Black Basta-linked attacks target executives via Teams phishingLaura FrenchApril 15, 2026Suspected former Black Basta affiliates impersonate help desks to deploy RMM software.
WordPress plugins compromised after acquisition, leading to backdoor installationSC StaffApril 15, 2026
Blind spots at scale: The hidden risks of identity visibility gaps and shadow AIPaul WagenseilApril 10, 2026
Security OperationsCISOs: Revamp security programs in the wake of Claude MythosSteve ZurierApril 14, 2026Experts warn AI-driven cyber threats outpace defenses; current guidance may be insufficient.
LeadershipJSOC IT’s Sam Sawalhi: Telling the room what it needs to hearSC StaffApril 14, 2026Sometimes the path to success is saying not what people want to hear, but what they need to hear.
Application securityOpenAI’s macOS app-signing process hit by axios supply chain attackLaura FrenchApril 13, 2026The company is revoking and rotating certificates “out of an abundance of caution.”
Application securityMicrosoft 365 mailbox rules abused for exfiltration, persistenceSteve ZurierApril 13, 2026Attackers abuse Microsoft 365 mailbox rules to hide activity, steal data, and persist after password resets.
AI/MLAI browser extensions more likely to have known vulnerabilities, report saysLaura FrenchApril 13, 2026AI extensions are also more likely to have cookie, scripting and tabs permissions.
AI benefits/risksBessent, Powell met privately with top bankers over impact of Claude Mythos on cybersecuritySteve ZurierApril 10, 2026Security pros say companies that spend less money than most large banks on cyber should take this as a warning to get moving.
PhishingLinux Foundation leader impersonated in Slack phishing campaignLaura FrenchApril 10, 2026The campaign targets open-source developers to steal credentials and deploy malware.
Cloud SecurityActor tied to Raccoon targets ‘several dozen’ companies by exploiting BPOs and helpdesksSteve ZurierApril 9, 2026Google says UNC6783 leverages social engineering and phishing campaigns to gain entry to the BPOs.