News
Top 10 Web Hacking Techniques of 2025 and a Hint for 2026 " James Kettle " ASW #380
2+ hour, 57+ min ago (496+ words) James "albinowax" Kettle is the Director of Research at Port Swigger, the makers of Burp Suite. He"s best known for pioneering novel web attack techniques, and publishing them at major conferences like Black Hat USA, at which he"s…...
Why Anthropic was right to form Project Glasswing
3+ day, 21+ hour ago (784+ words) COMMENTARY: Anthropic built a powerful AI model and then kept it on a short leash. The company said more than 99% of the vulnerabilities it found remain unpatched, and that's why it withheld most of the technical detail. The important part…...
UK's NCSC endorses passkeys over traditional passwords
3+ day, 21+ hour ago (169+ words) SC Media UK's NCSC endorses passkeys over traditional passwords The UK's National Cyber Security Centre (NCSC) has officially endorsed passkeys as a superior alternative to traditional passwords. This endorsement signifies a major shift in digital security recommendations, moving away from…...
Critical vulnerability in Word Press Breeze Cache plugin exploited
3+ day, 21+ hour ago (205+ words) SC Media Critical vulnerability in Word Press Breeze Cache plugin exploited Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for Word Press, allowing for unauthenticated arbitrary file uploads. This security issue, tracked as CVE-2026-3844, has been…...
Exabeam enhances Agent Behavior Analytics for Google Cloud agents
4+ day, 23+ hour ago (161+ words) SC Media Exabeam enhances Agent Behavior Analytics for Google Cloud agents Exabeam Inc. has announced new Agent Behavior Analytics (ABA) capabilities designed to secure enterprises adopting agentic workflows, extending its ABA across Google Cloud's agent ecosystem, including Gemini Enterprise, custom…...
Several flaws found in serial-to-IP converters used in critical sectors
6+ day, 13+ hour ago (186+ words) SC Media Several flaws found in serial-to-IP converters used in critical sectors Security Week reports that Forescout Technologies identified 20 new vulnerabilities in Sliex and Lantronix serial-to-IP converters, or serial device servers, that can be exploited without authentication, potentially exposing healthcare,…...
System BC botnet linked to Gentlemen ransomware attacks
6+ day, 21+ hour ago (197+ words) SC Media System BC botnet linked to Gentlemen ransomware attacks A large System BC proxy malware botnet, comprising over 1, 570 hosts believed to be corporate victims, has been uncovered following an investigation into a Gentlemen ransomware attack, according to a recent…...
Aikido Security launches Endpoint to secure AI development and mitigate supply chain attacks
6+ day, 21+ hour ago (175+ words) SC Media Aikido Security launches Endpoint to secure AI development and mitigate supply chain attacks Per Silicon Angle, Aikido Security BV has launched Endpoint, a new security agent designed to protect artificial intelligence use on developer workstations and combat supply…...
The CISO role has always been brutal. Here is what makes some survive it.
6+ day, 23+ hour ago (66+ words) [SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.] The most important factor a CISO needs to consider when crafting their risk menu is understanding exactly who is…...
Grey Noise finds attacker activity surges before vulnerability disclosures
1+ week, 57+ min ago (624+ words) Grey Noise examined 147. 8 million sessions of scanning and exploit activity targeting 18 edge device vendors between Dec. 14, 2025, and March 27, 2026, finding that about half of all activity spikes preceded a CVE disclosure within three weeks " 36% more than would normally occur by chance....