Cyber Security

ShipSec Studio brings open-source workflow orchestratio...

Security teams have long relied on a mix of shell scripts, cron jobs, and loosel...

Why risk alone doesn’t get you to yes

I have been in security rooms for years, from military operations centers to cor...

Don’t count on government guidance after a smart home b...

People are filling their homes with internet-connected cameras, speakers, locks,...

Breaking out: Can AI agents escape their sandboxes?

Container sandboxes are part of routine AI agent testing and deployment. Agents ...

Week in review: NIST updates DNS security guidance, com...

Here’s an overview of some of last week’s most interesting news, articles, inter...

Iran-Linked Hackers Breach FBI Director’s Personal Emai...

Threat actors with ties to Iran successfully broke into the personal email accou...

Attackers are exploiting RCE vulnerability in BIG-IP AP...

A critical unauthenticated remote code execution vulnerability (CVE-2025-53521) ...

Citrix NetScaler Under Active Recon for CVE-2026-3055 (...

A recently disclosed critical security flaw impacting Citrix NetScaler ADC and N...

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spe...

Proofpoint has disclosed details of a targeted email campaign in which threat ac...

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP ...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added...

TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targe...

Proofpoint has disclosed details of a targeted email campaign in which threat ac...

Coruna, DarkSword & Democratizing Nation-State Expl...

Nation-state malware is being sold on the Dark Web and leaked to GitHub; and ord...

Apple Sends Lock Screen Alerts to Outdated iPhones Over...

Apple is now sending Lock Screen notifications to iPhones and iPads running olde...

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides...

TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, ...

China Upgrades the Backdoor It Uses to Spy on Telcos Gl...

Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cyb...

Wartime Usage of Compromised IP Cameras Highlight Their...

The list of countries exploiting internet-connected cameras to give them eye's i...