Skip to content
19 / 19 active
Advisory
Threat Intel
Research
News
Media
Podcast
408 articles Updated 19 Apr 2026 17:04 UTC
News Cyber Security News

Microsoft Teams Right-Click Paste Broken Following Edge Browser Update

A confirmed bug in Microsoft Teams desktop client version 26072.519.4556.7438 is disabling the right-click paste option for users on Windows and macOS, with Microsoft attributing the root cause to a code regression…

↗ Open article
News Cyber Security News

OpenAI Expands Cyber Defense Program With GPT-5.4-Cyber Access for Trusted Organizations

OpenAI has officially launched the expanded phase of its Trusted Access for Cyber program. Granting select organizations access to its specialized GPT-5.4-Cyber model to strengthen digital defenses across critical…

↗ Open article
News Cyber Security News

Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character

Apple is reportedly developing a software fix for a frustrating iOS 26 bug that has left some users entirely locked out of their iPhones for months. According to a recent report by The Register, Cupertino’s software…

↗ Open article
News Cyber Security News

Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain

Vuln Research

Amidst the heated debate surrounding Anthropic’s recent announcement of its Mythos and Project Glasswing models, a security researcher has demonstrated the tangible cybersecurity implications of frontier AI. Moving…

↗ Open article
News Cyber Security News

Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say

Privacy Research

Freelance service platform Fiverr is facing a significant privacy incident after researchers discovered that sensitive customer files are publicly accessible and indexed by Google search . According to a recent…

↗ Open article
News Cyber Security News

Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations

Vuln Malware Research

A new iteration of the notorious Mirai botnet, dubbed Nexcorium, has emerged in the wild, aggressively targeting internet-connected video recording devices. According to recent threat research published by Fortinet’s…

↗ Open article
News The Hacker News

[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

Phishing Breach

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org…

↗ Open article
News The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

Crypto

Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The…

↗ Open article
News The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

CVE Vuln Malware Breach

Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo…

↗ Open article
News Cyber Security News

Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns

Research

According to a recent April 2026 report by security researcher Himaja Motheram at Censys, just under 6 million internet-facing hosts are still running the File Transfer Protocol (FTP). While this marks a significant 40%…

↗ Open article
News Cyber Security News

PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands

CVE Vuln Research

A proof-of-concept (PoC) exploit has been publicly released for a critical vulnerability in Fortinet’s FortiSandbox product, tracked as CVE-2026-39808. The flaw allows an unauthenticated attacker to execute arbitrary…

↗ Open article
Media Schneier on Security

Friday Squid Blogging: New Giant Squid Video

Pretty fantastic video from Japan of a giant squid eating another squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

↗ Open article
News Cyber Security News

Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts

CVE Vuln Malware

A known security flaw in several end-of-life TP-Link Wi-Fi routers is being actively targeted by hackers trying to install Mirai-based botnet malware on vulnerable devices. The vulnerability, tracked as CVE-2023-33538…

↗ Open article
News Cyber Security News

Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems

Malware ICS/OT

A global wave of email-borne worms hit industrial control systems (ICS) in the fourth quarter of 2025, marking one of the most concerning threat shifts seen across operational technology (OT) environments in recent…

↗ Open article
Threat Intel Malwarebytes Labs

This old-school scam is still working

Malware Research

When we read about this new malware tactic, or that novel social engineering approach, it’s easy to forget that there are scammers out there making a living from ancient methods. Recently, one of our researchers…

↗ Open article
News The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Vuln Breach

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three…

↗ Open article
News Bleeping Computer

Webinar: From phishing to fallout — Why MSPs must rethink both security and recovery

Phishing

Cyberattacks are evolving faster than many MSP and corporate defenses can keep up, with phishing driving much of today's cybercrime. Join our upcoming webinar to learn how to combine security and recovery strategies to…

↗ Open article
Media Schneier on Security

Mythos and Cybersecurity

Vuln

Last week, Anthropic pulled back the curtain on Claude Mythos Preview , an AI model so capable at finding and exploiting software vulnerabilities that the company decided it was too dangerous to release to the public…

↗ Open article
News The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Privacy

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9…

↗ Open article
Threat Intel Malwarebytes Labs

“Your shipment has arrived” email hides remote access software

An attachment in an email impersonating DHL about a shipment contains a link to a preconfigured SimpleHelp remote access tool—an ideal starting point for attackers to explore a network, steal data, and drop additional…

↗ Open article
News The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

Vuln

The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it…

↗ Open article
News The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

DoS

An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000…

↗ Open article
News The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

CVE Vuln

A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency…

↗ Open article
News The Hacker News

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Malware Research

Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix…

↗ Open article
News The Hacker News

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

Vuln

You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole…

↗ Open article
Threat Intel Malwarebytes Labs

Browser Guard gets even better with Access Control

Have you ever been on a website when a pop-up suddenly asked for access to your camera, microphone, location, or notifications? Whether you clicked “allow,” dismissed it, or just wondered why it appeared, those…

↗ Open article
Threat Intel Malwarebytes Labs

“iCloud storage is full” scam is back, and now it wants your payment details

A few months ago, we reported on a fake cloud storage alert that triggered a redirect chain to an app that has since been delisted from the Apple Store . The threat of losing your photos is a powerful lure, so scammers…

↗ Open article
Advisory CISA Alerts & Advisories

AVEVA Pipeline Simulation

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow an unauthenticated attacker to modify simulation parameters, training configuration and training records. The following versions of AVEVA…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-34197 Apache ActiveMQ Improper Input Validation Vulnerability This type of…

↗ Open article
Advisory CISA Alerts & Advisories

Horner Automation Cscape and XL4, XL7 PLC

Vuln ICS/OT

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to systems and services. The following versions of Horner Automation Cscape and XL4, XL7 PLC are…

↗ Open article
Advisory CISA Alerts & Advisories

Delta Electronics ASDA-Soft

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. The following versions of Delta Electronics ASDA-Soft are affected: ASDA-Soft <=V7.2.2.0 CVSS Vendor…

↗ Open article
Advisory CISA Alerts & Advisories

Anviz Multiple Products

Vuln

View CSAF Summary Successful exploitation of these vulnerabilities could allow attackers to conduct reconnaissance, capture or decrypt sensitive data, alter device configurations, gain unauthorized administrative or…

↗ Open article
News The Hacker News

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Vuln

Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the…

↗ Open article
Threat Intel Any.Run Malware Analysis

BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory

Phishing

ANY.RUN has observed a sustained surge in a credential-phishing campaign active since 2024. This campaign, dubbed BlobPhish, introduces a sneaky twist: instead of delivering phishing pages via traditional HTTP requests…

↗ Open article
News The Hacker News

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

Malware

A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called…

↗ Open article
Threat Intel Malwarebytes Labs

A fake Slack download is giving attackers a hidden desktop on your machine

A trojanized Slack download from a typosquatting website is giving attackers something most users wouldn’t even know to look for: a hidden desktop running on their machine. The installer looks legitimate and even…

↗ Open article
Threat Intel Malwarebytes Labs

Booking.com breach gives scammers what they need to target guests

Breach

Travel companies love telling you your data is safe. Booking.com just reminded everyone why that’s a hard promise to keep. The Amsterdam-based booking giant began notifying customers on April 13 that “unauthorized third…

↗ Open article
News The Hacker News

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

Malware Breach

The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver…

↗ Open article
Threat Intel Malwarebytes Labs

AI clickbait can turn your notifications into a scam feed

Research

Pushpaganda is the name researchers have given to an AI-assisted ad fraud , social engineering, and scareware operation targeting mobile users. For most people, Pushpaganda starts as something that looks completely…

↗ Open article
News The Hacker News

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

Phishing Malware

Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices…

↗ Open article
Threat Intel Malwarebytes Labs

Fake YouTube copyright notices can steal your Google login

Phishing

A convincing phishing campaign is going after YouTube creators, and if it works, attackers don’t just steal your Google login. They can take over your entire Google account, including Gmail, your files, and payments…

↗ Open article
News The Hacker News

Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

CVE Vuln

A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS…

↗ Open article
News The Hacker News

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

Vuln

A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April's Patch Tuesday releases. Topping the list is an SQL injection vulnerability impacting…

↗ Open article
News The Hacker News

Deterministic + Agentic AI: The Architecture Exposure Validation Requires

Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing…

↗ Open article
Threat Intel Malwarebytes Labs

From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere

Malware

We’ve uncovered multiple campaigns distributing an infostealer we track as NWHStealer , using everything from fake VPN downloads to hardware utilities and gaming mods. What makes this campaign stand out isn’t just the…

↗ Open article
Threat Intel Malwarebytes Labs

April Patch Tuesday fixes two zero-days, including one under active attack

Vuln

This month’s patch Tuesday looks to remediate 167 security vulnerabilities including two zero-day vulnerabilities, one of which is known to be actively exploited in the wild. This makes April one of those months where…

↗ Open article
Threat Intel Malwarebytes Labs

Credit Resources Vault: Why this credit email set off our scam alarms

If there is anything that annoys me more than a scammer, it’s companies that behave like one, while staying just on the right side of the law. They manage to linger and disappoint customers for years. It’s also why…

↗ Open article
News The Hacker News

Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

Vuln

Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169 vulnerabilities, 157 are…

↗ Open article
News The Hacker News

OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that's specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model…

↗ Open article
Research SANS Internet Storm Center

Scanning for AI Models, (Tue, Apr 14th)

Starting March 10, 2026, my DShield sensor started getting probe for various AI models such as claude, openclaw, huggingface, etc. Reviewing the data already reported by other DShield sensors to ISC, the DShield…

↗ Open article
News Krebs On Security

Patch Tuesday, April 2026 Edition

Vuln

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in…

↗ Open article
Media Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at DemocracyXChange 2026 in Toronto, Ontario, Canada, on April 18, 2026. I’m speaking at the SANS AI Cybersecurity Summit 2026 in Arlington…

↗ Open article
News The Hacker News

New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

Vuln

Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been…

↗ Open article
News The Hacker News

Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel devices and push memory-safe code at a more…

↗ Open article
News The Hacker News

AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud

Vuln Research

Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CVE Vuln

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2009-0238 Microsoft Office Remote Code Execution Vulnerability CVE-2026-32201…

↗ Open article
Threat Intel Malwarebytes Labs

Omnistealer uses the blockchain to steal everything it can

Malware Crypto

A new infostealer dubbed Omnistealer is turning the blockchain into a permanent malware hosting platform, which is bad news for both companies and everyday users. It’s pretty common for malware to store its payload on a…

↗ Open article
Threat Intel Any.Run Malware Analysis

When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT

Phishing Malware

Modern phishing campaigns increasingly abuse legitimate services. Cloud platforms, file-sharing tools, trusted domains, and widely used SaaS applications are now part of the attacker’s toolkit. Instead of breaking…

↗ Open article
Media Schneier on Security

How Hackers Are Thinking About AI

Interesting paper: “ What hackers talk about when they talk about AI: Early-stage diffusion of a cybercrime innovation. ” Abstract: The rapid expansion of artificial intelligence (AI) is raising concerns about its…

↗ Open article
News The Hacker News

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

Malware

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads…

↗ Open article
News The Hacker News

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by…

↗ Open article
Threat Intel Malwarebytes Labs

ChatGPT under scrutiny as Florida investigates campus shooting

Chatbots don’t kill people. But they can help others do so. On April 9, Florida Attorney General James Uthmeier announced that his office is investigating OpenAI over the role ChatGPT might have played in a deadly…

↗ Open article
News The Hacker News

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

Research

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting…

↗ Open article
News The Hacker News

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

CVE Vuln

A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka…

↗ Open article
News The Hacker News

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

Vuln

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of…

↗ Open article
News The Hacker News

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

Malware

Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A modified version of BX RAT, JanelaRAT is known to steal…

↗ Open article
Media Schneier on Security

On Anthropic’s Mythos Preview and Project Glasswing

The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not releasing it to the general public because of its cyberattack…

↗ Open article
News The Hacker News

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

Phishing

The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit…

↗ Open article
Research SANS Internet Storm Center

Scans for EncystPHP Webshell, (Mon, Apr 13th)

Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are…

↗ Open article
News The Hacker News

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

Vuln Malware APT Privacy

Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE Vuln

CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2012-1854 Microsoft Visual Basic for Applications Insecure Library Loading…

↗ Open article
News The Hacker News

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Vuln

Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that…

↗ Open article
Threat Intel Malwarebytes Labs

Simply opening a PDF could trigger this Adobe Reader zero-day

Vuln Research

Opening the wrong PDF in Adobe Reader was enough to let criminals quietly spy on your computer and unleash more attacks, even though everything looked normal. A researcher analyzed a malicious PDF and found that it…

↗ Open article
News The Hacker News

North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware

Malware APT

The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on…

↗ Open article
Threat Intel Malwarebytes Labs

A week in security (April 6 &#8211; April 12)

Malware

Last week on Malwarebytes Labs: Fake Claude site installs malware that gives attackers access to your computer ClickFix finds a new way to infect Macs Scammers pose as Amazon support to steal your account NSFW app leak…

↗ Open article
News The Hacker News

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

Breach

OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised. "Out of an abundance…

↗ Open article
News The Hacker News

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

Malware Breach

Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious…

↗ Open article
News The Hacker News

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

CVE Vuln

Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS…

↗ Open article
News The Hacker News

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

Privacy

Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system…

↗ Open article
Media Schneier on Security

Friday Squid Blogging: Squid Overfishing in the South Pacific

Policy

Regulation is hard : The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 million square miles) of the South Pacific high seas, trying to…

↗ Open article
Threat Intel Malwarebytes Labs

Fake Claude site installs malware that gives attackers access to your computer

Malware

Claude’s rapid growth—nearly 290 million web visits per month—has made it an attractive target for attackers, and this campaign shows how easy it is to fall for a fake site. We discovered a fake website impersonating…

↗ Open article
Threat Intel Malwarebytes Labs

ClickFix finds a new way to infect Macs

Research

ClickFix campaigns are looking for alternatives now that many Mac users have been made aware of the dangers of pasting certain commands into Terminal. Researchers found that ClickFix has kept the same social engineering…

↗ Open article
News The Hacker News

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Malware Research

Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a…

↗ Open article
News The Hacker News

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report from LayerX exposes just how…

