#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | Expert Insights

The Uncomfortable Truth About "More Visibility"

The Uncomfortable Truth About "More Visibility"

Feb 16, 2026
Security teams have never had more telemetry. They have also never been more behind. In 2025, organizations faced an average of 1,968 cyber attacks per week , an 18% YoY increase, and nearly a 70% increase since 2023 . That’s not just “more noise.” It’s a signal that attacker throughput is scaling faster than human response models can. At the same time, the attacker playbook shifted in ways that punish slow cycles. Social engineering moved beyond email into multi-channel, cross-platform operations, including new interaction-led techniques like ClickFix, which manipulates users into executing the attack themselves. ClickFix activity increased by roughly 500% and appeared in nearly half of documented malware campaigns. And while humans remain a primary target, attackers are finding even easier traction in unpatched, unmanaged, and inherited exposures. These gaps give adversaries durable footholds long before exposure remediation is implemented. Couple that with automation, and expo...
AI Shouldn't Improve Workflows, It Should Replace Them. Here's How to Do It

AI Shouldn't Improve Workflows, It Should Replace Them. Here's How to Do It

Feb 16, 2026
The market is flooded with chatbots that summarize requirements, GenAI that drafts policies, and AI assistants that extract provisions from contracts. And these tools undoubtedly make existing workflows better. But when it comes to transformational technology, different is better than better.  These AI for GRC capabilities are the direct result of practitioners and vendors alike asking, "How can AI make our current workflows better?" What they should be asking is "Does AI make a completely new way of operating possible?” Agentic GRC doesn’t improve GRC workflows; it replaces them with agents. For something to earn the title agentic, it needs to take an entire workflow, including the decision-making between each step, and execute it from start to finish. Whether teams are ready for the future or not (and they should be), they need to start thinking about their workflows in an entirely new way. Here's a framework for them to do so. Why the Distinction Between AI f...
3 Questions to Ask Before Your Next SSE POC

3 Questions to Ask Before Your Next SSE POC

Feb 09, 2026
Secure Service Edge (SSE) has somehow become the default answer to a very real problem: how do you secure access in a world of GenAI, hybrid work, SaaS sprawl, unmanaged devices, and third-party users, without rebuilding your entire network? On paper, SSE looks like the modern solution. Consolidation. Centralized policy. One pane of glass. In practice, many teams discover something uncomfortable after rollout: the POC proved the architecture, not the risk reduction. The demo worked. Production didn’t. Why is this? Network “rip and replace.” - Most SSE deployments still require traffic steering, tunnels, PAC files, certificate gymnastics, and coordination across networking, identity, security, and IT just to reach baseline enforcement. That’s a lot of moving parts before you’ve reduced a single real risk. Limited browser and session visibility. - SSE platforms primarily see connections , not actions . URLs, IPs, flows. But modern risk lives inside the browser and SaaS session:...
9 Identity Security Predictions for 2026

9 Identity Security Predictions for 2026

Feb 02, 2026
The world of identity security is in constant motion. What was once a straightforward matter of usernames and passwords has evolved into a complex ecosystem of biometrics, hardware tokens, and zero-trust architectures. As we look toward 2026, the pace of change is only accelerating. The lines between our digital and physical identities are blurring, and the threat landscape is becoming more sophisticated. Chief Information Security Officers spend their days on the front lines of this evolution. Staying ahead isn't just about reacting to threats; it's about anticipating them to reduce risk. Based on the trends I'm seeing today, here are 9 identity security predictions for where we'll be in 2026. 1. AI will become the primary identity governance tool. Manual access reviews and role-based access control (RBAC) models are already showing their age. By 2026, AI-driven identity governance and administration (IGA) will be standard. These systems will continuously analyze u...
CTM360 Research Reveals 30,000+ Fake Online Shops Impersonating Fashion Brands

CTM360 Research Reveals 30,000+ Fake Online Shops Impersonating Fashion Brands

Feb 02, 2026
Brand impersonation in e-commerce has evolved beyond isolated scam websites into a repeatable, industrialized fraud model operating at global scale . CTM360’s latest threat intelligence research analyzes a coordinated campaign—referred to as FraudWear —that demonstrates how attackers are systematically exploiting consumer trust in well-known fashion brands through tens of thousands of fraudulent online stores. Unlike traditional phishing operations, these campaigns do not rely on simple deception or low-effort spoofing. Instead, they replicate the full structure and behavior of legitimate e-commerce platforms , including storefront design, product catalogs, checkout workflows, localized marketing, and payment processing. Each site functions as a disposable asset within a broader, resilient fraud ecosystem. Read the full report here: https://www.ctm360.com/reports/fraudwear-brand-impersonating-online-stores Scale and Targeting Patterns CTM360 identified more than 30,000 malicio...
How to Secure Your Mid-Market Business Across the Complete Threat Lifecycle

