• A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language.

    Experts say the wiper campaign against Iran materialized this past weekend and came from a relatively new cybercrime group known as TeamPCP. In December 2025, the group began compromising corporate cloud environments using a self-propagating worm that went after exposed Docker APIs, Kubernetes clusters, Redis servers, and the React2Shell vulnerability. TeamPCP then attempted to move laterally through victim networks, siphoning authentication credentials and extorting victims over Telegram.

    A snippet of the malicious CanisterWorm that seeks out and destroys data on systems that match Iran’s timezone or have Farsi as the default language. Image: Aikido.dev.

    In a profile of TeamPCP published in January, the security firm Flare said the group weaponizes exposed control planes rather than exploiting endpoints, predominantly targeting cloud infrastructure over end-user devices, with Azure (61%) and AWS (36%) accounting for 97% of compromised servers.

    “TeamPCP’s strength does not come from novel exploits or original malware, but from the large-scale automation and integration of well-known attack techniques,” Flare’s Assaf Morag wrote. “The group industrializes existing vulnerabilities, misconfigurations, and recycled tooling into a cloud-native exploitation platform that turns exposed infrastructure into a self-propagating criminal ecosystem.”

    On March 19, TeamPCP executed a supply chain attack against the vulnerability scanner Trivy from Aqua Security, injecting credential-stealing malware into official releases on GitHub actions. Aqua Security said it has since removed the harmful files, but the security firm Wiz notes the attackers were able to publish malicious versions that snarfed SSH keys, cloud credentials, Kubernetes tokens and cryptocurrency wallets from users.

    Over the weekend, the same technical infrastructure TeamPCP used in the Trivy attack was leveraged to deploy a new malicious payload which executes a wiper attack if the user’s timezone and locale are determined to correspond to Iran, said Charlie Eriksen, a security researcher at Aikido. In a blog post published on Sunday, Eriksen said if the wiper component detects that the victim is in Iran and has access to a Kubernetes cluster, it will destroy data on every node in that cluster.

    “If it doesn’t it will just wipe the local machine,” Eriksen told KrebsOnSecurity.

    Image: Aikido.dev.

    Aikido refers to TeamPCP’s infrastructure as “CanisterWorm” because the group orchestrates their campaigns using an Internet Computer Protocol (ICP) canister — a system of tamperproof, blockchain-based “smart contracts” that combine both code and data. ICP canisters can serve Web content directly to visitors, and their distributed architecture makes them resistant to takedown attempts. These canisters will remain reachable so long as their operators continue to pay virtual currency fees to keep them online.

    Eriksen said the people behind TeamPCP are bragging about their exploits in a group on Telegram and claim to have used the worm to steal vast amounts of sensitive data from major companies, including a large multinational pharmaceutical firm.

    “When they compromised Aqua a second time, they took a lot of GitHub accounts and started spamming these with junk messages,” Eriksen said. “It was almost like they were just showing off how much access they had. Clearly, they have an entire stash of these credentials, and what we’ve seen so far is probably a small sample of what they have.”

    Security experts say the spammed GitHub messages could be a way for TeamPCP to ensure that any code packages tainted with their malware will remain prominent in GitHub searches. In a newsletter published today titled GitHub is Starting to Have a Real Malware Problem, Risky Business reporter Catalin Cimpanu writes that attackers often are seen pushing meaningless commits to their repos or using online services that sell GitHub stars and “likes” to keep malicious packages at the top of the GitHub search page.

    This weekend’s outbreak is the second major supply chain attack involving Trivy in as many months. At the end of February, Trivy was hit as part of an automated threat called HackerBot-Claw, which mass exploited misconfigured workflows in GitHub Actions to steal authentication tokens.

    Eriksen said it appears TeamPCP used access gained in the first attack on Aqua Security to perpetrate this weekend’s mischief. But he said there is no reliable way to tell whether TeamPCP’s wiper actually succeeded in trashing any data from victim systems, and that the malicious payload was only active for a short time over the weekend.

    “They’ve been taking [the malicious code] up and down, rapidly changing it adding new features,” Eriksen said, noting that when the malicious canister wasn’t serving up malware downloads it was pointing visitors to a Rick Roll video on YouTube.

    “It’s a little all over the place, and there’s a chance this whole Iran thing is just their way of getting attention,” Eriksen said. “I feel like these people are really playing this Chaotic Evil role here.”

    Cimpanu observed that supply chain attacks have increased in frequency of late as threat actors begin to grasp just how efficient they can be, and his post documents an alarming number of these incidents since 2024.

    “While security firms appear to be doing a good job spotting this, we’re also gonna need GitHub’s security team to step up,” Cimpanu wrote. “Unfortunately, on a platform designed to copy (fork) a project and create new versions of it (clones), spotting malicious additions to clones of legitimate repos might be quite the engineering problem to fix.”

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Six Predictions for the AI-Driven SOC

    Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber

    San Jose, Calif. – Mar. 23, 2026

    SOC

    Key Takeaways:

    • What is Autonomous SOC solving?
      It addresses critical challenges in security operations such as alert fatigue, fragmented visibility, and limited skilled personnel.
    • What are the core capabilities of Autonomous SOC?
      It integrates automated detection, investigation, and response using AI and behavioral analytics.
    • How does Autonomous SOC impact response time?
      It significantly reduces mean time to detect (MTTD) and respond (MTTR), improving operational efficiency.
    • What types of tools are unified in an Autonomous SOC?
      SIEM, SOAR, UEBA, NDR, and threat intelligence systems work together in one integrated solution.
    • Who benefits most from Autonomous SOC?
      Resource-limited enterprises and MSSPs need high-efficiency, low-friction security operations.
    • How does Stellar Cyber support Autonomous SOC?
      Its Open XDR platform connects over 300 tools, centralizing visibility and automation across infrastructure.

    The autonomous Security Operations Centre (SOC) is already here: as different organizations work to increase their SOC maturity and team efficiency, however, the next step toward tighter AI efficiency can be hard to identify, and difficult to trust. 

    This article identifies the major stages of SOC automation maturity, the challenges faced along the way, and the joint partnership that AI and SOC analysts need to form to pave the way to truly autonomous security operations.

    Schedule a Demo

    What Is an Autonomous SOC?

    An Autonomous SOC represents the next stage in security operations—one where AI-driven systems take on a significant portion of the detection, investigation, and response lifecycle. Instead of relying solely on human analysts and manual workflows, an Autonomous SOC continuously analyzes telemetry, identifies threats, prioritizes events, and executes actions with minimal oversight.

    It shifts the SOC from a reactive, labor-intensive model to one that functions as an intelligent, adaptive, and always-on security engine.

    Why Organizations Are Moving Toward Autonomous SOC Capabilities

    Security teams today face a difficult reality: attacks are more sophisticated, attack surfaces are expanding, and alert volumes continue to surge. Traditional SOC structures—built on a combination of skilled staff, established processes, and assorted tools—struggle to keep pace. These pressures reduce operational efficiency, increase time to respond, and rapidly exhaust human capacity.

    Combined with an ongoing cybersecurity talent shortage, organizations are finding it increasingly hard to triage, investigate, and respond to threats at the required speed and scale. Proactive initiatives like posture management and threat hunting often fall behind because they demand deep expertise, significant time investment, and costly resources. This environment fuels the shift toward an Autonomous SOC as a practical, necessary evolution in security operations.

    How AI and Automation Advance the Autonomous SOC Journey

    As organizations embrace more autonomous capabilities, their threat detection, correlation, and response maturity grows. AI engines can interpret logs, signals, and behaviors—connecting what once appeared as isolated alerts into meaningful patterns. Analysts gain clearer workflows, prioritized by contextual scoring, and can operate at a scale that far exceeds human-only processes.

    At peak maturity, an Autonomous SOC delivers visibility, efficiency, and response actions that amplify the impact of every analyst. Teams effectively extend their operational capacity without increasing headcount, achieving faster detection, more consistent investigations, and a significantly stronger security posture.

    Key Benefits at Different Stages of SOC Automation

    Organizations are making this transition at different rates and with different tools. To lend a degree of legibility across these different programs, the autonomous SOC maturity model splits it into five SOC types: fully manual; rule-based; AI-Unified; AI-Augmented; and AI-led.

    #1. Manual SOC

    The most basic level of automation is its complete absence. All security operations within this stage rely on centralized detection methods, that are then assessed by a human analyst. For example, when a suspicious phishing email is forwarded to an analyst’s workflow, the analyst in question is expected to comb through the mass of collected network logs to confirm whether any users have visited the fake website. Remediation could include manually selecting the site that needs to be blocked, or investigating and isolating a compromised account.

