(Adobe Stock) Microsoft Office bugs exploited by Russia-linked APT28Steve ZurierFebruary 3, 2026Experts warn that social engineering lets attackers take advantage of even the lesser-rated vulnerabilities.
Spotify and major labels sue Anna’s Archive for $13 trillion over massive data scrapingSC StaffFebruary 3, 2026
From change prevention to continuous improvement: Automating patch cycles with guardrails, rings, and proofBill BrennerJanuary 6, 2026
Bouncing back better: Submit your nominations for the Resilient CISO AwardPaul WagenseilJanuary 5, 2026
IdentityPDF phishing attack leads to stolen Dropbox credentialsLaura FrenchFebruary 2, 2026The attack uses seemingly benign attachments and trusted cloud infrastructure to evade detection.
Security OperationsGlassWorm malware targets Open VSX Registry in supply chain attackSteve ZurierFebruary 2, 2026Experts concerned the malware can spread throughout the open-source developer environment.
Security OperationsAI agents solve 9 of 10 web security CTF challenges in recent studyLaura FrenchJanuary 30, 2026The agents solved most challenges at low cost but struggled with more broadly scoped tasks.
Security OperationsIvanti patches two 9.8 bugs in Endpoint Manager MobileSteve ZurierJanuary 30, 2026CVE-2026-1281 and CVE-2026-1340 have CVSS scores of 9.8 and have already been exploited.
Security OperationsGoogle disrupts IPIDEA residential proxy network used in cybercrimeLaura FrenchJanuary 30, 2026Google said the network is overwhelmingly used by malicious actors, including botnet operators.
Security OperationsPricewaterhouseCoopers, Google Cloud sign $400 million AI dealSteve ZurierJanuary 29, 2026Google will develop artificial intelligence that PwC will roll it out to Fortune 500.
Security OperationsTwo n8n sandbox escape vulnerabilities allow RCELaura FrenchJanuary 29, 2026The flaws affect the platform’s expression engine and Python Code Node.
Security OperationsMicrosoft Windows file archival tool WinRAR exploited worldwideSteve ZurierJanuary 28, 2026Vulnerability lets threat actors drop malware into the Windows Startup folder.