Please turn on your JavaScript for this page to function normally.
instructure
Instructure took a risky approach to recover stolen Canvas data

Instructure, the company behind the online learning platform Canvas, said it reached an agreement with the extortion group ShinyHunters to prevent data stolen in a recent …

car tire
General Motors to pay $12.75 million over driver data sales

General Motors has agreed to a $12.75 million settlement with California over allegations that it unlawfully sold drivers’ location and behavioral data to brokers, …

Download: The IT and security field guide to AI adoption

Security and IT teams are under pressure to adopt AI, but many are seeing the opposite of what was promised. Tools that demo well don’t hold up in real workflows. Complexity …

TeamCity
JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)

JetBrains has patched a high-severity vulnerability (CVE-2026-44413) in TeamCity, its popular continuous integration and continuous delivery platform, and is urging …

Help Net Security
Citrix moves secure access to a flexible, credit-based consumption model

Citrix has introduced Citrix Platform Flex, a secure access platform that combines software, management, and infrastructure to deliver managed desktops, enterprise browsing, …

dnsmasq
Six new dnsmasq vulnerabilities open the door to DNS cache poisoning, local root

Recent disclosures have revealed that open-source networking tool dnsmasq is grappling with a serious set of vulnerabilities. The problems span memory safety and input …

Škoda
Škoda confirms unauthorized access to its online shop

Car manufacturer Škoda discovered that attackers had exploited a vulnerability in its online shop software and gained temporary unauthorized access to the system. What …

OpenAI
OpenAI’s Daybreak uses Codex Security to identify risky attack paths

OpenAI Daybreak is the company’s cybersecurity initiative focused on building AI-assisted software defense into the development process from the start. It combines OpenAI …

HEIDI
HEIDI: Free IDE security plugin for open-source vulnerability checks

Open-source dependencies make up a large percentage of the code in production applications, and most vulnerability checks still run late in the pipeline, inside CI/CD systems …

smart fridge
The hidden smart fridge risks that emerge years after purchase

Household refrigerators are built to last more than a decade. The software, cloud services, and mobile apps that control them are not. A new analysis from Erik Buchmann at …

cybersecurity jobs
Cybersecurity jobs available right now: May 12, 2026

Application Security Engineer Total Quality Logistics | USA | On-site – View job details As an Application Security Engineer, you will design, implement, and maintain …

Apple
iOS 26.5 is out, bringing encrypted RCS messaging to iPhone and Android users

Apple is bringing long-awaited end-to-end encryption to Rich Communication Services (RCS) messaging between iPhone and Android users in iOS 26.5. The feature is launching in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools