
Advantest Cyberattack Triggers Ransomware Investigation Across Internal Network
Advantest Corp., a Tokyo‑listed semiconductor test equipment maker, disclosed a cyberattack that surfaced on February 15, when unusual activity triggered its incident‑response protocols. Preliminary analysis suggests an unauthorized third party infiltrated parts of the internal network and deployed ransomware, prompting system isolation and engagement of external cybersecurity specialists. The company is still assessing the scope of the breach, including any potential exposure of customer or employee data, and evaluating financial ramifications. Advantest has pledged transparent updates as the investigation progresses.

Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox V147
Mozilla released an out‑of‑band update, Firefox v147.0.4, to fix a high‑severity heap buffer overflow in the libvpx video codec (CVE‑2026‑2447). The flaw, discovered by researcher jayjayjazz, could allow attackers to execute arbitrary code by delivering crafted VP8/VP9 video streams. Parallel patches...
Singapore Warns That Vulnerabilities Span the Entire Space Value Chain
Singapore has launched its National Space Agency and warned that cyber‑vulnerabilities permeate every stage of the space value chain, from satellites to ground networks. The February 2022 KA‑SAT attack, which knocked out communications and energy services across Europe, underscored the systemic...

South Africa’s Cybersecurity Challenge Is Not a Tool Problem
South African enterprises are pouring significant budgets into cybersecurity tools, yet breach rates keep rising. The core issue is execution: security teams are overwhelmed by data and lack the capacity to turn visibility into action. Unified platforms like Rapid7’s Command...
Agentic AI Era: Cloud Security Shifts From Asset Protection to Identity-First Zero Trust
At the ETCIO Cloud Summit, leaders from Starbucks India and Jio argued that cloud security must shift from protecting static assets to continuously validating identities, especially as AI agents and autonomous workloads proliferate in hybrid environments. They emphasized that bots,...

Remote Access Abuse Drives Majority of Breaches
Arctic Wolf’s 2026 Threat Report reveals a dramatic shift toward data‑only extortion, which surged from 2% to 22% of incidents in 2025. Remote‑access tool abuse initiated 65% of non‑BEC breaches, while AI‑enhanced phishing powered 85% of BEC attacks. Ransomware remains common,...

From Acceleration to Exposure: Why AI Demands Mature AppSec
AI‑driven development is dramatically speeding code creation, reviews and releases, but application security (AppSec) has not kept pace. Autonomous AI actions now make decisions on dependencies, configurations and remediation, turning isolated flaws into system‑wide risks. When AppSec foundations are immature,...

Track Vulnerability Remediation with the Updated GitLab Security Dashboard
GitLab’s updated Security Dashboard, now in the 18.9 release, adds advanced filters and visualizations that let teams track vulnerability trends, remediation velocity, and risk scores across projects and groups. The dashboard calculates risk using vulnerability age, EPSS, and KEV data,...

Control, Alt, Influence: The Potential for US Cyber Operations in Iran
U.S. policymakers are weighing offensive cyber operations against Iran if diplomatic talks on the nuclear program collapse, positioning cyber as a central element of joint military action rather than a peripheral tool. Recent Senate testimony and statements from US Cyber...
N-Able Inc (NABL) Q4 2025 Earnings Call Transcript
N‑Able reported Q4 2025 revenue of $130 million, a 12% year‑over‑year increase, and ended the year with $540 million in annual recurring revenue, up 12% on a reported basis. Non‑GAAP adjusted EBITDA held steady at a 30% margin, while dollar‑based net revenue retention...

Tech Firms Must Remove ‘Revenge Porn’ in 48 Hours or Risk Being Blocked, Says Starmer
The UK government will amend the Crime and Policing Bill to require tech platforms to delete non‑consensual intimate images, including AI‑generated deepfakes, within 48 hours of notification. Enforcement will be handed to Ofcom, which can levy fines up to 10%...
Nigerian Man Sentenced to Eight Years in Prison for Computer Intrusion and Theft
A Nigerian national living in Mexico was sentenced to eight years in federal prison and ordered to pay $1.39 million in restitution for a five‑year scheme that compromised Massachusetts tax‑preparation firms. Using phishing emails and Warzone RAT malware, he harvested taxpayer...

