More

    Cyber News

    Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

    Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025...

    How Granite complied with new federal cyber regs before a critical deadline

    This audio is auto-generated. Please let us know if you have feedback. Malcolm Jack wants you to understand that when it comes to cybersecurity, people...

    Dragos reports Electrum group targets Polish electric system in ‘first major’ distributed energy resources cyberattack

    Industrial cybersecurity firm Dragos disclosed in a research report published Tuesday that a coordinated cyberattack late December on roughly 30 distributed energy sites across...

    Secret US cyber operations shielded 2024 election from foreign trolls, but now the Trump admin has gutted protections

    Weeks before the 2024 election, American military hackers carried out a secret...

    Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

    Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild. The vulnerability, assigned...

    Korea warns last year’s hacking fallout could fuel new cyber threats

    Jan. 27 (Asia Today) -- South Korea's Ministry of Science and ICT warned Tuesday that the impact of last year's large-scale hacking incidents is...

    Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

    Flaw in the popular vm2 sandbox package allows attackers to escape isolation and execute arbitrary code on compromised systems. 

    State-led AI policy, cyber grant funding, FirstNet in NASCIO’s 2026 federal advocacy priorities

    The National Association of State Chief Information Officers, the group that represents states’ top technology officials, on Tuesday revealed a new set of policies...

    Zeron Open-Sources HSES and CRML to Advance Foundational Cyber Risk Intelligence

    NEW YORK, Jan. 27, 2026 /PRNewswire/ -- Most cybersecurity failures do not originate from defective controls or absent tooling. They emerge from socio-technical systems that fail...

    Latest articles