Latest Cybersecurity News
View all →Ukraine Warns Of Cyberattacks On Healthcare By UAC-0247
Ukrainian cyber defenders reported a newly intensified cyber campaign that is targeting Ukraine’s healthcare system and local government agencies, with attackers deploying increasingly sophisticated malware…
Fintel Alliance starts planning its next-gen analytics hub
Australia’s Fintel Alliance of banks, police and regulators is set to evolve its collaborative analytics hub so that it can scale up to meet expanded…
Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure
Sweden said Wednesday that a pro-Russian group with links to Russia’s security and intelligence services was behind a cyberattack on a heating plant last year.…
U.S. CISA adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalog
U.S. CISA adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 15, 2026 U.S. Cybersecurity and…
FCC exempts Netgear from foreign router ban
The commission did not explain its action beyond citing a Defense Department determination. Source link
OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model
OpenAI said it is expanding its Trusted Access for Cyber program to “thousands of individuals and organizations,” who will use the company’s technology to root…
Industrial threat report for Q4 2025
Statistics across all threats The percentage of ICS computers on which malicious objects were blocked has been decreasing since the beginning of 2024. In Q4…
Rapid7 Exposure Command and Remediation Hub: A Clearer Path from Exposure to Patch
Security leaders know that reducing risk is not just about finding the right exposures, but helping the organization act on them before known issues turn…
Copilot and Agentforce fall to form-based prompt injection tricks
Enterprise AI agents are supposed to streamline workflows. Instead, two fresh findings show they can just as easily streamline data exfiltration. Security researchers have uncovered…