    There are not many SOCs that rely purely on manual processes today: the proliferation of more advanced security tools has pushed the average SOC far deeper into the automation pipeline. However, this reliance on manual intervention may still linger in some security processes like patch management and threat hunting. It’s immensely time-consuming, and relies on large staff numbers to churn through demanding workflows.

    #2. Rule-Based SOC

    This is the first degree of automation: it’s implemented within individual security tools, and allows them to correlate data according to set rules – should the data match, it automatically prevents or flags ‘bad’ connections. For instance, a firewall rule might dictate that – in the case of several failed login attempts occurring from one account – the analysts are sent an alert. Rules can be nested within one another for greater granularity: in our example, an analyst could nest the detection of multiple failed login attempts, with a spike of outbound network activity from the same IP address. Should both of these conditions be met, the firewall could automatically isolate the suspect endpoint, to prevent or limit the account from being compromised. A SOC’s network defenses aren’t the only possible platform for rule-based automation: log management is one of the highest-ROI options, and is achieved via a SIEM tool. This applies the same principle of log collection, collation, and reaction. Rather than the analyst having to take every analytical and remediation action themselves, the rule determines which specific action the security tool should take – vastly accelerating the pace at which the SOC can defend its endpoints and servers. While these advancements drastically enhance scalable SOC operations, SOC teams are still required to continuously update and refine the rules themselves. And – with every rule that’s triggered – analysts are often manually identifying the core issue that triggered it, alongside determining whether it’s a genuine attack or not. Runbooks often detail how analysts need to cross-reference one tool against another – meaning rule-based SOCs are still heavily dependent on manual triaging.

    #3. AI-Unified SOC

    AI-unified capabilities evolve runbooks into playbooks, or automated workflows. AI-unified SOCs add an extra layer of analysis over all the log correlation happening in phase 2. This starts to shift it from log correlation to alert correlation – eliminating some of the time that alert clustering usually

    demands, and therefore allowing the team to respond to genuine IoCs faster.

    SOAR is a common tool seen in AI-Unified SOCs: it gives the SOC a console that incorporates the real-time activity of an organization’s segmented security software, like its SIEM, EDR, and firewalls. This collaboration isn’t just visible: for it to be AI-unified, SOAR automatically cross-references the alerts and data being shared between these disparate tools. They’re able to leverage application programming interfaces (APIs) to transfer data between relevant sources.

    From all of this data, a SOAR platform is able to ingest an alert from one tool – like an endpoint detection and response (EDR) solution – and begin connecting other tools’ findings. For example, the EDR may have identified an unusual background application running on a device. The SOAR can compare the application in question against relevant logs within other tools, like threat intelligence feeds and firewalls. This extra data then allows the SOAR’s analysis engine to assess the legitimacy of the EDR’s alert.

    Note that the SOAR itself is not full AI: it still relies on vast swathes of playbooks to respond. Developing these SOAR playbooks demands a thorough understanding of each security operation, and what potential threats could look like. Each playbook is built by pinpointing repetitive tasks, and then establishing clear metrics to evaluate the playbook’s performance, such as response times and the rate of false positives. This saves a lot of time in the incident response process – once it’s all up and running.

    #4. AI-Augmented Human SOC

    This stage sees automation capabilities grow from alert correlation to partial automatic triage. Triaging is the process by which alerts are responded to – and up until this stage, all triage steps have been defined manually. Rather than a trigger for set playbooks, AI-Augmented SOC benefits from investigating each alert as an individual datapoint; and their incident response combines automated suggestions with analyst input.

    The specific demands of each investigation process are established by the organization’s own analyzed data: with a baseline of network access, data sharing, and endpoint behavior, the AI is able to spot deviations from this norm – alongside monitoring for known IoCs that match connected threat intelligence databases. Most importantly for this phase, however, are the responses taken: once an alert is linked to a genuine attack path, the AI engine is able to respond through the security tools to cut an attacker off. Throughout this process, it produces and prioritizes alerts and streams to the correct tier of SOC specialists. It connects each alert with consistent, well-documented summaries and findings that quickly bring the human component up to speed.

    Tools for achieving this and the final phase of automation include Stellar Cyber’s automated SecOps platform: it grants human SOC experts the ability to rapidly automate triaging, while retaining human analysts as the final decision-makers on remediation. To support this, these capabilities and underlying information are made accessible through a central platform.

