How AI will impact security careers and what leaders should do about it
09
Mar
2026

How AI will impact security careers and what leaders should do about it

Security teams are optimistic about AI’s impact on their careers, but workloads remain high. Tines’ Voice of Security 2026 report…

Rogues gallery: 15 worst ransomware groups active today
09
Mar
2026

Rogues gallery: 15 worst ransomware groups active today

Targeted victims: LockBit targeted thousands of victims worldwide in its heyday, including government services, private sector companies, and critical infrastructure…

Lessons From Clop: Combating Ransomware
09
Mar
2026

Lessons From Clop: Combating Ransomware

Lessons from Clop It’s been one month since the Clop ransomware group began exploiting the MOVEit vulnerability (CVE-2023-34362 (VulnDB ID:…

Rogue RMMs: Common Social Engineering Tactics We Saw in 2025
09
Mar
2026

Rogue RMMs: Common Social Engineering Tactics We Saw in 2025

Special thanks to Austin Worline for his contributions to this blog post. The Huntress Security Operations Center (SOC) frequently comes…

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS
09
Mar
2026

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

ExifTool Flaw Malicious Images Trigger Code Execution on macOS A newly discovered vulnerability is challenging the long-held belief that macOS…

Using form hijacking to bypass CSP
09
Mar
2026

Using form hijacking to bypass CSP

In this post we’ll show you how to bypass CSP by using an often overlooked technique that can enable password…

1-Click ZITADEL Vulnerability Could Allow Full System Takeover
09
Mar
2026

1-Click ZITADEL Vulnerability Could Allow Full System Takeover

A critical Cross-Site Scripting (XSS) vulnerability has been discovered in ZITADEL, a popular open-source identity and access management platform. Tracked…

09
Mar
2026

Open-source tool Sage puts a security layer between AI agents and the OS

Autonomous AI agents running on developer workstations execute shell commands, fetch URLs, and write files with little or no inspection…

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
09
Mar
2026

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused…

romance scams
09
Mar
2026

Ghanaian Man Pleads Guilty in U.S. Court for Romance Scams That Stole $100M – The Cyber Express

A Ghanaian national has pleaded guilty to his role in a large-scale cyber fraud scheme that used romance scams and…

09
Mar
2026

ClipXDaemon Malware, a Stealthy Cryptocurrency Clipboard Hijacker on Linux – The Cyber Express

Security researchers have identified a new Linux malware strain called ClipXDaemon, a stealthy threat designed to target cryptocurrency users by manipulating copied wallet…

Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA
09
Mar
2026

Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA

Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and…