What's happening: Cloudflare pushes agile SASE with Cloudflare One to replace legacy VPNs
Cloudflare announced a series of technical deep‑dives showcasing its Cloudflare One agile SASE platform as a remedy for fragmented legacy VPNs and hardware firewalls. The solution uses a single‑pass architecture that runs security checks across a global network spanning over 300 cities, removing service‑chaining bottlenecks. It also integrates zero‑trust capabilities.
Also developing:
Singapore has launched its National Space Agency and warned that cyber‑vulnerabilities permeate every stage of the space value chain, from satellites to ground networks. The February 2022 KA‑SAT attack, which knocked out communications and energy services across Europe, underscored the systemic risk. In response, Singapore is adopting a cybersecurity‑by‑design framework that embeds protection into satellite hardware, ground stations and operational software. The strategy relies on multi‑agency coordination, international norms and public‑private partnerships as the space economy heads toward a $1.8 trillion market by 2035.

South African enterprises are pouring significant budgets into cybersecurity tools, yet breach rates keep rising. The core issue is execution: security teams are overwhelmed by data and lack the capacity to turn visibility into action. Unified platforms like Rapid7’s Command...
At the ETCIO Cloud Summit, leaders from Starbucks India and Jio argued that cloud security must shift from protecting static assets to continuously validating identities, especially as AI agents and autonomous workloads proliferate in hybrid environments. They emphasized that bots,...
Agent identities is going to be a super fun and hard problem for software in the coming years. Most agentic systems today assume that the agent can do everything the user can do, and just operate as an extension of...

Arctic Wolf’s 2026 Threat Report reveals a dramatic shift toward data‑only extortion, which surged from 2% to 22% of incidents in 2025. Remote‑access tool abuse initiated 65% of non‑BEC breaches, while AI‑enhanced phishing powered 85% of BEC attacks. Ransomware remains common,...

AI‑driven development is dramatically speeding code creation, reviews and releases, but application security (AppSec) has not kept pace. Autonomous AI actions now make decisions on dependencies, configurations and remediation, turning isolated flaws into system‑wide risks. When AppSec foundations are immature,...
UL Solutions develops new standard for solar inverter cybersecurity #energysky -- via Solar Power World: https://t.co/TvHlobdGEg

In episode 455 of the Smashing Security podcast, host Graham Cluley and journalist James Ball examine the growing threat of tech sovereignty, questioning whether the United States could effectively shut down Europe’s internet by leveraging Gmail, cloud services, and critical infrastructure. They also...

U.S. policymakers are weighing offensive cyber operations against Iran if diplomatic talks on the nuclear program collapse, positioning cyber as a central element of joint military action rather than a peripheral tool. Recent Senate testimony and statements from US Cyber...

GitLab’s updated Security Dashboard, now in the 18.9 release, adds advanced filters and visualizations that let teams track vulnerability trends, remediation velocity, and risk scores across projects and groups. The dashboard calculates risk using vulnerability age, EPSS, and KEV data,...
N‑Able reported Q4 2025 revenue of $130 million, a 12% year‑over‑year increase, and ended the year with $540 million in annual recurring revenue, up 12% on a reported basis. Non‑GAAP adjusted EBITDA held steady at a 30% margin, while dollar‑based net revenue retention...
Law firms are increasingly confronted with demanding security questionnaires from Fortune 500 clients, requiring verifiable endpoint protection within tight deadlines. Many firms still rely on manual or semi‑automated processes, leaving gaps in device visibility and patch compliance. This lack of...

The UK government will amend the Crime and Policing Bill to require tech platforms to delete non‑consensual intimate images, including AI‑generated deepfakes, within 48 hours of notification. Enforcement will be handed to Ofcom, which can levy fines up to 10%...
A Nigerian national living in Mexico was sentenced to eight years in federal prison and ordered to pay $1.39 million in restitution for a five‑year scheme that compromised Massachusetts tax‑preparation firms. Using phishing emails and Warzone RAT malware, he harvested taxpayer...

The French Economy Ministry disclosed that a hacker used stolen government credentials to view data from 1.2 million bank accounts across the country. The breach, detected in late January, exposed personal details such as names, addresses, account numbers and, in some...

Sumo Logic announced the extension of its cloud‑native analytics platform into the AWS European Sovereign Cloud and an AWS data center in Switzerland. The move lets customers keep logs, telemetry, and security data within national borders, satisfying GDPR and other...

AI agents are moving from occasional chat tools to always‑on assistants, prompting enterprises to confront identity‑governance gaps. Tailscale introduced Aperture, an open‑alpha governance layer that ties AI usage to user or workload identities, offering policy controls, audit‑ready session logs, and...
The Cheyenne and Arapaho Tribes of Oklahoma were hit by a ransomware attack that forced the shutdown of their computer networks, halting email, phone services and some tribal operations. Tribal Governor Reggie Wassana confirmed the disruption while recovery efforts began....

Indian digital‑ID specialist eMudhra has completed self‑certification as a Modular Open Source Identity Platform (MOSIP) system integrator, joining the MOSIP Marketplace. The certification confirms its software and hardware meet MOSIP’s rigorous technical, operational and security standards, enabling it to deliver...
“At Facebook, they found that when security vulnerabilities were reported as issues, nearly 0% got fixed. But when these same problems appeared directly in the developer’s IDE, where the red squiggles were difficult to ignore, fix rates jumped to around...

Dataminr’s 2026 Cyber Threat Landscape Report shows a dramatic shift in cyber risk during 2025, with threat‑actor alerts soaring 225% year‑over‑year. Identity‑based intrusions now account for nearly 30% of attacks, driven by an 84% rise in infostealer malware and AI‑enhanced...

On Jan. 23, 2026 the Office of Management and Budget issued Memorandum M‑26‑05, rescinding the Biden‑era mandate that all federal agencies obtain a CISA “Common Form” software attestation. The new memo replaces the one‑size‑fits‑all requirement with a risk‑based, agency‑specific approach while...

Security firm Trellix uncovered a new cryptojacking operation that spreads through pirated software installers and installs a customized XMRig miner. The malware uses a controller named Explorer.exe for persistence and a signed driver (WinRing0x64.sys, CVE‑2020‑14979) to gain kernel access, boosting...
Dell has issued an urgent advisory for RecoverPoint for Virtual Machines after discovering CVE‑2026‑22769, a critical 10.0 CVSS flaw that embeds admin credentials in its Tomcat‑based web layer. The vulnerability allows unauthenticated attackers to log in as administrators, upload malicious...
The article argues that insider threats could dramatically lower the barriers to satellite hacking, as insiders can bypass air‑gap protections and exploit the growing use of off‑the‑shelf Linux hardware. It highlights how complex supply chains, contractor relationships, and recent geopolitical...

CRN’s Security 100 list spotlights 20 security‑operations, risk and threat‑intelligence vendors that distinguished themselves in 2026. The roundup underscores a rapid shift toward AI‑driven, agentic SOC solutions that automate triage, investigation and response. Companies such as 7AI, Arctic Wolf, Google Cloud and...

Microsoft confirmed a bug in its 365 Copilot Chat that allowed the AI to read and summarize customers' confidential emails for weeks, even when data‑loss‑prevention policies were in place. The issue, tracked as CW1226324, affected both draft and sent messages...

Poland’s senior army commanders have issued a directive barring Chinese‑manufactured cars from entering protected military facilities. The move targets vehicles whose sensors, software or connectivity modules could transmit location and other sensitive data. It aligns Poland with recent U.S. and...
The most exposed lady in the cloud? Lady S3 Bucket. ☂️ If you use AWS, you know the shame. Public access is NOT a vibe. https://youtube.com/shorts/q_T0RC87aRg #DevOps #CloudComputing #Security

At the Abu Dhabi Finance Week summit, an unsecured cloud server exposed the passports and national ID cards of more than 700 attendees, including former British Prime Minister David Cameron, hedge‑fund billionaire Alan Howard, and former White House communications director...

A decade after the 2016 DAO hack, the DAO Security Fund will stake roughly 75,000 dormant ETH—now worth about $150 million—to generate yield for Ethereum security initiatives. The fund will keep claims open indefinitely for original token holders and shift from...

Amazon’s Ring introduced the “Search Party” feature, allowing users to share video clips from their doorbell cameras with friends, family, or law‑enforcement agencies to help locate missing persons. The rollout triggered immediate privacy backlash from civil‑rights groups who argue the...

The migration of data processing from centralized servers to edge devices is reshaping QA strategies for IoT pipelines. Unstable networks, fragmented device fleets, and expanded attack surfaces demand testing that goes beyond functional checks. Specialized IoT testing services now employ...
Pathology labs are accelerating digital transformation, but integrating laboratory information systems (LIS) with imaging management systems (IMS) remains a hurdle. Cybersecurity and image management top the agenda as AI-driven diagnostics expand. Cloud‑based LIS‑IMS solutions promise stronger security controls and scalable...

Security, IT and engineering teams face pressure to accelerate outcomes while extracting AI value, yet 88% of AI proofs‑of‑concept never reach production despite 70% of workers seeking time‑saving automation. The Hacker News article outlines three pre‑built intelligent‑workflow use cases—automated phishing response,...

ClickFix is weaponizing a fake Homebrew installation workflow to deliver Cuckoo Stealer, a macOS credential‑stealing RAT. The campaign uses typosquatted domains such as homabrews.org that mimic brew.sh and inject a malicious curl | bash command into the clipboard, prompting developers to run it....

The article argues that traditional security dashboards hide the true predictors of a breach, emphasizing metrics that expose process debt, access sprawl, and human behavior. It highlights four high‑impact signals: credential reuse and identity drift, stale access paths, alert‑fatigue ratios,...
Enterprise networks face unprecedented strain as AI workloads surge, generating unpredictable, high‑volume traffic across regions. A recent Broadcom study shows only 49% of organizations believe their networks can meet AI’s bandwidth and latency demands, despite 99% adopting cloud strategies. Retrieval‑augmented...
Generative AI’s rapid consumer adoption has exposed enterprises to data leakage risks, prompting security teams to reassess protection strategies. Traditional DLP solutions are expensive and cumbersome, limiting their use to large organizations. Two viable paths emerge: purchasing enterprise‑grade GenAI licenses...
IntelliGenesis launched CYBERSPAN, an AI‑driven network detection and response solution tailored for managed security service providers. The platform offers a multi‑tenant, agentless architecture that can be deployed on‑premises or in the cloud, integrating with existing SIEM, SOAR and ticketing tools...

Actionstep, a cloud‑based practice‑management platform used by nearly 5,000 law firms, announced completion of its SOC 2 Type 2 examination conducted by Prescient Assurance. The audit evaluated both the design and operating effectiveness of the company’s security controls over a defined period, providing...
🔥🔥🔥 This hits on something that has bothered me for most of my career... Much of what orgs do to "assess risk" is largely performative, and has very little do with actual risk. Impact is what matters. Your AI Pentester Found...
OpenAI and Paradigm launched EVMbench, a benchmark testing AI agents’ ability to detect, patch, and exploit real smart contract vulnerabilities. What's the meaning of it? Come join us! https://t.co/2YgOdrosIO

SANS Institute and cybersecurity firm siberX have launched NOW // AI, an immersive simulation program built on the SANS AI Blueprint. The curriculum targets executives and security teams, focusing on three pillars—Protect AI, Utilize AI, and Govern AI—to tighten risk...
Identity and supply chain need more attention, risk intelligence firm says | Cybersecurity Dive https://t.co/917wKw3CC3
A new investigation from @AmnestyTech found that a journalist in Angola was targeted with Predator spyware in 2024. We also know that @citizenlab found links to Predator infrastructure in Angola in 2023, and links to FinFisher infrastructure in 2015. https://t.co/N2TIUdGKkn

The European Parliament banned AI chatbots like Claude and Copilot from lawmakers' devices, citing cybersecurity risks from cloud data uploads to US firms https://t.co/KCPJ57Qqs1 #ArtificialIntelligence #Innovation #Technology #Tech #TechNews https://t.co/uigKl4zdY7
When hacker named "Waifu" and "Judische" made death threats against security researcher Allison Nixon, she had no idea why he targeted her. So she set out to unmask him. The quest led her to Connor Moucka, a 25-yr-old behind infamous...
Why Cybersecurity Strategies and Frameworks Must Be Recalibrated in the Age of AI and Quantum Threats by @ChuckDBrooks https://t.co/KGZ9x9TO0T #CyberSecurity #ai #Quantum
PANW strong q/good initial guide with CyberArk. The need for AI-native, integrated security platforms rather than fragmented point solutions is further increasing demand for PANW platform. AI increasing PANW’s value proposition-not displacing it. $225 PT..very well positioned🏆