News
National cyber director solicits industry help in fixing regulations, threat information-sharing
1+ hour, 50+ min ago (747+ words) President Donald Trump's chief cybersecurity adviser said a forthcoming national strategy will kick off ambitious projects. WASHINGTON "The U.S. government needs the business community's help crafting the right cybersecurity strategy, President Donald Trump's top cybersecurity official said on Tuesday. "We need…...
Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts
3+ hour, 38+ min ago (583+ words) Security researchers warn that the initial threat activity was highly targeted, as a limited number of users were impacted prior to disclosure. Security teams are scrambling Tuesday as two critical vulnerabilities in Ivanti Endpoint Manager Mobile are facing exploitation attempts....
National cybersecurity strategies depend on public-private trust, report warns
4+ hour, 43+ min ago (341+ words) An influential cybersecurity think tank urged governments to consult extensively with a wide variety of business stakeholders before making ambitious plans. Governments should work closely with the private sector when designing and detailing their national cybersecurity strategies, a prominent think…...
ShinyHunters escalates tactics in extortion campaign linked to Okta environments
1+ day, 4+ hour ago (348+ words) Researchers are tracking multiple clusters that are using social engineering to gain access to victims. Researchers warn that a recently disclosed extortion campaign linked to ShinyHunters represents an escalation of tactics used by the group." ShinyHunters late last month claimed…...
FCC urges telecoms to boost cybersecurity amid growing ransomware threat
1+ day, 5+ hour ago (321+ words) The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms. "Recent events show that some U.S. communications networks are vulnerable to cyber exploits that may pose significant risks to national security, public safety,…...
Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat
3+ day, 22+ hour ago (309+ words) A look at the most important trends and issues in cyber this year. New year, new and more complex challenges for cybersecurity leaders, starting on the technology front: AI tools are revolutionizing ways of working for security operations teams while…...
Cisco sees vulnerability exploitation top phishing in Q4
4+ day, 5+ hour ago (401+ words) The company's recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise. While vulnerability exploitation remained high in Q4, there were no major exploitation campaigns that accounted for the lion's share of the activity, Cisco said "a…...
CISA, security researchers warn FortiCloud SSO flaw is under attack
5+ day, 3+ hour ago (362+ words) The exploitation activity comes weeks after a similar authentication bypass vulnerability was found. Federal authorities and security researchers are warning about a critical vulnerability in Fortinet FortiCloud single sign-on, which is currently under exploitation." The flaw, tracked as CVE-2026-24858, allows…...
Government’s new approach to software security oversight could complicate things for vendors
5+ day, 23+ hour ago (971+ words) Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy. The Trump administration's elimination of a security attestation requirement for federal software vendors could change how those companies demonstrate their products' security to customers…...
Corporate workers lean on shadow AI to enhance speed
6+ day, 3+ hour ago (386+ words) A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk. About six of every 10 corporate employees are willing to use shadow AI tools if it helps them meet work deadlines,…...