IdentityTheft.org Sells for $30,000 on Sedo
IdentityTheft.org has reportedly changed hands for $30,000 on Sedo, which is one of those sales that quietly feels more meaningful than the raw number might…
Infosecurity Europe 2026, June 2–4, London
Europe’s cybersecurity industry is preparing for the return of one of its largest annual gatherings as Infosecurity Europe 2026 heads back to ExCeL London from…
Ocean Launches From Stealth With $28 Million to Reinvent Email Security Using AI Agents
Ocean, a new cybersecurity startup focused on AI-native email protection, has officially emerged from stealth with $28 million in total funding. The round was led…
Salt Typhoon, Volt Typhoon, Flax Typhoon: China’s 2024 Campaign Against U.S. Infrastructure
Three Chinese state-sponsored campaigns disclosed in 2023 and 2024 represent a qualitative shift in the publicly documented threat from Beijing. Previous Chinese cyber operations —…
Foreign Criminal Cyberattacks Against the United States: Ransomware, Botnets, and Financial Fraud
The Congressional Research Service’s inventory of foreign criminal cyberattacks against the United States runs from 2003 through 2025 and documents operations by individuals and groups…
Iran’s Cyber Operations: Infrastructure Attacks, Election Interference, and IRGC Proxies
Iran’s documented cyber operations against the United States are distinguished by their breadth of target selection and their use of both the Islamic Revolutionary Guard…
North Korea’s Cyber Program: From Sony to Blockchain Theft
North Korea’s cyber program is unlike any other nation-state operation in the CRS record. Where China steals intellectual property to fuel industrial development and Russia…
Russia’s State Cyber Operations: From SolarWinds to Logistics Warfare
Russia’s documented cyber operations against the United States and its allies span three distinct intelligence and military organizations — the FSB, the GRU, and the…
China’s Cyber Campaigns Against the United States: Two Decades of Documented Operations
The People’s Republic of China runs the most sustained documented cyber espionage program targeting the United States. The Congressional Research Service’s updated cyberattack compendium covers…
How the U.S. Government Attributes Cyberattacks — and Why It Is Harder Than It Looks
Attributing a cyberattack to a specific actor or nation is an analytic exercise that combines forensic investigation with intelligence tradecraft, and the U.S. government has…
Thirteen Years of Cyberattacks Against the United States: The CRS Record
The Congressional Research Service released an updated inventory of significant cyberattacks against the United States spanning 2012 through 2025. The document, R46974, catalogues operations attributed…
Billington Critical Infrastructure CyberSecurity Summit, Nov. 17–18, 2026, San Antonio, Texas
Billington CyberSecurity is launching its first dedicated Critical Infrastructure CyberSecurity Summit on Nov. 17–18, 2026 at Henry B. Gonzalez Convention Center, bringing together government officials,…
ShinyHunters Breaches Canvas LMS, Threatening Data on 275 Million Users
The criminal extortion group ShinyHunters has claimed responsibility for a sweeping breach of Instructure’s Canvas learning management system, one of the most widely deployed academic…
NETSCOUT FY2026: Revenue Growth, Margin Expansion, and a Balance Sheet That Tells the Real Story
NETSCOUT Systems reported fiscal year 2026 results on May 7, 2026, covering the twelve months ended March 31, 2026. Total revenue of $859.5 million grew…
Day Zero Threat Research Summit, August 30–September 1, 2026, Las Vegas
Day Zero Threat Research Summit will debut this year as a specialized research-focused gathering inside Fal.Con 2026, bringing together some of the cybersecurity industry’s leading…
AI Agent Security Summit, May 27, 2026, San Francisco
The upcoming AI Agent Security Summit will bring together security researchers, enterprise practitioners, and AI infrastructure leaders to examine one of the fastest-emerging areas in…
General Analysis Raises $10 Million to Secure the Fast-Rising World of AI Agents
As enterprises rush to deploy autonomous AI systems into customer support, finance, coding, and internal operations, a new startup is betting that the next major…
Black Hat Asia 2026, Singapore: Cybersecurity Event Highlights AI Threats and Data Sovereignty
Black Hat announced the successful completion of the in-person portion of Black Hat Asia 2026, held at Marina Bay Sands Expo & Convention Centre in…
Aptori Expands Runtime-Driven Validation Platform for the AI Coding Era
Aptori today announced a major expansion of its Runtime-Driven Validation Platform, introducing autonomous offensive testing capabilities aimed at a market where AI-generated code is increasing…
Rilian Raises $17.5 Million to Bring Agentic AI Into Cybersecurity and Sovereign Defense
Rilian has emerged from stealth with $17.5 million in seed and seed extension financing, signaling growing investor conviction that the next major wave in cybersecurity…
ServiceNow Completes $7.75 Billion Armis Acquisition, Expands AI Security Ambitions
ServiceNow has completed its acquisition of Armis for approximately $7.75 billion in cash, a major move that deepens the company’s push into enterprise cybersecurity and…
Enterprise WiFi Security: Where Convenience Stops and Control Begins
Enterprise WiFi looks familiar on the surface—you connect, you browse, things work—but underneath, it’s a very different system entirely. The difference isn’t just scale, it’s…
International Cybersecurity Challenge 2026, May 18–21, Gold Coast, Australia
The global cybersecurity calendar lands on the Gold Coast this May with the 2026 edition of the International Cybersecurity Challenge, staged alongside the AUSCERT Conference…
Bitdefender Expands GravityZone With Extended Email Security to Close the Inbox Gap
Email remains the easiest door into an organization, and attackers haven’t stopped refining how they walk through it. With the launch of GravityZone Extended Email…