Investments in cybersecurity startups took off in 2025 as venture capital firms focused not just on AI-native tech but on talent as well.
The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.
Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.
In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.
ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments.
Attackers are bypassing email gateways through telephone-oriented attack delivery (TOAD), in which the only email payload is a phone number.
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent access to infected machines.
The PCI Security Standards Council experienced a record year in many regards, but its first annual report shows it needs to work even faster to stay ahead of attackers.
Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.
The vulnerabilities highlight a big drawback to integrating AI into software development workflows and the potential impact on supply chains.
A Chinese keyboard warrior inadvertently leaked information about politically motivated influence operations through a ChatGPT account.
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.