(Adobe Stock) Apple rolls out ‘Background Security Improvements’ for WebKit browser engine bugSteve ZurierMarch 18, 2026Apple shifts to more continuous security patches versus waiting for the next big OS release.
6 ways to make the White House’s new cyber strategy work for our industryScott Montgomery March 18, 2026
When it comes to quantum safety, sovereignty demands architectural clarityAntonio SanchezMarch 17, 2026
GlassWorm campaign evolves: ForceMemo attack targets Python repos via stolen GitHub tokensSC StaffMarch 17, 2026
The importance of keeping calm in trying circumstances: Zero Trust World 2026Paul WagenseilMarch 8, 2026
Identity security as app growth accelerates: Why automation is becoming essentialPaul WagenseilMarch 7, 2026
Use of the MITRE Attack framework in threat detection with ThreatLocker’s John LillistonSC StaffMarch 6, 2026
AI/MLAI coding assistants twice as likely to leak secrets, as overall leaks rise 34%Laura FrenchMarch 18, 2026A total of 28.65 million hardcoded secrets were found in public GitHub commits in 2025.
Threat ManagementStryker cyberattack contained, but experts warn repair costs could soarSteve ZurierMarch 17, 2026Security pros call “containment” victory claim hollow as recovery could cost multi-millions.
Threat ManagementPhishing emails target AI defenses with unique obfuscationLaura FrenchMarch 17, 2026Benign content hidden at the bottom of an email is designed to “outweigh” malicious content.
AI/MLClickFix campaigns target macOS users via MacSync infostealerSteve ZurierMarch 16, 2026ClickFix campaigns use fake ChatGPT tools and Terminal tricks to infect macOS with MacSync infostealer.
AI/MLAI phishing, malicious SVGs continues after surge over holidaysLaura FrenchMarch 13, 2026HoxHunt reports AI-generated phishing increased from 4% to 56% of phishing attempts in December.
Threat ManagementNo restoration timeline for medical device maker Stryker after cyberattackSteve ZurierMarch 13, 2026Company also tells customers the attack by Iran-linked Handala disrupted supply chain.
Vulnerability ManagementCISA adds n8n RCE flaw to list of known exploited vulnerabilitiesLaura FrenchMarch 13, 2026An authenticated attacker could execute arbitrary code with elevated privileges.
Threat ManagementIran-linked group claims wiper attack and takedown of medical device maker StrykerSteve ZurierMarch 12, 2026Second major case targeting a U.S. firm after start of Iran conflict Feb. 28.