News
New malware turns Linux systems into P2 P attack networks
2+ hour, 47+ min ago (574+ words) Attackers have found a new way to turn Linux systems into stealthy supply chain distribution hubs that are resistant to takedowns. Researchers from Trend Micro have disclosed a new malware framework, dubbed Quasar Linux or QLNX, describing it as a…...
Poisoned truth: The quiet security threat inside enterprise AI
5+ hour, 28+ min ago (1473+ words) As enterprises rush to deploy internal LLMs, AI copilots, and autonomous agents, most security conversations focus on familiar threats: prompt injection, jailbreaks, model abuse, and data exfiltration. But some security leaders argue a quieter risk deserves far more attention: what…...
Train like you fight: Why cyber operations teams need no-notice drills
5+ hour, 25+ min ago (370+ words) The fix is not more planning. It is more surprise. And the reason why is not just operational. It is neurological. Detection is the catalyst, not the problem. What determines whether a response goes well is the state of the…...
Supply-chain attacks take aim at your AI coding agents
23+ hour, 1+ min ago (763+ words) Attackers too are looking to cash in on the AI coding craze, adapting their supply-chain techniques to target coding agents themselves. North Korean threat actors commonly use social engineering to trick developers into installing malware, whether through fake job interviews…...
CISA pushes critical infrastructure operators to prepare to work in isolation
1+ week, 1+ day ago (813+ words) The US Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new national initiative aimed at helping critical infrastructure operators withstand and recover from major cyberattacks by preparing to operate in isolation from the internet and third-party dependencies. "CI Fortify…...
Oracle will patch more often to counter AI cybersecurity threat
1+ day, 1+ hour ago (305+ words) Oracle plans to issue security patches for its ERP, database, and other software on a monthly cycle, rather than quarterly, to respond to the increased pace of AI-enabled software vulnerability discovery. Other software vendors, notably Microsoft, SAP, and Adobe, already…...
AI finds 20-year-old bugs in Postgre SQL and Maria DB
1+ day, 2+ hour ago (417+ words) Open-source databases are facing a bit of a memory problem as AI helps surface decades-old buffer overflow issues in widely used components. Security researchers have disclosed a set of high and critical-severity vulnerabilities affecting Postgre SQL and Maria DB, with…...
Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs
1+ day, 14+ hour ago (735+ words) A newly identified malware campaign is abusing Microsoft's Phone Link feature to intercept SMS-based one-time passwords and other sensitive mobile data directly from Windows systems. The activity, first observed by Cisco Talos in January 2026, involves a remote access trojan dubbed…...
CISOs step up to the security workforce challenge
1+ day, 5+ hour ago (1030+ words) A robust cybersecurity program needs a range of skilled people, yet many CISOs continue to face an ongoing skills shortage " and the squeeze may only get worse as AI gains traction. Some 95% of cybersecurity practitioners and decision-makers'noted at least one…...
Why most zero-trust architectures fail at the traffic layer
2+ day, 5+ hour ago (491+ words) Zero trust has become one of the most widely adopted security models in enterprise environments. Organizations invest heavily in identity systems, access policies and modern security tooling. On paper, these environments look well-protected. Yet during incidents, a different reality often…...