Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
Ravie LakshmananFeb 12, 2026Zero-Day / Vulnerability Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that…
Ravie LakshmananFeb 12, 2026Zero-Day / Vulnerability Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that…
In the past six months, Taiwan’s government agencies have reported 637 cybersecurity incidents, according to the latest data released by the Cybersecurity Academy (CSAA). The…
Cybercriminals are increasingly using valid administrative software to launch attacks, making their malicious activities much harder to spot. Instead of relying solely on custom computer…
A dormant Microsoft Outlook add-in has been weaponized by attackers to steal thousands of login credentials and credit card numbers. The incident, identified by security…
A new free, open source tool is available to help organizations detect where autonomous AI agents are operating across corporate environments. The OpenClaw Scanner identifies…
NBN Co says that fibre is now the dominant broadband connection technology used in its network, as its overbuild program starts to enter high gear.…
Multiple Endpoint Manager bugs patched by Ivanti, including remote auth bypass Pierluigi Paganini February 12, 2026 Ivanti patched over a dozen Endpoint Manager flaws, including…
A new era of AI vulnerability has arrived, and it is far more dangerous than simply tricking a chatbot into saying something rude. New research…
Vendor noise is already a problem in traditional security testing. AI red teaming has added another layer of confusion, with providers offering everything from consulting…
Threat actors are abusing legitimate remote monitoring tools to hide inside corporate networks and launch ransomware attacks. Net Monitor for Employees Professional is a commercial…
Security teams in large enterprises already spend significant time tracking vulnerabilities across software supply chains, third-party libraries, and internal codebases. Java environments add another layer…
A new global study of chief information security officers (CISOs) suggests that while cyber resilience is increasingly seen as a driver of business growth, significant gaps remain…