How to Secure Your Mid-Market Business Across the Complete Threat Lifecycle

Feb 02, 2026
According to research by IBM, organizations use an average of 83 separate security solutions. It is hardly surprising that 52% of security professionals identify complexity as the biggest impediment to effective operations. For IT and security leaders in mid-market organizations, who know they have gaps in security coverage, this challenge can feel particularly difficult to solve. At Bitdefender , we see this challenge play out consistently across mid-market environments. Most organizations have the fundamentals in place, such as Endpoint Protection Platforms (EPP), email filtering, and patch management. However, many are not fully realizing the capabilities of these existing tools. This creates security gaps and, when combined with a lack of preventative exposure management controls, severely limits visibility across attack surfaces. Maximize Your ROI: Exploit Underused Tools Many mid-market organizations already have powerful Endpoint Detection and Response (EDR) in place as part...
When Your Browser Becomes The Attacker: AI Browser Exploits

When Your Browser Becomes The Attacker: AI Browser Exploits

Feb 02, 2026
AI-powered browsers are changing how we use the web, but they're also creating some serious new security risks. Tools like Perplexity's Comet and Opera's Neon can summarize pages and automate tasks for you. The problem is that researchers have found these agentic copilots can be hijacked by malicious prompts hidden in ordinary webpages, essentially turning your browser against you. In August 2025, Brave's security team disclosed an indirect prompt injection against Perplexity's Comet using hidden instructions in a Reddit spoiler tag, leading Comet to extract an email address and a one-time passcode. No memory corruption, no code execution exploit. The browser simply followed instructions it couldn't distinguish from legitimate user intent. In this post, we'll look at how these attacks work, why they slip past traditional defenses, and what security teams can do to keep data safe from compromised AI agents. AI Browsers: Powerful, But a New Target AI-ena...
OT Security, In Practice: 4 Cross‑Industry Trends from Global Assessments and How CISOs Should Respond

OT Security, In Practice: 4 Cross‑Industry Trends from Global Assessments and How CISOs Should Respond

Jan 26, 2026
OT incidents rarely start with “OT attacks.” They start with ordinary enterprise weaknesses: shared credentials, remote access shortcuts, management systems that bridge zones too easily, and monitoring that stops short of operations.  When those weaknesses line up, an initial IT compromise becomes an OT event, and the deciding factor is no longer whether the activity is detected, but whether the environment can be contained and recovered without extended outage. What matters is that these failure patterns repeat across industries, which means they can be anticipated and solved - but only if recovery is treated as a security control, not an afterthought. Recurring OT Security Patterns Across Industries Sygnia is a premier cyber technology and services company, with extensive experience helping organisations' IT/OT environments respond to cyber incidents and strengthen enterprise-wide cyber security..  Across numerous OT security assessments, adversary simulations, and inc...
Do You Really Know Your AI Landscape?

Do You Really Know Your AI Landscape?

Jan 20, 2026
Enterprise adoption of AI is no longer a future trend; it's a present-day reality. As organizations race to leverage AI for innovations, security teams are grappling with a new, complex, and dynamic attack surface. AI is breaking the operational silos that currently segregate Cloud, SaaS and Endpoint Security; AI is everywhere and it is consuming enterprise data and assets across these channels. Traditional security tools, designed for cloud infrastructure and SaaS applications, are fundamentally ill-equipped to handle the unique risks posed by AI.  AI security posture management (AI-SPM) solutions can provide relief by protecting critical AI assets, but it’s important to note that not all AI-SPM solutions are created equal. Many solutions offer only basic posture checks and are focused predominantly on infrastructure and vulnerability management. In addition, most focus solely on Cloud or SaaS, leaving many blind spots when trying to get the full picture of your AI landscape. ...
The Great Container Disconnect: A Security Leader's Mandate for Prevention in 2026

The Great Container Disconnect: A Security Leader's Mandate for Prevention in 2026

Jan 19, 2026
The transition to container-first infrastructure is complete, with microservices now powering production-critical workloads and driving digital innovation for most enterprises. While 100% of DevSecOps leaders view containerization as critical to their production strategy, this shift has been accompanied by a crisis in security frameworks. According to the ActiveState 2026 State of Vulnerability Management & Remediation Report , respondents’ organizations faced a staggering 82% container breach rate over the past year. Many companies have tried to mitigate risk by “shifting left", empowering developers to build security into their code from the start while still leveraging containers and open-source software from public registries. But in 2026, the reality of shifting left has often meant shifting a mountain of undifferentiated remediation work (i.e., fixing someone else’s code) onto already overextended engineering teams. How should Security Leaders think about container se...
CTM360 Analysis Shows How Fake Banks Exploit Search and Trust

CTM360 Analysis Shows How Fake Banks Exploit Search and Trust

Jan 19, 2026
CTM360 researchers have identified a large-scale fraud campaign involving thousands of fake banking websites that actively target users in the United States and the United Kingdom. Over the past year, more than 11,000 fraudulent bank domains were observed, with 8,000+ in the U.S. and 3,000+ in the UK, all operating without regulatory authorization or physical presence. These are not throwaway phishing pages. They are polished, SEO-optimized platforms that impersonate legitimate financial institutions, regulators, and lending services. Not Your Typical Phishing Fraud What sets this campaign apart is operational maturity. The fake banks offer services such as loans, mortgages, grants, and high-limit credit cards, often promising instant approval or no credit checks. Victims are funneled through simplified onboarding flows, fake KYC processes, and staged “approvals” designed to build trust before monetization. Once engaged, users are pressured to pay activation or processing fees ,...
Cybersecurity Resources