(Adobe Stock) Only 15% of CISOs say they have visibility into third-party riskSteve ZurierJanuary 14, 2026The Panorays survey noted that only 21% of CISOs have tested crisis response plans in place.
The Electric Tech Stack: Its importance and how the U.S. can keep pace with ChinaVal MoonJanuary 12, 2026
Alexandra Seymour to receive Excellence in Action award for advancing national cybersecurity policy at ICIT 2025 GalaBill BrennerDecember 23, 2025
Autonomous IT, real-time endpoint intelligence, and unified operations and security: Turning operations data into faster decisionsBill BrennerDecember 22, 2025
State Department CIO Kelly Fletcher to receive Impact Award for advancing secure global diplomacy at ICIT 2025 GalaBill BrennerDecember 22, 2025
Seeing clearly: How exposure management streamlines SOC investigationsPaul WagenseilDecember 20, 2025
Need for speed: How exposure management optimizes mobilization and remediationPaul WagenseilDecember 19, 2025
Security OperationsBroadcom chip software flaw affecting ASUS routers enables DoSLaura FrenchJanuary 14, 2026The exploit requires no authentication and requires a manual router reset to reconnect.
Security OperationsMagecart network targeted Amex, Diners Club, MasterCard since 2022Steve ZurierJanuary 13, 2026Experts point out that Magecart attacks exploit third-party scripts on web browsers, bypassing traditional security controls.
Threat Management‘Pig butchering-as-a-service’ provides ready-to-use kits, infrastructureLaura FrenchJanuary 13, 2026Infoblox researchers detail the offerings of entities known as UWORK and the Penguin Account Store.
Application security2026 AI reckoning: Agent breaches, NHI sprawl, deepfakesStephen WeigandJanuary 13, 2026Experts warn 2026 brings agent-driven breaches, NHI abuse and deepfake trust shocks.
Threat ManagementRussia-linked APT28 targets energy and defense groups tied to NATOSteve ZurierJanuary 12, 2026Active since 2004, APT28’s sustained campaign for the past year focused on credential harvesting.
Threat ManagementFBI: Kimsuky steals credentials via QR code ‘quishing’ attacksSteve ZurierJanuary 9, 2026North Koreans use quishing to steal identities on mobile devices.
AI/MLHoneypots detect threat actors mass scanning LLM infrastructureLaura FrenchJanuary 9, 2026GreyNoise honeypots captured more than 80,000 sessions probing LLM endpoints over the last 11 days.
OT SecurityCritical infrastructure facing cyber surge in OT and supply chains in 2026Stephen WeigandJanuary 8, 2026Experts warn 2026 will bring AI-scaled OT attacks, pre-positioning, and wider supply-chain hits.