Critical Langflow RCE vulnerability exploited within 20 hoursLaura FrenchMarch 20, 2026CVE-2026-33017 could enable an unauthenticated attacker to execute arbitrary Python code on the server.
Accelerated breakout time via AI has made it nearly impossible for humans to keep pace Gene Moody March 20, 2026
6 ways to make the White House’s new cyber strategy work for our industryScott Montgomery March 18, 2026
From audit readiness to operational assurance: Why CCM modernization cannot waitDustin SachsMarch 9, 2026
The importance of keeping calm in trying circumstances: Zero Trust World 2026Paul WagenseilMarch 8, 2026
Identity security as app growth accelerates: Why automation is becoming essentialPaul WagenseilMarch 7, 2026
Network SecurityUS, Canada and Germany take down four large DDoS botnetsSteve ZurierMarch 20, 2026Experts warn that the botnet operators will likely regroup and come back stronger, armed with AI.
Threat ManagementFake interactive Zoom call leads to malicious ScreenConnect downloadLaura FrenchMarch 20, 2026JavaScript is used to imitate a glitchy Zoom call, prompting the user to install an “update.”
Critical Infrastructure SecurityLack of CISA leadership amid DHS shutdown raises risks, cyber pros saySteve ZurierMarch 19, 2026CISA operates short-staffed without a director, raising concerns over cyber risk.
RansomwareBeast Ransomware’s toolkit revealed by exposed directoryLaura FrenchMarch 19, 2026Researchers tracked the group’s tooling from reconnaissance to encryption.
Application securityApple rolls out ‘Background Security Improvements’ for WebKit browser engine bugSteve ZurierMarch 18, 2026Apple shifts to more continuous security patches versus waiting for the next big OS release.
AI/MLAI coding assistants twice as likely to leak secrets, as overall leaks rise 34%Laura FrenchMarch 18, 2026A total of 28.65 million hardcoded secrets were found in public GitHub commits in 2025.
Threat ManagementStryker cyberattack contained, but experts warn repair costs could soarSteve ZurierMarch 17, 2026Security pros call “containment” victory claim hollow as recovery could cost multi-millions.
Threat ManagementPhishing emails target AI defenses with unique obfuscationLaura FrenchMarch 17, 2026Benign content hidden at the bottom of an email is designed to “outweigh” malicious content.