Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber…
The Emirates Nuclear Energy Company (ENEC), the Technology Innovation Institute (TII) and Aspire have launched a joint proof-of-concept (PoC) project…
By Itamar Apelblat, CEO & Co-Founder, Token Security For decades, compliance frameworks were built on an assumption that now feels…
A critical privilege-escalation vulnerability has been discovered in Check Point’s Harmony SASE (Secure Access Service Edge) Windows client software, affecting versions prior…
Cal.com, an open-source scheduling platform and developer-friendly alternative to Calendly, recently patched a set of critical vulnerabilities that exposed user…
Ravie LakshmananJan 28, 2026Vulnerability / Open Source A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js…
The Competition and Markets Authority (CMA) has proposed what it describes as a “package of measures” to improve how Google…
Chips from Chinese semiconductor designer Hygon Information Technology were found unaffected by a recently disclosed vulnerability in products developed by…
A new security alert has been issued over a computer program that is acting as a silent gateway for intruders….
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total…
The UK’s financial services sector regulator has announced a review of the potential long-term impacts of advanced artificial intelligence (AI)…
A malicious campaign is actively targeting exposed LLM (Large Language Model) service endpoints to commercialize unauthorized access to AI infrastructure. Over a…