The Broken Physics of Remediation – exploitation now precedes disclosure
We speak with Qualys Managing Director for ANZ, Sam Salehi in the lead up to their Customer and Channel Partner event in Sydney on 28…
We speak with Qualys Managing Director for ANZ, Sam Salehi in the lead up to their Customer and Channel Partner event in Sydney on 28…
“AI-driven attacks accelerate adversary actions and adaptation, so a slow recovery increases the window for re-compromise,” she adds, warning that extended outages can create cascading…
European law enforcement authorities have dismantled a large-scale online propaganda network linked to Iran’s Islamic Revolutionary Guard Corps (IRGC), removing around 14,200 links as part…
Threat actors love a good phish. In this year’s Data Breach Investigations Report released by Verizon, phishing is named as one of the top four…
When an employee installs an AI writing assistant, connects a coding copilot to their IDE, or starts summarizing meetings with a new browser tool, they…
A major security lapse has exposed highly sensitive U.S. government cloud credentials after a contractor working with the Cybersecurity and Infrastructure Security Agency (CISA) accidentally…
Hackers Abuse Microsoft Entra ID Accounts to Exfiltrate Microsoft 365 and Azure Data. A highly sophisticated cyberattack campaign carried out by a threat actor tracked…
A handful of public Instagram posts can give attackers enough material to generate convincing phishing emails with GenAI. Research from the University of Texas at…
Ravie LakshmananMay 19, 2026Software Security / Malware In yet another software supply chain attack, threat actors have compromised the popular GitHub Actions workflow, actions-cool/issues-helper, to…
Thank you for joining! Access your Pro+ Content below. 19 May 2026 Generative AI is changing the game in video gaming Share this item with…
A large-scale cybercrime crackdown led by INTERPOL has resulted in 201 arrests and the identification of 3,867 victims across the Middle East and North Africa…
Microsoft Threat Intelligence has disclosed details of a cyberattack carried out by a threat actor tracked as Storm-2949, which escalated from a targeted identity compromise into a…