Latest from todayNews AnalysisZero-day exploits hit enterprises faster and harderChinese state hackers and spyware vendors are fueling a rise in zero-day attacks, which increasingly target enterprise software and devices — security and networking products in particular.By Lucian ConstantinMar 6, 20267 minsAdvanced Persistent ThreatsCyberattacksZero-Day Vulnerabilities News Analysis State-affiliated hackers set up for critical OT attacks that operators may not detectBy Lucian ConstantinMar 5, 20269 minsCritical InfrastructureCyberattacksGovernment ITFeature How to know you’re a real-deal CSO — and whether that job opening truly seeks oneBy David WeldonMar 4, 202610 minsCSO and CISOCareersIT Leadership NewsTeenage hacker myth primed for a middle-age criminal makeoverBy John Leyden Mar 6, 20265 minsCybercrimeSecurity FeatureChallenges and projects for the CISO in 2026By María Ramos Domínguez Mar 6, 20267 minsArtificial IntelligenceSecurityVulnerabilities Feature14 old software bugs that took way too long to squashBy Josh Fruhlinger and John Leyden Mar 5, 202617 minsApplication SecurityVulnerabilities NewsIranian cyberattacks fail to materialize but threat remains acuteBy John E. Dunn Mar 4, 20266 minsCyberattacksCybercrimeDDoS OpinionAnthropic AI ultimatums and IP theft: The unspoken riskBy Christopher Burgess Mar 4, 20267 minsArtificial IntelligenceRisk ManagementTechnology Industry NewsAI-powered attack kits go open source, and CyberStrikeAI may be just the beginningBy Taryn Plumb Mar 3, 20265 minsCyberattacksCybercrimeOpen Source More security newsnewsTrump’s cyber strategy emphasizes offensive operations, deregulation, AIThe White House unveiled a cybersecurity strategy built around six pillars, prioritizing offensive operations, AI adoption, and deregulation, while leaving critics to question whether cutting red tape and hardening infrastructure can coexist.By Cynthia Brumfield Mar 6, 2026 6 minsGovernmentGovernment ITSecuritynewsClickFix attackers using new tactic to evade detection, says MicrosoftUnwitting victims are now being tricked into installing malware via Windows Terminal, but some experts say this is old news. Regardless, they agree that infosec leaders need to educate employees about the tactic.By Howard Solomon Mar 6, 2026 5 minsMalwarePhishingSocial EngineeringnewsOnly 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling shortResearch shows that both CISOs and boards need to change their approach.By Taryn Plumb Mar 6, 2026 6 minsBusinessCSO and CISOEnterprisenewsFBI wiretap system tapped by hackersA system used to manage wiretaps is reportedly being investigated following suspicious activities.By Maxwell Cooter Mar 6, 2026 2 minsCommunications SecurityGovernmentGovernment ITnewsOAuth vulnerability in n8n automation platform could lead to system compromiseThe configuration weakness shows the risk of centralizing credentials, says Imperva.By John E. Dunn Mar 6, 2026 3 minsArtificial IntelligenceSecurityVulnerabilitiesnewsTargeted advertising is also targeting malwareCybersecurity should be as much about monitoring ad calls as securing fire-walls, according to a cybersecurity firm.By Maxwell Cooter Mar 6, 2026 2 minsCybercrimeMalwareMarketing and Advertising IndustrynewsLeakBase marketplace unplugged by cops in 14 countriesThe action coordinated by Europol seized two of the group's domains and captured the forum's data, as well as making arrests.By Howard Solomon Mar 5, 2026 5 minsCybercrimeSecuritynewsCisco issues emergency patches for critical firewall vulnerabilities Flaws in the web management interface give unauthenticated attackers remote root access. By John E. Dunn Mar 5, 2026 4 minsNetwork SecuritySecurityVulnerabilitiesnewsCoruna iOS exploit kit moved from spy tool to mass criminal campaign in under a yearGoogle and iVerify researchers say the case points to a thriving secondary market for high-end zero-day exploits.By Gyana Swain Mar 5, 2026 5 minsEndpoint ProtectionMobile SecurityiOS SecuritynewsMicrosoft leads takedown of Tycoon2FA phishing service infrastructureThe SaaS operation was used to push millions of malicious emails a month.By Howard Solomon Mar 4, 2026 6 minsCybercrimePhishingSocial EngineeringnewsOAuth phishers make ‘check where the link points’ advice ineffectiveMicrosoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware downloads.By Gyana Swain Mar 3, 2026 5 minsAccess ControlAuthenticationPhishingopinionEpic Fury introduces new layer of enterprise risk The US war on Iran and Iran’s retaliatory toolkit mean enterprise security and risk leaders now own additional operational risk — and must match their plans and policies to the reality on the ground.By Christopher Burgess Mar 3, 2026 6 minsRisk ManagementSecurity Show more Show less Video on demand video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA What if you could stop cyberattacks before they happen? In this episode of Cyber Sessions, host Joan Goodchild sits down with Erin Whitmore, former CIA case officer and current Head of the CYNTURION Group for CYPFER, to discuss how her team uses intelligence and AI to anticipate