US: Iranian-linked actors are actively exploiting our critical infrastructureSteve ZurierApril 8, 2026Joint advisory says likely targets include the energy, water, and transportation sectors, as well as the defense industrial base.
Zero trust everywhere: Redefining secure network access in a post-VPN worldPaul WagenseilApril 3, 2026
Vulnerability ManagementDocker fixes AuthZ bypass bug that created containers with excessive privilegesLaura FrenchApril 8, 2026A crafted HTTP request can make restricted containers invisible to AuthZ plugins.
IdentityID Dataweb outlines the need for continuous identity threat detection Steve ZurierApril 7, 2026The industry needs tools that can verify users throughout the entire identity lifecycle without disrupting daily business processes.
Threat IntelligenceNorth Korea recruits Iranian workers for IT job fraudLaura FrenchApril 7, 2026Internal records reveal how North Korean facilitators scout and coach workers.
Vulnerability ManagementFortinet issues Easter weekend hotfix for FortiClient EMSSteve ZurierApril 6, 2026Experts warn to apply hotfix right away for critical bug exploited in the wild.
RansomwareAxios maintainer’s post mortem confirms social engineering by UNC1069Laura FrenchApril 3, 2026Jason Saayman says he installed a remote access trojan disguised as a Teams update.
RansomwareChaos malware now targeting 64-bit Linux serversSteve ZurierApril 3, 2026Analysis of China-nexus groups also discovers double-pronged strategy, one on immediacy, the other around long dwell times.
RansomwareHighly evasive spear-phishing campaign targeting senior execs ‘neutralizes’ MFALaura FrenchApril 3, 2026The campaign leverages a newly-discovered phishing kit called VENOM.
Vulnerability ManagementApple expands updates to iOS 18 devices affected by DarkSword exploitSteve ZurierApril 2, 2026Experts say Apple’s move shows it understood that older iOS and iPadOS devices were vulnerable and being exploited by DarkSword.