The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

10/03/2026 0 Comments 0 tags

You can’t control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

10/03/2026 0 Comments 0 tags

Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails,

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

10/03/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability list

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

10/03/2026 0 Comments 0 tags

Salesforce has warned of an increase in threat actor activity that’s aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

09/03/2026 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data from compromised hosts. The package,

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

09/03/2026 0 Comments 0 tags

The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

09/03/2026 0 Comments 0 tags

Another week in cybersecurity. Another week of “you’ve got to be kidding me.” Attackers were busy. Defenders were busy. And somewhere in the middle, a whole lot of people had

Can the Security Platform Finally Deliver for the Mid-Market?

09/03/2026 0 Comments 0 tags

Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of supply chain attacks, your customers and business partners are defining

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

09/03/2026 0 Comments 0 tags

Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code,

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

09/03/2026 0 Comments 0 tags

High-value organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a years-long campaign. The activity, which has targeted aviation, energy,