NSA urges continuous checks to achieve zero trust

The agency leading the US government’s cryptology and cyber security strategies has published its latest zero-trust guidance - Read more

Threat and Vulnerability Management in 2026

Key Takeaways: Traditional vulnerability management tools can no longer keep up with the speed of modern exploitation—threat context is now mandatory. Threat...

Elevating global operations: Mastering multi-cluster Elastic deployments with Fleet

This blog highlights the features built into Fleet and Integrations that enable Elastic Agents to seamlessly operate in these environments. - Read more

Kaiser to Pay $46M in Patient Data Lawsuit. Find Out If You’re Eligible

Kaiser Permanente agreed to a $46M settlement over claims that patient health information was improperly disclosed online. The claims deadline is March 12, 2026. The...

Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits

Threat actors are increasingly using trusted cloud and content delivery network platforms to host phishing kits, creating major detection challenges for security teams. ...

Predicting 2026

Welcome to this week’s edition of the Threat Source newsletter. It’s become traditional at this time of year to make predictions about cybersecurity for the coming...

AVEVA Process Optimization

View CSAF Summary Successful exploitation of these vulnerabilities could enable an attacker to execute remote code, perform SQL injection, escalate privileges, or access sensitive information. The following...

Cyber body ISC2 signs on as UK software security ambassador

Professional cyber association ISC2 pledges support to UK government’s Software Security Ambassador scheme, part of the recently unveiled Cyber Action Plan - Read...

UAT-8837 targets critical infrastructure sectors in North America

Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor based on...

6-day and IP Address Certificates are Generally Available

Short-lived and IP address certificates are now generally available from Let’s Encrypt. These certificates are valid for 160 hours, just over six days. In...

Latest article

Patch Tuesday – March 2026

Microsoft is publishing 77 vulnerabilities this March 2026 Patch Tuesday. Microsoft is aware of public disclosure of two of today’s vulnerabilities, but without evidence...

AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus...

In January 2026, we announced the general availability of the AWS European Sovereign Cloud, a new, independent cloud for Europe entirely located...

Google’s $32B Wiz Acquisition Set to Become Israel’s Largest Tech Deal Ever

Google’s $32 billion Wiz acquisition is nearing completion, marking a record Israeli tech exit and a major bet on cloud security. The post Google’s $32B...

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity - Read more