Cyber Security

Ransomware negotiator admits role in attacks he was hir...

A Florida man, formerly employed as a ransomware negotiator, pleaded guilty to c...

VirtualBox 7.2.8 is out with Linux kernel 7.0 support a...

Oracle shipped VirtualBox 7.2.8 on April 21, 2026, as a maintenance release cove...

Surge in Bomgar RMM Exploitation Demonstrates Supply Ch...

The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring...

22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and...

Cybersecurity researchers have identified 22 new vulnerabilities in popular mode...

22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex...

Cybersecurity researchers have identified 22 new vulnerabilities in popular mode...

Ransomware Negotiator Pleads Guilty to Aiding BlackCat ...

A third individual who was employed as a ransomware negotiator has pleaded guilt...

Scattered Spider hacker pleads guilty to stealing $8 mi...

A British national tied to the Scattered Spider cybercrime group pleaded guilty ...

Google Fixes Critical RCE Flaw in AI-Based Antigravity ...

The prompt injection vulnerability in the agentic AI product for filesystem oper...

5 Places where Mature SOCs Keep MTTR Fast and Others Wa...

Security teams often present MTTR as an internal KPI. Leadership sees it differe...

CISA flags another Cisco Catalyst SD-WAN Manager bug as...

CISA added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV...

OpenAI’s Chronicle feature lets Codex read your screen,...

OpenAI’s Chronicle is a feature designed to help Codex, an AI-powered coding ass...

Silobreaker Mimir adds agentic AI to intelligence workf...

Silobreaker has announced new agentic AI capabilities that combine faster resear...

Ivanti Neurons AI automates IT operations, reducing man...

Ivanti has revealed new solution capabilities, focusing on enabling autonomous I...

Chinese APT Targets Indian Banks, Korean Policy Circles

China is spying on India's financial sector, for some reason, and it's not putti...

Serial-to-IP Devices Hide Thousands of Old & New Bugs

The OT devices that translate machine talk into Internet-speak are riddled with ...

No Exploit Needed: How Attackers Walk Through the Front...

The cybersecurity industry has spent the last several years chasing sophisticate...