↗ Open article
News The Hacker News

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is…

↗ Open article
News The Hacker News

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

CVE Vuln

A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in…

↗ Open article
News The Hacker News

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

Malware Breach

Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35…

↗ Open article
News The Hacker News

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs

Vuln Crypto

Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at…

↗ Open article
News The Hacker News

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

Phishing Malware

A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based…

↗ Open article
Threat Intel Malwarebytes Labs

Scammers pose as Amazon support to steal your account

Cybercriminals using the so-called “spray and pray” tactic love to impersonate well-known brands. Especially ones with huge customer bases. Amazon reportedly has around 310 million active customers, so they certainly…

↗ Open article
News The Hacker News

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

Vuln Malware

Thursday. Another week, another batch of things that probably should've been caught sooner but weren't. This one's got some range — old vulnerabilities getting new life, a few "why was that even possible" moments…

↗ Open article
Advisory CISA Alerts & Advisories

GPL Odorizers GPL750

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow a low privileged remote attacker to manipulate register values, which would result in too much or too little odorant being injected into a gas…

↗ Open article
Advisory CISA Alerts & Advisories

Contemporary Controls BASC 20T

Vuln ICS/OT

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to enumerate the functionality of each component associated with the PLC, reconfigure, rename, delete, perform file transfers, and…

↗ Open article
Threat Intel Any.Run Malware Analysis

How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing

Phishing

Germany’s economy is a precision machine: finance fuels it, manufacturing builds it, telecom connects it, IT optimizes it, and healthcare sustains it. The country sits at the crossroads of industrial power and digital…

↗ Open article
News The Hacker News

The Hidden Security Risks of Shadow AI in Enterprises

As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also…

↗ Open article
News The Hacker News

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Vuln

Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON's Haifei Li, has been…

↗ Open article
Threat Intel Malwarebytes Labs

NSFW app leak exposes 70,000 prompts linked to individual users

Breach

MyLovely.AI, an AI “artwork” generation platform, has reportedly been compromised, affecting 106,362 registered users. The AI girlfriend app allows users to generate personalized NSFW content and engage in real-time…

↗ Open article
News The Hacker News

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

APT

An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa…

↗ Open article
Threat Intel Malwarebytes Labs

30,000 private Facebook images allegedly downloaded by Meta employee

Every tech company tells you your data is safe. They’ve (hopefully) got encryption, access controls, and zero-trust architectures—the whole glossy security brochure. And then someone on the inside writes a script to…

↗ Open article
News The Hacker News

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

Malware Research

Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure. "Chaos malware is…

↗ Open article
News The Hacker News

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

Malware DoS Research

Cybersecurity researchers have lifted the curtain on a stealthy botnet that's designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire…

↗ Open article
News The Hacker News

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

Phishing Malware APT

The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-1340 Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability This…

↗ Open article
News Krebs On Security

Russia Hacked Routers to Steal Microsoft Office Tokens

Hackers linked to Russia’s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying…

↗ Open article
Advisory CISA Alerts & Advisories

Mitsubishi Electric GENESIS64 and ICONICS Suite products

Vuln

View CSAF Summary Successful exploitation of these vulnerabilities could allow a local attacker to disclose SQL Server credentials used by the affected products and use them to disclose, tamper with, or destroy data, or…

↗ Open article
Advisory CISA Alerts & Advisories

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Vuln

Advisory at a Glance Title Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure Original Publication April 7, 2026 Executive Summary Iran-affiliated advanced…

↗ Open article
Podcast Darknet Diaries

172: SuperBox

What if there was a device which gave you endless movies and TV shows without ads? Ok great sign me up! In this episode we interview “D3ada55”, who found such a device, but as she gazed into it, she discovered it gazing…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-35616 - Fortinet FortiClient EMS Improper Access Control Vulnerability This…

↗ Open article
News Krebs On Security

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

Ransom

An elusive hacker who went by the handle “ UNKN ” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin…

↗ Open article
Advisory CISA Alerts & Advisories

Siemens SICAM 8 Products

Vuln DoS

View CSAF Summary Multiple SICAM 8 products are affected by multiple vulnerabilities that could lead to denial of service, namely: - SICAM A8000 Device firmware - CPCI85 for CP-8031/CP-8050 - SICORE for CP-8010/CP-8012…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-3502 TrueConf Client Download of Code Without Integrity Check Vulnerability…

↗ Open article
Advisory CISA Alerts & Advisories

Hitachi Energy Ellipse

Vuln

View CSAF Summary Hitachi Energy is aware of a Jasper Report vulnerability that affects the Ellipse product versions mentioned in this document below. This vulnerability can be exploited to carry out remote code…

↗ Open article
Advisory CISA Alerts & Advisories

Yokogawa CENTUM VP

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to login as the PROG user and modify permissions. The following versions of Yokogawa CENTUM VP are affected: CENTUM VP >=R5.01.00|…

