What's happening: Cloudflare pushes agile SASE with Cloudflare One to replace legacy VPNs
Cloudflare announced a series of technical deep‑dives showcasing its Cloudflare One agile SASE platform as a remedy for fragmented legacy VPNs and hardware firewalls. The solution uses a single‑pass architecture that runs security checks across a global network spanning over 300 cities, removing service‑chaining bottlenecks. It also integrates zero‑trust capabilities.
Also developing:
.webp?ssl=1)
A new phishing campaign is using LinkedIn private messages to deliver remote access trojans to enterprise networks. Attackers send self‑extracting WinRAR archives that contain a legitimate PDF reader, a malicious DLL, and a portable Python interpreter. The DLL is loaded via sideloading, while the Python script runs Base64‑encoded shellcode in memory, creating a persistent Run‑key RAT that evades traditional AV. Precise LinkedIn targeting and trusted tools let the campaign bypass email security and reach high‑value employees.

The article warns that generative AI is reshaping email insider threats, turning everyday tools like grammar checkers into vectors for intellectual property loss. Attackers now use AI‑crafted phishing emails and malicious attachments that bypass traditional filters, while browser extensions silently...

In episode #821 of Risky Business, hosts Patrick Gray and Adam Boileau, joined by BBC World Cyber Correspondent Joe Tidy, dissect a week of cyber news ranging from alleged U.S. attacks on Venezuela’s power grid to a major AWS console...

NSFOCUS has been placed in the Star Quadrant of MarketsandMarkets' Global DDoS Protection and Mitigation Security Market Forecast to 2030, marking its entry into the industry’s top tier. The ranking reflects NSFOCUS’s mature technology stack, broad solution portfolio, and expanding...
Businesses are abandoning passwords for B2C apps, citing high friction and security risks. Password resets cost about $70 each and cause significant support expenses, while passwordless solutions can boost conversion rates by more than 10%. The CIAM market is expanding,...
Data destruction is now a strategic imperative, requiring more than simple file deletion. Certified IT asset disposition (ITAD) vendors, especially those with R2v3, Appendix B, and Appendix C credentials, guarantee logical sanitization, physical destruction, and secure refurbishment. These certifications provide...
Coherent Corp. and Quside have demonstrated a mass‑manufacturable quantum entropy source using Coherent’s 6‑inch VCSEL line combined with Quside’s QRNG technology. The system generates true, verifiable randomness by measuring VCSEL phase fluctuations and includes real‑time entropy monitoring to detect tampering....
Everest ransomware announced a breach of McDonald’s India, claiming to have stolen 861 GB of customer and internal data. The leaked material reportedly contains financial reports, ERP migration files, investor contact lists, and store‑level employee details. HackRead published screenshots to substantiate...

Barnegat Township Police warned New Jersey residents of a hybrid fraud scheme that combines phone spoofing with a physical courier pickup to steal debit cards. Criminals pose as bank fraud agents, claim unauthorized out‑of‑state activity, and arrange a courier to...

Enzoic’s real‑time breach alerts can now be piped into Microsoft Sentinel using Azure Logic Apps, turning each webhook into a Sentinel incident. The guide walks through provisioning a Log Analytics workspace, creating a consumption‑based Logic App, parsing Enzoic’s JSON payload,...

UStrive, a nonprofit mentoring platform for students, fixed a security lapse that let any logged‑in user view personal data of others, including children. The flaw stemmed from a vulnerable Amazon‑hosted GraphQL endpoint, exposing at least 238,000 records containing names, emails,...

Mend.io launched an interactive AI Security Maturity Survey and a companion Compliance Checklist to help organizations assess and document AI risk. The tools map to OWASP AIMA, NIST AI RMF, ISO 42001 and the upcoming EU AI Act, delivering a personalized...
Airlock Digital released an independent Total Economic Impact study by Forrester Consulting showing a 224% return on investment and a $3.8 million net present value over three years for its allow‑listing solution. The research reports more than a 25% reduction in...

Zendesk reported a wave of mass spam campaigns that exploit its customer‑service platform to send phishing emails. The messages appear to originate from legitimate Zendesk subdomains, tricking recipients into opening malicious links. Zendesk clarified that the campaigns are not linked...

Researchers at NDSS 2025 examined defensive domain registrations by Fortune 500 firms, uncovering 19,523 domains registered across 447 companies. The study found most firms register only a handful of domains, yet they collectively rely heavily on online brand protection (OBP)...

Cybersecurity leaders are trapped in a zero‑risk mindset, chasing perfect audit scores while real threats evolve. The article argues that this pursuit leads to burnout, misallocated resources, and a false sense of security. It proposes a shift toward ruthless risk...

The European Commission has unveiled a comprehensive cybersecurity package that gives it authority to conduct EU‑wide risk assessments and restrict high‑risk foreign suppliers in critical telecom infrastructure. The proposal builds on the voluntary 5G Security Toolbox and expands the Cybersecurity...

2025 marked a turning point for space cybersecurity as the National Reconnaissance Office unveiled a centralized Space Cyber Program, while Ukraine publicly confirmed a 2023 hack on Russia’s Dozor‑Teleport satellite network. Academic research revealed that low‑cost satellite receivers can capture...

Data centers now feature layered physical safeguards, redundant systems and zero‑trust digital controls, creating a robust perimeter. Despite these defenses, most breaches stem from human error, especially phishing and weak passwords. The article highlights that 90 % of 2021 data breaches...
Digital wallets are evolving beyond UI to prioritize security architecture, payment infrastructure, and regulatory intelligence for 2026. Agentic commerce will enable AI agents to execute transactions autonomously, requiring cryptographic consent and continuous trust orchestration. Multi‑biometric authentication, AI‑driven predictive security, and...
High Lander Aviation, Abu Dhabi’s Technology Innovation Institute (TII) and venture builder VentureOne announced a strategic collaboration at UMEX 2026 to develop national‑level zero‑trust security standards for unmanned traffic management (UTM) in the UAE. The partnership will focus on end‑to‑end security...

E‑commerce retailers are shifting Philippine outsourcing from a pure cost play to a fraud‑resilience strategy as cyber threats intensify. Leading BPOs now embed machine‑learning, behavioral analytics, device intelligence and seasoned fraud analysts, delivering 40‑60% lower fraud losses, 50‑70% fewer false...

In 2024, smart‑contract vulnerabilities cost the Web3 ecosystem $1.42 billion across 149 incidents, with access‑control flaws alone responsible for $953.2 million. While the community debates perfect AI solutions, current AI‑powered static analysis tools already capture roughly 80 % of known issues, and models...

Cybersecurity AIOps combines AI, machine learning, and automation to transform traditional security operations. It enables real‑time threat detection, reduces human error, and shifts defenses from reactive to proactive. Key strategies include predictive analytics, automated response, alert prioritization, cross‑team collaboration, and...

Security vendors increasingly market ‘integrated’ platforms as a way to simplify protection, but most are merely stitched collections of separate tools. This architectural shortcut leaves each product with its own data model, causing delayed correlation and siloed response actions that...
PAI is a super power. @DanielMiessler created features on top of Claude Code that increase its efficacy by 50%... and that's a lot based on how awesome Claude Code is. Incoming FREE workshop of PAI and other tools I'm using to...

Signaloid announced that it has earned a SOC 2 Type II attestation, concluding a three‑month audit of its cloud infrastructure, data‑processing pipelines, and operational controls. The audit, performed by compliance specialist A‑LIGN, covered the period from July 1 to September 30, 2025,...
Sprocket Security announced the appointment of Eric Sheridan as its new Chief Technology Officer. Sheridan brings decades of cybersecurity and software engineering experience, along with multiple patents, to guide the firm’s technology vision. In his role, he will oversee engineering...

Identity Threat Detection & Response (ITDR) is positioned as the core security strategy for 2026, shifting focus from perimeter defenses to monitoring compromised accounts. The article highlights that identity‑based attacks are the most common threat, and traditional controls like MFA...

Universidad Politécnica de Madrid and Q*Bird have deployed Spain’s first operational multi‑node measurement‑device‑independent quantum key distribution (MDI‑QKD) network in Madrid. The hub‑and‑spoke architecture links two INTA facilities and the Ministry of the Interior’s SGSICS site, using Q*Bird’s Falqon® MQX4000 hub...

