What's happening: Cloudflare pushes agile SASE with Cloudflare One to replace legacy VPNs
Cloudflare announced a series of technical deep‑dives showcasing its Cloudflare One agile SASE platform as a remedy for fragmented legacy VPNs and hardware firewalls. The solution uses a single‑pass architecture that runs security checks across a global network spanning over 300 cities, removing service‑chaining bottlenecks. It also integrates zero‑trust capabilities.
Also developing:

Revolut’s latest report shows encrypted messaging apps now dominate Authorised Push Payment (APP) fraud, with Telegram accounting for over 58% of job‑related scams. The platform’s share of total APP fraud rose more than 30% year‑over‑year, overtaking WhatsApp in several categories. Meta‑owned services still generate the largest slice of fraud overall, responsible for 44% of cases, while WhatsApp and Telegram together comprise 60% of investment scams. The findings highlight a shift toward “secure” messaging channels as prime fraud vectors.

Microsoft has broadened its first‑sign‑in restore experience, part of Windows Backup for Organizations, to include hybrid‑managed devices, multi‑user setups, and Windows 365 Cloud PCs. The feature lets users who sign in with a Microsoft Entra ID account restore personal settings and...

Cybercriminals are increasingly targeting high‑net‑worth individuals, exploiting the wealth of personal and financial data stored online. The FBI reports $16.6 billion lost to internet‑enabled crimes in 2024, highlighting the scale of the threat. Family offices, positioned as trusted advisors, can extend...

Almost a third of UK businesses experienced a remote‑working related cyber breach in the past year, with phishing responsible for 85% of incidents. The Cyber Security Breaches Survey 2025 shows larger firms are most affected, reporting breach rates of 67%...

Enterprise adoption of generative AI tools is soaring, with nearly one in twenty companies regularly using them and internal data uploads to public models increasing thirty‑fold year‑on‑year. Employees often paste confidential contracts or credentials into tools like ChatGPT, unintentionally turning...

Meta’s 2021 global outage highlighted how a coordinated, cross‑functional incident response team can limit downtime and reputational harm. The article uses that case to illustrate the challenges smaller firms face when structuring such teams. It outlines essential roles—Incident Commander, Technical...

Security firm Truffle Security revealed that publicly exposed Google API keys can be upgraded to full‑access Gemini credentials, enabling data exfiltration from any organization using them. A November scan uncovered 2,863 such keys, affecting major banks, security vendors, and even...

Ribbon Communications announced a strategic collaboration with Amazon Web Services to deliver a cloud‑native, secure voice communications suite on AWS Marketplace. The offering bundles Ribbon’s Session Border Controller, policy routing engine, and centralized management platform as containerized services optimized for...

ResidentBat is a custom Android spyware implant deployed by the Belarusian KGB to turn seized smartphones into persistent surveillance tools. The malware is sideloaded via Android Debug Bridge after physical access, granting extensive data collection and remote‑wipe capabilities. First disclosed...

The EU Cyber Resilience Act (CRA) is set to overhaul security requirements for the global rail supply chain, targeting connected products and software. Nomad Digital hosted a webinar with experts from Alstom, Durham University and its own security team to...

Quantum‑era risk is no longer a distant theory; adversaries are already harvesting encrypted data to decrypt later when quantum computers mature. This "harvest‑now, decrypt‑later" model threatens long‑life information across government, finance, healthcare and private‑sector IP. CEOs must shift focus from...
To meet the stringent data‑privacy demands of enterprise insurance, the company abandoned the traditional multi‑tenant SaaS model and built a single‑tenant AI platform where each client receives an isolated database and compute environment. By eliminating middleware and moving business logic...

TrendAI, the enterprise arm of Trend Micro, released patches for eight vulnerabilities in its Apex One endpoint security suite. Two critical CVEs (2025‑71210 and 2025‑71211) could let remote attackers upload malicious code and execute commands via the management console, while six high‑severity...

Payments platform Ecommpay released a free whitepaper titled “E‑commerce fraud defence: A quick guide for merchants.” The guide details nine top fraud threats, including friendly fraud, refund fraud, account takeover and AI‑powered deepfakes, and offers actionable mitigation tactics. Ecommpay claims...

Samsung SDS released its 2026 cybersecurity outlook, highlighting five priority threats: AI‑driven attacks, ransomware, cloud misconfigurations, phishing/account takeovers, and data security gaps. The report, based on 667 Korean security professionals, warns that generative AI and autonomous agents will intensify phishing,...

Wireshark 4.6.4 releases address two critical dissector vulnerabilities—a crash in the HTTP3 dissector and an infinite loop in the MEGACO dissector. The update also resolves a plugin compatibility problem introduced by an API/ABI change in version 4.6.1, restoring functionality for...

The IRS Criminal Investigation report shows tax‑related financial crimes hit $4.5 billion in FY 2025, a 111.8 % jump from the prior year, signaling heightened risk this tax season. Cybercriminals are leveraging generative AI to produce hyper‑personalized phishing, deepfake voice and video scams,...

Intellicheck launched an enriched Desktop Application that lets organizations of any size stop identity theft and fraud instantly, without needing system integration. The solution works with existing scanners, incurs minimal cost, and stores transaction history securely in the cloud via...

The Ministry of Housing, Communities and Local Government (MHCLG) has released a Local Government Reorganisation Digital and Cyber Playbook to help councils navigate digital, data and cybersecurity challenges during structural changes. Developed with input from local and central government, sector...

LM Studio and Tailscale have launched LM Link, a feature that lets developers access remote GPU rigs as if they were locally attached. The solution replaces public APIs and SSH tunnels with a private, WireGuard‑encrypted tunnel built on Tailscale’s userspace tsnet...
_(36).jpg)
From 4 March 2026 the Australian government will enforce minimum security standards for all smart devices sold in the market, shifting compliance from voluntary guidance to mandatory requirement. The IoT Alliance Australia (IoTAA) is spearheading a voluntary Security Labelling Scheme, slated to...
FedRAMP, the federal cloud security authorization program, is becoming a critical benchmark for eDiscovery solutions as U.S. courts anticipate over 400,000 lawsuits this year. Legal teams must verify that their cloud‑based discovery tools meet FedRAMP standards to prevent security breaches,...
UpGuard, the Hobart‑based cybersecurity firm, closed a $75 million Series C round led by Springcoast Capital, with participation from August Capital, Square Peg and Pelion Venture Partners. The capital will accelerate development of its AI‑powered cyber‑risk posture management (CRPM) platform, expand go‑to‑market operations,...
Keeper Security announced integration of the Kyber key encapsulation mechanism across its platform to deliver quantum‑resistant identity protection. The hybrid approach layers lattice‑based Kyber on existing elliptic‑curve primitives, securing backend APIs, Keeper Commander, and upcoming mobile apps. This rollout aligns...

Singapore is bolstering its cybersecurity ecosystem through a multi‑pronged strategy that includes large‑scale cyber‑drills, senior leadership training, and youth programmes to grow a skilled talent pipeline. The Cyber Security Agency and the Ministry of Digital Development coordinate rapid response to...

UFP Technologies, a $600 million medical‑device maker, disclosed a cyberattack detected on February 14 that compromised several IT systems. The company isolated the breach, removed the threat and engaged external advisors, but confirmed that data was stolen and some functions, such as...

Cisco Duo unveiled Delegated Access, a feature that lets Managed Service Provider (MSP) technicians authenticate to client applications using a single Duo user account. The solution centralizes MFA policy, logs, and monitoring on the parent account while granting access to...
Clalit Health Services, Israel’s largest HMO, announced it is probing a suspected cyberattack after the Iranian‑linked group Handala claimed to have breached its systems. The hackers released thousands of documents containing patients' personal and medical information on public platforms. Clalit...

The Financial Action Task Force (FATF) warned that cyber‑enabled fraud is now a top money‑laundering threat in 90% of the jurisdictions it assessed. Singapore alone saw a 61% jump in scam cases over the past two years, while the United...

U.S. Cybersecurity and Infrastructure Security Agency (CISA) is reportedly operating at roughly 38% of its pre‑Trump staffing levels, after losing about one‑third of its workforce during the administration’s first year. The cuts have crippled core programs, including the counter‑ransomware initiative...

The Pentagon released an OT‑specific zero‑trust roadmap, the “fan chart,” outlining 84 baseline and 21 advanced activities to protect military operational technology. The guidance emphasizes asset visibility, risk‑operations centers, network segmentation, passive monitoring, and AI‑driven automation. Agencies are urged to...

ProGlove runs a SaaS platform on AWS using an account-per-tenant architecture, currently operating about 6,000 tenant accounts—half active—with over 120,000 service instances and a million Lambda functions. The approach gives each customer isolated compute, storage, and IAM boundaries, simplifying security,...

Choosing a VPN today means sifting through countless features, but the author argues that multi‑hop capability is the single most critical attribute. Multi‑hop routes traffic through multiple servers, preventing any one node from seeing both the user’s IP and the...

