The Latest
-
‘Resurge’ malware can remain undetected on devices
CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.
Updated Feb. 27, 2026 -
Sponsored by Security Engineered Machinery (SEM)
Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction
Build your strategy on risk assessment, not on assumptions that one size fits all.
-
UFP Technologies investigating cyberattack that impacted company data
The medical device maker warned of short-term shipment delays, but does not see a material impact.
-
AI accelerates lateral movement in cyberattacks
New research paints a grim picture of how the technology is making cyberattacks faster and easier for threat actors.
-
Software vulnerabilities are being weaponized faster than ever
A report by VulnCheck shows threat groups are exploiting a small percentage of critical flaws well before security teams can mitigate.
-
CISA orders agencies to patch Cisco devices now under attack
The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.
-
China-linked hackers breached dozens of telecoms, government agencies
The cyberattacks used a clever technique: malware that hid in plain sight on Google Sheets.
-
Threat groups move at record speeds, as AI helps scale attacks
A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.
-
In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps
CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.
-
AI helps novice threat actor compromise FortiGate devices in dozens of countries
Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized impact, according to a new Amazon report.
-
Hackers target vulnerabilities in Roundcube Webmail
CISA has added the flaws, one of which is considered critical, to its Known Exploited Vulnerabilities catalog.
-
US Treasury Department offers secure AI advice to financial services firms
The agency developed the resources in partnership with financial executives and other regulators.
-
BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools
Researchers warn that thousands of instances may still be vulnerable to exploitation activity.
Updated Feb. 20, 2026 -
Palo Alto Networks CEO sees AI as demand driver, not a threat
During a quarterly investor call, Nikesh Arora addressed growing concerns in the investment community that AI could hurt demand for cybersecurity.
Updated Feb. 19, 2026 -
AI’s ‘connective tissue’ is woefully insecure, Cisco warns
In a new report, the company also said businesses should beware of the “SolarWinds of AI.”
-
Threat groups use AI to speed up and scale cyberattacks
A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.
-
Identity and supply chain need more attention, risk intelligence firm says
Roughly a third of attacks now use stolen credentials, according to the company’s latest report.
-
Hackers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines
Threat actors linked to China have deployed a novel backdoor, according to researchers.
Updated Feb. 18, 2026 -
Newly identified hacking groups provide access to OT environments
A state-linked adversary has begun to pivot from the Ukraine war with new attacks targeting Europe and the U.S.
-
Data-only extortion grows as ransomware gangs seek better profits
Businesses should prioritize securing one type of technology in particular, the security firm Arctic Wolf said in a new report.
-
Ransomware attacks increase against IT and food sectors
Social engineering and zero-day vulnerability weaponization are getting faster and easier, two information sharing and analysis centers said in new reports.
-
Critical flaw in BeyondTrust Remote Support sees early signs of exploitation
The vulnerability is a variant of a CVE linked to the 2024 hack of the U.S. Treasury Department, according to researchers.
Updated Feb. 16, 2026 -
CISA will shutter some missions to prioritize others
The agency has lost roughly one-third of its workforce since January 2025.
Updated Feb. 13, 2026 -
CISA seeks infrastructure sector consultation on incident reporting rule
The agency is particularly interested in feedback on several aspects of the long-awaited regulation.
-
SmarterMail facing widespread attacks targeting critical flaws
The business email and collaboration software is being exploited for potential ransomware.
-
Majority of Ivanti EPMM threat activity linked to hidden IP
A report by GreyNoise warns the IP address is operating behind bulletproof hosting infrastructure and might not show up in current IoCs.
Updated Feb. 11, 2026