(Adobe Stock) Ransomware attack exposes 1.2 million University of Hawaii Cancer Center recordsSteve ZurierMarch 3, 2026Information included Social Security, driver's license and voter records dating to the 1990s.
Why regulated industries need architectural defenses against prompt injectionDavid BalabanMarch 3, 2026
Updated Contagious Interview campaign harnesses illicit npm packages for RAT deliverySC StaffMarch 3, 2026
From perimeter to protocol: Reducing telecom attack surface with privacy-first mobile technologySC StaffFebruary 13, 2026
Application securityGoogle Chrome vulnerability risked hijacking Gemini panel by rogue extensionLaura FrenchMarch 3, 2026A malicious extension could have injected code into the panel to escalate its privileges.
Threat ManagementIran cyberattacks likely in expanding conflict, experts saySteve ZurierMarch 2, 2026Security pros say critical infrastructure in the U.S. and Israel are potential targets.
SC Awards2026 SC Awards finalists announced ahead of RSA ConferenceKelley DamoreMarch 2, 2026SC Awards names 2026 finalists, honoring top cybersecurity innovation and leadership.
SC AwardsNew Resilient CISO Award honors transformational leadersKelley DamoreMarch 2, 2026Award recognizes five CISOs redefining resilience, risk, and strategy.
SC Awards2026 Trust Awards finalists announced ahead of RSA ConferenceKelley DamoreMarch 2, 2026Winners will be revealed at the RSA Conference 2026 in San Francisco on March 24.
SC Awards2026 Excellence Awards finalists announced; winners revealed at RSA ConferenceKelley DamoreMarch 2, 2026The awards recognize the top cybersecurity companies for enterprises and small- to mid-sized organizations.
AI/MLHow OpenClaw could be hijacked with a simple website visitLaura FrenchFebruary 27, 2026Patching is required to fix a vulnerability that enables any website to brute force OpenClaw’s gateway password.
Network SecurityUAT-10027 targets US education, healthcare sectors via DOH techniqueSteve ZurierFebruary 27, 2026Once the threat actor establishes persistence, it can return and expand access.