Sumo Logic Moves Into Sovereign Cloud Regions in Europe
Sumo Logic announced the extension of its cloud‑native analytics platform into the AWS European Sovereign Cloud and an AWS data center in Switzerland. The move lets customers keep logs, telemetry, and security data within national borders, satisfying GDPR and other...

AI Agents and How to Govern Them: Tailscale, Sayvint Offer Solutions
AI agents are moving from occasional chat tools to always‑on assistants, prompting enterprises to confront identity‑governance gaps. Tailscale introduced Aperture, an open‑alpha governance layer that ties AI usage to user or workload identities, offering policy controls, audit‑ready session logs, and...
Oklahoma Cheyenne and Arapaho Tribes Say Ransomware Disrupted Tribal Systems
The Cheyenne and Arapaho Tribes of Oklahoma were hit by a ransomware attack that forced the shutdown of their computer networks, halting email, phone services and some tribal operations. Tribal Governor Reggie Wassana confirmed the disruption while recovery efforts began....

EMudhra Self-Certified as MOSIP System Integrator for Digital ID Projects at Scale
Indian digital‑ID specialist eMudhra has completed self‑certification as a Modular Open Source Identity Platform (MOSIP) system integrator, joining the MOSIP Marketplace. The certification confirms its software and hardware meet MOSIP’s rigorous technical, operational and security standards, enabling it to deliver...

Dataminr Report: Cyber Risk Shifted in 2025 with Increased Threat Actor Activity and Mega-Loss Events
Dataminr’s 2026 Cyber Threat Landscape Report shows a dramatic shift in cyber risk during 2025, with threat‑actor alerts soaring 225% year‑over‑year. Identity‑based intrusions now account for nearly 30% of attacks, driven by an 84% rise in infostealer malware and AI‑enhanced...

Cryptojacking Campaign Exploits Driver to Boost Monero Mining
Security firm Trellix uncovered a new cryptojacking operation that spreads through pirated software installers and installs a customized XMRig miner. The malware uses a controller named Explorer.exe for persistence and a signed driver (WinRing0x64.sys, CVE‑2020‑14979) to gain kernel access, boosting...
Dell Warns of RecoverPoint for VMs Zero-Day (Exploited Since Mid-2024)
Dell has issued an urgent advisory for RecoverPoint for Virtual Machines after discovering CVE‑2026‑22769, a critical 10.0 CVSS flaw that embeds admin credentials in its Tomcat‑based web layer. The vulnerability allows unauthenticated attackers to log in as administrators, upload malicious...
Why Insider Threats May Make Satellite Hacking Significantly Easier
The article argues that insider threats could dramatically lower the barriers to satellite hacking, as insiders can bypass air‑gap protections and exploit the growing use of off‑the‑shelf Linux hardware. It highlights how complex supply chains, contractor relationships, and recent geopolitical...

The 20 Coolest Security Operations, Risk And Threat Intelligence Companies Of 2026: The Security 100
CRN’s Security 100 list spotlights 20 security‑operations, risk and threat‑intelligence vendors that distinguished themselves in 2026. The roundup underscores a rapid shift toward AI‑driven, agentic SOC solutions that automate triage, investigation and response. Companies such as 7AI, Arctic Wolf, Google Cloud and...

Microsoft Says Office Bug Exposed Customers’ Confidential Emails to Copilot AI
Microsoft confirmed a bug in its 365 Copilot Chat that allowed the AI to read and summarize customers' confidential emails for weeks, even when data‑loss‑prevention policies were in place. The issue, tracked as CW1226324, affected both draft and sent messages...

Poland Bans Chinese-Made Cars From Entering Military Sites
Poland’s senior army commanders have issued a directive barring Chinese‑manufactured cars from entering protected military facilities. The move targets vehicles whose sensors, software or connectivity modules could transmit location and other sensitive data. It aligns Poland with recent U.S. and...

Global Leaders, Executives Exposed in Data Leak
At the Abu Dhabi Finance Week summit, an unsecured cloud server exposed the passports and national ID cards of more than 700 attendees, including former British Prime Minister David Cameron, hedge‑fund billionaire Alan Howard, and former White House communications director...

From 2016 Hack to $150M Endowment: The DAO’s Second Act Focuses on Ethereum Security
A decade after the 2016 DAO hack, the DAO Security Fund will stake roughly 75,000 dormant ETH—now worth about $150 million—to generate yield for Ethereum security initiatives. The fund will keep claims open indefinitely for original token holders and shift from...

