BlackSanta ‘EDR-killer’ malware targets HR departmentsSteve ZurierMarch 11, 2026Malware collects info about the OS, user accounts, and host configurations.
How to build a breach-ready security posture without the enterprise price tagAdriel DesautelsMarch 11, 2026
Texas governor pushes for review of Chinese medical devices amid federal cyber warningsSC StaffMarch 10, 2026
Use of the MITRE Attack framework in threat detection with ThreatLocker’s John LillistonSC StaffMarch 6, 2026
AI is useless, zero trust is dangerous: Contrary lessons from Zero Trust World 2026Paul WagenseilMarch 5, 2026
Incident ResponseFirst CIRM warranty protecting employees from breach liability announcedLaura FrenchMarch 11, 2026BreachRx warranty covers up to $3 million in personal or corporate penalties stemming from an incident.
Cloud SecuritySalesforce confirms ShinyHunters exploited Experience Cloud sitesSteve ZurierMarch 10, 2026The ShinyHunters cybercrime group has systematically targeted Salesforce instances since mid-2025.
Application securityMozilla fixes 22 Firefox vulnerabilities discovered by Anthropic’s Claude AILaura FrenchMarch 10, 2026Anthropic recently published coordinated disclosure policies for Claude-discovered flaws.
Governance, Risk and ComplianceTrump cyber policy focuses on offensive operations, harnessing AISteve ZurierMarch 9, 2026Trump cyber policy shifts from secure-by-design towards offensive operations.
Vulnerability Management3 Apple flaws from Coruna exploit kit added to CISA vulnerability listLaura FrenchMarch 6, 2026The exploit kit affects versions of iOS between 13.0 and 17.2.1.
Threat ManagementIranian APT group MuddyWater targets multiple US companiesSteve ZurierMarch 6, 2026Recent Iranian campaign picked up after the Feb. 28 U.S.-Israel attack.
Vulnerability Management‘Mail2Shell’ FreeScout patch bypass exploit leads to RCELaura FrenchMarch 6, 2026Researchers say an attacker could achieve unauthenticated RCE by sending a crafted email.
Network SecurityCisco patches 48 bugs across firewall products; notes two more SD-WAN flaws exploitedSteve ZurierMarch 5, 2026Internet-facing edge devices are now major targets for attackers as the war in the Middle East unfolds.