
Security
U.S. Charges 31 More Suspects in Transnational ATM Jackpotting Scheme Using Ploutus Malware
1/28/2026
Vulnerabilities
Critical Vulnerabilities in ibaPDA Industrial Software Prompt CISA Advisory
1/28/2026

Cybersecurity
Republican Criticism of Trump's DHS Signals Shift in Cybersecurity Priorities
1/28/2026

Security
Winning Against AI-Based Attacks Requires a Combined Defensive Approach
1/26/2026

Cybersecurity
Nike Investigates 1.4TB Data Theft Claim as Extortion Crew Targets Sportswear Supply Chains
1/26/2026

Vulnerabilities
CISA Flags Actively Exploited VMware vCenter Vulnerability, Orders Federal Agencies to Patch
1/26/2026

Vulnerabilities
Pwn2Own Automotive 2026 Exposes Critical Automotive Vulnerabilities, While AI Security Gains Legal Clarity
1/25/2026

DevOps
The 30-Minute Incident Window: How One Engineer's Internal Clock Shaped Team Culture
1/25/2026

Security
NASA's Blockchain Breakthrough for Aviation Security
1/25/2026

Regulation
EU Drafts Legislation to Counter US Tech Dominance, Citing Security Risks
1/24/2026

Security
Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
1/24/2026

Security
New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
1/24/2026

Security
Malicious AI Extensions on VSCode Marketplace Exfiltrate Developer Data to China
1/23/2026