Please turn on your JavaScript for this page to function normally.
Help Net Security
Acronis GenAI Protection gives MSPs control over AI usage and data risks

Acronis has launced Acronis GenAI Protection, a monitoring and security solution that enables managed service providers (MSPs) to control generative AI usage across client …

Help Net Security
Elastic MCP Apps bring security and observability workflows into AI tools

Elastic has announced MCP Apps for Elastic, delivering agent-native UI experiences for security and observability workflows across third-party coding tools and chat clients. …

Progress
Progress Software fixes sneaky WAF bypass vulnerability (CVE-2026-21876)

Progress Software has fixed a slew of high-severity vulnerabilities in MOVEit WAF and LoadMaster, including a flaw (CVE-2026-21876) that may allow attackers to bypass firewall …

QClaw
Tencent’s QClaw AI agent app arrives on Windows and macOS

Tencent has opened an international beta of QClaw, an AI agent application aimed at consumers in Canada, Japan, Singapore, South Korea, and the United States. The first wave …

phishing
Phishing reclaims the top initial access spot, attackers experiment with AI tools

Phishing returned as the leading method attackers used to break into organizations in the first quarter of 2026, accounting for over a third of engagements where initial …

OneDrive
OneDrive updates focus on AI, access control, and compliance

Microsoft OneDrive’s recent updates focus on improving intelligence, collaboration, and administrative control. “Last year, we made a promise: your files should work for you, …

Pentagi
PentAGI: Open-source autonomous AI penetration testing system

Penetration testers have long relied on collections of specialized tools, manual coordination, and documented runbooks to work through a target assessment. PentAGI, an …

Apple Intelligence
Apple Intelligence flaw kept stolen tokens reusable on another device

Apple claims that Apple Intelligence, a GenAI service provided on its operating systems, is designed with an extra focus on user security and privacy through a two-stage …

vault
Shadow AI, deepfakes, and supply chain compromise are rewriting the financial sector threat playbook

Financially motivated attacks continued to drive the bulk of cyber incidents against banks, insurers, and payment processors in 2025. Approximately 90% of breaches affecting …

Thunderbird
Thunderbird 150 arrives with encrypted message search and OpenPGP improvements

Released today, Thunderbird 150.0 brings eight new features, a round of bug fixes, and security patches that cover the web engine underlying the email client. Thunderbird …

VirtualBox
VirtualBox 7.2.8 is out with Linux kernel 7.0 support and crash fixes

Oracle shipped VirtualBox 7.2.8 on April 21, 2026, as a maintenance release covering crashes, networking problems, clipboard issues, and extended Linux kernel compatibility. …

ransomware
Ransomware negotiator admits role in attacks he was hired to resolve

A Florida man, formerly employed as a ransomware negotiator, pleaded guilty to conspiring to carry out ransomware attacks against US companies. Prosecutors say Angelo Martino, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools