Post-Quantum Cryptography Webinar for Security Leaders
The Hacker NewsMar 05, 2026Encryption / Data Protection Most organizations assume encrypted…
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Ravie LakshmananMar 05, 2026Vulnerability / Enterprise Security Cisco has disclosed that two…
Where Multi-Factor Authentication Stops and Credential Abuse Starts
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are…
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Google said it identified a "new and powerful" exploit kit dubbed Coruna…
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following…
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
Ravie LakshmananMar 04, 2026Malware / Windows Security Cybersecurity researchers have disclosed details…
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Threat hunters have called attention to a new campaign as part of…
The 3 Steps CISOs Must Follow
Every CISO knows the uncomfortable truth about their Security Operations Center: the…
Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
Ravie LakshmananMar 02, 2026Cryptography / Browser Security Google has announced a new…


