General cybersecurity industry news, market trends, and analysis
Mitiga researchers say attackers can silently redirect Claude Code MCP traffic, intercept OAuth tokens, and maintain persistent access to connected SaaS platforms.
The fresh browser update resolves critical-severity integer overflow and use-after-free vulnerabilities.
AI-driven phishing enables initial device compromise in 2026, causing rapid breach escalation within minutes, increasing enterprise risk.
Cisco’s AI security researchers have analyzed ways to target vision-language models (VLMs) using pixel-level perturbation.
CVE-2026-0300 exploited after April 9 attempts enables PAN-OS RCE, leading to stealth espionage and lateral movement by April 29.
The software developer has identified the impacted systems, removed potentially compromised files, and validated installation packages.
The most sophisticated AI-integrated campaign to date hit a brick wall in the form of a SCADA login screen.
“TrustFall” attack shows how AI coding agents can be manipulated into launching stealthy supply chain compromises.
Researchers find malicious repositories can trigger code execution in Claude Code with minimal or no user interaction.
From service accounts to AI-driven processes, identity is evolving faster than most security programs can adapt. Discover strategies for reducing risk and regaining control.
ThreatsDay Bulletin: fake apps, supply chain attacks, AI-fueled exploits, ransomware chaos, and the biggest cyber threats this week.
Successful exploitation of the flaws could lead to code execution, server-side request forgery attacks, and denial-of-service conditions.