(Adobe Stock) Unit 42: Identity abuse drives nearly two-thirds of all breachesSteve ZurierFebruary 17, 2026Speed is also a factor, as the time from data access to exfiltration has dropped to 72 minutes.
Why Agentic AI will obliterate legacy SaaS, cybersecurity, and networking giantsAnurag GurtuFebruary 17, 2026
The AI threat isn’t one exploit: It’s attackers hijacking trusted workflowsJack NaglieriFebruary 12, 2026
South Korea faces increased US investor legal action over Coupang breach probeSC StaffFebruary 13, 2026
ICIT’s Center for FCEB Resilience: Strengthening federal civilian agenciesPaul WagenseilFebruary 3, 2026
SASE’s role in securing AI adoption: How existing tools can manage AI securityPaul WagenseilJanuary 22, 2026
Hackers, surprises and outer space: What we’ll see at Zero Trust World 2026Paul WagenseilJanuary 20, 2026
Security OperationsCISA adds SolarWinds, Microsoft, Apple, Notepad++ vulnerabilities to KEV catalogLaura FrenchFebruary 13, 2026The Microsoft Configuration Manager vulnerability, patched in 2024, could enable RCE.
IdentityActively exploited BeyondTrust RCE bug exposes identity infrastructureSteve ZurierFebruary 13, 2026Exploited BeyondTrust RCE (CVE-2026-1731) shows patch gaps in privileged access tools.
Vulnerability ManagementUnstructured.io flaw enables path traversal by email attachmentLaura FrenchFebruary 13, 2026A malicious attachment could cause files to be written to sensitive locations, leading to RCE.
Application securityApple fixes zero-day that exploited OS bug in open-source codeSteve ZurierFebruary 12, 2026Apple patches exploited zero-day in open-source component across iOS, macOS, watchOS.
Threat ManagementFoxveil malware loader abuses Discord, Cloudflare, Netlify for stagingLaura FrenchFebruary 12, 2026The loader uses a novel string mutation mechanism and in-memory execution to evade detection.
Security OperationsPublished CVEs could hit record-breaking 50,000-plus in 2026Stephen WeigandFebruary 12, 2026FIRST forecasts 50K-plus CVEs in 2026 could strain security teams and planning.
Application securityConduent case breaks open after Volvo reports third-party compromiseSteve ZurierFebruary 11, 2026Conduent incidents reveal how third-parties must move to a disclosure-first model.
AI/MLAI-generated React2Shell malware infects 90-plus hostsLaura FrenchFebruary 11, 2026The malware was discovered through a Docker honeypot and is used for cryptojacking.