(Adobe Stock) Vercel incident falls short of a supply chain attack — for nowSteve ZurierApril 20, 2026Experts say Vercel case was a trust and authentication boundary failure, but not an attack on the level of SolarWinds.
AI vulnerability discovery and the case for systems security engineeringDr. Darren DeathApril 20, 2026
Attempted exploitation of vulnerability impacting EoL TP-Link routers discoveredSC StaffApril 20, 2026
Multiple other companies purportedly breached by ShinyHunters, over 9M record leak warnedSC StaffApril 20, 2026
Trojanized TestDisk installer, Microsoft binary tapped for illicit ScreenConnect deploymentSC StaffApril 20, 2026
Blind spots at scale: The hidden risks of identity visibility gaps and shadow AIPaul WagenseilApril 10, 2026
Threat ManagementGitHub user attachments abused to spread novel infostealerLaura FrenchApril 17, 2026The stealthy CGrabber malware targets a wide array of apps, browsers and extensions.
Vulnerability ManagementApache ActiveMQ RCE bug to CISA list of exploited vulnerabilitiesSteve ZurierApril 17, 2026CISA flags 13-year-old ActiveMQ RCE as exploited, highlighting AI-driven bug discovery.
Application securityBot traffic makes up 49% of online activity, but 99% of bots unwantedLaura FrenchApril 17, 2026Researchers warn malicious bots may spoof trusted user agents to disguise their intent.
IdentityCisco patches critical bugs in Webex, ISESteve ZurierApril 16, 2026Experts warn that the Webex bug may get the headlines, but exploited ISE bugs offer attackers the keys to the kingdom.
IdentityNginx-ui MCP missing authentication flaw actively exploitedLaura FrenchApril 16, 2026Attackers on the same network can alter nginx configurations, leading to complete takeover.
IdentityVishing attacks on Okta identity systems on the riseSteve ZurierApril 15, 2026Vishing attacks target Okta to bypass MFA, enabling broad SSO data access.
RansomwareBlack Basta-linked attacks target executives via Teams phishingLaura FrenchApril 15, 2026Suspected former Black Basta affiliates impersonate help desks to deploy RMM software.
Security OperationsCISOs: Revamp security programs in the wake of Claude MythosSteve ZurierApril 14, 2026Experts warn AI-driven cyber threats outpace defenses; current guidance may be insufficient.