Thursday, April 16, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
Ransomware and Vishing Surge as Attackers Pivot Strategies
April 01, 2025
Threats are always changing and growing as attackers attempt to launch more sophisticated and successful attacks, forcing cybersecurity professionals to constantly adapt and evolve to defend against these attacks. Security service provider Ontinue’s 2H 2024…
Read More >
Microsoft Bets on AI Agents to Combat Evolving Cyber Threats
March 31, 2025
Cybersecurity threats are constantly evolving, with bad actors always looking for the best and newest practices and technologies to launch more attacks with higher success rates and larger payouts. The AI boom in recent years…
Read More >
XCSSET: A New Variant That Targets Developers
March 28, 2025
Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a highly sophisticated modular macOS malware variant that injects malicious code into Xcode projects. Xcode is Apple’s integrated development environment (IDE) for macOS, which developers…
Read More >
X Marks the Target for Massive DDoS Attack
March 27, 2025
“There was (still is) a massive cyberattack against X,” was posted by Elon Musk on March 10, 2025. The attack had multiple waves as reported by Downdetector. The attack focused on U.S. and U.K. users.…
Read More >
Quantum Threats Are Closer Than You Think
March 26, 2025
The era of commercially available quantum computers capable of compromising today’s cryptography may not be fully upon us yet, but it is coming on faster than many believe. It is crucial for organizations to consider…
Read More >
How Volt Typhoon Infiltrated a Small US Power Grid
March 25, 2025
The threat group Volt Typhoon (also known as VOLTZITE) has been known to be active since 2021, representing an advanced persistent threat (APT) primarily to organizations in the United States. Alleged to be a Chinese…
Read More >
Tenable Reveals How DeepSeek Can Write Keyloggers and Ransomware (With a Little Help)
March 24, 2025
Tenable’s latest research highlights a growing concern in cybersecurity: the role of AI in developing malicious code. Researchers tested DeepSeek, a generative AI model, to see whether it could create malware. With the right prompts—specifically…
Read More >
U.S. Military and Defense Contractors Facing Unprecedented Cybersecurity Breach
March 21, 2025
A significant number of data breaches occur when cybercriminals walk through the “front door” using stolen credentials. According to a study from Hudson Rock, the login information is acquired using infostealer malware. Cybercriminals package the…
Read More >
AI Agents on Autopilot: OpenAI’s Operator Can Be Exploited for Cyberattacks
March 20, 2025
Artificial intelligence tools have been at the forefront of tech news lately, with organizations and individuals increasingly using them for a wide range of purposes. This surge in popularity has both been stoked by and…
Read More >
How a 130,000-Device Botnet Is Quietly Cracking Microsoft 365 Accounts
March 19, 2025
A recently discovered botnet consisting of more than 130,000 compromised devices is now targeting Microsoft 365 accounts with advanced password-spraying tactics capable of evading traditional detection methods. Password-spraying is a brute-force cyber-attack where hackers try…
Read More >
March Madness, Cyber Sadness: How AI-Powered Hackers Are Scoring Big Against Businesses
March 18, 2025
With the start of the NCAA March Madness Tournament season, the social and cultural phenomenon has a presence in many workplaces. Up to 80 million tournament brackets are filled out each year, and many employees…
Read More >
Exploited Zero-Day Vulnerabilities in VMware Products
March 17, 2025
Global tech leader Broadcom published a critical security advisory on March 4th, 2025, regarding three new zero-day vulnerabilities in VMware ESXi, Workstation, Fusion, and other products. With varying levels of severity, the vulnerabilities can enable…
Read More >
Typosquatting in the Go Ecosystem
March 14, 2025
Software supply chain attacks have become a growing concern for developers and security teams alike. Instead of targeting individual systems, attackers compromise widely used components, allowing them to spread malware through trusted software channels. One…
Read More >
Salt Typhoon Exploits Seven-Year-Old Flaw to Breach Major U.S. Telecoms
March 13, 2025
In late 2024, it was confirmed that a cyber espionage campaign perpetrated by a highly sophisticated Chinese-based threat actor infiltrated at least eight major telecommunications companies. The attacks gained access to Call Detail Records used…
Read More >
Silk Typhoon Targets IT Infrastructure and Cloud Apps
March 11, 2025
The threat group known as Silk Typhoon has been active since the 2021 exploitation of zero-day vulnerabilities in Microsoft Exchange servers. The group has a diverse attack history, partly as a result of their opportunistic…
Read More >
A Precarious Pause: U.S. Halts Offensive Cyber Operations Against Russia
March 10, 2025
In a major policy shift, U.S. Defense Secretary Pete Hegseth has directed U.S. Cyber Command to cease offensive cyber operations targeting Russia. Framed as a diplomatic effort during ongoing negotiations over the Ukraine conflict, this…
Read More >
Ghost Ransomware Strikes Globally
March 07, 2025
The United States Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI), in partnership with the Multi-State Information Sharing and Analysis Center (MS-ISAC), recently released a joint Cybersecurity Advisory warning of a…
Read More >
Report Reveals Open Source Security Crisis
March 06, 2025
Open-source software (OSS) has become the backbone of modern applications, driving innovation across industries from finance to manufacturing. However, the latest Open Source Security and Risk Analysis (OSSRA) report from Black Duck reveals a sobering…
Read More >
Subscribe for the Latest News
Webinars
Tuesday, Apr. 21
8am ET / 5am PT
Securing the AI Frontier: Defending the Enterprise Ecosystem with Prisma AIRS
Wednesday, Apr. 22
1pm ET / 10am PT
When Your Cloud Directory Goes Dark: Recovering Entra ID After a Cyberattack
Wednesday, Apr. 22
1pm ET / 10am PT
Takeaways from Major Open Source Library Attacks