GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
Ravie LakshmananMar 25, 2026Browser Security / Threat Intelligence Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that...
Ravie LakshmananMar 25, 2026Browser Security / Threat Intelligence Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that...
The RSA Conference 2026 is putting a spotlight on one of the biggest shifts in cybersecurity today: the rise of...
Image: Jonathan Kemper/Unsplash Crunchyroll just got breached, and it didn’t start inside its systems. It came through a vendor. According...
PRE Security has released platform version 3.3, introducing two major new capabilities, SignalGate and a fully agentic Autonomous Security...
PRE Security has released platform version 3.3, introducing two major new capabilities, SignalGate and a fully agentic Autonomous Security...
Recent Navia data breach impacts HackerOne employee data Pierluigi Paganini March 25, 2026 A Navia breach exposed personal data of...
FCC targets foreign router imports amid rising cybersecurity concerns Pierluigi Paganini March 25, 2026 The FCC will ban new foreign-made...
Cybercrime group Lapsus$ claims the hack of pharma giant AstraZeneca Pierluigi Paganini March 25, 2026 Cybercrime group Lapsus$ claims it...
Malicious LiteLLM versions linked to TeamPCP supply chain attack Pierluigi Paganini March 25, 2026 TeamPCP backdoored LiteLLM v1.82.7–1.82.8, likely via...
Ravie LakshmananMar 25, 2026Network Security / Data Protection The U.S. Federal Communications Commission (FCC) said on Monday that it was...
In a world of targeted ads and intrusive malware, virtual private networks (VPNs) are one of the best ways to...
Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš...
Data breach at Dutch Ministry of Finance impacts staff following cyberattack Pierluigi Paganini March 24, 2026 Dutch Ministry of Finance...
How Can Organizations Build Trust in Agentic AI Security Systems? Can the management of Non-Human Identities (NHIs) enhance the...
Image: Stephen Phillips/Unsplash Your Wi-Fi router just became the latest battlefield in a growing war over cybersecurity and national control....