The PCI Security Standards Council published its inaugural 2025 annual report, the first since its 2006 founding, outlining a surge in payment‑system threats and the council’s expanding role. The report highlights accelerated attacks leveraging AI, ransomware incidents such as BridgePay,...

PXL Vision, Idiap Research Institute and Innosuisse have released a deepfake detector integrated into the PXL Ident platform. The tool, developed under the ROSALIND project, targets face‑swapping, reenactment and fully synthetic identities in ID documents. A companion Idiap paper benchmarks...
Space ISAC has announced a new quantum initiative, launching its first Quantum Community of Interest (COI) meeting on Feb. 25, co‑hosted with MITRE. The COI will explore how quantum technologies can strengthen security and resilience across space systems, which underpin critical...
UC Irvine computer scientists have uncovered a critical flaw in camera‑based autonomous target‑tracking drones, dubbed the FlyTrap attack. By attaching a specially designed visual pattern to an ordinary umbrella, attackers can trick drones into believing the target is receding, causing...

Resilience’s 2025 Cyber Risk Report reveals a decisive shift from ransomware‑focused disruption to extortion attacks that rely on stolen data. Data‑theft‑only extortion claims rose to 65 % of incidents in the second half of last year, turning cyber incidents into multi‑year...

Caspia Technologies announced the general availability of CODAx V2026.1, an AI‑enhanced RTL security analyzer that checks over 150 insecure coding practices against more than 1,000 hardware vulnerability references. The tool can scan half‑million lines of RTL in under an hour,...

Wynn Resorts disclosed that an unauthorized party accessed employee data after the casino‑hospitality firm appeared on ShinyHunters' extortion leak site. The group claims to have stolen more than 800,000 records, including Social Security numbers, from Wynn's Oracle PeopleSoft HR platform....

The United States and the European Union are negotiating the Enhanced Border Security Partnership (EBSP), which would grant visa‑free travel to EU citizens in exchange for access to European biometric databases. The latest draft does not explicitly prohibit the use...

The China‑aligned threat group UnsolicitedBooker has begun targeting telecommunications providers in Kyrgyzstan and Tajikistan. The campaign employs two custom backdoors, LuciDoor and MarsSnake, delivered through phishing emails that embed malicious Office macros and loaders such as LuciLoad. These implants can...

Georgia Tech researchers have uncovered critical weaknesses in the global threat‑intelligence supply chain, highlighting how inconsistent data quality and limited sharing impede rapid response. Their study, presented at the NDSS Symposium, found that while 67% of vendors sandbox suspicious binaries,...

PowerSchool and Chicago Public Schools have agreed to a $17.25 million settlement to resolve a class‑action lawsuit accusing the ed‑tech firm of covertly recording student communications. The fund will be divided among more than 10 million potential class members and obligates PowerSchool...
German startup Solarsecure Tech introduced the SolarSecure Vision gateway, a hardware‑agnostic device installed at the meter connection point that intercepts and validates inverter‑to‑cloud communications. The gateway blocks unverified kill‑switch commands while allowing authenticated signals, including mandatory grid‑operator directives, to pass via a...

Russia‑linked threat group UAC‑0550, also known as DaVinci Group, launched a sophisticated social‑engineering campaign against a European financial institution that supports Ukraine. The attackers sent legal‑themed phishing emails from a counterfeit Ukrainian judicial domain, directing victims to download a ZIP...

Praetorian unveiled its AI‑driven CVE Researcher pipeline, automating the end‑to‑end analysis of new vulnerabilities from CISA’s KEV catalog. The system ingests a CVE ID and outputs research reports, technology reconnaissance, asset correlation, and validated Nuclei detection templates within minutes. Reported...

The NDSS 2025 paper introduces Borrowed Time, a countermeasure that protects integrated circuits from emerging static side‑channel attacks such as static power analysis, laser logic state imaging, and impedance analysis. By continuously monitoring a device and securely erasing key‑dependent data...

News publishers are increasingly replacing passwords with email‑based magic links or one‑time passcodes. Small‑scale outlets using platforms like Ghost, Substack, and Beehiiv cite reduced security overhead and faster onboarding as primary benefits. Industry voices argue that magic links combat password...

Scattered LAPSUS$ Hunters (SLH) is paying women $500 to $1,000 per call to conduct voice‑phishing attacks against IT help desks. The group supplies pre‑written scripts and leverages legitimate proxy services and tunneling tools to evade detection. These vishing campaigns aim...