Amazon Fends Off Blowback for Ring’s Search Party Tool
Amazon’s Ring introduced the “Search Party” feature, allowing users to share video clips from their doorbell cameras with friends, family, or law‑enforcement agencies to help locate missing persons. The rollout triggered immediate privacy backlash from civil‑rights groups who argue the...

Safeguarding IoT & Edge Data Pipelines: QA Best Practices
The migration of data processing from centralized servers to edge devices is reshaping QA strategies for IoT pipelines. Unstable networks, fragmented device fleets, and expanded attack surfaces demand testing that goes beyond functional checks. Specialized IoT testing services now employ...
Pathologists, Vendors Talk LIS-IMS Integration
Pathology labs are accelerating digital transformation, but integrating laboratory information systems (LIS) with imaging management systems (IMS) remains a hurdle. Cybersecurity and image management top the agenda as AI-driven diagnostics expand. Cloud‑based LIS‑IMS solutions promise stronger security controls and scalable...

3 Ways to Start Your Intelligent Workflow Program
Security, IT and engineering teams face pressure to accelerate outcomes while extracting AI value, yet 88% of AI proofs‑of‑concept never reach production despite 70% of workers seeking time‑saving automation. The Hacker News article outlines three pre‑built intelligent‑workflow use cases—automated phishing response,...

ClickFix Exploits Homebrew Workflow to Deploy Cuckoo Stealer for macOS Credential Theft
ClickFix is weaponizing a fake Homebrew installation workflow to deliver Cuckoo Stealer, a macOS credential‑stealing RAT. The campaign uses typosquatted domains such as homabrews.org that mimic brew.sh and inject a malicious curl | bash command into the clipboard, prompting developers to run it....

Security Metrics That Actually Predict a Breach
The article argues that traditional security dashboards hide the true predictors of a breach, emphasizing metrics that expose process debt, access sprawl, and human behavior. It highlights four high‑impact signals: credential reuse and identity drift, stale access paths, alert‑fatigue ratios,...
AI Likely to Put a Major Strain on Global Networks—Are Enterprises Ready?
Enterprise networks face unprecedented strain as AI workloads surge, generating unpredictable, high‑volume traffic across regions. A recent Broadcom study shows only 49% of organizations believe their networks can meet AI’s bandwidth and latency demands, despite 99% adopting cloud strategies. Retrieval‑augmented...
A New Approach for GenAI Risk Protection
Generative AI’s rapid consumer adoption has exposed enterprises to data leakage risks, prompting security teams to reassess protection strategies. Traditional DLP solutions are expensive and cumbersome, limiting their use to large organizations. Two viable paths emerge: purchasing enterprise‑grade GenAI licenses...
CYBERSPAN Brings AI-Driven, Agentless Network Detection to MSSP Environments
IntelliGenesis launched CYBERSPAN, an AI‑driven network detection and response solution tailored for managed security service providers. The platform offers a multi‑tenant, agentless architecture that can be deployed on‑premises or in the cloud, integrating with existing SIEM, SOAR and ticketing tools...

SANS and siberX Introduce NOW // AI to Help Leaders Manage AI Risk, Strengthen Security Controls, and Defend Enterprise Value
SANS Institute and cybersecurity firm siberX have launched NOW // AI, an immersive simulation program built on the SANS AI Blueprint. The curriculum targets executives and security teams, focusing on three pillars—Protect AI, Utilize AI, and Govern AI—to tighten risk...

New SysUpdate Variant Malware Discovered, Decryption Tool for Linux C2 Traffic Released
Researchers at LevelBlue identified a new SysUpdate variant targeting Linux systems, packaged as a packed ELF64 binary that mimics a system service. The malware employs a custom, multi‑layered symmetric cipher to encrypt its command‑and‑control traffic across several protocols. By emulating...

Lasso’s Intent Deputy Secures AI Agents Through Real-Time Behavioral Intent Analysis
Lasso Security unveiled Intent Deputy, a runtime behavioral‑intent framework that secures autonomous AI agents by interpreting their decision flow and operational context. The solution claims 99.83% threat detection at sub‑50 ms latency and a 570‑fold cost advantage over cloud‑native guardrails. By...

Suped Review – Features, User Experience, Pros & Cons (2026)
Suped is a cloud‑based DMARC monitoring platform aimed at small to mid‑size businesses, offering a visual dashboard, guided DNS setup, and an AI Copilot that translates technical errors into plain‑language tasks. Users can onboard in minutes and see initial data...

KnowBe4 Report Reveals U.S. Public Sector Faces Unrelenting Cyber Threats
KnowBe4 released a white paper highlighting the U.S. public sector’s exposure to escalating cyber threats, with ransomware affecting an estimated 43 % of local governments by 2025. The report identifies four core challenges: relentless attacks, chronic staffing shortages, mounting compliance pressures,...

Microsoft Defender Update Lets SOC Teams Manage, Vet Response Tools
Microsoft Defender now includes a Library Management feature that lets security operations centers (SOCs) organize, preview, and control the scripts and tools used in live response. Analysts can upload PowerShell, batch, and other response files ahead of investigations, making them...

AWS Coding Agents Gain New Plugin Support Across Development Tools
AWS introduced Agent Plugins, a framework that equips AI coding assistants with native AWS capabilities. The initial "deploy‑to‑AWS" plugin lets developers issue natural‑language prompts to generate architecture recommendations, cost estimates, and infrastructure‑as‑code templates. It currently integrates with Claude Code and...
The New Paradigm for Raising up Secure Software Engineers
AI‑assisted coding is set to dominate enterprise development, with Gartner projecting 90% of engineers using AI assistants by 2028. As AI automates line‑level vulnerability detection, security teams face a surge in code volume and reduced review windows. This forces a...

The Defense Industrial Base Is a Prime Target for Cyber Disruption
Cyber adversaries are moving beyond classic espionage to disrupt the defense industrial base (DIB), aiming to cripple production capacity and supply chains. Attackers now target everything from large primes to niche startups, especially firms with dual‑use technologies, using ransomware and...

New Phishing Campaign Exploits Booking.com Partners, Targets Customers in Multi-Stage Fraud Scheme
A coordinated phishing campaign is exploiting Booking.com’s partner platform to steal hotel staff credentials and then target guests with payment‑stealing lures. The operation uses a three‑stage chain: email phishing to hotel inboxes, a bespoke partner login kit to harvest credentials,...

Everyone Uses Open Source, but Patching Still Moves Too Slowly
Enterprise security teams now rely on open source for core infrastructure, development pipelines, and production applications, yet patching cycles remain sluggish. TuxCare’s 2026 Open Source Landscape Report shows that 60% of recent incidents involved known vulnerabilities that were not patched...

Regtech SlowMist Exposes Supply Chain Threats in ClawHub’s AI Plugin Ecosystem
SlowMist has uncovered a wave of supply‑chain attacks targeting ClawHub, the official plugin repository for the OpenClaw AI agent framework. Over 340 malicious plugins were identified among roughly 3,000 listings, many embedding Base64‑encoded commands in the SKILL.md documentation that download...
Understanding the U.S. Coast Guard’s Maritime Cybersecurity Framework
The U.S. Coast Guard’s Cybersecurity in the Marine Transportation System rule took effect in July 2025, imposing mandatory cybersecurity and incident‑response plans for U.S.-flagged vessels, OCS facilities and MTSA‑covered sites. Owners must appoint a Cybersecurity Officer, enforce account lockouts, maintain...
Government Explores Unified ID and Verification System for Businesses
The UK Department for Business and Trade has signed a 10‑week, £300,000 contract with Deloitte to explore a unified digital business ID that would provide a single login and a cross‑government business entity directory. The discovery phase will assess existing...
GDS Public Sector Monitoring ‘Finding and Fixing over 100 Critical Vulnerabilities a Month’
The Government Digital Service’s Vulnerability Monitoring Service (VMS), launched in summer 2024, now has over 700 public‑sector organisations signed up and is detecting more than 100 critical vulnerabilities each month. Offered free through the National Cyber Security Centre, the service...

Singapore & Its 4 Major Telcos Fend Off Chinese Hackers
Singapore’s Cyber Security Agency and the nation’s four major telcos (M1, Simba Telecom, Singtel, StarHub) launched the "Cyber Guardian" operation, expelling the China‑linked threat actor UNC3886 after an 11‑month campaign. The attackers breached critical network segments but did not steal...