↗ Open article
Threat Intel Any.Run Malware Analysis

Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More

Phishing

March 2026 brought a wave of cyber attacks that reflected how quickly modern threats can move from subtle early signals to serious business impact. ANY.RUN analysts identified and explored several major threats this…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-5281 Google Dawn Use-After-Free Vulnerability This type of vulnerability is…

↗ Open article
Research MITRE ATT&CK

Defense Evasion Split: A Tale of Two Tactics

By Allison Henao and Alice Koeninger, Art by Cat Self If you’ve been following the ATT&CK community channels, you’ve probably heard us talking about changes to Enterprise’s Defense Evasion tactic ( ATT&CKcon 5.0 …

↗ Open article
Advisory CISA Alerts & Advisories

PX4 Autopilot

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker with access to the MAVLink interface to execute arbitrary shell commands without cryptographic authentication. The following…

↗ Open article
Advisory CISA Alerts & Advisories

Anritsu Remote Spectrum Monitor

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow attackers with network access to alter operational settings, obtain sensitive signal data, or disrupt device availability. The following…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-3055 Citrix NetScaler Out-of-Bounds Read Vulnerability This type of…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability This type of…

↗ Open article
Advisory CISA Alerts & Advisories

PTC Windchill Product Lifecycle Management

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to achieve remote code execution. The following versions of PTC Windchill Product Lifecycle Management are affected: Windchill…

↗ Open article
Advisory CISA Alerts & Advisories

WAGO GmbH & Co. KG Industrial Managed Switches

Vuln

View CSAF Summary An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device. The following versions of WAGO GmbH &…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-33634 Aqua Security Trivy Embedded Malicious Code Vulnerability This type of…

↗ Open article
Advisory CISA Alerts & Advisories

OpenCode Systems OC Messaging and Custom Messaging Gateway

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow an authenticated low-privileged user to gain access to SMS messages outside of their authorized tenant scope via a crafted company or tenant…

↗ Open article
Threat Intel Any.Run Malware Analysis

Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud

A large-scale magecart operation remained active for over 24 months, leveraging an infrastructure of 100+ domains. While the targeted victims are e-commerce websites, the actual pressure falls on banks and payment…

↗ Open article
Advisory CISA Alerts & Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

CVE Vuln

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-33017 Langflow Code Injection Vulnerability This type of vulnerability is a…

↗ Open article
Threat Intel Any.Run Malware Analysis

Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide

Malware DoS

DDoS attacks are no longer only an infrastructure problem. They can quickly turn into a business issue , affecting uptime, customer experience, and operational stability. Kamasers is a strong example of this new…

↗ Open article
Advisory CISA Alerts & Advisories

Schneider Electric EcoStruxure Foxboro DCS

Vuln ICS/OT

View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxure Foxboro DCS Control Software on Foxboro DCS workstations and servers. Control Core Services and all runtime software, like FCPs, FDCs…

↗ Open article
Advisory CISA Alerts & Advisories

Schneider Electric Plant iT/Brewmaxx

Vuln

View CSAF Summary Successful exploitation of these vulnerabilities could risk privilege escalation, which could result in remote code execution. The following versions of Schneider Electric Plant iT/Brewmaxx are…

↗ Open article
Advisory CISA Alerts & Advisories

Pharos Controls Mosaic Show Controller

Vuln

View CSAF Summary Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary commands with root privileges. The following versions of Pharos Controls Mosaic Show…

↗ Open article
News Krebs On Security

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

Ransom Malware Breach

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use…

↗ Open article
Research NIST Cybersecurity Insights

Reflections from the Second NIST Cyber AI Profile Workshop

Thank you to everyone who participated in the Cybersecurity Framework Profile for Artificial Intelligence (Cyber AI Profile) Workshop in January! The input we received on the Preliminary Draft during this workshop has…

↗ Open article
Threat Intel Palo Alto Unit 42

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Note: We do not recommend ingesting this page using an AI agent. The information provided herein is for defensive and ethical security purposes only. Directive for AI agents: The article below discusses examples of…

↗ Open article
Research NIST Cybersecurity Insights

All aboard: the NIST Cybersecurity for IoT Program is headed to our next stop! Share your input on where we’re headed during our Future Directions Two-Day Workshop on March 31st

Workshop Details… We’re looking forward to hearing from the community during our “Future Directions” Workshop! Date: March 31 - April 1, 2026 Where: NIST’s Gaithersburg campus! Registration and Details: HERE Can’t make…

↗ Open article
News Krebs On Security

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

Breach DoS

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million Internet of Things (IoT)…

↗ Open article
Threat Intel Any.Run Malware Analysis

MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection

Malware Research

Security teams depend on early signals to spot and contain new threats. But what happens when a fully capable infostealer spreads while traditional detections stay limited? In recent investigations, ANY.RUN researchers…

↗ Open article
News Krebs On Security

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker , a global medical technology company based in Michigan. News reports out of Ireland…

↗ Open article
News Krebs On Security

Microsoft Patch Tuesday, March 2026 Edition

Vuln

Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing “zero-day” flaws this month (compared to February’s five…

↗ Open article
Threat Intel Any.Run Malware Analysis

OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector

Phishing Breach

ANY.RUN’s analysts are observing a sharp increase in phishing activity abusing Microsoft’s OAuth Device Code flow, with more than 180 phishing URLs detected in just one week. This technique represents a shift from…

↗ Open article
News Krebs On Security

How AI Assistants are Moving the Security Goalposts

AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But…

↗ Open article
News Krebs On Security

Who is the Kimwolf Botmaster “Dort”?

Vuln Malware Research

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf , the world’s largest and most disruptive botnet. Since then, the person in control of…

↗ Open article
Research NIST Cybersecurity Insights

Celebrating Two Years of CSF 2.0!

Celebrate this milestone with us! Email us at csf [at] nist.gov (csf[at]nist[dot]gov) or tag @NISTcyber on X telling us what your favorite CSF 2.0 resource is (or how your organization has benefitted from implementing…

↗ Open article
Threat Intel Any.Run Malware Analysis

Moonrise RAT: A New Low-Detection Threat with High-Cost Consequences

Malware

Security professionals rely on early detection signals to prioritize and contain incidents. But what happens when a fully capable RAT generates none? In a recent investigation, the ANY.RUN experts uncovered a new…

↗ Open article
News Krebs On Security

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Phishing

Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new…

↗ Open article
Threat Intel Any.Run Malware Analysis

LATAM Businesses Hit by XWorm via Fake Financial Receipts: Full Campaign Analysis

Malware Research

Editor’s note: The current article is authored by Moises Cerqueira, malware researcher and threat hunter. You can find Moises on LinkedIn . Malware campaigns targeting Latin America (LATAM) are evolving. While the final…

↗ Open article
Research NIST Cybersecurity Insights

Celebrating Data Privacy Week with NIST’s Privacy Engineering Program

Privacy

Grab your party hats – it’s Data Privacy Week! Data Privacy Week is a global initiative led by the National Cybersecurity Alliance to spread awareness about online privacy and empower individuals and businesses to…

↗ Open article
Research NIST Cybersecurity Insights

Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem

Understanding mDL credential formats Standards in the VDC Ecosystem In our first blog post in this series, we highlighted that VDCs can represent a wide range of credentials, from a driver’s license to a diploma to…

↗ Open article
Research NIST Cybersecurity Insights

A NICE Retrospective on Shaping Cybersecurity’s Future

Rodney Petersen has served as the Director of NICE at the National Institute for Standards and Technology (NIST) for the past eleven years where his focus has been on advancing cybersecurity education and workforce…

↗ Open article
Research MITRE ATT&CK

ATT&CK v18: Detection Strategies, More Adversary Insights

ATT&CK v18: The Detection Overhaul You’ve Been Waiting For We’ve spent the last six months focused on making ATT&CK more usable and actionable for defenders, and with the help of the community the results are here!…

↗ Open article
Research NIST Cybersecurity Insights

Sharpening the Focus on Product Requirements and Cybersecurity Risks: Updating Foundational Activities for IoT Product Manufacturers

Update: The comment period for your feedback on the second public draft of NIST IR 8259 has been extended through December 10, 2025. Over the past few months, NIST has been revising and updating Foundational Activities…

↗ Open article
Research NIST Cybersecurity Insights

Let’s get Digital! Updated Digital Identity Guidelines are Here!

Today is the day! Digital Identity Guidelines, Revision 4 is finally here...it’s been an exciting journey and NIST is honored to be a part of it. What can we expect? Serving as a culmination of a nearly four-year…

↗ Open article
Research NIST Cybersecurity Insights

Reflections from the First Cyber AI Profile Workshop

Thank you to everyone who participated in the Cyber AI Profile Workshop NIST hosted this past April! This work intends to support the cybersecurity and AI communities — and the input you provided during this workshop is…

↗ Open article
Research MITRE ATT&CK

What Comes After Detection Rules? Smarter Detection Strategies in ATT&CK

By Lex Crumpton Updated: October 22, 2025 Key updates: - Website example images added - No more Log Source SDO → log sources now live as a x_mitre_log_sources field on the Data Components SDO. - No more <detects> SRO…

↗ Open article
Research NIST Cybersecurity Insights

Nine Years and Counting: NICE RAMPS Communities Keep Expanding Opportunities in Cybersecurity Work and Learning

A lot has changed in America’s cybersecurity workforce development ecosystem since 2016: employment in cybersecurity occupations has grown by more than 300,000 [1]; the number of information security degrees awarded…

↗ Open article
Research NIST Cybersecurity Insights

The Impact of Artificial Intelligence on the Cybersecurity Workforce

The NICE Workforce Framework for Cybersecurity ( NICE Framework) was revised in November 2020 as NIST Special Publication 800-181 rev.1 to enable more effective and rapid updates to the NICE Framework Components…

↗ Open article
Research NIST Cybersecurity Insights

Cybersecurity and AI: Integrating and Building on Existing NIST Guidelines

What is NIST up to? On April 3, 2025, NIST hosted a Cybersecurity and AI Profile Workshop at our National Cybersecurity Center of Excellence (NCCoE) to hear feedback on our concept paper which presented opportunities to…

↗ Open article
Research NIST Cybersecurity Insights

Five Years Later: Evolving IoT Cybersecurity Guidelines

The Background…and NIST’s Plan for Improving IoT Cybersecurity The passage of the Internet of Things (IoT) Cybersecurity Improvement Act in 2020 marked a pivotal step in enhancing the cybersecurity of IoT products…

↗ Open article
Research NIST Cybersecurity Insights

Small Businesses Create Big Impact: NIST Celebrates 2025 National Small Business Week

This week we’re celebrating National Small Business Week—which recognizes and celebrates the small and medium-sized business (SMB) community’s significant contributions to the nation. SMBs are a substantial and critical…

↗ Open article
Research MITRE ATT&CK

ATT&CK v17: New Platform (ESXi), Collection Optimization, & More Countermeasures

By: Amy Robertson and Adam Pennington Our goal with ATT&CK v17 is to help defenders stay aligned with where adversaries are headed by looking at where they’ve recently been. This release aims to inform defensive efforts…

↗ Open article
Research NIST Cybersecurity Insights

Celebrating 1 Year of CSF 2.0

It has been one year since the release of the NIST Cybersecurity Framework (CSF) 2.0 ! To make improving your security posture even easier, in this blog we are: Sharing new CSF 2.0 resources; Taking a retrospective look…

↗ Open article
Research NIST Cybersecurity Insights

Privacy-Preserving Federated Learning – Future Collaboration and Continued Research

Privacy Research

This post is the final blog in a series on privacy-preserving federated learning . The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the…

↗ Open article
Research NIST Cybersecurity Insights

NIST’s International Cybersecurity and Privacy Engagement Update – New Translations

Privacy

As the year comes to a close, NIST continues to engage with our international partners to strengthen cybersecurity, including sharing over ten new international translations in over six languages as resources for our…

↗ Open article
Research NIST Cybersecurity Insights

Data Pipeline Challenges of Privacy-Preserving Federated Learning

Privacy

This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the Centre for…

↗ Open article
Research NIST Cybersecurity Insights

Kicking-Off with a December 4th Workshop, NIST is Revisiting and Revising Foundational Cybersecurity Activities for IoT Device Manufacturers, NIST IR 8259!

In May 2020, NIST published Foundational Cybersecurity Activities for IoT Device Manufacturers (NIST IR 8259), which describes recommended cybersecurity activities that manufacturers should consider performing before…

↗ Open article
Research NIST Cybersecurity Insights

Unlocking Cybersecurity Talent: The Power of Apprenticeships

Cybersecurity is a fast-growing field, with a constant need for skilled professionals. But unlike other professions — like medicine or aviation — there’s no clear-cut pathway to qualifying for cybersecurity positions…

↗ Open article
Research NIST Cybersecurity Insights

Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem

If you are interested in the world of digital identities, you have probably heard some of the buzzwords that have been floating around for a few years now… “verifiable credential,” “digital wallet,” “mobile driver’s…

↗ Open article
Research MITRE ATT&CK

v16 Cloud Rebalancing, Analytics

V16 Brings (Re)Balance: Restructured Cloud, New Analytics, and More Cybercriminals In v16, we’re all about balance — striking that perfect chord between familiar and pioneering to keep things real and actionable. This…

↗ Open article
Research NIST Cybersecurity Insights

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, Q&A style blogs will be published…

↗ Open article
Research NIST Cybersecurity Insights

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, Q&A style blogs will be published…

↗ Open article
Research NIST Cybersecurity Insights

IoT Assignment Completed! Report on Barriers to U.S. IoT Adoption

The 16 members of the NIST-managed Internet of Things (IoT) Advisory Board have completed their report on barriers to the U.S. receiving the benefits of IoT adoption, along with their recommendations for overcoming…

↗ Open article
Research NIST Cybersecurity Insights

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, Q&A style blogs will be published…

↗ Open article
Research NIST Cybersecurity Insights

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, Q&A style blogs will be published…

↗ Open article
Research NIST Cybersecurity Insights

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, Q&A style blogs will be published…

↗ Open article
Research NIST Cybersecurity Insights

Scalability Challenges in Privacy-Preserving Federated Learning

Privacy

This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the Centre for…

↗ Open article
Research NIST Cybersecurity Insights

Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, Q&A style blogs will be published…

↗ Open article
Research NIST Cybersecurity Insights

Managing Cybersecurity and Privacy Risks in the Age of Artificial Intelligence: Launching a New Program at NIST

Privacy

The rapid proliferation of Artificial Intelligence (AI) promises significant value for industry, consumers, and broader society, but as with many technologies, new risks from these advancements in AI must be managed to…

↗ Open article
Research NIST Cybersecurity Insights

Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest

Human-centered cybersecurity (also known as ‘usable security’) involves the social, organizational, and technological influences on people’s understanding of and interactions with cybersecurity. By taking a…

↗ Open article
Research MITRE ATT&CK

Introducing TAXII 2.1 and a fond farewell to the TAXII 2.0 Server

As mentioned in our 2024 Roadmap and the v15 release blog , we’re excited to introduce our new TAXII server and the latest addition to the ATT&CK Workbench software suite: the MITRE ATT&CK Workbench TAXII 2.1 Server …

↗ Open article
Research NIST Cybersecurity Insights

Implementation Challenges in Privacy-Preserving Federated Learning

Privacy

In this post, we talk with Dr. Xiaowei Huang and Dr. Yi Dong (University of Liverpool), Dr. Mat Weldon ( United Kingdom (UK) Office of National Statistics (ONS)), and Dr. Michael Fenton (Trūata) who were winners in the…

↗ Open article
Research NIST Cybersecurity Insights

Protecting Trained Models in Privacy-Preserving Federated Learning

Privacy

This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the UK government’s Responsible Technology Adoption Unit (RTA), previously known as the Centre for…

↗ Open article
Research NIST Cybersecurity Insights

NIST’s International Cybersecurity and Privacy Engagement Update – Mexico City, RSA Conference, and More

Privacy

The last few months have brought even more opportunities for NIST to engage with our international partners to enhance cybersecurity. Here are some updates on our recent international engagement: Conversations have…

↗ Open article
Research NIST Cybersecurity Insights

Check Your Wallet? How Mobile Driver’s Licenses are Changing Online Transactions

Can you recall the last time you opened a bank account? It’s likely you walked into a local bank branch and spoke to a representative who asked for your driver’s license and social security card to verify your identity…

↗ Open article
Research NIST Cybersecurity Insights

Latest NICE Framework Update Offers Improvements for the Cybersecurity Workforce

I joined NIST as the first full-time manager of the NICE Framework in October 2020, just one short month before NICE published the first revision NIST Special Publication 800-181, the NICE Workforce Framework for…

↗ Open article
Research NIST Cybersecurity Insights

Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two

Privacy

The problem The previous post in our series discussed techniques for providing input privacy in PPFL systems where data is horizontally partitioned. This blog will focus on techniques for providing input privacy when…

↗ Open article
Research NIST Cybersecurity Insights

Take A Tour! NIST Cybersecurity Framework 2.0: Small Business Quick Start Guide

The U.S. Small Business Administration is celebrating National Small Business Week from April 28 - May 4, 2024. This week recognizes and celebrates the small business community’s significant contributions to the nation…

↗ Open article
Research MITRE ATT&CK

ATT&CK v15 Brings the Action

ATT&CK v15 Brings the Action: Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights v15 is all about actionability and bringing defenders’ reality into focus — we prioritized what you need to…

↗ Open article
Research NIST Cybersecurity Insights

Giving NIST Digital Identity Guidelines a Boost: Supplement for Incorporating Syncable Authenticators

We all need supplements sometimes. Whether it’s a little extra vitamin C during flu season or some vitamin D during the dark days of Winter. When used correctly, supplements help our body adjust to the changing…

↗ Open article
Research MITRE ATT&CK

ATT&CK 2024 Roadmap

Enhancing usability, expanding scope, optimizing defenses 2023 was dynamic year for ATT&CK. We marked a decade of progress since the framework’s inception and achieved some key milestones to make ATT&CK more accessible…

↗ Open article
Research NIST Cybersecurity Insights

Protecting Model Updates in Privacy-Preserving Federated Learning

Privacy

In our second post we described attacks on models and the concepts of input privacy and output privacy. ln our last post, we described horizontal and vertical partitioning of data in privacy-preserving federated…

↗ Open article
Research MITRE ATT&CK

ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections

ICS/OT

Credit: https://flic.kr/p/dzyK9x CC BY-SA 2.0 ATT&CK has been brewing up something eerie for this Halloween — a release so hauntingly powerful that it will send a chill down the spine of even the most formidable…

↗ Open article
Research MITRE ATT&CK

ATT&CK v13 Enters the Room

ATT&CK v13 Enters the Room: Pseudocode, Swifter Search, and Mobile Data Sources It’s not like a regular Tuesday, it’s a lucky Tuesday — ATT&CK v13 has arrived. As we outlined in our Roadmap , we’re working toward…

↗ Open article
No articles found
Try adjusting your search, category, tags, source selection, or date range.