A newly identified ransomware campaign is targeting Windows users across South America, leveraging tactics that closely mimic the notorious Akira ransomware group. According to ESET’s […]
MIWIC26: Nkiruka Joy Aimienoho, Chief Information Security Officer, Standard Chartered Bank NG
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in […]
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker […]
RSAC 2026: AI Dominates, But Community Remains Key to Security
As AI took center stage at this year’s conference, experts debated automation, oversight and the evolving role of human intelligence in cybersecurity — despite the […]
Security Bosses Are All-In on AI. Here’s Why
CISOs are bullish on AI and have big plans to roll out future tools. We talk to Reddit CISO Frederick Lee and leading analyst Dave […]
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) […]
Not Toying Around: Hasbro Attack May Take ‘Weeks’ to Remediate
The company’s 8-K filing notes “unauthorized access” and that it’s activated business continuity plans and taken some systems offline. ​The original article found on darkreading […]
Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026
AI-driven threats, global leadership shifts, and the future of cybersecurity in a rapidly evolving landscape were among the discussions at RSAC 2026 Conference. ​The original […]
Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign
Hackers have launched a targeted phishing campaign by cloning Ukraine’s official CERT-UA website and distributing malicious software disguised as a security tool, according to a […]
The State of Trusted Open Source Report
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption […]