WantToCry ransomware evades detection through SMB abuse, remote encryptionLaura FrenchMay 20, 2026More than 1.5 million exposed SMB ports may be susceptible to brute force attacks.
A 6-step guide for responding to the Foxconn ransomware/supply chain incidentDavid BalabanMay 19, 2026
1Password and OpenAI collaborate on secure credential access for AI coding agentsSC StaffMay 20, 2026
Terra Security expands platform to include network infrastructure exploitation validationSC StaffMay 20, 2026
Securing every door: Scalable strategies to manage machine and AI agent risksPaul WagenseilApril 29, 2026
Handling shadow AI at the source: Why the browser is the new control layerPaul WagenseilApril 29, 2026
Trust or fail: AI unlocks the value of unstructured data but raises new challenges for AI successPaul WagenseilApril 28, 2026
Controlling AI at machine speed: Detecting risk, protecting systems, and reversing mistakesPaul WagenseilApril 24, 2026
IdentityNew Mini Shai-Hulud attack targets npm ecosystemSteve ZurierMay 20, 2026Mini Shai-Hulud campaign hits 323 npm packages, GitHub Actions and VS Code tools.
Threat ManagementVerizon DBIR 2026: Vulnerability exploits top initial access as patching coverage fallsLaura FrenchMay 20, 2026The report also highlighted ransomware trends and the evolving role of AI in breaches.
Vulnerability ManagementUniversal Robots patches critical 9.8 flaw in ‘cobots’ OSSteve ZurierMay 19, 2026Critical flaw in Universal Robots cobots could let attackers hijack production systems remotely.
OT SecurityIran suspected in breaching automatic tank gauges at US gas stationsLaura FrenchMay 19, 2026The automatic tank gauge systems were reportedly exposed online without passwords.
Vulnerability ManagementCritical bug in F5 NGINX actively exploitedSteve ZurierMay 18, 2026Experts raise concerns because NGINX runs in front of one-third of al website worldwide.
Critical Infrastructure SecurityIBM executive floated for CISA director as concerns persist for agencySteve ZurierMay 18, 2026Cybersecurity leaders warn weakened CISA could hurt AI-era defense and threat response.
Critical Infrastructure SecurityTeamPCP releases ‘vibe coded’ Shai-Hulud source code, issues challengeLaura FrenchMay 15, 2026The variant was used in recent attacks against TanStack and others – but it’s not the original, researchers say.
Vulnerability Management10.0 Cisco Catalyst SD-WAN Controller bug added to CISA’s KEV listSteve ZurierMay 15, 2026Maximum-severity bug an authentication bypass flaw that’s considered the highest value target in an attacker’s playbook.