Ping Identity introduced Universal Services, a continuous identity assurance suite that extends trust beyond the login event to every digital interaction. The offering integrates with any existing identity provider via standard APIs, allowing enterprises to validate, re‑verify, and adapt protections...
South Korea’s largest mobile carrier, SK Telecom, has filed a lawsuit with the Seoul Administrative Court to overturn a record 135 billion‑won (US$91 million) fine imposed by the Personal Information Protection Commission for a massive data breach. The breach, disclosed belatedly, exposed...
Crypto criminals are increasingly buying stolen consumer databases to pinpoint high‑net‑worth individuals and siphon cryptocurrency. A breach at luxury conglomerate Kering exposed millions of shopper records, which a hacker purchased for $300,000 and cross‑referenced with other leaks. Using the combined...
Former defence secretary Sir Ben Wallace criticised the use of a secret gagging order to conceal a massive data breach at the Ministry of Defence that exposed the personal details of thousands of Afghan collaborators. The breach occurred after an...

PwC’s 29th Global CEO Survey reveals cyber risk has risen to a top‑three threat alongside macroeconomic volatility, with 31 % of CEOs rating their firms as highly or extremely exposed to significant financial loss from cyber attacks in the coming year....

3 things that will become non-negotiable for any chain that plans to operate in the long-term: Privacy, security, scale. - Privacy (by now it's obvious, and still) - because if we're to migrate our digital life -- financial and non-financial --...

HackerOne introduced the Good Faith AI Research Safe Harbor, a framework that grants legal protection to researchers testing AI systems in good faith. Building on its 2022 Gold Standard Safe Harbor for traditional software, the new program clarifies authorization, limits...

Two critical flaws were discovered in the open‑source AI framework Chainlit, allowing arbitrary file reads (CVE‑2026‑22218) and server‑side request forgery (CVE‑2026‑22219). The vulnerabilities can expose environment variables, API keys and cloud credentials, and enable attackers to forge authentication tokens for...

The City of London Police has unveiled a national "Report Fraud" service, replacing the older Action Fraud programme. The platform offers victims and businesses across England, Wales and Northern Ireland a single gateway to report cyber crime and fraud. By centralising...
In 2025 the healthcare sector saw breach incidents more than double, yet the total number of patient records exposed dropped sharply. The Fortified Health Security report, based on HHS OCR data, its own NIST Cybersecurity Framework assessments, and incident‑response experience,...
North West Ambulance Service NHS Trust disclosed nearly 400 data‑breach incidents over the past three years, with reports climbing from 75 breaches in 2022/23 to 143 the following year and 172 in the most recent period. Confidentiality failures dominated, accounting...

Security operations centers are plagued by alert fatigue because many tools are selected by executives without input from analysts. A BleepingComputer webinar on Jan. 29 will feature Sumo Logic experts discussing the disconnect between purchasing decisions and SOC needs. The session...
RansomHouse, a ransomware‑extortion group, alleges it breached Luxshare Precision Industry, a major Apple manufacturing partner, and accessed sensitive engineering data such as 3D CAD and PCB files. The group posted a victim profile on its dark‑web leak site, listing Apple...

Anthropic has patched three critical flaws in its Git MCP server that could be chained with the Filesystem MCP server to achieve remote code execution via prompt injection. The vulnerabilities – CVE‑2025‑68145 (path‑validation bypass), CVE‑2025‑68143 (unrestricted git_init), and CVE‑2025‑68144 (git_diff...
.webp?ssl=1)
Apache Airflow released version 3.1.6 to fix two credential‑exposure flaws (CVE‑2025‑68675 and CVE‑2025‑68438). The first flaw logged proxy URLs with embedded usernames and passwords, while the second allowed unmasked API keys and tokens in the Rendered Templates UI. Both issues affect...

Endace released OSm 7.3, a major update that dramatically speeds packet‑capture search and adds a Vault REST API for automated forensic data access. The new search engine delivers up to 50‑fold performance gains, cutting typical query times from nearly a minute...

Group‑IB warns that cybercrime has entered a fifth wave powered by weaponized AI, accelerating attacks with generative tools. Dark‑web marketplaces now sell synthetic identity kits and deep‑fake‑as‑a‑service for as little as $5, while AI‑enhanced phishing kits automate victim targeting and...

Orchid Security highlights the growing threat of orphan accounts—unused human, service, and AI identities that remain active across enterprise environments due to fragmented IAM and IGA processes. These hidden credentials, often with elevated privileges, have been leveraged in high‑profile breaches...

Radware announced its API Security Service, an end‑to‑end platform that safeguards APIs throughout their entire lifecycle using live production traffic. The solution tackles OWASP Top 10 API risks, including sophisticated Layer 7 DDoS attacks, by delivering continuous discovery, runtime posture management, and...