Latest Cybersecurity News
View all →Ticket savings of up to $500 this week for Disrupt 2026
Starting today, you have 5 days to save nearly $500 on your ticket to TechCrunch Disrupt 2026. This offer disappears Friday, April 10, at 11:59 p.m. PT.…
You’re the “Why” Behind the Huntress Hub
When it comes to getting your security right, you shouldn’t have to go about it alone. It can take way more time and resources than…
Microsoft links Medusa ransomware affiliate to zero-day attacks
Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity…
CISA Warns of Fortinet 0-Day Vulnerability Actively Exploited in Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-35616, a critical improper access control vulnerability in Fortinet FortiClient Enterprise Management Server (EMS), to its…
Trojanized PyPI AI Proxy Steals Claude Prompt, Exfiltrates Data
A malicious PyPI package, hermes-px, that masquerades as a “Secure AI Inference Proxy” while secretly stealing user prompts and abusing a private university AI service.…
Cloudflare Targets WordPress With New AI-Powered EmDash CMS
Technology and website security giant Cloudflare has launched EmDash CMS, a new content management system designed to challenge the dominance of WordPress. While WordPress currently…
This Is How They Tell Me The World Ends
In 2021, Nicole Perlroth wrote “This Is How They Tell Me the World Ends: The Cyberweapons Arms Race“, a New York Times Bestseller. The book won numerous…
IT talent looks the other way as wireless security incidents pile up
Enterprise wireless networks are supporting a growing mix of devices and applications, increasing operational demand and security exposure. The 2026 Cisco State of Wireless report…
How SOCs Close a Critical Risk in 3 Steps
Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux…