Tuesday, May 12, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
Identity Is the New Perimeter: Rethinking Security in the Age of Autonomy
April 23, 2025
The cybersecurity world recently recognized Identity Management Day. Held on April 8, Identity Management Day was first established in 2021 in partnership with the National Cybersecurity Alliance and promotes awareness and educates business leaders, IT…
Read More >
How Spam Bomb Attacks Are Evolving to Breach Enterprise Defenses
April 22, 2025
Threat actors are always attempting to devise sophisticated, advanced attack tactics, and they frequently do so by building on tried-and-true methods of old, as demonstrated by a new surge in email spam bomb attacks. Email…
Read More >
A Glimpse into the Next Generation of Malicious Autonomous Cyber Threats
April 21, 2025
In recent years, particularly since the public availability of tools like ChatGPT, AI has taken center stage in many discussions of technology. Using AI can serve a variety of legitimate purposes for businesses and individuals…
Read More >
NIST Pauses Enrichment for Pre-2018 CVEs: A Strategic Reset or a Risky Omission?
April 18, 2025
In a pivotal shift that could reshape how cybersecurity teams prioritize vulnerabilities, the National Institute of Standards and Technology (NIST) has announced it will deprioritize enrichment of all Common Vulnerabilities and Exposures (CVEs) published before…
Read More >
AI Phishing Agents Now Outsmart Human Red Teams
April 18, 2025
The growth of AI has been in the spotlight in recent years as generative AI tools have become available for individual and business use. As these tools have grown in popularity and taken center stage…
Read More >
Ransomware’s Dirty Secret: Paying Doesn’t Guarantee Recovery
April 15, 2025
In a stark warning to organizations globally, CyberEdge Group’s 2025 Cyberthreat Defense Report (CDR) has revealed a troubling trend: only 54% of organizations that paid a ransom to cybercriminals in 2024 successfully recovered their data.…
Read More >
AI Agents Are Weaponizing at Speed: Gartner Warns of 50% Faster Exploits by 2027
April 10, 2025
The AI arms race has begun. In its new forecast, Gartner now predicts that by 2027, AI agents will cut the time it takes to exploit exposed account credentials in half. It’s a real warning…
Read More >
NSA Leadership Shakeup Sparks Cybersecurity Concerns
April 10, 2025
On Thursday, April 3rd, the highest officials at the National Security Agency were abruptly fired. Air Force Gen. Timothy Haugh had been serving as the head of U.S. Cyber Command and director of the NSA,…
Read More >
Oracle’s Breach Denial Under Scrutiny as Millions of Records Surface for Sale
April 08, 2025
CloudSEK recently uncovered a major breach allegedly targeting Oracle Cloud, in which six million records were exfiltrated. A threat actor known as “rose87168” was found attempting to sell this data – from more than 140,000…
Read More >
How GenAI and Phishing-as-a-Service Are Transforming Cyber Threats in 2025
April 07, 2025
The enterprise web browser as the primary battleground for cybercriminals is the underlying theme of Menlo Security’s State of the Browser Security report. The report highlights the trends around attacks concentrated on exploiting web browser…
Read More >
How Malicious Drivers Are Silencing Endpoint Security
April 03, 2025
Endpoint detection and response (EDR) tools are the first line of defense against malware on modern networks. They monitor system activity in real-time, flag suspicious behavior, and help security teams contain threats before they spread.…
Read More >
KoSpy Unmasked: North Korea’s APT37 Expands Mobile Surveillance Operations
April 02, 2025
North Korea’s state-sponsored hackers have added a powerful new tool to their cyber arsenal. According to researchers at Lookout, a newly discovered Android spyware strain called KoSpy is actively being used to spy on mobile…
Read More >
Ransomware and Vishing Surge as Attackers Pivot Strategies
April 01, 2025
Threats are always changing and growing as attackers attempt to launch more sophisticated and successful attacks, forcing cybersecurity professionals to constantly adapt and evolve to defend against these attacks. Security service provider Ontinue’s 2H 2024…
Read More >
Microsoft Bets on AI Agents to Combat Evolving Cyber Threats
March 31, 2025
Cybersecurity threats are constantly evolving, with bad actors always looking for the best and newest practices and technologies to launch more attacks with higher success rates and larger payouts. The AI boom in recent years…
Read More >
XCSSET: A New Variant That Targets Developers
March 28, 2025
Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a highly sophisticated modular macOS malware variant that injects malicious code into Xcode projects. Xcode is Apple’s integrated development environment (IDE) for macOS, which developers…
Read More >
X Marks the Target for Massive DDoS Attack
March 27, 2025
“There was (still is) a massive cyberattack against X,” was posted by Elon Musk on March 10, 2025. The attack had multiple waves as reported by Downdetector. The attack focused on U.S. and U.K. users.…
Read More >
Quantum Threats Are Closer Than You Think
March 26, 2025
The era of commercially available quantum computers capable of compromising today’s cryptography may not be fully upon us yet, but it is coming on faster than many believe. It is crucial for organizations to consider…
Read More >
How Volt Typhoon Infiltrated a Small US Power Grid
March 25, 2025
The threat group Volt Typhoon (also known as VOLTZITE) has been known to be active since 2021, representing an advanced persistent threat (APT) primarily to organizations in the United States. Alleged to be a Chinese…
Read More >
Subscribe for the Latest News
Webinars
Tuesday, May. 12
1pm ET / 10am PT
Scaling Code Security for Builders Beyond Developer-First
Wednesday, May. 13
1pm ET / 10am PT
Cyber Resilience in Action: How IBM and Index Engines Deliver a Detection-to-Recovery Pipeline
Wednesday, May. 27
1pm ET / 10am PT
Passwordless Authentication: A Practical Approach to Modernizing Access