and prevent attacks before adversaries strike. Whitmore reveals how proactive cybersecurity is blending human intuition, artificial intelligence, and offensive tactics to predict threats — while balancing the line between privacy and protection. By Joan Goodchild Feb 4, 2026 28 minsCyberattacksCybercrime Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan Goodchild Jan 13, 2026 23 mins CybercrimeSmall and Medium Business Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan Goodchild Dec 15, 2025 26 mins Application SecurityCSO and CISO CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan Goodchild Dec 10, 2025 27 mins CSO and CISOSecurity Infrastructure See all videos Explore a topicGenerative AIApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityView all topics The new era of IT innovation Articles Buyer’s Guide Emerging technologies from AI and quantum computing to extended reality, edge computing, digital twins, and more are at the forefront of innovation, poised to reshape how companies operate, compete, and deliver value in a rapidly evolving digital landscape. CIOs and their teams find it difficult to keep pace with emerging tech and to understand the provider landscape. This focus enables sponsors to share their strategies and offerings in new areas of keen interest to buyers. View all Popular topicsGenerative AI opinionHow to make LLMs a defensive advantage without creating a new attack surfaceBy Ankit Gupta Feb 27, 2026 9 minsGenerative AISecurity InfrastructureSecurity Operations Center newsSix flaws found hiding in OpenClaw’s plumbingBy Shweta Sharma Feb 19, 2026 3 minsArtificial IntelligenceGenerative AISecurity newsHackers can turn Grok, Copilot into covert command-and-control channels, researchers warnBy Prasanth Aby Thomas Feb 19, 2026 4 minsArtificial IntelligenceGenerative AISecurity View topic Cybercrime newsUS authorities punish sellers of malware and spywareBy Maxwell Cooter Feb 27, 2026 2 minsCybercrimeLegalVulnerabilities news analysisRansomware groups switch to stealthy attacks and long-term accessBy John Leyden Feb 27, 2026 5 minsCybercrimeMalwareRansomware newsChina-linked hackers used Google Sheets to spy on telecoms and governments across 42 countriesBy Gyana Swain Feb 26, 2026 5 minsCybercrimeHacker GroupsHacking View topic Careers newsOne of the ‘most influential cybersecurity’ roles will pay under $175,000By Maxwell Cooter Feb 27, 2026 2 minsCSO and CISOGovernmentGovernment IT featureThe CSO guide to top security conferencesBy CSO Staff Feb 27, 2026 3 minsC-SuiteCSO and CISOEvents featureIt’s time to rethink CISO reporting linesBy Evan Schuman Feb 24, 2026 6 minsC-SuiteCSO and CISOCareers View topic IT Leadership opinionInnovation without exposure: A CISO’s secure-by-design framework for business outcomesBy Luke Collinson Mar 2, 2026 12 minsIT LeadershipInnovationSecurity Practices opinionA scorecard for cyber and risk cultureBy Maman Ibrahim and Gavriel Schneider Mar 2, 2026 15 minsIT LeadershipRisk ManagementSecurity Practices opinionThe farmers and the mercenaries: Rethinking the ‘human layer’ in securityBy Alan LeFort Feb 26, 2026 6 minsIT LeadershipSecurity InfrastructureSecurity Operations Center View topic In depth FeatureWho owns your data? SaaS contract security, privacy red flagsCompanies looking to use SaaS solutions should involve the security team in the procurement process and pay attention to contract language.By Andrada FiscuteanMar 27, 202410 mins Data and Information Security Read the Article Podcasts podcastsCyber Sessions with Joan GoodchildCybersecurity is constantly evolving, and so are the leaders who shape it. Hosted by veteran journalist Joan Goodchild, Cyber Sessions brings candid conversations with top CISOs, strategists, and industry influencers. Each episode cuts through the noise to explore the trends, challenges, and leadership insights that define the future of security.6 episodesSecuritySecurity Practices Ep. 06 How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan Goodchild Jun 28, 202328 mins CyberattacksCybercrime Ep. 06 Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan Goodchild Jun 28, 202323 mins CybercrimeSmall and Medium Business Show me moreLatestArticlesPodcastsVideos feature 7 factors impacting the cyber skills gap By John EdwardsMar 3, 20267 mins HiringIT ManagementIT Skills and Training news Vulnerability monitoring service secures public-sector websites faster By Gyana SwainMar 2, 20265 mins GovernmentGovernment ITThreat and Vulnerability Management feature How CISOs can build a resilient workforce By Rosalyn PageMar 2, 202610 mins BurnoutEmployee ExperienceIT Management podcast CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CyberattacksCybercrimeRansomware podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CSO and CISOElectronic Health RecordsRansomware video CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity By Estelle QuekJan 11, 202628 mins CyberattacksCybercrimeHuman Resources video CSO Executive Sessions Australia with Daisy Wong, Head of Security Awareness at Medibank Dec 14, 202538 mins CSO and CISO