Hi, what are you looking for?
A summary of the announcements made by vendors in the days leading up to the RSAC 2026 Conference.
The latest M-Trends report is based on insights from over 500,000 hours of Mandiant incident response investigations in 2025.
The semiconductor company says hackers deployed file-encrypting ransomware on the network of a subsidiary in Singapore.
Hackers published a malicious scanner release and replaced tags to point to information-stealer malware.
The flaws could allow attackers to access sensitive information, execute code, or cause unexpected behavior.
Attack volumes are back to pre-disruption levels, and the adversary tactics have remained unchanged.
CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild.
The vulnerability is tracked as CVE-2025-32975 and it may have been exploited in attacks against the education sector.
Other noteworthy stories that might have slipped under the radar: vulnerabilities found in KVM devices, Claudy Day Claude vulnerabilities, The Gentlemen ransomware group.
The men violated U.S. export controls laws by scheming to divert massive quantities of the high-performance servers assembled in the United States to China.
The company will use the investment to expand its platform’s capabilities and grow channel partnerships.
The US has seized several domains used by Handala in cyber-enabled psychological operations.
Cape offers a privacy-focused mobile virtual network operator (MVNO) service for consumers, enterprises, and governments.
Between late December 2025 and mid-January 2026, hackers stole personal and health plan information from Navia’s environment.
The attacks started on February 27 and have targeted e-commerce platforms, global brands, and government services.
The company will invest in expanding its digital brand protection platform and in scaling its go-to-market efforts.