Iran’s decentralized cyber operations continue despite strikes on leadership.
For a complete running list of events, please visit the Event Tracker. Events ISC2’s 2026 Global 50×50 Women’s Summit: Changing the Face of Cybersecurity (Virtual,…
For a complete running list of events, please visit the Event Tracker. Events ISC2’s 2026 Global 50×50 Women’s Summit: Changing the Face of Cybersecurity (Virtual,…
ConnectWise is warning ScreenConnect customers of a cryptographic signature verification vulnerability that could lead to unauthorized access and privilege escalation. The flaw affects ScreenConnect versions before…
An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC) Software. Cisco disclosed…
iPhone hacking techniques have sometimes been described almost like rare and elusive animals: Hackers have used them so stealthily and carefully against such a small…
FancyBear’s latest operational security failure has exposed a live Russian espionage server packed with stolen credentials, 2FA secrets, and detailed insight into the ongoing targeting…
Researchers at Howler Cell have discovered a new .NET AOT malware campaign that uses a clever scoring system to bypass security tools and steal your…
Token Security has unveiled intent-based AI agent security, a new approach that governs autonomous agents in enterprise environments by aligning their permissions with their intended…
Apple has released a Background Security Improvement to patch a flaw that could allow malicious websites to bypass browser protections and access data from other…
Ravie LakshmananMar 18, 2026Network Security / Ransomware Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that’s exploiting a recently disclosed critical security…
When UK citizens wake up on 19 March, there will no longer be a regulation that limits how much they can spend in a single…
A new study focusing on Cortex XDR BIOC rules reveals that encrypted detection logic, designed to remain secure, can be decrypted and examined, creating new…
The most dangerous fraudster in the world today may not be a person at all. Interpol’s second edition Global Financial Fraud Threat Assessment, released during…