News

Palo Alto Networks has announced the retirement of its founder, Chief Technology Officer, and board member Nir Zuk. Zuk founded the company in 2005. The company's Chief Product Officer Lee Klarich has ...
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to ...
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center ...
In this week's episode: OpenAI's GPT-5 launch that definitely didn't go according to plan, complete with backlash, safety concerns, and frantic updates; Anthropic's fascinating new research on ...
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T ...
In this Caveat Policy Deep Dive, our conversation and analysis revolves around cyber operations policy. Throughout this conversation, we break down the global shift where governments are taking a more ...
Ransomware has evolved from one-off attacks to a fully operational criminal economy. Today, cybercrime groups operate with defined roles, shared infrastructure, and a growing reliance on AI to speed ...
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar ...
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between ...
Jeetu Patel,⁠ President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape.
In this episode of Threat Vector, host ⁠David Moulton⁠ sits down with ⁠Tyler Shields⁠, Principal Analyst at ⁠ESG⁠, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between ...
“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows.