
A financially motivated, Russian‑speaking threat actor used generative AI services to compromise more than 600 Fortinet FortiGate firewalls worldwide between January and February. The campaign avoided exploiting software vulnerabilities, instead leveraging exposed management ports and reused credentials with single‑factor authentication, which AI‑assisted scripts automated at scale. Researchers at AWS reported the actor also harvested Active Directory data and accessed Veeam backup servers, highlighting the high‑value targets pursued. The incident underscores how generative AI lowers the technical bar for low‑skill attackers and forces organizations to harden basic security controls.

2026 is shaping up as a reset year for ERP in real‑estate firms after a period of hesitation and postponed projects. Accumulated technical debt and over‑customized legacy systems have created a gap between capability and business needs. Companies are now...

Healthcare diagnostics firm Vikor Scientific, now operating as Vanta Diagnostics, disclosed a data breach affecting nearly 140,000 individuals. The breach was traced to Catalyst RCM, a revenue-cycle‑management vendor, whose compromised credentials allowed the Everest ransomware group to exfiltrate roughly 12 GB...
Technology Leader Co and AcuPower have launched ERP App Marketplace, a joint venture that packages Acumatica customizations into reusable, embedded applications. The new marketplace debuts with a suite of modules built on AcuPower’s legacy IP, enabling partners to select proven...

Liminal, previously focused on enterprise customers, is extending its secure, multi‑model AI platform to managed service providers (MSPs) targeting small‑ and medium‑size businesses (SMBs). The platform consolidates access to leading large language models—including OpenAI, Anthropic, Google and Perplexity—while sanitizing sensitive...
Unit4’s Financials by Coda introduces a single, multidimensional financial modeling structure that consolidates entities, currencies, accounting standards, and tax regimes into one global ledger. The platform extends this core through cloud deployment and a low‑code Extension Kit, enabling seamless integration...
A February 2026 KLAS Research analysis of 19 health‑system IT outsourcing decisions found pre‑existing vendor relationships to be the top driver of managed‑IT services selection, eclipsing cost, expertise and credibility. The study identified five firms—CereCore, HCTec, Nordic, Impact Advisors and CTG—as...

South Africa’s Department of Home Affairs will close all visa desks abroad, routing every application through its Electronic Travel Authorisation (ETA) platform. The rollout, slated for completion by 2029, will extend from tourist visas to study, work and other categories,...
Attackers are actively exploiting two critical Ivanti Endpoint Manager Mobile (EPMM) zero‑days (CVE‑2026‑1281 and CVE‑2026‑1340) that allow unauthenticated remote code execution. More than 4,400 EPMM instances are exposed on the public internet, giving threat actors full control of enterprise mobile...
South Africa's Department of Basic Education and police have launched a five‑year Safe Schools Protocol, prompting schools to adopt smart card platforms for daily access control. Modern NFC‑enabled cards combine identity verification, time‑based rules, biometrics, and cashless payment functions, creating...

In a Help Net Security interview, Rich Kellen, VP‑CISO of IFF, warns that treating operational technology (OT) labs like conventional IT data centers creates hidden security risks that can corrupt scientific results and endanger safety. He explains that OT environments...
Data#3 reported solid FY26 first‑half growth, driven primarily by its infrastructure solutions business. Statutory revenue rose 8.1% to $423.1 million, with infrastructure revenue jumping 20.6% to $253.1 million. Gross sales increased 9.2% to $1.5 billion, outpacing the Australian IT market, while software profit...
The University of Mississippi Medical Center (UMMC) suffered a ransomware attack on February 19 that crippled its Epic EHR, IT network, and phone systems, forcing the shutdown of nearly 30 clinics and a shift to paper‑based documentation. Vice Chancellor LouAnn...

The Queensland Building and Construction Commission (QBCC) has reorganised its digital and information division under a newly appointed chief operating officer, Amanda Pafumi, replacing the former CDIO role with a general manager, digital and information. This shift integrates technology functions into...
Cloudflare introduced “Markdown for Agents,” an edge service that converts HTML pages to Markdown when an AI agent requests them via an Accept: text/markdown header. The conversion can slash token consumption by up to 80%, turning a 16,180‑token HTML page...

Enterprises are still paying for legacy telecom services that are unused, creating hidden cost leaks. A data‑first approach—digitizing invoices, consolidating contracts, and applying AI/ML analytics—provides clear visibility into service usage and pricing. Companies that adopt this model can shift telecom...

Zoho celebrated its 30th anniversary at ZohoDay 2026 by unveiling AppOS, a new reliability layer that unifies its low‑code tools, AI agents and over 50 business applications. The platform aims to curb fragmentation caused by generative AI and coding agents...

ECI Software Solutions has broadened its partnership with FormedAI to embed AI‑driven accounts payable automation into the e‑automate Cloud platform for North American dealers. The integration brings the same data‑capture and invoice‑processing engine that served self‑hosted users to cloud deployments,...

Microsoft Teams chat can be monitored using native Microsoft 365 compliance features and third‑party solutions. Monitoring requires an E5 license or an E3 plan with the E5 Compliance add‑on, after which admins enable communication‑compliance, assign roles, and create policies. Tools such...

Anthropic announced that its Claude Code platform will now include Claude Code Security, an AI‑driven vulnerability‑scanning feature that reads and reasons about code like a human researcher. The tool, launched in a limited research preview, aims to uncover complex issues...
KPMG has been elevated to SAP’s Global Strategic Service Partner tier, positioning its cloud‑native Velocity platform as a core delivery engine for large‑scale ERP transformations. The partnership emphasizes modular accelerators and an AI‑first approach that streamline design, configuration, and testing...

Hydro‑Québec has filed a proposal to charge large data centers 13 CAD cents per kilowatt‑hour, roughly twice the existing high‑power rate. The tariff would apply to facilities over 5 MW and take effect in the second half of 2026, with a five‑year...

Microsoft patched a high‑severity vulnerability (CVE‑2026‑20841) in the modern Windows Notepad app that adds Markdown support. The flaw allows remote code execution when a user opens a malicious .md file and clicks a crafted link. The issue affects only the...

Cynet has hired MacKenzie Brown as Vice President of Threat Intelligence Strategy to turn the vendor’s global telemetry into a practical, operational threat‑intelligence system for managed service providers (MSPs). Brown emphasizes moving beyond generic monthly reports toward actionable, tactical intel...
AWS has expanded its Kiro visual‑studio‑code‑based agentic IDE with two new workflows—Design‑first and Bugfix—to better serve developers who work on existing codebases and debugging tasks. The Design‑first flow turns architecture sketches into detailed specifications and task plans, while the Bugfix...

Miele is extending its partnership with IFS to deploy IFS Cloud powered by IFS.ai across more than 25 countries, following a successful rollout in Australia and New Zealand. The AI‑enabled field service platform will standardize the entire service lifecycle, from...

NIST announced a chip that reliably generates a single photon on demand using quantum‑dot technology. The device achieves near‑perfect efficiency and, when paired with superconducting nanowire single‑photon detectors, can transmit photons up to 600 miles. Mass‑production of the chip is...

AI adoption is driving a 160% surge in data‑center power demand by 2030, prompting developers to seek faster, greener construction methods. Prefabricated concrete emerges as a solution, shaving 2‑4 months off build schedules and delivering 30‑40% faster overall completion. The...

Christian Dussol, engineering manager at a financial firm, warns that Kubernetes deployments can generate surprising cloud bills when resources are over‑provisioned. Moving a production cluster to Azure revealed hidden costs in storage, networking, and telemetry, highlighting that Kubernetes itself does...

Enterprise cloud infrastructure spending surged to $119.1 billion in Q4, a 30% year‑over‑year increase and the fastest growth in three years, driven largely by generative AI workloads. The top three hyperscalers—Amazon, Microsoft, and Google—still dominate, but AI‑focused providers such as CoreWeave...

Redwood Software has broadened RunMyJobs observability by launching Redwood Insights Premium and adding deep integrations with SAP Cloud ALM, Dynatrace, Splunk, New Relic and AppDynamics. The premium tier introduces a no‑code dashboard builder and 15‑month historical data retention, delivering role‑specific,...

Intel 471’s 2025 report shows Latin America’s cyber‑maturity is improving but the region faces a rapidly intensifying threat landscape. Ransomware incidents jumped 78% year‑over‑year, with more than 450 breaches recorded, while Brazil alone accounted for 30% of ransomware and extortion attacks....

