Thursday, April 16, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
Chinese Hackers Target Diplomacy with Covert Email Breaches
October 12, 2025
With cyber risks on the rise, many state-aligned threat groups have either arrived on the scene or evolved to take advantage of vulnerabilities in the modern landscape. Palo Alto Networks’ threat intelligence and incident response…
Read More >
Tokens, SVGs, and Thumb Drives: Inside 2025’s Identity-Centric Attack Wave
October 07, 2025
Cloud-based security service provider Ontinue recently published the 1H 2025 Threat Intelligence Report, which explores the most common cyber risks from the first half of the year. The major findings include threat actors increasingly focusing…
Read More >
Phishing Gangs Expand Targets to Microsoft, Google, and Twilio
October 06, 2025
Phishing has always been a moving target, but the latest data shows just how fast attackers are evolving. Email-based scams that once relied on crude tricks are now weaponizing trusted services, slipping past filters, and…
Read More >
Salesforce Vulnerability Chain Exposes AI Agent Risks
October 03, 2025
The role of AI agents continues to expand rapidly within enterprise workflows. A case in point is the Salesforce Agentforce solution. The AI-powered platform allows enterprises to customize autonomous agents to streamline customer engagements and…
Read More >
AI-Driven Development Fuels New Vulnerabilities
October 03, 2025
In the past several years, AI has gone through massive growth, rapidly expanding in capabilities, popularity, and reach. This has led to an explosion of AI-driven development and faster release cycles, but it has also…
Read More >
FBI Warns of New Salesforce Data Extortion Campaigns
September 30, 2025
The FBI has issued a FLASH alert warning of new data theft and extortion campaigns aimed at Salesforce users. Investigators say two cybercriminal groups are breaking into Salesforce instances through social engineering schemes and compromised…
Read More >
How Steganography and Bitbucket Are Delivering the StealC Information Stealer
September 29, 2025
A user opens their email to find what looks to be a legitimate—and urgent—message purporting to be from Meta Support. The email claims that the user’s account has been reported and is scheduled to be…
Read More >
New Vulnerability Exposes Developers to Silent Code Execution
September 26, 2025
Developers using the popular AI-powered code editor Cursor may be exposing themselves to silent attacks the moment they open a project. Oasis Security uncovered a critical vulnerability that, unlike the typical IDE flaws rooted in…
Read More >
Luxury Fashion Faces a Cyber Reckoning: Kering Breach Exposes Millions
September 24, 2025
Luxury fashion group Kering, which includes such high-end brands as Gucci, Balenciaga, and Yves Saint Laurent, has recently been hit by a major data breach. Malicious actors hacked Kering’s systems to steal vast amounts of…
Read More >
Why a Shared SBOM Vision Could Be the Key to Securing the Software Supply Chain
September 23, 2025
In an era of increasingly interconnected digital landscapes, the software supply chain is a crucial area to secure, affecting organizations across all sectors. Software supply chain attacks are on the rise among modern threats, and…
Read More >
How a Self-Propagating npm Attack Is Hunting Developer Secrets
September 23, 2025
A developer runs a routine update, the kind that happens dozens of times a week. Nothing unusual flashes on the screen. But buried inside the new package is a hidden file called bundle.js. The moment…
Read More >
Burger King Parent RBI Exposed by Ethical Hackers
September 16, 2025
Recently, ethical hackers uncovered critical vulnerabilities in platforms hosted by Restaurant Brands International, the parent company that owns such major fast food chains as Burger King, Popeyes Louisiana Kitchen, and Tim Hortons. Two ethical hackers,…
Read More >
SEO Poisoning Campaign Targets Chinese Users with Hiddengh0st and Winos Malware
September 15, 2025
Many security issues on the internet stem from avoidable mistakes based on an assumption of safety or legitimacy, often supported by implicitly understood “trust signals.” Users online are primed to have confidence in search engines,…
Read More >
CISA Flags Actively Exploited Flaws in TP-Link Devices and WhatsApp
September 15, 2025
The Cybersecurity and Infrastructure Security Agency has added two more entries to its Known Exploited Vulnerabilities catalog, the list of bugs it says pose significant risk to the federal enterprise. Inclusion on the KEV means…
Read More >
Crypto-Stealing Code Slips Into NPM
September 12, 2025
Josh Junon, a software developer and maintainer, revealed on social media this week that his account had been compromised and 18 of his popular JavaScript packages tampered with. The malicious updates injected code designed to…
Read More >
Docker Desktop Flaw Exposes Hosts to Privilege Escalation
September 08, 2025
Containers are a highly important security boundary used in countless contexts to isolate an environment from other applications on the operating system. The container environment, such as a sandbox, works toward a variety of purposes,…
Read More >
AI Risks and Supply Chain Demands Redefine the Future
September 06, 2025
The embedded software industry is in the middle of a major reset. According to Black Duck’s State of Embedded Software Quality and Safety 2025 report, AI tools are changing how code is written, tested, and…
Read More >
Workday Breach Highlights Expanding Wave of Social Engineering Attacks
September 02, 2025
Social engineering, while an age-old tactic of cybercriminals, is by no means outdated or ineffective in modern environments. Threat actors continue to rely on deceptive methods and take advantage of the human element to cause…
Read More >
Subscribe for the Latest News
Webinars
Thursday, Apr. 16
1pm ET / 10am PT
5 SIEM Migration Myths Debunked: Why You Should Move to a Cloud-Native, AI-Driven SOC
Tuesday, Apr. 21
8am ET / 5am PT
Securing the AI Frontier: Defending the Enterprise Ecosystem with Prisma AIRS
Wednesday, Apr. 22
1pm ET / 10am PT
When Your Cloud Directory Goes Dark: Recovering Entra ID After a Cyberattack