A suspected Chinese state-linked group exploited a critical Dell RecoverPoint flaw (CVE-2026-22769) in zero-day attacks starting mid-2024. Mandiant and Google’s Threat Intelligence Group (GTIG) reported that a suspected China-linked... Read more »
AI is introducing new risks that existing evaluation and governance approaches were never designed to manage, creating a widening gap between what AI-backed security tools promise and what can... Read more »
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and... Read more »
Notepad++, the popular text and source code editor for Windows whose update mechanism was hijacked last year, The post Notepad++ secures update channel in wake of supply chain compromise... Read more »
Attackers often gain access through routine workflows like email logins, browser sessions, and SaaS integrations. A single stolen credential can give them a quick path to move across systems... Read more »
Qodo has unveiled an intelligent Rules System for AI governance that replaces static, manually maintained rule files with a governance layer that automatically generates rules from real code patterns... Read more »
IntelliGenesis has announced the availability of CYBERSPAN for managed security service providers (MSSPs). The AI-driven network detection and response platform, originally developed to protect small and mid-sized contractors in... Read more »
Kaspersky uncovered Keenadu, an Android backdoor used for ad fraud that can even take full control of devices. Kaspersky has identified a new Android malware called Keenadu. It can... Read more »
Lasso Security launched Intent Deputy, a behavioral intent framework designed to secure AI agents at runtime. It delivers real-time insight into AI behavior by interpreting intent, decision flow, and... Read more »
Microsoft introduced library management in Microsoft Defender to help security analysts working with live response manage scripts and tools they use to triage, investigate and remediate threats. The library... Read more »
