
Security
Rockstar Games Faces April 14 Ransom Deadline After Alleged Third-Party Data Breach
4/11/2026
Vulnerabilities
The Structural Vulnerabilities of Confidential Computing: Why the Technology Falls Short of Its Promise
4/4/2026

Vulnerabilities
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
4/3/2026

Vulnerabilities
Security researchers uncover thousands of exposed API keys across 10 million websites
3/27/2026

Vulnerabilities
1K+ cloud environments infected via Trivy attack • The Register
3/25/2026

Cybersecurity
Mandiant's M-Trends 2026 Report Reveals Critical Shift in Cybercriminal Tactics
3/24/2026

Security
Native Emerges from Stealth with $42M to Unify Cloud Security Monitoring
3/17/2026

Cybersecurity
Telus Data Breach Exposes Petabyte of Data in ShinyHunters Attack
3/16/2026

Security
Scanner Raises $22M to Build AI-Powered Security Data Lakes for Threat Detection
3/15/2026

Security
The End of an Era: How AWS's New Namespace Finally Defeats Bucketsquatting
3/13/2026

Security
Securing the Agentic Supply Chain: Multi-Cloud Strategies for AI Agent Protection
3/13/2026

Security
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
3/12/2026

Security
Modern Database Protection: From Visibility to Threat Detection with Microsoft Defender for Cloud
3/12/2026