Federal agencies ordered to patch Ivanti EPMM zero-day in 3 daysLaura FrenchMay 8, 2026The actively exploited flaw enables remote admin users to execute arbitrary code.
Australian organizations warned of Vidar Stealer malware campaign using ClickFix techniqueSC StaffMay 8, 2026
California man sentenced to over 6 years for role in $250 million cryptocurrency heistSC StaffMay 8, 2026
Trust or fail: AI unlocks the value of unstructured data but raises new challenges for AI successPaul WagenseilApril 28, 2026
Controlling AI at machine speed: Detecting risk, protecting systems, and reversing mistakesPaul WagenseilApril 24, 2026
Privilege risk is in the lifecycle: A CISO discussion on modernizing identity controlPaul WagenseilApril 20, 2026
Vulnerability Management‘Dirty Frag’ Linux zero-day exposes most distributions to LPESteve ZurierMay 8, 2026Dirty Frag Linux zero-day exposes most distributions to root privilege escalation.
Vulnerability ManagementPalo Alto Networks says patch for exploited PAN-OS firewall bug forthcomingSteve ZurierMay 7, 2026Palo Alto confirms that its PAN-OS firewalls were actively exploited by a zero-day for more than a month.
RansomwareIranian threat group used Chaos ransomware as a ‘false flag,’ researchers sayLaura FrenchMay 7, 2026The purported ransomware attack did not encrypt files and used infrastructure tied to MuddyWater.
IdentityMost security pros say managing identity has become a major challengeSteve ZurierMay 6, 2026Nearly 9 in 10 security leaders struggle with identity sprawl as AI and NHIs expose governance gaps.
IdentityCloudZ RAT plugin targets Windows Phone Link for possible OTP theftLaura FrenchMay 6, 2026The Pheno plugin monitors active Phone Link connections to eavesdrop on texts and notifications.
Vulnerability ManagementCritical 9.8 Weaver E-cology vulnerability actively exploitedSteve ZurierMay 5, 2026Critical Weaver E-cology bug exploited for RCE, exposing core enterprise workflows and secrets.
Vulnerability ManagementCISA reportedly considers 3-day patch deadline for KEV flawsLaura FrenchMay 5, 2026Officials are considering how AI tools like Claude Mythos could shorten exploit timelines, Reuters reports.
Vulnerability ManagementCopy Fail bug added to CISA’s list of known exploited vulnerabilitiesSteve ZurierMay 4, 2026CISA flags “Copy Fail” Linux bug as exploited, urging immediate patching across systems.