- The OpenClaw experiment is a warning shot for enterprise AI security3h
- Malicious use of virtual machine infrastructure3d
- Eeny, meeny, miny, moe? How ransomware operators choose victims17d
- Microsoft Office vulnerability (CVE-2026-21509) in active exploitation13d
- February’s Patch Tuesday assumes battle stations20h
- The OpenClaw experiment is a warning shot for enterprise AI security20h
- Sophos Firewall Configuration Viewer1d
- Threat Intelligence Executive Report – Volume 2025, Number 63d
- Sophos AI Agents: Accelerating MDR and Powering the Agentic SOC3d
- From Security Operations to Security Leadership: Sophos CISO Advantage3d
- Sophos Workspace Protection Enables Safe GenAI Adoption3d
- Malicious use of virtual machine infrastructure9d
- Sophos Protected Browser Early Access and FAQ10d
- The Good, the Bad and the Ugly in Cybersecurity – Week 72h
- ClawSec: Hardening OpenClaw Agents from the Inside Out4d
- The Good, the Bad and the Ugly in Cybersecurity – Week 67d
- AI Security, From Data to Runtime: A Holistic Defense Approach7d
- The Good, the Bad and the Ugly in Cybersecurity – Week 514d
- The Good, the Bad and the Ugly in Cybersecurity – Week 421d
- The Good, the Bad and the Ugly in Cybersecurity – Week 328d
- The Good, the Bad and the Ugly in Cybersecurity – Week 235d
- 12 Months of Fighting Cybercrime & Defending Enterprises | The SentinelLABS 2025 Review38d
- When Your AI Coding Plugin Starts Picking Your Dependencies: Marketplace Skills and Dependency Hijack in Claude Code38d
- What Are The Different Qualifications That You Can Get In Cybersecurity in The UK?25d
- How Much Should You Spend On Cybersecurity Each Month or Year?32d
- How Much Does a Cyber Attack Cost UK Businesses Each Year?39d
- From Clippers to KQL: My Jump into Cybersecurity72d
- How Much Does a Cyber Security Company Cost?87d
- How Are Cyber Security Companies Managing AI Attacks?92d
- What Can an Outsourced Cyber Security Company Do for Me?95d
- Understanding the Colt Attack122d
- JUMPSEC Continuing to Inspire Primary School Children Towards Cyber Careers130d
- Assume Compromise: Designing for Continuity and Detection133d
- South Korea fines Louis Vuitton, Christian Dior, Tiffany $25M for SaaS security failures1h
- Researchers unearth 30-year-old vulnerability in libpng library2h
- Battling bots face off in cybersecurity arena2h
- Four new reasons why Windows LNK files cannot be trusted4h
- BSI läutet Ende der klassischen Verschlüsselung ein6h
- The foundation problem: How a lack of accountability is destroying cybersecurity8h
- Google fears massive attempt to clone Gemini AI through model extraction8h
- The democratization of AI data poisoning and how to protect your organization9h
- Why key management becomes the weakest link in a post-quantum and AI-driven security world10h
- 5 key trends reshaping the SIEM market13h
- Security-Infotainment: Die besten Hacker-Dokus16h
- Hackers turn bossware against the bosses18h
- Why identity recovery is now central to cyber resilience21h
- ‘Dead’ Outlook add-in hijacked to phish 4,000 Microsoft Office Store users1d
- Neue Warn-App für Cybervorfälle gestartet1d
- Im Fokus: Emerging Technologies1d
- Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection1d
- Palo Alto closes privileged access gap with $25B CyberArk acquisition1d
- The ephemeral infrastructure paradox: Why short-lived systems need stronger identity governance1d
- What CISOs need to know about the OpenClaw security nightmare1d
- They Got In Through SonicWall. Then They Tried to Kill Every Security Tool9d
- The (!FALSE) Pattern: How SOAPHound Queries Disappear Before They Hit Your Logs15d
- How Huntress Managed ITDR's New Incident Report Timeline Changes Response18d
- Huntress Catches SmarterMail Account Takeover Leading to RCE22d
- How Hacked Construction Apps Are Bringing Down Jobsite Security23d
- Dissecting CrashFix: KongTuke's New Toy28d
- SDFlags: The Log Field I Wasn't Looking at That Revealed How BloodHound Really Works29d
- Cross-Platform Unity in EDR31d
- Reflecting on AI in 2025: Faster Attacks, Same Old Tradecraft32d
- ESXi Exploitation in the Wild37d
- Rogue RMMs: Common Social Engineering Tactics We Saw in 202544d
- The LDAP Whitespace Problem: Making Sigma Rules Work in Production45d
- Tradecraft Tuesday Recap: React2Shell, ClickFix, and the Rise of AI Scams52d
- Rising Supply Chain Attacks on Cybersecurity Ecosystems | Huntress52d
- Trial, Error, and Typos: Why Some Malware Attacks Aren't as 'Sophisticated' as You Think53d
- Securing Your Business: The Vital Role of Cyber Insurance | Huntress56d
- Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability56d
- A Series of Unfortunate (RMM) Events57d
- The OID Problem: Writing LDAP Detections That Actually Work59d
- CMMC: The Opportunity ($$) and Challenge for MSPs65d
- Naming and shaming: How ransomware groups tighten the screws on victims1d
- Taxing times: Top IRS scams to look out for in 20263d
- OfferUp scammers are out in force: Here’s what you should know9d
- A slippery slope: Beware of Winter Olympics scams and other cyberthreats11d
- This month in security with Tony Anscombe – January 2026 edition14d
- DynoWiper update: Technical analysis and attribution14d
- Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan16d
- Drowning in spam or scam emails? Here’s probably why17d
- ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 202521d
- Children and chatbots: What parents should know21d
- Common Apple Pay scams, and how to stay safe22d
- Old habits die hard: 2025’s most common passwords were as predictable as ever24d
- Why LinkedIn is a hunting ground for threat actors – and how to protect yourself28d
- Is it time for internet services to adopt identity verification?30d
- Your personal information is on the dark web. What happens next?31d
- Credential stuffing: What it is and how to protect yourself36d
- This month in security with Tony Anscombe – December 2025 edition46d
- A brush with online fraud: What are brushing scams and how do I stay safe?52d
- Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component53d
- LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan57d
- Hand over the keys for Shannon’s shenanigans1d
- Ryan Liles, master of technical diplomacy1d
- New threat actor, UAT-9921, leverages VoidLink framework in campaigns2d
- Microsoft Patch Tuesday for February 2026 — Snort rules and prominent vulnerabilities2d
- All gas, no brakes: Time to come to AI church8d
- Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework8d
- I'm locked in!15d
- Microsoft releases update to address zero-day vulnerability in Microsoft Office15d
- Dissecting UAT-8099: New persistence mechanisms and regional focus15d
- IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations15d
- I scan, you scan, we all scan for... knowledge?22d
- Foxit, Epic Games Store, MedDreams vulnerabilities22d
- Predicting 202629d
- UAT-8837 targets critical infrastructure sectors in North America29d
- Brushstrokes and breaches with Terryn Valikodath30d
- The game is over: when “free” comes at too high a price. What we know about RenEngine2d
- Spam and phishing in 20252d
- Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT8d
- The Notepad++ supply chain attack — unnoticed execution chains and new IoCs10d
- Supply chain attack on eScan antivirus: detecting and remediating malicious updates15d
- HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns17d
- The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor46d
- Threat landscape for industrial automation systems in Q3 202550d
- Evasive Panda APT poisons DNS requests to deliver MgBot51d
- Assessing SIEM effectiveness52d
- January 2026 Product Releases | Blumira2h
- SIEM vs XDR vs SOAR vs SOC vs EDR vs MDR | Blumira2d
- Customer Story: Enhancing Ottawa County’s Security with Blumira Solutions3d
- How MintsLoader uses a Legacy Windows Binary to gain a Foothold4d
- Ransomware Protection: The 2026 Defense Playbook9d
- Your Cybersecurity Gameplan with Blumira11d
- Achieving CMMC Compliance: How Blumira Simplifies Cybersecurity30d
- December 2025 Product Releases | Blumira32d
- How to Choose a Security Operations Platform32d
- The Complete SIEM Buyer's Checklist32d
- Kimwolf Botnet Swamps Anonymity Network I2P2d
- Patch Tuesday, February 2026 Edition2d
- Please Don’t Feed the Scattered Lapsus ShinyHunters11d
- Who Operates the Badbox 2.0 Botnet?18d
- Kimwolf Botnet Lurking in Corporate, Govt. Networks24d
- Patch Tuesday, January 2026 Edition30d
- Who Benefited from the Aisuru and Kimwolf Botnets?35d
- The Kimwolf Botnet is Stalking Your Local Network42d
- Happy 16th Birthday, KrebsOnSecurity.com!46d
- Dismantling Defenses: Trump 2.0 Cyber Year in Review56d
- Weekly Update 4904d
- Weekly Update 4899d
- Weekly Update 48817d
- Weekly Update 48726d
- Weekly Update 48628d
- Who Decides Who Doesn’t Deserve Privacy?31d
- Weekly Update 48537d
- Weekly Update 48447d
- Weekly Update 48355d
- Weekly Update 48258d
- Processing 630 Million More Pwned Passwords, Courtesy of the FBI62d
- Weekly Update 48170d
- Why Does Have I Been Pwned Contain "Fake" Email Addresses?71d
- Weekly Update 48074d
- Weekly Update 47982d
- ESET PROTECT On-Prem hotfix version 13.0.12.0 has been released13/02/26
- ESET PROTECT version 7 has been released13/02/26
- ESET Mail Security for Microsoft Exchange Server feature update13/02/26
- ESET Security for Microsoft SharePoint Server version 12.1 has been released13/02/26
- ESET PROTECT On-Prem hotfix version 13.0.10.0 has been released13/02/26
- ESET Full Disk Encryption version 2.3.5.0 has been released13/02/26
- ESET PROTECT Hub version 2.1.2 has been released13/02/26
- ESET PSA plugin Service Release 2.4 has been released13/02/26
- ESET PROTECT On-Prem version 13.0.8.0 has been released13/02/26
- ESET PROTECT plugin for ConnectWise Asio has been released13/02/26
- ESET Cloud Office Security v645 has been released13/02/26
- ESET Endpoint Antivirus and ESET Endpoint Security for Windows version 12.1.2057.3 have been released13/02/26
- Hotfix for ESET Endpoint Security for macOS version 9 has been released13/02/26
- Hotfix for ESET Cyber Security version 9 has been released13/02/26
- ESET PROTECT version 6.5 has been released13/02/26
- ESET Management Agent version 12.5 for ESET PROTECT On-Prem has been released13/02/26
- ESET PROTECT Hub v1.12.8 has been released13/02/26
- ESET PROTECT On-Prem 12.1, 12.0, 11.1 and 11.0 servicing update has been released13/02/26
- ESET Cyber Security for macOS version 9 has been released13/02/26
- ESET Endpoint Antivirus and ESET Endpoint Security for Windows version 12.0.2062.0 have been released13/02/26
- Louis Vuitton, Dior, and Tiffany fined $25 million over data breaches1h
- Turning IBM QRadar Alerts into Action with Criminal IP5h
- CISA flags critical Microsoft SCCM flaw as exploited in attacks7h
- Microsoft fixes bug that blocked Google Chrome from launching10h
- Russia tries to block WhatsApp, Telegram in communication blockade21h
- Bitwarden introduces ‘Cupid Vault’ for secure password sharing22h
- Critical BeyondTrust RCE flaw now exploited in attacks, patch now22h
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities23h
- Romania's oil pipeline operator Conpet confirms data stolen in attack1d
- Odido data breach exposes personal info of 6.2 million customers1d
- WordPress plugin with 900k installs vulnerable to critical RCE flaw1d
- AMOS infostealer targets macOS through a popular AI app1d
- Fake AI Chrome extensions with 300K users steal credentials, emails1d
- Google says hackers are abusing Gemini AI for all attacks stages1d
- Apple fixes zero-day flaw used in 'extremely sophisticated' attacks1d