GitHub user attachments abused to spread novel infostealerLaura FrenchApril 17, 2026The stealthy CGrabber malware targets a wide array of apps, browsers and extensions.
Blind spots at scale: The hidden risks of identity visibility gaps and shadow AIPaul WagenseilApril 10, 2026
Vulnerability ManagementApache ActiveMQ RCE bug to CISA list of exploited vulnerabilitiesSteve ZurierApril 17, 2026CISA flags 13-year-old ActiveMQ RCE as exploited, highlighting AI-driven bug discovery.
Application securityBot traffic makes up 49% of online activity, but 99% of bots unwantedLaura FrenchApril 17, 2026Researchers warn malicious bots may spoof trusted user agents to disguise their intent.
IdentityCisco patches critical bugs in Webex, ISESteve ZurierApril 16, 2026Experts warn that the Webex bug may get the headlines, but exploited ISE bugs offer attackers the keys to the kingdom.
IdentityNginx-ui MCP missing authentication flaw actively exploitedLaura FrenchApril 16, 2026Attackers on the same network can alter nginx configurations, leading to complete takeover.
IdentityVishing attacks on Okta identity systems on the riseSteve ZurierApril 15, 2026Vishing attacks target Okta to bypass MFA, enabling broad SSO data access.
RansomwareBlack Basta-linked attacks target executives via Teams phishingLaura FrenchApril 15, 2026Suspected former Black Basta affiliates impersonate help desks to deploy RMM software.
Security OperationsCISOs: Revamp security programs in the wake of Claude MythosSteve ZurierApril 14, 2026Experts warn AI-driven cyber threats outpace defenses; current guidance may be insufficient.
LeadershipJSOC IT’s Sam Sawalhi: Telling the room what it needs to hearSC StaffApril 14, 2026Sometimes the path to success is saying not what people want to hear, but what they need to hear.