    #5. Human-Augmented AI SOC

    The final stage of AI-SOC integration, this phase sees AI’s capabilities spread from incident detection and response to include wider and more specialist-specific areas.

    For instance, detailed forensic investigations are one field in which AI-led SOCs can outpace their human-led counterparts. Starting from a known security incident, a central AI engine can extract relevant IOCs and re-assemble them into likely attack chains – from initial intrusion, across lateral movement, and finally to malware deployment or data exfiltration. These IoCs can remain internal, or be used to enrich the detection capabilities of a central information sharing and analysis center (ISACs). Alongside identifying attackers’ methods and ultimate objectives, this focus on shared knowledge can also allow an AI-driven SOC to pinpoint an attack’s potential perpetrators, especially if their tactics and techniques align with those of known groups.

    In this phase, incident communications can also benefit: the growth of niche Large Language Models (LLMs) allows SOC leaders to quickly communicate the core issue at hand, as the central autonomous SOC platform condenses the highly-complex attack into more accessible language. It’s how Stellar’s Copilot AI provides assistance throughout complex investigations. Integrated LLMs also allow for organizations to rapidly inform impacted customers, too – and let SOC analysts focus on AI-guided remediation.

    Forensics aside, full SOC automation can proactively identify and automatically the gaps in current security controls. This could be fully automated threat detection; patching; correcting for firewall vulnerabilities discovered during file sandboxing; or integrating with the CI/CD pipeline to prevent vulnerable code from being deployed internally in the first place.

    Autonomous SOC Challenges Along the Journey

    Transitioning to an autonomous SOC represents a real upheaval to a company’s security operations; it has its own set of challenges to be aware of.

    Data Integration

    Connecting disparate tools and systems to a unified platform can be one of the first SOC automation hurdles. And it’s not even as simple as sharing data between different tools; an autonomous SOC needs an extensible security architecture – one that can integrate seamlessly with the full security stack and ingest, consolidate, and transform data in any format.

    At the same time, it’s not just all security, device, and network data that needs to reach the central AI engine: it also needs to support the analysts’ own remediation and investigation attempts, making a centralized platform and cross-tool UI a necessity.

    Cultural Resistance

    Adapting to automation can require significant shifts in team workflows. if a SOC is familiar with manually maintaining their own firewall and SIEM rules, they may resist the changes posed by automation. It’s why an incremental process is often the best – jumping from phase 1 to 5 in the span of a year would likely represent too much of a disruption.

    There’s also a degree of fear to contend with: because automation can now replicate all 3 tiers of SOC analysts’ skill sets, there are valid concerns that human input will no longer be deemed necessary. The truth is far from this: the human SOC team is the best source of real-world understanding and intelligence of an organization’s own architecture and vulnerabilities. Their current challenges need to lead the AI-driven security integration within any SOC; their support will remain crucial even in fully-evolved setups, as they’re at the helm of an AI’s corrective and ethical decision-making.

    Skill & Budget Restraints

    When implementing AI, it’s vital to draw on subject-specific expertise across AI, automation, and advanced threat detection. This specific mix of skill sets can be difficult to find, however – and not to mention expensive to bring on board. Even the newest SecOps analysts can cost $50k a year, and suitably-trained, AI-first specialists are orders of magnitude more expensive. This links neatly with another challenge: budget.

    SOCs used to be confined to the highest-turnover companies; smaller organizations would rely on Managed Security Service Providers (MSSPs) to help balance the cost of cybersecurity against the risk of attack. This means that cost is still one of the greatest hurdles to implementing AI, especially given the time and money sink that manual processes can perpetuate.

    How Stellar Cyber Removes the Barriers to Autonomous SOC

    Stellar Cyber accelerates the journey toward an autonomous SOC by providing an integrated platform that combines simplified security operations and accessible AI. It focuses on stopping SOC sprawl – and gives each tier of analysts the tools they need to realize far greater security gains.

    An Open, Unified Platform

    AI-driven security requires heavy, continuous access to data. Some providers lock this access behind rungs of their own tools. Stellar Cyber, on the other hand, places open integration at the core of the tool’s philosophy. An API-driven architecture allows Stellar Cyber to ingest data from any source and security tool – and further allows the AI engine to remediate incidents via the same bi-directional connections.

    The full reach of the organization’s security environment is then unified into a single platform. This places all AI SOC operations at the fingertips of its corresponding analysts. It combines the analysis and remediation actions offered by SIEM, NDR, and XDR – further simplifying a SOC’s tech stack. Since Stellar can embed a host of different frameworks into this wide range of response capabilities, the dashboard also serves to detail the steps that go into each automated response.

    A Multi-Layer AI

    The beating heart of Stellar Cyber is in its decision-making capabilities. There are a number of processes that the multi-layer AI goes through to establish threats:

    Detection AI

    Both supervised and unsupervised ML algorithms monitor the real-time status of every connected security tool and device. Collected by either sensors or API integrations, the logs and alerts being generated are all ingested into the model’s data lake, off which runs a core detection algorithm. It’s this architecture that allows the detection AI to signal unusual patterns, or trigger pre-set rule alerts.

    Correlation AI

    With alerts discovered, Stellar’s second AI kicks in: it compares detections and other data signals across relevant environments, turning alerts into comprehensive incidents. These incidents are tracked via a GraphML-based AI, aiding analysts by automatically assembling related data points. Establishing how different alerts are connected takes into account ownership as well as temporal and behavioral similarities. This AI is continuously evolving based on real-world data, growing with each operational exposure.

    Response AI

    Finally, the response AI can take effect. It can act across firewalls, endpoints, emails, and users – anywhere that will limit the blast radius the fastest. Analysts retain complete customizability over the context, conditions, and output of the tool’s responses. Playbooks can be implemented either globally, or tailored to individual tenants; pre-built playbooks can automate standard responses, or build custom ones that perform context-specific actions.

    Multi-Tenancy for MSSPs

    MSSPs represent an ideal partner for many organizations, but they particularly benefit the mid-sized organizations that need to balance budget and security flexibility. Because MSSPs essentially outsource the management of security, they stand to drastically benefit from high-efficiency automation like Stellar Cyber’s.

    Stellar Cyber supports this by offering its capabilities across multiple tenants whilst still maintaining data separation. Preventing this commingling is critical to ensuring back-end security, while still lending highly-trained analysts the tools and visibility of the Stellar Cyber platform.

    Scalability for Lean Teams

    Whether based within an MSSP or in the organization itself, it’s vital for AI enablement to focus on cost-effective, scalable security operations. Stellar Cyber allows lean teams to achieve the same degree of protection as larger manual teams, thanks to its two core components: automated threat hunting, and accessible decision-making.

    While collecting and analyzing the real-time data within an organization, Stellar Cyber collates all possible security oversights into its threat hunting library. This overview shows the different alert types, and the number of each that has been detected. These can be manually connected to ongoing cases, or handled individually. For a different view, Stellar Cyber’s asset analysis process quickly sorts the highest-risk assets, alongside their locations and connected cases, further providing analysts with a higher resolution picture for each potential flaw.

    Automated SOC shouldn’t happen at the expense of the team. Stellar Cyber translates each automated decision according to the corresponding framework it uses to get there. For instance, it doesn’t just align with MITRE – it also shares how each triaging decision aligns with this framework. This keeps the triaging process accessible even when handling complex attacks.

    Enhance the Efficiency of Your SOC with Stellar Cyber

    The result of Stellar Cyber’s AI enablement is an accessible platform that drives a SOC analyst’s confidence in their own processes – elevating both human and AI capabilities. This human-first approach is also why Stellar Cyber prices its platform on a single license. This includes all of its open SecOps capabilities – purpose-built to enhance the efficiencies of each SOC member’s own expertise. To explore Stellar Cyber for yourself, schedule a demo with one of our experienced team members.

    Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber


    About Stellar Cyber

    Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. For more information, visit https://stellarcyber.ai.

    The post Autonomous SOC: What It Is, Key Benefits and Core Challenges appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New research from LevelBlue reveals how a suspected North Korean operative landed a remote IT role to fund national weapons programmes.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Tax-themed Google Ads are being weaponized to deliver a BYOVD-based EDR killer, with Huntress linking a large-scale malvertising campaign to rogue ScreenConnect deployments and a vulnerable Huawei audio driver used to blind endpoint defenses before hands-on-keyboard activity. Sponsored Google Ads for queries such as “W2 tax form” and “W‑9 Tax Forms 2026” led to realistic […]

    The post Tax Scam Google Ads Push BYOVD EDR Killer, Huntress Finds appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition covers a mix of issues: supply chain attacks hitting CI/CD setups, long-abused IoT devices being shut down, and exploits moving quickly from disclosure to real attacks. There are also new malware tricks

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SEO Poisoning Campaign Impersonates 25+ Popular Apps to Deliver AsyncRAT Since October 2025.An ongoing SEO poisoning campaign abuses search results to trick users into downloading trojanized installers for more than 25 popular applications, ultimately deploying the AsyncRAT remote access trojan. Active since at least October 2025, the operation uses a mix of fake download portals, […]

    The post SEO Poisoning Campaign Uses Fake Popular Apps to Deliver AsyncRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Mar. 23, 2026

    Read the Full Report

    MSPs and MSSPs, the force multiplier in security leadership, are positioned to provide SMBs with CISO services.

    The world’s small to midsized businesses (SMBs) have been mired in a cybersecurity supply and demand crisis, according to the 2026 CISO Report published today by Cybersecurity Ventures in partnership with Sophos.

    Cybercrime is predicted to cost the world $12.2 trillion USD annually by 2031, up from $10.5 trillion in 2025, and $6 trillion in 2021. As a result, every business in the world should have a chief information security officer or equivalent resources. In 2026, nearly every Fortune 500 and Global 2000 company employs a full-time CISO, but close to zero percent of small businesses, which make up more than 90 percent of companies worldwide, have a dedicated security officer on staff.

    Cybersecurity Ventures estimates that there are 35,000 chief information security officers employed worldwide in 2026, up minimally from 32,000 in 2023. There are approximately 359 million businesses in operation in the world today being serviced by those CISOs. Joe Levy, CEO at Sophos, told the World Economic Forum that’s a 10,000:1 ratio and a massive challenge for global cybersecurity resilience. “Those are not good odds,” says Levy. “This is a market failure. The cybersecurity ecosystem hasn’t figured out how to address this gap. We have the potential to do that now.”

    A growing number of small businesses are turning to virtual (remote) CISOs, who provide on-call security strategy support, incident response leadership, governance, and other security services. “The challenge with the vCISO offerings in the market today is that human bandwidth doesn’t scale infinitely,” says Raja Patel, President, Product & Marketing at Sophos.



    Sophos views managed service providers (MSPs) and managed security service providers (MSSPs) as the force multiplier in security leadership. Just as managed detection and response (MDR) proved that security operations scale best through services, security leadership scales best through partners. Various industry estimates put the number of MSPs and MSSPs at tens of thousands globally. “We need to provide the effective leadership of a CISO to the hundreds of millions of organizations that couldn’t have even dreamed of having one previously,” adds Levy. “This is the biggest opportunity that exists in cybersecurity today.”

    The 2026 CISO Report contains facts, figures, predictions and statistics covering cybersecurity in the boardroom, women in CISO roles, compensation data, turnover rate, CISO certifications, budget trends, cyberinsurance, artificial intelligence (AI), ransomware, supply chain attacks, Q-Day aka Y2Q, human risk management, regulatory issues, the insider threat, and more.

    “We partnered with Sophos on the 2026 CISO Report because they have the vision, platform, people, and channel strategy, to deliver cybersecurity to organizations globally who are largely underserved by our industry,” says Steve Morgan, founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine.

    Cybersecurity Ventures and Sophos will be sharing ongoing thought leadership around the report with media outlets globally.

    Read the Full Report


    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post 35,000 Chief Information Security Officers Employed Globally in 2026 appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Police shut down 373K dark web sites in a one-man CSAM and cybercrime network run by a 35-year-old man in China, with global probe ongoing.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A targeted cyber espionage campaign against Libyan organizations has compromised an oil refinery, a telecommunications provider, and a state institution between November 2025 and February 2026. The campaign stands out due to its focus on critical infrastructure, particularly Libya’s oil sector. The country produced around 1.37 million barrels of oil per day in 2025, its […]

    The post Libyan Refinery Targeted in Prolonged Spy Campaign With AsyncRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • AWS Bedrock is Amazon’s platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models directly to enterprise data and systems. That connectivity is what makes it powerful – but it’s also what makes Bedrock a target. When an AI agent can query your Salesforce instance, trigger a Lambda function, or pull from a SharePoint

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