The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer
Flux RSS
— Sources secondairesNotorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says
Someone tries to remote control his own DJI Romo vacuum, and ends up controlling 7,000 of them from all around the world. The IoT is horribly insecure, but we already knew that.
35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs
These rulings prohibit the entities from entering or doing business in the European Union.
In addition to enabling remote access, the malware supports a wide range of capabilities, including data theft and spying.
A sophisticated iOS exploit chain leverages multiple zero-day vulnerabilities and is targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine.
CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit
A prompt injection vulnerability paired with other flaws can turn a Google search into a full attack chain that could threaten enterprise networks.
ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data
The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.
Rapid7 says median time from publication to CISA KEV inclusion dropped to five days
Tracking pixels let social media companies spy on their users even after they click over to advertiser sites, gleaning credit card info, geolocations, and more, according to an analysis.
The Vidar 2.0 infostealers is deployed through fake free game cheats on GitHub and Reddit
Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here. This is a technology that will exist, whether we like it or not. Meanwhile, there is a new Android app that detects when there are smart glasses nearby.
Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response
Credential theft soared in the second half of 2025, thanks in part to the industrialization of infostealer malware and AI-enabled social engineering.
When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups.
Ransomware actors are ditching Cobalt Strike in favor of native Windows tools, as payment rates hit record lows and data theft surges.
In an unsuccessful phishing attack, threat actors leveraged trusted brands and domains to try to redirect a C-suite executive at Outpost24 to give up his credentials.