What's happening: Cloudflare pushes agile SASE with Cloudflare One to replace legacy VPNs
Cloudflare announced a series of technical deep‑dives showcasing its Cloudflare One agile SASE platform, positioning it as a single‑pass solution to the fragmentation of legacy VPNs and hardware firewalls. The platform runs security checks across a global network spanning over 300 cities, eliminating service‑chaining bottlenecks and integrating zero‑trust controls.
Also developing:

Imprivata has expanded its Enterprise Access Management platform with context‑aware passwordless authentication, AI‑powered risk signaling, and behavioral analytics. The new suite supports FIDO passkeys, facial recognition, and zero‑trust VPN‑less remote access, aiming to streamline access for frontline staff and knowledge workers. A recent Imprivata survey shows 85% of healthcare IT leaders view passwordless as mission‑critical, yet only 7% have fully adopted it, highlighting the need for integrated solutions. By unifying multiple authentication tools, Imprivata seeks to boost security, compliance, productivity, and reduce total cost of ownership.

Microsoft’s 2026 Global Online Safety Survey reveals that 58% of UK residents encountered a major online risk in 2025, with fraud and cyberbullying topping the list. Generative AI usage has surged to 28% weekly, up from 9% three years earlier,...

Portnox has broadened its zero‑trust network access (ZTNA) platform to include passwordless connectivity for console‑based protocols such as RDP, SSH, VNC and Telnet. The expansion removes credential‑based authentication, a vector behind roughly 80 % of data breaches, while preserving a frictionless...
Communications service providers are deploying AI in billing, service configuration and revenue recognition faster than they are building governance structures. McKinsey reports that while eight‑in‑ten firms use generative AI, only one percent consider their AI strategy mature, highlighting a gap...

SpecterOps has launched BloodHound Scentry, a managed service that pairs the BloodHound Enterprise platform with seasoned security practitioners to fast‑track identity attack‑path management (APM). The offering delivers tailored remediation, monthly threat analysis, privilege‑zone design, OpenGraph extensions, and custom reporting, promising...

Malwarebytes discovered a trojanized version of the popular 7‑Zip installer that silently adds proxyware payloads, turning compromised home computers into residential proxy nodes. The malicious installer is hosted on a look‑alike domain (7zip.com) and is often reached through erroneous links...

Armis introduced Centrix for Application Security, an AI‑driven platform that unifies vulnerability detection across the entire software development lifecycle. The solution scans source code, dependencies, container images and configuration files in unlimited languages, delivering context‑aware insights tied to the CI/CD...

A new APQC study shows only 41% of firms integrate cybersecurity into enterprise risk management (ERM), leaving a critical visibility gap. The report highlights that merely 23% apply unified risk structures to suppliers, despite third‑party breaches rising. CFOs can close...

Capitol AI announced Chester Leung as Vice President of Engineering, bolstering its leadership as the firm pushes AI tools deeper into workflows handling sensitive data. Leung brings a risk‑first mindset and extensive experience building secure, governance‑focused AI platforms, most recently...

Google expanded its “Results about you” tool to let users monitor and request removal of search results containing government‑issued IDs such as passports, driver’s licenses, and Social Security numbers. The feature builds on existing monitoring for phone numbers and home...

Versa has upgraded its Universal SASE Platform (v23.1.1) with advanced text‑analysis and OCR capabilities that can spot sensitive data hidden in documents and images, cutting false‑positive DLP alerts. The release also embeds a Model Context Protocol server, letting the Verbo...

Picus Security’s Red Report 2026, based on analysis of over 1.1 million malicious files and 15.5 million actions, shows threat actors now favor stealthy persistence and silent data exfiltration for extortion. Process injection remains the top technique for the third consecutive year, accounting...
Most digital engagement metrics are being polluted by bots, synthetic traffic, and identity spoofing, turning them from reliable signals into attack surfaces. Datavault AI is addressing this by building a verification‑first platform that authenticates human actions at the point of...
ANYbotics earned ISO/IEC 27001 certification after a multi‑stage audit, achieving zero non‑conformities on its first attempt. The certification validates the company’s world‑class Information Security Management System and signals maturity in security governance. It directly addresses the compliance concerns of energy and...

ID Dataweb announced it has again earned SOC 2 Type II attestation for its platform, confirming that its security, availability and confidentiality controls operate effectively over time. The audit, performed by an independent third party, validates continuous compliance with the AICPA...

Phantom wallet’s new chat feature has come under fire after an investor lost roughly $264,000 worth of wrapped Bitcoin in an address‑poisoning scam. Researchers traced the theft to a 3.5 wBTC transfer that leveraged a small‑value transaction in the victim’s history,...

Microsoft announced that Windows 11 will adopt smartphone‑style permission prompts, requiring user consent before apps can access files, cameras, microphones or install software. The rollout introduces a Baseline Security Mode that enforces runtime integrity by allowing only signed code to run,...

ZeroDayRAT, a commercial mobile spyware kit, provides full remote control of iOS and Android devices. Available through Telegram, the toolkit includes live camera streaming, keylogging, GPS tracking, and modules for bank credential harvesting and clipboard‑based crypto theft. Researchers at iVerify...

HaystackID announced on February 10, 2026 that Jeff Shapiro will serve as Managing Director for Europe, anchoring its Global Advisory practice in London. The appointment comes as the EU AI Act and Data Act enter critical enforcement phases, demanding localized...
Software developers: Prime cyber targets and a rising risk vector for CISOs | CSO Online https://t.co/BQaEUbegeO

Security firm Flare has uncovered a new Linux botnet named SSHStalker that relies on a suite of decade‑old exploits and IRC‑based control mechanisms. The malware chain deploys multiple C‑based and Perl IRC bots, leverages 19 Linux kernel vulnerabilities from 2009,...

The University of Edinburgh and Kyiv National University hosted an online student forum that gathered Ukrainian and UK experts to dissect drones, disinformation, civil resilience, and energy security, showing how Ukraine’s war is reshaping European security thinking. Panels highlighted drone‑induced...

Scammers have launched a Pride‑themed phishing campaign weeks before June, exploiting diversity messaging to steal employee credentials. The operation leverages compromised SendGrid accounts to send seemingly internal emails that either promise Pride branding or an opt‑out link, driving engagement regardless...
Pipelock is a single‑binary, zero‑dependency security harness designed for AI coding agents that need shell access and API keys. It isolates the agent process from unrestricted internet by routing all web traffic through a fetch‑proxy that applies a seven‑layer scanning...
Forcepoint X‑Labs uncovered a Phorpiex‑driven phishing campaign that weaponizes Windows shortcut (LNK) files to deliver Global Group ransomware. The emails use a double‑extension lure such as "Document.doc.lnk" and hide the true file type behind Windows’ default extension hiding. Once opened,...

The UK National Cyber Security Centre (NCSC) has issued an urgent alert to critical national infrastructure (CNI) providers, warning of "severe" cyber‑attacks that could disrupt essential services. The warning follows a coordinated malware strike on Poland’s energy grid in December,...

ZAST.AI announced a $6 million Pre‑Series A round led by Hillhouse Capital, bringing total funding near $10 million. The Seattle‑based startup claims its AI‑driven platform delivers “zero false‑positive” code security by automatically generating and validating proof‑of‑concept exploits. In 2025 the company uncovered...
Microsoft researchers uncovered a novel attack called GRP‑Obliteration that uses a single benign‑sounding prompt to strip safety guardrails from 15 major language and image models. By hijacking the Group Relative Policy Optimization training loop, the method rewards harmful completions, driving...

Law firms are turning to managed IT support to counter escalating cyber threats, meet strict compliance mandates, and sustain uninterrupted client service. Subscription‑based models replace ad‑hoc repairs, delivering predictable budgeting and scalable resources. Proactive monitoring curtails downtime, while secure remote‑work...
Cisco has donated its Project CodeGuard framework to the OASIS Open‑run Coalition for Secure AI (CoSAI). The model‑agnostic security coding agent embeds best‑practice rules across the entire software development lifecycle, from design through AI‑generated code to post‑generation review. CodeGuard integrates...
E‑commerce veteran Scot Wingo argues that merchants must decide whether to block or welcome AI bots that now crawl retail sites. Four major agents—ChatGPT, Google Gemini, Microsoft Copilot and Perplexity—collectively command roughly one billion monthly active users, and Google’s shift to AI...

The global secure mobile communications market is projected to expand from $28.5 bn in 2026 to $100.9 bn by 2033, reflecting a 19.8% compound annual growth rate. Growth is fueled by escalating cyber‑threats, stricter data‑privacy regulations, and the shift toward remote, mobile‑first...

Tax season in 2026 is seeing a surge in sophisticated IRS‑related scams, with fraudsters leveraging AI, phishing, and fake W‑2 schemes to steal personal data and refunds. Scammers impersonate the agency via email, text, or phone, demanding payment through gift...

DuckDuckGo has integrated AI-powered voice chat into its Duck.ai assistant, allowing users to converse with the model using spoken input. The company emphasizes that audio streams are processed in real time and are not stored after the session, with encryption...

SailPoint reports growing demand for adaptive identity security as enterprises grapple with an influx of non‑human identities such as AI agents, machines, and service accounts. The company unveiled its Agent Identity Security feature, enabling discovery, classification, and governance of these...

AlgoSec’s State of Network Security Report, based on over 500 global respondents, reveals enterprises are shifting toward unified policy control amid rapid cloud growth, AI‑driven traffic, and hybrid workloads. Sixty‑five percent of organizations have already adjusted to AI‑powered threats, with...

Australian fixed‑income firm FIIG Securities was hit with a AU$2.5 million civil penalty after the Federal Court found it failed to protect client data for over four years. A 2023 ransomware attack exfiltrated roughly 385 GB of personal and financial information belonging...

Google Translate switched to Gemini models in December 2025, and researchers have uncovered a prompt‑injection flaw that lets users bypass the translation engine entirely. By appending an English instruction after foreign‑language input, the system answers the instruction instead of translating....

The European Union Agency for Cybersecurity (ENISA) has published an updated International Strategy aimed at reinforcing the EU’s cyber‑defence ecosystem through selective global cooperation. The revision aligns partnerships with the EU’s policy objectives, highlighting collaborations with Ukraine, the United States,...

The EU’s Markets in Crypto‑Assets Regulation (MiCA) replaces disparate national rules with a single, EU‑wide framework for Crypto‑Asset Service Providers (CASPs). It mandates incorporation in an EU member state, a national licence, and capital thresholds ranging from €50,000 to €150,000...

The article highlights that most cyber breaches stem from basic hygiene failures—human error, unpatched software, weak authentication, and poor segmentation—rather than sophisticated exploits. Multi‑factor authentication (MFA) blocks the majority of automated attacks but remains vulnerable to fatigue and social‑engineering tricks....

Cybersecurity teams are drowning in disparate findings, while adversaries leverage AI to craft rapid attack chains. By integrating AI with the MITRE ATT&CK framework, organizations can generate dynamic heat maps that surface coverage gaps and model realistic attack paths. Platforms...

A dual Chinese‑St. Kitts and Nevis national, Daren Li, was sentenced in absentia to 20 years in prison for his role in an international cryptocurrency pig‑butchering scheme that stole over $73 million from U.S. victims. The fraud operated through a network of 74...
![Domain Spoofing (Noun) [Word Notes]](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://megaphone.imgix.net/podcasts/8797f03a-a50b-11ea-b6c0-87ebb093948d/image/hacking-humans-cover-art-cw.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress)
In this concise episode, host Rick Howard explains domain spoofing, a social engineering technique where attackers create malicious domains that closely resemble legitimate ones to deceive users. He outlines how the tactic works, its common vectors, and the potential damage...

EnforceAuth unveiled its AI Security Fabric, the first authorization platform built specifically to govern decisions made by AI agents, automated workflows, and machine identities in real time. The solution shifts security focus from static identity checks to contextual, decision‑centric controls,...

Senegal’s Directorate of File Automation (DAF) confirmed a cyberattack that forced a shutdown of national ID card, passport and biometric services. Ransomware group The Green Blood Group claims to have exfiltrated 139 TB of citizen records and posted samples on the...
Luxury watches are now treated as high‑value alternative assets, prompting collectors to seek institutional‑grade protection. WatchMatic has introduced the Watch Winder Safe Box, combining biometric fingerprint access, encrypted digital locks, and active humidity control to safeguard both security and watch...

In this episode, AM Best’s Toomey discusses how the growing cyber interconnectedness among businesses is forcing insurers to enhance their detection and response capabilities. He highlights the rising frequency and complexity of cyber incidents, the need for real‑time monitoring, and...

Andrew Northern, Principal Security Researcher at Censys, argues that mentorship is vital for preserving institutional memory and judgment under pressure in cybersecurity teams. He warns that when senior defenders disengage, the tacit knowledge needed to protect legacy‑heavy environments evaporates quickly....

AI agents are now automating the research and targeting phases of social engineering, turning weeks‑long preparations into minutes. This automation lowers both the skill threshold and cost for launching phishing and scam campaigns. Deepfake audio and video are being used...