A new year brings both fresh and long-standing cyber challenges. The following innovative projects that CISOs are undertaking this year might be worth adding to your own 2026 planning list. As 2026 ...
A project spearheaded by a former official at the Cybersecurity Infrastructure Security Agency is attempting to put common “outdated” cybersecurity advice to rest through a “Stop Hacklore” initiative ...
An event aimed at strengthening cybersecurity in Cyprus and translating European research into real-world operations will take place on January 23, 2026, as part of the CY-TRUST project. The event, ...
The National Institute of Standards and Technology has published a draft practice guide for a data classification project to help organizations prepare and organize unstructured data for effectively ...
North Korea-linked Lazarus campaign spreads malicious npm and PyPI packages via fake crypto job offers, deploying RATs and ...
Threat actors are exploiting the Metro4Shell React Native vulnerability to deploy malware on Linux and Windows systems.
Attackers can abuse VS Code configuration files for RCE when a GitHub Codespaces user opens a repository or pull request.
The interim head of the country’s cyber defense agency uploaded sensitive contracting documents into a public version of ChatGPT last summer, triggering multiple automated security warnings that are ...
First malicious Outlook add-in abused an abandoned domain to host a fake Microsoft login page, stealing 4,000+ credentials in ...
In this can't miss virtual event, IT pros will get a forward-looking view of how attackers are evolving, the tactics they’re using, the vulnerabilities they will exploit -- and how your organization ...
It could cause you a lot of problems.
The audio version of this article is generated by AI-based technology. Mispronunciations can occur. We are working with our partners to continually review and improve the results. The Canadian Centre ...