Why Security Validation Is Becoming Agentic
If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pentest…
If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pentest…
Companies House, the UK’s business registrar, has successfully rebooted its online WebFiling service after it emerged that a previously-unknown cyber security issue exposed various data…
Tensions between China and Costa Rica have intensified following allegations tied to an ICE cyberattack that Costa Rican authorities say was linked to the cyberespionage group UNC2814. The…
A large-scale malicious campaign tied to GlassWorm has expanded within the ecosystem of open VSX extensions, introducing a method of spreading malware through developer tools. Researchers identified at least…
Superloop has continued its push to incorporate AI into its operation with a new system that will see its legacy billing platforms consolidated into a…
Former Germany’s foreign intelligence VP hit in Signal account takeover campaign Pierluigi Paganini March 16, 2026 Former BND VP Arndt Freytag von Loringhoven was targeted…
Hackers breached the Canadian process-outsourcing giant Telus Digital and may have accessed data belonging to the firm’s customers, which include major telecommunications, financial services, healthcare…
Cybersecurity is entering “a new phase” as artificial intelligence tools have matured and given IT defenders significantly less time to respond to cyberattacks and other…
Australia’s competition watchdog is hoping a heat mapping exercise will get to the bottom of wi-fi performance problems at its offices, which are occurring despite…
FBI launches inquiry into Steam games spreading malware Pierluigi Paganini March 16, 2026 The FBI is asking gamers who installed malware-infected Steam games between May…
Surgical robotics firm Intuitive Surgical recently experienced a cyberattack that compromised customer and employee data. The hackers used a phishing attack to steal an Intuitive…
Ransomware remains a scourge that shows some signs of relenting, but incident responders and threat hunters are busier than ever as more financially-motivated attackers lean…