The Latest
-
Identity-based attacks need more attention in cloud security strategies
Companies should lock down user accounts and scan for compromised credentials, according to a new report.
-
Cybercrime groups team with organized crime in massive cargo theft campaigns
Financially motivated hackers are abusing remote monitoring and access tools against trucking and freight companies, Proofpoint warns.
Updated Nov. 3, 2025 -
Security leaders say AI can help with governance, threat detection, SOC automation
Executives and technical leaders differ on AI priorities, according to a report from Amazon.
-
Windows Server Update Service exploitation ensnares at least 50 victims
Researchers say hackers could be gathering intelligence for future attacks, and authorities warn users to apply patches and check for compromise.
-
CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks
The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.
-
FCC will vote to scrap telecom cybersecurity requirements
The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.
Updated Oct. 31, 2025 -
CISA updates guidance and warns security teams on WSUS exploitation
The agency urges users to apply emergency patches from Microsoft to counter a serious threat.
-
Canadian authorities warn of hacktivists targeting exposed ICS devices
Hackers have manipulated critical components at water utilities, oil and gas facilities, and agricultural sites in recent weeks.
Updated Oct. 31, 2025 -
AI adoption outpaces corporate governance, security controls
Security and business leaders warn that companies are accelerating their use of agentic AI beyond the ability to maintain proper guardrails.
-
F5 expects nation-state hack to curb revenues
The company says it could lose new deals because of the intrusion.
-
Google probes exploitation of critical Windows service CVE
Researchers have traced the threat activity to a newly identified hacker, while separate evidence points to more than one variant.
-
Conduent says data breach originally began with 2024 intrusion
The cyberattack, which affected several state agencies, has also impacted multiple insurance providers.
-
UN member states sign cybercrime agreement despite industry, activist opposition
Critics say the new convention is ripe for abuse by authoritarian countries.
-
Hackers exploiting critical vulnerability in Windows Server Update Service
Microsoft has issued an out-of-band update and is urging users to immediately apply the patch.
Updated Oct. 27, 2025 -
Opinion
Gartner: How to prepare for and respond to today’s evolving threat landscape
With the emergence of AI, security operations teams must navigate a fast-moving generation of cyber threats.
-
North Korea led the world in nation-state hacking in Q2 and Q3
Security leaders should prioritize anomalous-activity detection and zero-trust principles, a new report recommends.
-
Researchers warn of critical flaws in TP-Link routers
No active exploitation has been spotted, but the vendor and researchers advise users to apply updates immediately.
-
Financial services tech leaders tackle agentic AI governance
Operating in a risk-averse industry, IT decision-makers are helping their businesses adapt to emerging threats without derailing momentum.
-
Burned-out security leaders view AI as double-edged sword
As companies face cybersecurity skills gaps and broader attack surfaces, they’re warily turning to AI-powered automation.
-
Climbing costs, skills loss and other AI warnings for CIOs
Amid seismic change for IT leaders, enterprises need to curate survival kits to mitigate reliability and cost challenges, Gartner analysts said.
-
CISA’s international, industry and academic partnerships slashed
The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.
-
Jaguar Land Rover attack cost British economy $2.5 billion
The Cyber Monitoring Centre warned that losses could rise further if the company's production isn't back to pre-incident levels by January.
-
AI security flaws afflict half of organizations
EY suggested ways for companies to reduce AI-related hacking risks.
-
Deep Dive
Social engineering gains ground as preferred method of initial access
Senior executives and high-net-worth individuals are increasingly at risk as hackers use deepfakes, voice cloning and other tactics for targeted attacks.
Updated Oct. 21, 2025 -
AI-fueled automation helps ransomware-as-a-service groups stand out from the crowd
Ransomware gangs that offer their affiliates customization and automation are growing faster than those that don’t, a new report finds.