobile Threat…
Read More >
Zero-Day Suspected in SAP NetWeaver Attacks
May 13, 2025
A newly uncovered attack is targeting SAP NetWeaver systems. According to researchers at ReliaQuest, threat actors are exploiting what appears to be a previously unknown vulnerability to quietly drop lightweight JSP web shells onto fully…
Read More >
The 47-Day Certificate Countdown
May 12, 2025
The CA/Browser Forum recently took an official vote to amend the TLS Baseline Requirements, bringing certificate lifespans down to 47 days by 2029 through a series of gradual changes. This comes largely in response to…
Read More >
When the Weakest Link Breaks: The Cleo Vulnerability Behind the Hertz Data Breach
May 09, 2025
Modern organizations are presented with an array of risks from all angles, including through partners, contractors, and other third parties. Interconnected and integrated technologies and supply chains open up many avenues for attackers to compromise…
Read More >
What Microsoft’s 2024 Vulnerability Data Reveals About Cybersecurity Priorities
May 07, 2025
Findings from BeyondTrust’s recently released 12th annual Microsoft Vulnerabilities Report reveal a complex and evolving threat landscape. As evidence, consider that in 2024, Microsoft reported the highest number of vulnerabilities it has ever had (1,360).…
Read More >
Why 95% of Security Warnings Are Noise
May 06, 2025
Modern application security (AppSec) suffers from a number of issues, one of the main ones being alert fatigue. Human teams do not have the time or resources to verify and investigate every security alert, especially…
Read More >
Unpatched Erlang SSH Vulnerability Opens Door to Full System Takeover
May 02, 2025
Erlang/OTP plays a major role in telecom and distributed systems, enabling easy creation of concurrent, fault-tolerant, and robust systems. Erlang/OTP SSH is the most popular protocol for remote access management, and its compromise represents a…
Read More >
Cybersecurity Sharing at a Crossroads as Senators Push to Extend Key Law
May 01, 2025
A key pillar of the nation’s cyber defense is on the clock. The Cybersecurity Information Sharing Act (CISA) of 2015 is set to expire in September, and lawmakers are scrambling to renew it before the…
Read More >
Ransomware Rankings Shake Up: Akira Rises, Hunters Fall, New Threats Emerge
April 29, 2025
The threat landscape is always shifting, requiring organizations to stay on top of current threat trends, and ransomware trends are no exception. Halcyon recently released its Ransomware Malicious Quartile, exploring the top ransomware groups in…
Read More >
EU Eyes Deregulation to Boost Global Competitiveness
April 28, 2025
The European Union’s General Data Protection Regulation has been a pillar since its implementation in May 2018, impacting data security and influencing other pieces of legislation worldwide. Although the regulation applies to the EU, the…
Read More >
Coordinated Login Scanning Targets Palo Alto Networks GlobalProtect Portals
April 24, 2025
Cybersecurity intelligence and analysis company GreyNoise has reported that they have seen a sharp spike in login scanning activity targeting Palo Alto Networks’ PAN-OS GlobalProtect portals, suggesting a planned, sustained effort to test network defenses…
Read More >
Subscribe for the Latest News
Webinars
Tuesday, May. 12
1pm ET / 10am PT
Scaling Code Security for Builders Beyond Developer-First
Wednesday, May. 13
1pm ET / 10am PT
Cyber Resilience in Action: How IBM and Index Engines Deliver a Detection-to-Recovery Pipeline
Wednesday, May. 27
1pm ET / 10am PT
Passwordless Authentication: A Practical Approach to Modernizing Access