The Zero-Day Race Enters the AI Era: Why China’s 360 Claims Matter for CISOs
The emergence of AI systems capable of discovering, validating, and even exploiting software vulnerabilities marks a turning point in cybersecurity.…
The emergence of AI systems capable of discovering, validating, and even exploiting software vulnerabilities marks a turning point in cybersecurity.…
On 14 April 2026, Lugano became the meeting point for some of the most influential voices in cybersecurity and artificial…
U.S. authorities have warned that Iranian-affiliated cyber actors are escalating attacks against American critical infrastructure, with a growing focus on…
The European Commission has confirmed a data breach after a cyberattack on the cloud infrastructure hosting Europa.eu. Early findings suggest…
Censys has disclosed a previously undocumented Russian-origin .NET toolkit called CTRL that is delivered through fake private-key LNK files and…
Swiss Cyber AI Conference 2026 lands in Lugano on April 14, 2026. A full-day event focused on cybersecurity in the…
The two Chrome zero-day vulnerabilities highlight how browsers remain a prime attack surface. Memory corruption in Skia and flaws in…
The EU’s PSD2 directive transformed digital payments with stronger security, open banking and clear liability rules. But does it force…
Google patched an actively exploited Chrome zero-day (CVE-2026-2441) enabling remote code execution via a CSS use-after-free flaw. CISOs must act…
ETH Zurich researchers found 25 vulnerabilities in Bitwarden, LastPass, and Dashlane that can undermine “zero-knowledge” protections under a malicious server…
A critical zero-click RCE vulnerability in Claude Desktop Extensions exposes over 10,000 users to remote attacks via a malicious Google…