Millions of Gmail, Facebook and other account credentials exposedLaura FrenchJanuary 23, 2026The dataset included email accounts, social media accounts, financial accounts and more.
San Francisco’s ‘Waymo Freeze’ last month uncovered the next identity challengeDavid SequinoJanuary 22, 2026
From change prevention to continuous improvement: Automating patch cycles with guardrails, rings, and proofBill BrennerJanuary 6, 2026
Bouncing back better: Submit your nominations for the Resilient CISO AwardPaul WagenseilJanuary 5, 2026
A serial entrepreneur’s journey from marketing to cybersecurity: Founder StoriesPaul WagenseilDecember 24, 2025
IdentityOkta warns of multiple vishing attacks that can defeat MFASteve ZurierJanuary 23, 2026Experts say we’ve seen similar attacks in recent Salesforce vishing campaigns tied to ShinyHunters.
Security OperationsHundreds of vulnerable test environments exposed, targeted by crypto minersLaura FrenchJanuary 22, 2026Misconfigurations turn apps meant for security training into cloud attack vectors.
Security OperationsPatched FortiGate bug targeted in new wave of automated attacksSteve ZurierJanuary 22, 2026Fortinet plans to update a FortiGate patch it first issued last month in the coming days.
Security Operations2026 security predictions: AI-driven attacks, extortion, trust collapseStephen WeigandJanuary 22, 2026Experts warn AI-driven breaches, vibe hacking and ransom payment debates will reshape 2026.
Application securityChinese firms directed to not buy US, Israeli cybersecurity softwareSteve ZurierJanuary 21, 2026Experts say the move is performative, as Beijing does not permit that many U.S. and Israeli cyber products to enter China.
IdentityLastPass warns of vault backup phishing emailsLaura FrenchJanuary 21, 2026The emails claim LastPass will be going into maintenance, requiring action within 24 hours.
Security OperationsMalicious ad blocker extension uses ‘CrashFix’ to spread new Python RATLaura FrenchJanuary 21, 2026The ClickFix variant crashes the user’s browser and instructs them to copy and paste commands to fix the issue.
IdentityPhishing campaign exploits LinkedIn messages via DLL sideloadingSteve ZurierJanuary 20, 2026Attackers exploit the trusted professional social media platform to deploy a remote access trojan.