New Federal Strategies, Rising Risk From Iran Top Cyber Themes
Lohrmann on Cybersecurity When cybersecurity experts from the public and private sectors gathered this week, AI and critical infrastructure...
Lohrmann on Cybersecurity When cybersecurity experts from the public and private sectors gathered this week, AI and critical infrastructure...
Can Machine Identities Be the Key to Greater Security in Healthcare Data Systems? Where data breaches are alarmingly frequent,...
By Byron V. Acohido I ran an experiment this week that I did not expect to be instructive, and...
Starbucks data breach impacts 889 employees Pierluigi Paganini March 14, 2026 Starbucks disclosed a breach after phishing attacks on its...
Ravie LakshmananMar 14, 2026Artificial Intelligence / Endpoint Security China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a...
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how...
Storm-2561 lures victims to spoofed VPN sites to harvest corporate logins Pierluigi Paganini March 14, 2026 Attackers linked to Storm-2561...
Interpol – Operation Synergia III leads to 45,000 malicious IPs dismantled and 94 arrests worldwide Pierluigi Paganini March 14, 2026...
This week in scams, the Pokémon Trainer pursuit to “catch ’em all” is being hijacked by criminals posting fake trading card...
Cyber threats are evolving at a pace that traditional security testing methods struggle to keep up with. Organizations today...
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo...
U.S. CISA adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini March 13, 2026 U.S. Cybersecurity and...
Hackers targeted Poland’s National Centre for Nuclear Research Pierluigi Paganini March 13, 2026 Hackers targeted Poland’s National Centre for Nuclear...
If you run a Microsoft-heavy security environment (Sentinel, Defender, Entra, Intune), you have one of the most comprehensive detection...
Are Your Machine Identities Securely Managed? Understanding Non-Human Identities Imagine the complexities involved in managing something that can’t think,...
Subscribe To InfoSec Today News