Beers with Talos breaks down the 2025 Talos Year in Review

The Beers with Talos B team (that’s Hazel, Bill, Joe and Dave) break down (sometimes in the literal sense) the 2025 Talos Year in...

2025 Talos Year in Review: Speed, scale, and staying power

The 2025 Talos Year in Review is now available to view online.The pace and scale of adversary activity in 2025 placed sustained pressure on security...

Irish government launches CNI resilience plan

Ireland’s National Strategy on the Resilience of Critical Entities sets out a pathway to improved cyber resilience for the nation’s critical infrastructure, and establishes...

Chromium: CVE-2026-4464 Integer overflow in ANGLE

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2026) for more information. - Read...

Crossbench MPs pressure Labor over gas export tax – as it happened

This blog is now closedHundreds of petrol stations across Australia run out of fuel as Albanese inks supply deal with SingaporeSA premier warns One...

The endpoint tax is over: Elastic Security XDR

Introducing Elastic Security XDR. By eliminating the "endpoint tax,” our agentic security operations platform is enabling organizations to achieve total visibility and world-class prevention...

Hackers Compromise Trivy Scanner to Inject malicious Scripts and Steal Login Credentials

A sophisticated supply chain attack targeting the official Trivy GitHub Action (aquasecurity/trivy-action) has compromised continuous integration and continuous deployment (CI/CD) pipelines globally. Disclosed...

Latest article

Microsoft Defender Mistakenly Flags DigiCert Root Certificates as Malware

Microsoft Defender triggered widespread false positive alerts after a faulty security update caused it to flag two legitimate DigiCert root certificates as malicious, potentially...

ZenBusiness – 5,118,184 breached accounts

In March 2026, the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness, a business formation and...

Microsoft Shell Spoofing Zero-day Vulnerability

What is the Attack? A newly disclosed vulnerability, CVE-2026-32202, has emerged...