News
Palo Alto Networks has announced the retirement of its founder, Chief Technology Officer, and board member Nir Zuk. Zuk founded the company in 2005. The company's Chief Product Officer Lee Klarich has ...
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to ...
In this week's episode: OpenAI's GPT-5 launch that definitely didn't go according to plan, complete with backlash, safety concerns, and frantic updates; Anthropic's fascinating new research on ...
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T ...
In this Caveat Policy Deep Dive, our conversation and analysis revolves around cyber operations policy. Throughout this conversation, we break down the global shift where governments are taking a more ...
Ransomware has evolved from one-off attacks to a fully operational criminal economy. Today, cybercrime groups operate with defined roles, shared infrastructure, and a growing reliance on AI to speed ...
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar ...
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between ...
Join Michael Sikorski and Michael Daniel on Threat Vector for a deep dive into cybersecurity collaboration. They discuss how competing companies and governments can work together. Learn about the ...
In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between ...
Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million ...
“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results