AI's potential to disrupt cyber operations highlighted by cyber leaders
AI was emphasized by multiple cybersecurity leaders at RSAC 2026 to possibly unsettle cybersecurity operations, which could result in a major industry upheav...
20 articles
AI was emphasized by multiple cybersecurity leaders at RSAC 2026 to possibly unsettle cybersecurity operations, which could result in a major industry upheav...
BleepingComputer reports that at least 500,000 WordPress sites are vulnerable to attacks involving a medium-severity flaw in the Smart Slider 3 plugin, which...
Nearly 2,000 API credentials enabling access to AWS, OpenAI, GitHub, and Stripe have been observed by Stanford University researchers to be exposed across 10...
Infamous cybercrime marketplace BreachForums had its latest database impacting over 300,000 users exposed by the ShinyHunters threat operation as it exited t...
Sterling Seacrest Pritchard, a leading U.S.
Major UK retail and commercial financial services provider had information from over 447,000 customers using its mobile banking apps inadvertently exposed by...
TechCrunch reports that Apple has touted that all of its devices with the Lockdown Mode activated have not been impacted by spyware intrusions.
Windows systems have been more stealthily compromised by the BlankGrabber malware through the exploitation of a counterfeit certificate holder for multi-stag...
PwC's "Cyber threats in motion" report warns that AI is giving attackers added sophistication, speed, and scale, but identity remains the fulcrum of entry, a...
Time to start treating sustainability telemetry as OT data.
It's easy to mount ransomware attacks upon SaaS and cloud assets, a researcher said at the BSides SF 2026 hacker conference.
The Shai-Hulud worms that exploited automatic updates in open-source software repositories may be only the beginning, two researchers said at RSAC 2026.
OX Security found AI coding assistants make the same common mistakes as humans.
Experts warn that the timeframe between disclosure and exploitation will continue to shrink, so teams must prepare.
Padraic O’Reilly and Srinivas Tummalapenta explore how cybersecurity is evolving from fragmented data collection to a unified cyber risk intelligence layer.
Matt Alderman and Evelyn Anderson explore how autonomous security programs are reshaping cyber governance.
Gibb Witham explains why organizations must move beyond assumed AI capability toward measurable, validated cyber readiness for both humans and AI systems.