Tag: threat
-
Ransomware’s New Era: Moving at AI Speed
Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/ransomware-new-era-moving-ai-speed
-
Dataminr Launches Cyber Defense Suite That Fuses External Threat Signals With Internal Telemetry
Dataminr used RSAC 2026 to roll out Dataminr for Cyber Defense, a new product suite the company says is designed to move security teams from alert-driven response to preemptive, risk-prioritized action. The suite aims to combine Dataminr’s real-time event and threat detection with an organization’s internal telemetry so teams can quickly determine what matters to..…
-
Tuskira Unveils Federated Detection Engine at RSAC 2026
Tuskira announced its Federated Detection Engine at RSA Conference 2026, adding a new capability to its Agentic SecOps platform that lets security teams detect threats in real time directly across cloud, identity, endpoint, network, SaaS, infrastructure, and legacy SIEM environments without centralizing logs first. The traditional model of detection engineering depends on pulling data into..…
-
Zero Trust Anchors AI Security Strategy
Zscaler’s Jay Chaudhry on Infrastructure, Agents and Oversight. Zscaler CEO Jay Chaudhry explains why distributed infrastructure and zero trust models will shape AI security, the agent risks mirroring human threats and why strong oversight and identity validation remain essential for mission-critical applications. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/zero-trust-anchors-ai-security-strategy-a-31119
-
Trivy Supply Chain Attack Targets CI/CD Secrets
A threat actor used the open source security tool to deploy an infostealer into CI/CD workflows and steal cloud credentials, SSH keys, tokens, and other sensitive secrets. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/trivy-supply-chain-attack-targets-ci-cd-secrets
-
IRONSCALES Launches Email Attack of the Day, a Daily Threat Intelligence Series for Security Teams
IRONSCALES is bringing a new threat intelligence series to the security community, launching >>Email Attack of the Day<< at RSA Conference 2026 this week. The series publishes daily breakdowns of real phishing attacks detected by IRONSCALES' Adaptive AI and its community of more than 30,000 security professionals. Each entry covers a single noteworthy attack: what..…
-
North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that’s distributed via malicious Microsoft Visual Studio Code (VS Code) projects.The use of VS Code “tasks.json” to distribute malware is a relatively new tactic adopted by the threat actor since December…
-
Protos Labs Opens Up Protos AI for Free, Targeting CTI Teams at RSAC 2026
Protos Labs used RSA Conference 2026 to launch a freemium edition of Protos AI, opening up the Singapore-based company’s agentic cyber threat intelligence platform to security teams that want to test the technology before committing to an enterprise contract. The free tier is available immediately and does not require data migration or infrastructure changes, the..…
-
SOCRadar Launches AI Agent Marketplace and Identity Intelligence at RSAC 2026
SOCRadar launched its AI Agent Marketplace at RSA Conference 2026, introducing a modular hub where organizations can browse, purchase, and deploy specialized autonomous AI agents within the SOCRadar Extended Threat Intelligence Platform. The release also adds Identity and Access Intelligence capabilities designed to address what the company describes as identity >>blind spots<< across third-party SaaS..…
-
Webinar Recap: Cyber Risk in Wartime Threat Intelligence, Risk Modeling, and Insurance Strategy
Cyber Risk in Wartime: What Leaders Need to Know Now As geopolitical tensions rise, cyber risk is no longer a theoretical concern; it’s a board-level issue demanding immediate attention. In Read More First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/webinar-recap-cyber-risk-in-wartime-threat-intelligence-risk-modeling-and-insurance-strategy/
-
Routers Replace PCs as Primary Threat Vector in Evolving Device Risk Landscape
Forescout has identified a sharp shift in enterprise cyber risk, with network infrastructure now surpassing traditional endpoints as the most vulnerable part of organisational environments. In its latest Riskiest Connected Devices in 2026 report, based on analysis of millions of assets in its Device Cloud, the company highlighted how the threat landscape from a device…
-
SecurityScorecard Debuts TITAN AI to Automate Third-Party Risk Management Workflows
RSAC 2026: SecurityScorecard is using RSA Conference week to roll out TITAN AI, a set of capabilities aimed at taking manual work out of third-party risk management (TPRM) and tying vendor oversight more directly to threat intelligence. The company says TITAN AI sits on top of its existing Ratings and TPRM platform and is designed..…
-
DOJ Disrupts Botnets, But DDoS Threats Remain, Security Pros Warn
The DOJ put a dent into the rising number of DDoS attacks this month when it dismantled the infrastructure used by four prominent IoT botnets, but security pros are warning that while the takedown was significant, it’s likely a temporary reprieve from the threat. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/doj-disrupts-botnets-but-ddos-threats-remain-security-pros-warn/
-
The devices winning the race to get hacked in 2026
Enterprise networks keep adding connected devices, expanding the attack surface as threat actors target a wider range of systems, many of which are difficult to inventory, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/23/connected-devices-security-risk-2026-research/
-
Quantum threats are already active and the defense response remains fragmented
Enterprises are moving toward post-quantum security at uneven speeds, and the gap between organizations that have built crypto-agility into their infrastructure and those that … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/23/ciso-post-quantum-crypto-agility/
-
SentinelOne Announces AI Agent Security, Red Teaming, and Auto Investigation GA at RSAC 2026
SentinelOne used RSAC 2026 to push deeper into AI-native security, announcing four new offerings that extend its platform from threat detection into the governance and testing of AI systems themselves. The first is Prompt AI Agent Security, a real-time discovery and governance control plane built for AI agents and agentic workflows. It monitors and enforces..…
-
The hidden cost of AI speed: Unmanaged cyber risk
Tags: access, ai, attack, business, chatgpt, ciso, cloud, control, cyber, cybersecurity, data, data-breach, exploit, flaw, google, governance, identity, infrastructure, injection, intelligence, monitoring, open-source, openai, privacy, radius, risk, service, software, threat, tool, vulnerabilityAI isn’t just moving fast. It’s creating new attack paths. Cyber teams must now manage vulnerabilities and their ramifications throughout their IT environments in AI tools deployed without enough governance guardrails. The answer for securing this new attack surface? Unified exposure management. Key takeaways AI as an attack vector: By connecting to core workflows and…
-
Beers with Talos breaks down the 2025 Talos Year in Review
The Beers with Talos team unpack the biggest cybersecurity threats of 2025, from React2Shell to ransomware and identity abuse, and what it all means for defenders going forward. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/beers-with-talos-breaks-down-the-2025-talos-year-in-review/
-
6 Best Unified Threat Management (UTM) Devices Software
Compare the 6 best UTM devices and software for 2026. Explore top solutions with IPS, sandboxing, and advanced threat protection. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/products/unified-threat-management-vendors/
-
Hackers Exploit Quest KACE SMA Flaw to Harvest Credentials
Tags: authentication, corporate, credentials, cve, cyber, exploit, flaw, hacker, network, threat, vulnerabilitySecurity Researchers have detected active exploitation targeting unpatched Quest KACE Systems Management Appliance (SMA) instances. Starting the week of March 9, 2026, threat actors began leveraging a critical authentication bypass vulnerability, identified as CVE-2025-32975, to infiltrate corporate networks, harvest sensitive credentials, and pivot toward critical infrastructure. Quest KACE SMA Flaw Quest KACE SMA is a…
-
Behavioral XDR and threat intel nab North Korean fake IT worker within 10 days of hire
Key signs of NK-linked insider infiltration: SpiderLabs has found that these threat actors commonly operate from China rather than North Korea because the internet is more stable and they can employ VPN services to conceal their true geographic origin.Astrill VPN has the ability to bypass China’s Great Firewall and allows threat actors to tunnel traffic…
-
Iran-linked actors use Telegram as C2 in malware attacks on dissidents
Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft. The FBI warns that Iran’s Ministry of Intelligence and Security (MOIS) runs cyber campaigns using Telegram as a command-and-control infrastructure to deliver malware. Threat actors target Iranian dissidents, journalists, and opposition groups worldwide. Once deployed, the malware…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…
-
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike typical mobile malware, Oblivion RAT comes with a web-based APK builder, a dropper generator, and…

