Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Phishers Exploit Office 365 Users Who Let Their Guard Down

Microsoft said that Office 365 tenants with weak configurations and who don't have strict anti-spoofing protection enabled are especially vulnerable.

DARKReading
#microsoft
DDoSia Powers Affiliate-Driven Hacktivist Attacks

Pro-Russian group NoName057(16) uses a custom denial-of-service tool to mobilize volunteers and disrupt government, media, and institutional sites tied to Ukraine and the West.

Cyberattacks Likely Part of Military Operation in Venezuela

Cyber's role in the US raid on Venezuela remains a question, though President Trump alluded to "certain expertise" in shutting down the power grid in Caracas.

Lack of MFA Is Common Thread in Vast Cloud Credential Heist

An emerging threat actor that goes by "Zestix" used an assortment of infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises.

Scattered Lapsus$ Hunters Snared in Cyber Researcher Honeypot

Scattered Lapsus$ Hunters, also known as ShinyHunters, were drawn in using a realistic, yet mostly fake, dataset.

ClickFix Campaign Serves Up Fake Blue Screen of Death

Threat actors are using the social engineering technique and a legitimate Microsoft tool to deploy the DCRat remote access Trojan against targets in the hospitality sector.

Startup Trends Shaking Up Browsers, SOC Automation, AppSec

These startups reimagined browser security, pioneered application security for AI-generated code, and are building consensus on agentic vs. human costs.

Advisor360 Gets a Handle on Shadow AI via Automation

With employees looking for the benefits of artificial intelligence, a fintech company stepped up controls with automation.

CISOs Face a Tighter Insurance Market in 2026

Insured entities are becoming more sophisticated in their views on how cyber policies fit into their broader risk management plans.

Critical 'MongoBleed' Bug Under Active Attack, Patch Now

A memory leak security vulnerability allows unauthenticated attackers to extract passwords and tokens from MongoDB servers.