(Adobe Stock) Emergency patches advised after attacks on Ivanti EPMM devicesSteve ZurierFebruary 9, 2026Exploited Ivanti EPMM RCEs hit agencies, prompting emergency patching amid fears of global spread.
Ten years after the Ukraine attack, here’s what we learned about protecting OT systemsMike Carr February 9, 2026
The Trump administration’s recent OMB memo walks back important Secure-by-Design conceptsTim MackeyFebruary 6, 2026
From change prevention to continuous improvement: Automating patch cycles with guardrails, rings, and proofBill BrennerJanuary 6, 2026
Application securityAnthropic: Latest Claude model finds more than 500 vulnerabilitiesLaura FrenchFebruary 6, 2026The AI company says all bugs were validated by human researchers to weed out false positives.
Governance, Risk and ComplianceCISA gives federal agencies one year to replace outdated edge devicesSteve ZurierFebruary 6, 2026Experts agree that it’s time for the federal government replace antiquated network infrastructure.
Vulnerability ManagementGoogle patches RCE, internal database leak flaws in LookerLaura FrenchFebruary 6, 2026Researchers used a crafted Git repo and exploited a race condition to achieve RCE.
Application securityVS Code config files abused to launch RCEs via GitHub CodespacesSteve ZurierFebruary 5, 2026Experts point out that exploited VS Code presents supply chain, credential theft, and network access risks.
Threat ManagementMore than 10,000 IPs hijacked by SystemBC botnetLaura FrenchFebruary 5, 2026Researchers identified continued development of the botnet despite “Operation Endgame” disruption.
Security OperationsInfostealer threats move beyond Windows to target macOS machinesSteve ZurierFebruary 4, 2026The infostealers leverage Python to deliver malware that steals credentials.
AI/MLOpenClaw agents targeted with 341 malicious ClawHub skillsLaura FrenchFebruary 4, 2026Most of the malicious skills deployed malware consistent with Atomic Stealer on Mac machines.
Security OperationsMicrosoft Office bugs exploited by Russia-linked APT28Steve ZurierFebruary 3, 2026Experts warn that social engineering lets attackers take advantage of even the lesser-rated vulnerabilities.