$ BREAKING

Chinese Nexus Actors Pivot to Qatar Targeting Amid Middle East Tensions

Chinese state-sponsored hackers pivot to target Qatar amid Middle East tensions, demonstrating rapid operational agility in response to geopolitical events.

nation state5 min read · Mar 19, 2026Read More →
brief

'BlackSanta' EDR Killer Hijacks HR Workflows to Evade Detection

Russian cybercriminals deploy 'BlackSanta' malware through HR workflows, bypassing EDR security to steal data undetected in sophisticated new campaign.

2 min readMar 19
analysis

White House Cyber Strategy Pivots to Offensive Operations: A New Era of Digital Deterrence

Trump administration's 2018 National Cyber Strategy marked a historic shift toward offensive cyber operations, emphasizing preemption and deterrence over defense.

4 min readMar 19
brief

Security Teams Grapple with Agentic AI Auto-Remediation Readiness

Security teams face readiness challenges as agentic AI promises autonomous threat remediation, raising questions about trust, governance, and infrastructure preparedness.

2 min readMar 19
analysis

North Korean APTs Weaponize AI to Supercharge IT Worker Infiltration Scams

North Korean APTs are using AI tools like deepfakes and automated communications to enhance IT worker infiltration scams, making them harder to detect.

4 min readMar 19
analysis

Iran's Cyber-Kinetic War Doctrine Takes Shape: Hacking Cameras to Plan Missile Strikes

Iran integrates cyber operations with kinetic warfare by hacking IP cameras for missile strike reconnaissance, blurring traditional warfare boundaries.

6 min readMar 19
analysis

Tycoon 2FA Phishing Empire Crumbles: Europol Takes Down MFA-Bypassing Criminal Platform

International law enforcement dismantles Tycoon 2FA, a sophisticated phishing platform that helped cybercriminals bypass multi-factor authentication protections.

5 min readMar 19

Cisco Patches 48 Firewall Vulnerabilities Including Two Critical 10/10 CVSS Flaws

Cisco patches 48 firewall vulnerabilities including two critical 10.0 CVSS flaws affecting edge security appliances, urging immediate updates.

2 min readMar 19
brief

Fig Security Emerges From Stealth With End-to-End Security Operations Monitoring Platform

Fig Security launches from stealth with platform that monitors security data flows across SIEMs and response systems to prevent critical infrastructure breaks.

2 min readMar 19
brief

Secure-by-Design Principles Extend Beyond Code to Combat Enterprise Risk

Organizations adapt secure-by-design software practices to tackle non-technical risks like governance failures and human error across business operations.

2 min readMar 19