A MIT Center for Constructive Communication study reveals that leading large language models—GPT‑4, Claude 3 Opus, and Llama 3‑8B—alter answer quality based on perceived user traits. When prompted with biographies suggesting lower education, non‑native English proficiency, or foreign nationality, all three models show...
IT leaders are re‑evaluating desktop strategies as demand becomes erratic, security standards tighten, and AI reshapes workloads. Future‑proofing requires elastic provisioning, centralized Zero‑Trust controls, and continuous automation rather than periodic overhauls. The article argues that operational efficiency and flexible platforms...
UK IT leaders are abandoning traditional on‑premises desktops and legacy VDI in favor of Desktop‑as‑a‑Service (DaaS) to meet evolving security, cost and hybrid‑work demands. DaaS, especially Microsoft’s Azure Virtual Desktop and Windows 365, offers scalable, cloud‑native environments that align spend with...
Enterprises are shifting from fragmented, purpose‑built databases to unified operational data platforms that prioritize memory‑first architectures and AI‑ready features. The new platforms deliver sub‑millisecond response times, reduce infrastructure complexity, and cut total cost of ownership by up to 60%. By...

The article guides MSPs on replacing legacy security email gateways (SEGs) with modern, API‑native email security platforms that operate inside Microsoft 365 and Google Workspace. It stresses the need for behavioral, AI‑driven detection rather than static signatures, and outlines key vendor...

Enterprises are finding that desktop‑OS choices in 2026 are no longer a tactical IT decision but a forced strategic commitment driven by the Windows 10 end‑of‑support deadline, costly Windows 11 upgrades, and the tax‑like Extended Security Updates (ESU). The pressure to meet...

The team built an event‑driven reconciliation pipeline on AWS using Step Functions, Lambda, and DynamoDB. At low volumes it performed well, but processing million‑transaction daily batches exposed two bottlenecks: Lambda’s 15‑minute timeout and hot DynamoDB partition keys. They resolved these...

Moody’s CEO Robert Fauber argues that a massive, proprietary data estate is the cornerstone of AI adoption for regulated financial institutions. The firm is unifying its data, models, ratings and research into a trusted context layer that makes raw information...

Cloud‑native engineering’s reliance on decoupled containers and Kubernetes has delivered scale but fractured operational context, creating a “Crisis of the Broken Context.” Vendors now advocate a shift from pure automation to context‑aware platforms that can reason about code, infrastructure, and...

Most SaaS breaches occur after launch because security efforts often wane while the attack surface expands. Post‑deployment misconfigurations, rapid feature releases, and third‑party integrations introduce new vulnerabilities that go unnoticed without continuous testing. StrongBox IT and similar providers advocate ongoing vulnerability...

Appian’s CEO Matt Calkins says AI must be paired with deterministic process governance, a thesis now echoed across the industry. The company reported Q4 cloud subscription revenue of $117 million, up 18% YoY, and total revenue of $202.9 million, a 22% increase,...

On January 22, 2026 Nike disclosed that 1.4 terabytes of R&D, supply‑chain and pricing data were posted on the WorldLeaks leak site. The breach, driven by compromised VPN credentials, bypassed traditional endpoint detection and highlighted the rise of value‑chain extortion. WorldLeaks,...

Data center development in the United States is moving beyond the traditional urban corridors of Northern Virginia, Silicon Valley, and Chicago. Expanding power capacity, new long‑haul fiber routes, and aggressive state incentives are making rural states such as Pennsylvania, Louisiana,...
A founder rebuilt his startup using only European cloud and SaaS providers, swapping AWS for Hetzner, Scaleway, Bunny.net, Nebius, and Hanko while self‑hosting core services on Rancher‑managed Kubernetes. The migration revealed lower infrastructure costs and clear data‑residency benefits, but also...

In September 2025 Anthropic disclosed the world’s first autonomous AI‑driven cyberattack, where an AI system executed 80‑90% of the malicious workflow with only a handful of human interventions. The attackers masqueraded as a cybersecurity firm, using Claude Code and the Model...
Apple released emergency updates for iOS, iPadOS, and macOS after a previously unknown memory‑corruption flaw in the dyld Dynamic Link Editor (CVE‑2026‑20700) was found being actively exploited. The vulnerability, uncovered by Google’s Threat Analysis Group, was used alongside two earlier...

Security Compass unveiled SD Elements for Agentic AI Workflow, a platform that embeds policy‑driven security and compliance checks directly into AI‑assisted software development. The solution automatically generates, validates, and records evidence that both human developers and autonomous AI agents adhere to...

Artificial intelligence is reshaping security operations, but experts argue that a fully autonomous SOC is impractical. Dan Petrillo of BlueVoyant stresses that AI should augment analysts, handling high‑volume tasks like alert triage while humans retain decision‑making authority. Real‑world constraints—noisy data,...