More

    Cyber News

    The new cyber investment mandate: Why ‘cyber risk quantification’ is key to state government’s pivot to human-centric defense

    State and local government agencies are facing a “stark new reality” as traditional federal support for cybersecurity infrastructure and information sharing undergoes dramatic federal...

    Cybersecurity Camp Launched for Middle School Students

    Cybercrime is accelerating at an alarming rate, with the FBI reporting that losses in the United States reached $12.5 billion in 2023. As phishing scams, malware and data breaches increasingly affect younger users,...

    Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

    Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that...

    Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

    The "coordinated" cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew...

    Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

    A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could allow attackers to run arbitrary...

    Ex-Palantir engineer raises $40 million for cyber startup Outtake, with backing from Microsoft CEO Nadella

    Alex Dhillon, CEO and founder of Outtake Courtesy: Abiola Familusi Alex Dhillon spent almost five years at Palantir before leaving to build cybersecurity startup Outtake. Now...

    Why We Can’t Let AI Take the Wheel of Cyber Defense

    The fastest way to squander the promise of AI is to mistake automation for assurance, and novelty for resilience. 

    Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

    Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code...

    From Triage to Threat Hunts: How AI Accelerates SecOps

    If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on...

    Latest articles