Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
09
Mar
2026

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a…

Harvey Nash docuseries addresses AI skills ‘paradox’
09
Mar
2026

Harvey Nash docuseries addresses AI skills ‘paradox’

Artificial intelligence (AI) is a rapidly growing technology, becoming more embedded in society and business every day, but is the…

4 best practices to get IAM implementation right the first time
09
Mar
2026

4 best practices to get IAM implementation right the first time

Congrats—you got the green light to move forward with improving identity access management (IAM). While you realize this is great…

We've seen ransomware cost American lives. Here's what it will actually take to stop it.
09
Mar
2026

We’ve seen ransomware cost American lives. Here’s what it will actually take to stop it.

Flights canceled. Emergency rooms shut down. Centuries-old companies shuttered. Ransomware and other similar cyberattacks have become so routine that even…

European Commission opens consultation on draft guidance to help manufacturers and developers comply with CRA
09
Mar
2026

European Commission opens consultation on draft guidance to help manufacturers and developers comply with CRA

The European Commission has prepared a Communication providing practical guidance on applying the Cyber Resilience Act (CRA). It will help…

Graphic illustrating the levels of exposure management maturity.
09
Mar
2026

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

Effective exposure management begins by illuminating and hardening risks across the entire attack surface. Some of the most meaningful shifts…

Tradecraft Tuesday Recap: React2Shell, ClickFix, and the Rise of AI Scams
09
Mar
2026

Tradecraft Tuesday Recap: React2Shell, ClickFix, and the Rise of AI Scams

Every security professional knows the drill. You go home for the holidays and, without volunteering, you become the family’s help…

Hikvision Multiple Products Vulnerability Allow Malicious User to Escalate Privileges
09
Mar
2026

Hikvision Multiple Products Vulnerability Allow Malicious User to Escalate Privileges

Hikvision Multiple Products Vulnerability A severe vulnerability affecting multiple Hikvision products was added to the Known Exploited Vulnerabilities (KEV) catalog…

Top 10 web hacking techniques of 2023
09
Mar
2026

Top 10 web hacking techniques of 2023

Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify…

Cybercrime Group in Vietnam Enables Massive Fraudulent Signups
09
Mar
2026

Cybercrime Group in Vietnam Enables Massive Fraudulent Signups

A wave of fraudulent account registrations to a cybercrime ecosystem operating out of Vietnam. These fake accounts are not just…

09
Mar
2026

OpenAI joins the race in AI-assisted code security

OpenAI introduced Codex Security⁠, an AI agent that reviews codebases to find, verify, and help fix software vulnerabilities. The launch…

Pentagon Designates Anthropic
09
Mar
2026

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence…