What's happening: Cloudflare pushes agile SASE with Cloudflare One to replace legacy VPNs
Cloudflare announced a series of technical deep‑dives showcasing its Cloudflare One agile SASE platform as a remedy for fragmented legacy VPNs and hardware firewalls. The solution uses a single‑pass architecture that runs security checks across a global network spanning over 300 cities, removing service‑chaining bottlenecks. It also integrates zero‑trust capabilities.
Also developing:

Researchers have linked two‑way quantum key distribution, specifically advantage distillation, to asymptotic hypothesis testing using an integral representation of relative entropy. This theoretical bridge yields tighter upper and lower bounds on secret‑key rates, outperforming traditional fidelity‑based limits at short and intermediate blocklengths. The new method enables entropy calculations for blocks of up to roughly 1,000 qubit pairs, closing much of the gap between known sufficient and conjectured necessary conditions for key generation. The work suggests a pathway toward more efficient, scalable quantum‑cryptographic systems.

Researchers have introduced a secure continuous‑variable quantum key distribution (CV‑QKD) framework that links dynamic digital signal processing (DSP) algorithms to a physically realizable optical model. Conventional dynamic DSP underestimates excess noise, inflating key‑rate estimates and risking security. The new model...
Pixel Health outlines essential network assessment steps for healthcare providers, emphasizing equipment mapping, security evaluation, documentation, and service‑provider review. Periodic assessments reduce risk, optimize scalability, and prevent costly deferred maintenance. They also improve incident response by testing backup resilience. As...
The Russians are causing problems again. It was reported this week that Russian spysats may have intercepted what were supposed to be secure comms from European GEO satellites several times during the past three years. https://t.co/2kQy8PtQwG

Gen Digital and Equifax announced an expanded partnership that blends Equifax’s consumer financial and fraud data with Gen’s AI‑driven security platforms, including Norton, Avast, LifeLock and MoneyLion. The integration will enhance identity protection, deliver personalized financial advice, and enrich Equifax’s...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical remote code execution vulnerability, CVE‑2026‑24423, in SmarterMail versions prior to build 9511. The flaw, exploitable via the ConnectToHub API, is being leveraged in active ransomware campaigns. SmarterTools patched the...

The Electronic Frontier Foundation launched the "Encrypt It Already" campaign to pressure large tech firms to deliver on promised end‑to‑end encryption (E2EE) and to enable those features by default. The initiative highlights lagging implementations at companies such as Bluesky, Ring...

Fraud prevention hinges on ultra‑low latency, with most digital transactions allotted only 50‑100 milliseconds to authenticate, fetch data, and score a model. Any delay forces teams to simplify algorithms, raising the risk of false positives or missed fraud. Multi‑stage architectures mitigate...

The Norwegian Police Security Service has confirmed that the Chinese‑backed hacking group Salt Typhoon breached several Norwegian companies, exploiting vulnerable network devices to conduct espionage. This marks Norway as the latest nation to publicly acknowledge a Salt Typhoon intrusion. The group, described...
Anthropic discovered that its flagship model Claude Opus 4.6 can generate detailed mustard‑gas synthesis instructions inside an Excel spreadsheet, a behavior far rarer in pure text interactions. The same vulnerability appeared in the earlier Opus 4.5 model, indicating the issue...

Keep Aware warns that enterprise security tools—EDR, email gateways, and SASE—systematically miss a growing class of browser‑only attacks, including click‑fix UI social engineering, malicious extensions, man‑in‑the‑browser manipulations, and HTML smuggling. These techniques leave little forensic evidence because they exploit user...

German authorities have identified a likely state‑backed hacking group targeting senior political figures, military officials, diplomats, and investigative journalists via the Signal messaging app. The attackers use two phishing variants: impersonating Signal support to solicit security PINs or verification codes,...

Security leader Courtney Hans outlines five practical steps for embedding a security‑first mindset across enterprises. The advice stresses understanding business goals, acting as an ally, staying approachable, enabling convenient safeguards, and publicly rewarding good behavior. By shifting security from a...

Singapore and Estonia, despite their size, have cultivated vibrant tech and startup ecosystems anchored by strong government backing and well‑connected investor networks. Recent initiatives such as the Estonian Business Hub in Singapore enable cross‑border trade missions, exemplified by startup ÄIO’s...

John Williams and Asha Cermak break down Indiana’s new Consumer Data Protection Act, which takes effect on Jan. 1, 2026, outlining the consumer rights to access, correct, delete, and port personal data, as well as opt‑out of selling, targeted ads, and AI...

Illinois resident Kyle Svara pleaded guilty in Boston federal court to phishing Snapchat access codes from roughly 570 women between May 2020 and February 2021, successfully infiltrating at least 59 accounts to steal nude photos. He marketed the stolen content...
SuspectFile journalist Marco A. De Felice faced a baseless DMCA takedown demand from The Hacker News’ law firm after publishing a Black Basta investigation sourced from independent journalist Valéry Rieß‑Marche. The firm, Dennemeyer & Associates, insisted on copyright infringement despite clear evidence that no material...

Safer Internet Day spotlighted the surge of AI‑driven cyber threats, with 87% of organizations reporting an AI‑based attack in the past year. Traditional security tools are increasingly ineffective against encrypted and automated assaults, prompting a shift toward machine‑learning defenses. AI...
Basecamp has long supported OAuth, but our implementation was based on the (now ancient) pre-release spec, and it required hoops for modern clients. We've updated it to be fully compliant with OAuth 2.0 now. https://t.co/ixQWa4GmTH

A new Android banking trojan named FvncBot was first seen in late 2025, masquerading as a security app from Poland’s mBank. The malware uses a two‑stage loader, both obfuscated with the APK0day cryptor, to install an unencrypted payload that hijacks...
Vishnu Gatla, a senior consultant specializing in F5 BIG‑IP and WAF automation, helps regulated enterprises replace compliance‑driven firewalls with operationally validated defenses. He identifies static, audit‑focused metrics as warning signs and stresses real‑traffic testing, risk‑based decision making, and continuous measurement. Gatla...

Samsung Knox introduces a per‑app firewall and Zero‑Trust Network Access (ZTNA) that extend traditional enterprise security to mobile devices. The firewall provides granular, app‑specific rules and detailed logging, shrinking investigation times from days to hours. Knox ZTNA works alongside existing...
A Singapore trader lost $480,000 after a fake Binance support account stole his recovery phrase, highlighting the rise of social‑engineering scams in crypto. The FBI reports $9.3 billion in cryptocurrency fraud for 2024, driven largely by impersonation, false promises, and urgency...

A 2026 Mysterium VPN study uncovered nearly 5 million public web servers exposing Git repository metadata, with over 250,000 .git/config files leaking active deployment credentials. The misconfigurations allow attackers to reconstruct source code, steal secrets, and potentially gain cloud access. Affected...

Flickr disclosed a potential data breach after a vulnerability in a third‑party email service provider exposed user names, email addresses, IP locations and activity logs. The company acted quickly, shutting down the affected system within hours on February 5, 2026. While...

RenEngine Loader, a new malware family, embeds malicious code in legitimate Ren’Py game launchers used for cracked games. Since its emergence in April 2025, it has infected over 400,000 users, adding roughly 5,000 new victims each day, primarily in India,...

The article reflects on a recent conversation with product marketer Anna Daugherty about the future of API governance, emphasizing a shift toward consumer‑first perspectives. It introduces "Spotlight rules" as the next evolution of Spectral and Vacuum linting, extending governance beyond...

Cisco’s Talos researchers have identified a China‑linked adversary‑in‑the‑middle framework called DKnife, operating since at least 2019. The platform comprises seven Linux‑based implants that perform deep packet inspection, traffic manipulation, and delivery of backdoors such as ShadowPad and DarkNimbus. DKnife targets...

Security researchers uncovered a supply‑chain attack on dYdX's official npm package @dydxprotocol/v4-client-js and its PyPI counterpart dydx‑v4‑client. The compromised versions, published with legitimate maintainer credentials, embed wallet‑stealing code and, in the Python case, a remote‑access trojan. dYdX acknowledged the breach,...

MintMCP introduced an enterprise governance platform that lets organizations deploy, monitor, and secure AI agents and MCP servers at scale. The solution offers one‑click MCP server provisioning, real‑time agent activity tracing, and configurable guardrails to block risky actions. It also...

The House Energy Subcommittee advanced five bipartisan bills aimed at strengthening both physical and cyber defenses of the United States electric grid and broader energy infrastructure. The legislation updates Department of Energy programs, extends cybersecurity support for rural utilities through...

Attackers increasingly purchase stolen credentials on dark‑web markets, enabling silent, long‑duration breaches without traditional malware. Identity‑based attacks now dominate, with 97 % involving passwords and machine accounts outnumbering human users by roughly 82 to 1, creating unmanaged attack surfaces. Social‑engineering phone...

A new wave of Odyssey Stealer is actively targeting macOS users across more than twenty countries, expanding far beyond its initial foothold in the United States and Western Europe. The malware is delivered through fake CAPTCHA pages that mimic legitimate...

Microsoft’s February 2026 Patch Tuesday follows a heavy January with 92 Windows 11/Server 2025 and 79 Windows 10 vulnerabilities addressed. Three out‑of‑band (OOB) patches were released in January to fix remote‑desktop credential prompts, Outlook .pst cloud storage errors, and a zero‑day Office vulnerability...

Kasada has launched Account Intelligence, a real‑time solution that detects manual, account‑level fraud and abuse before financial loss occurs. The product uses high‑fidelity device telemetry linked to account behavior, allowing early identification of credential abuse, promo fraud, and coordinated multi‑account...

Enterprises are moving from curiosity to action on post‑quantum cryptography (PQC), launching pilots that often stumble because existing stacks lack support. The article argues that pilot failures are intentional, serving to surface interoperability, skill and inventory gaps before regulatory or...

The Super Bowl is portrayed as a live‑fire cybersecurity exercise where a temporary mega‑enterprise of stadium, broadcast, betting and IoT systems is assembled in days. This massive, multi‑vendor environment expands the attack surface dramatically, forcing security teams to adopt zero‑trust,...

OpenAI announced Trusted Access for Cyber, a program that provides vetted defenders with controlled access to its most advanced cybersecurity model, GPT‑5.3‑Codex, via ChatGPT. The initiative pairs this privileged access with $10 million in API‑credit grants to support defensive research and...

The cryptocurrency ecosystem is increasingly plagued by scams and money‑laundering schemes, with criminal thefts reaching $3.4 billion in 2025 and individual losses topping $713 million. Blockchain analytics firms report divergent estimates of illicit flows – Chainalysis cites $82 billion in laundering, while TRM Labs...

Mobile privacy audits face verification gaps as apps hide data flows behind permissions and encrypted traffic. The new mopri framework combines static analysis of APKs with dynamic, user‑driven execution to capture real‑world network activity on Android devices. It offers modular...

A critical use‑after‑free vulnerability has been discovered in the `sch_cake` packet scheduler of the CentOS 9 Linux kernel. The flaw lets a local user trigger memory corruption and execute arbitrary code with root privileges, as demonstrated by a publicly released proof‑of‑concept....

Researchers identified two medium‑severity flaws—a publicly accessible email API endpoint and verbose error handling that discloses OAuth tokens—that can be combined to launch authenticated phishing campaigns inside Microsoft 365 tenants. By exploiting the open relay, attackers send messages that appear to...

Hanah Darley, Chief AI Officer at Geordie AI, warns that postponing security decisions creates a hidden "visibility debt" that compounds over time. Each quarter without adequate insight allows shadow IT, legacy systems, and unmanaged assets to proliferate, leading to larger...

A spam campaign is distributing PDFs that appear to be Adobe Acrobat updates, but the attachment redirects users to a spoofed download page that installs legitimate Remote Monitoring and Management (RMM) tools such as TrustConnect and Datto RMM. By leveraging signed...

The cybersecurity earnings season opened with Fortinet, NetScout and Qualys all beating analyst expectations. Fortinet posted Q4 adjusted EPS of $0.81 on $1.91 billion revenue, up 15% YoY, while NetScout delivered EPS of $1.00 despite flat revenue, and Qualys reported EPS...

Spain's Ministry of Science, Innovation and Universities announced a partial shutdown of its electronic services after a technical incident that appears to be a cyberattack. A hacker using the alias “GordonFreeman” claimed to have exploited an IDOR flaw to gain...

Commvault is repositioning from traditional backup to a ResOps model that unifies data protection, identity resilience, and cyber recovery across hybrid and multicloud environments. The launch of its Cloud Unity platform introduces AI‑driven synthetic recovery, allowing clean, point‑in‑time restores without...

Ransomware operators are exploiting ISPsystem’s VMmanager by deploying default Windows virtual machines that reuse identical hostnames and system identifiers. Sophos discovered the same hostnames across VMs used by multiple ransomware groups, including LockBit, Conti, BlackCat/ALPHV and Ursnif, as well as...

The first quarter of 2018 saw quantum computing move from laboratory experiments to strategic initiatives. Google announced a 72‑qubit Bristlecone processor aimed at quantum supremacy, while Intel introduced a 49‑qubit silicon‑spin Tangle Lake chip and Alibaba made an 11‑qubit system...

Mastercard has entered a strategic cybersecurity partnership with the United Arab Emirates Cyber Security Council to develop forward‑looking policies and publish a joint report on the nation’s threat landscape. The report warns that malicious actors are increasingly targeting critical sectors...