NATO approves iPhone and iPad to handle classified info
As part of that effort, BSI conducted a comprehensive series of assessments and tests, including deep security analysis, to make sure that the security capabilities...
As part of that effort, BSI conducted a comprehensive series of assessments and tests, including deep security analysis, to make sure that the security capabilities...
Image: GoldenDayz/Envato Something important shifted last week. On Feb. 24, US diplomats received new marching orders: lobby foreign governments to...
Hackers abused Cisco SD-WAN zero-day since 2023 to gain full admin control Pierluigi Paganini February 26, 2026 Cisco SD-WAN vulnerability...
Google GTIG disrupted China-linked APT UNC2814 halting attacks on 53 orgs in 42 countries Pierluigi Paganini February 26, 2026 Google...
If you’re a security architect or CISO, these famous words of Lt. General Lewis “Chesty” Puller may hold visceral...
Ravie LakshmananFeb 26, 2026Vulnerability / Network Security A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart)...
Untrusted repositories turn Claude code into an attack vector Pierluigi Paganini February 25, 2026 Flaws in Anthropic’s Claude Code could...
Critical Zyxel router flaw exposed devices to remote attacks Pierluigi Paganini February 25, 2026 Zyxel fixed a critical flaw in...
Image: MargJohnsonVA/Envato Millions of CarGurus users may have had their personal and financial data exposed after a notorious threat actor...
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security...
Ravie LakshmananFeb 25, 2026Artificial Intelligence / Vulnerability Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial...
ShinyHunters cyberattack on CarGurus impacts 12.4 Million users Pierluigi Paganini February 25, 2026 ShinyHunters leaked data from 12.4M CarGurus accounts,...
U.S. CISA adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 25,...
Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on...
Ravie LakshmananFeb 25, 2026Vulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently...