RSAC 2026—Where The World Talks Security
For 35 years, RSAC has been a driving force behind the world’s cybersecurity community. The power of community is a key focus for the 2026…
For 35 years, RSAC has been a driving force behind the world’s cybersecurity community. The power of community is a key focus for the 2026…
The UK government’s Department for Science, Innovation and Technology (DSIT) has completed what it calls the “discovery phase” of its bid to create a National…
Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online Pierluigi Paganini January 27, 2026 Shadowserver researchers found 6,000+ SmarterMail servers exposed online and likely vulnerable…
A sophisticated phishing campaign has been identified in which threat actors are abusing legitimate Microsoft Teams functionality to distribute malicious content that appears to originate…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory alerting the public to heightened risks of malicious cyber activity targeting disaster victims.…
Tenable announced general availability of Tenable One AI Exposure. With this release, the Tenable One Exposure Management Platform unifies AI protection, discovery and usage governance…
The government should commit to a thorough independent investigation of the prosecutions of subpostmasters by the Department of Work and Pensions (DWP), a campaigning peer…
U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 27, 2026 U.S. Cybersecurity…
LevelBlue, a Dallas-based managed security services provider, announced Tuesday that it is expanding its managed detection and response business through a strategic partnership with cybersecurity…
For years, security teams treated ransomware as a technological problem. Security teams hardened backup systems, deployed endpoint detection, practiced incident response playbooks built around data…
Cybercriminals have adopted a deceptive strategy to compromise users searching for common software applications online. These attackers are using search engine optimization poisoning techniques to…
A highly sophisticated infostealer malware disguised as a legitimate npm UI component library has been targeting developers through the ansi-universal-ui package. The malware, internally identified…