ShinyHunters targets Salesforce instances through social engineering and misconfiguration exploitation, not platform vulnerabilities, prompting Salesforce warnings about overly permissive guest user settings.
ShinyHunters targets Salesforce instances through social engineering and misconfiguration exploitation, not platform vulnerabilities, prompting Salesforce warnings about overly permissive guest user settings.
AI accelerates vulnerability detection, but effective risk management requires governance frameworks, clear accountability, and policy-based enforcement mechanisms beyond detection alone.
The hacker mindsetβanalytical curiosity combined with systemic thinkingβcan defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
Teams must reduce unnecessary internet-facing exposure to minimize vulnerability exploitation risk, as time-to-exploit windows are shrinking to hours or minutes.
AI agents automate tasks but create security vulnerabilities by accessing sensitive information without adequate oversight, enabling hackers to exploit them without breaking passwords.
APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
CISA added three critical vulnerabilities to its Known Exploited Vulnerabilities catalog, requiring federal agencies to patch them within one to two weeks due to active exploitation threats.
CISA's new SBOM Minimum Elements establish baseline standards for software supply chain security, while EU regulations legally mandate SBOMs, creating a global baseline that organizations must meet to remain competitive.
Polish police arrested seven juveniles aged 12-16 for operating a DDoS kit sales scheme targeting major websites for profit.
SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
Escape raised $18 million Series A funding after research revealed over 2,000 high-impact vulnerabilities in AI-powered no-code development platforms, addressing critical security gaps in rapidly deployed applications.
OpenAI acquires Promptfoo to enhance AI security testing and integrate advanced evaluation capabilities into OpenAI Frontier for enterprise AI agent deployment.
Ransom payment rates surged to 24.3% in 2025 from 14.4% in 2024, driven by AI-enhanced ransomware attacks targeting sensitive data with greater precision and personalization.
Threat actors are exploiting misconfigured Salesforce Experience Cloud sites using a modified AuraInspector tool to extract sensitive data from overly permissive guest user profiles.
Object-specific protection is essential as a primary security layer to prevent art theft, as comprehensive facility-wide systems fail when adversaries physically interact with high-value objects without triggering alarms.
CISA added three actively exploited vulnerabilities to its KEV catalog, including critical flaws in SolarWinds Web Help Desk, Omnissa Workspace One UEM, and Ivanti Endpoint Manager, with federal agencies required to patch by mid-to-late March 2026.
A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
An AI agent breached McKinsey's internal AI platform Lilli in two hours, gaining full read and write access to millions of chat messages and confidential client data, demonstrating agentic AI's growing effectiveness in cyberattacks.
Russian hackers are conducting large-scale phishing campaigns targeting Signal and WhatsApp accounts of government and military officials by impersonating support chatbots to steal PINs and access messages.
Data resilience emerges as enterprises adopt AI and autonomous agents, requiring integrated backup, security, and AI governance solutions to enable safe production deployment.
A malicious npm package impersonating OpenClaw deploys a remote access trojan and steals sensitive data including credentials, crypto wallets, SSH keys, and browser data from infected systems.
ShinyHunters claims to have stolen data from approximately 100 high-profile companies including Salesforce, Snowflake, Okta, LastPass, Sony, and AMD through exploiting overly broad guest user permissions on Salesforce Experience Cloud sites.
The Trump administration's cyber strategy prioritizes maintaining US technological superiority in post-quantum cryptography, artificial intelligence, and securing innovation against emerging threats.
OpenAI acquired Promptfoo, an AI security startup, to integrate its LLM vulnerability testing technology into OpenAI Frontier for enterprise AI agent security.
Iranian drone strikes on AWS data centers in the Middle East marked the first deliberate targeting of data centers in conflict, exposing the vulnerability of cloud infrastructure that supports both commercial services and U.S. military operations.
Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
ELECQ, a smart EV charger maker, suffered a ransomware attack on March 7 that encrypted and copied customer personal data including names, email addresses, phone numbers, and home addresses from its AWS cloud systems.
North Korean threat actor UNC4899 compromised a cryptocurrency organization's cloud environment through social engineering and DevOps exploitation to steal millions in cryptocurrency.
Forty-two cybersecurity M&A deals were announced in February 2026, with major acquisitions focused on AI-driven security, attack surface management, and identity verification capabilities.