10
Mar
2026

Fragmentation Defined 2025’s Threat Landscape. Here’s What It Means for 2026

Uncertainty has become the operating environment for business. And this year, fragmentation is driving it. The global threat landscape didn’t…

Proactive Threat Hunting with Elastic Security — Elastic Security Labs
10
Mar
2026

Proactive Threat Hunting with Elastic Security — Elastic Security Labs

When a new threat actor technique emerges — whether from a research blog, an intelligence feed, or breaking news —…

Ericsson
10
Mar
2026

Ericsson US discloses data breach after service provider hack

Ericsson Inc., the U.S. subsidiary of Swedish networking and telecommunications giant Ericsson, says attackers have stolen data belonging to an…

Hackers Use Fake CleanMyMac Site to Deploy SHub Stealer and Hijack Crypto Wallets
10
Mar
2026

Hackers Use Fake CleanMyMac Site to Deploy SHub Stealer and Hijack Crypto Wallets

A convincing fake website posing as the popular Mac utility CleanMyMac is actively pushing dangerous macOS malware called SHub Stealer…

IAG prepares software engineering for AI
09
Mar
2026

IAG prepares software engineering for AI

Insurance Australia Group (IAG) has started working on ways to make its software engineering functions more AI driven, beginning with…

09
Mar
2026

How Hackers Are Using AI to Launch Autonomous Cyber Attacks in 2026

The Rising Threat of Autonomous Cyber Attacks in 2026 In recent years, the integration of artificial intelligence (AI) into malicious…

Conflicting definitions and timelines causing cybersecurity regulation morass, industry reps say
09
Mar
2026

Conflicting definitions and timelines causing cybersecurity regulation morass, industry reps say

Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

09
Mar
2026

LABScon25 Replay | Simulation Meets Reality: How China’s Cyber Ranges Fuel Cyber Operations

Between late 2024 and early 2025, the United States government issued indictments or sanctions against three Chinese information security firms…

Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threat Activity
09
Mar
2026

Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threat Activity

The Iranian advanced persistent threat group known as Seedworm — also tracked as MuddyWater, Temp Zagros, and Static Kitten —…

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
09
Mar
2026

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan…

UK to launch cyber fraud squad in April
09
Mar
2026

UK to launch cyber fraud squad in April

The UK government has announced the formation of a new Online Crime Centre – which will commence operations in April…

CVE program funding secured, easing fears of repeat crisis
09
Mar
2026

CVE program funding secured, easing fears of repeat crisis

CISA ultimately stepped in at the last minute, issuing an emergency 11-month contract extension that kept the system running but…