(Adobe Stock) Five Eyes warn teams to patch Cisco Catalyst SD-WAN controllersSteve ZurierFebruary 26, 2026By exploiting one Cisco SD-WAN controller, attackers can push policy changes to every corner of the enterprise.
From perimeter to protocol: Reducing telecom attack surface with privacy-first mobile technologySC StaffFebruary 13, 2026
ICIT’s Center for FCEB Resilience: Strengthening federal civilian agenciesPaul WagenseilFebruary 3, 2026
Application securityOpen-source vulnerabilities per codebase surge by 107%Laura FrenchFebruary 26, 2026The Black Duck 2026 OSSRA report explores AI as one of several factors in the historic increase.
Application securityGoogle disrupts decade-long China-linked UNC2814 espionage campaignSteve ZurierFebruary 25, 2026GTIG points out that this campaign had no overlaps with other PRC activities, such as Salt Typhoon.
Threat ManagementCrowdStrike: Average cyberattack breakout time now under 30 minutesLaura FrenchFebruary 25, 2026Attackers gained speed as AI-enabled attacks and zero-day exploitation significantly increased.
Threat ManagementNorth Korea’s Lazarus Group targets US, Middle East healthcare sectorsSteve ZurierFebruary 24, 2026Threat actor focuses on identity-based attacks followed by a ransomware drop.
Application securitySANDWORM_MODE: Shai-Hulud with an AI twistLaura FrenchFebruary 24, 2026A new npm supply chain attack injects a malicious MCP server and targets LLM API keys.
Application securityThreat group leverages LLMs to compromise 600 FortiGate firewallsSteve ZurierFebruary 23, 2026Amazon Threat Intelligence said the attacks happened over five weeks in 55 countries.
Threat IntelligenceFBI posts ATM jackpotting prevention guidance after $20M stolen in 2025Laura FrenchFebruary 20, 2026The FBI FLASH alert highlights the threat of Ploutus malware, which exploits XFS software.
Vulnerability ManagementCISA update: BeyondTrust RCE exploited in ransomware attacksSteve ZurierFebruary 20, 2026Experts say if teams can’t patch right away, take the portal offline to protect against potential ransomware attacks.