News
CISO's predictions for 2026
1+ hour, 26+ min ago (979+ words) Last year was defined by AI hype, new attack models, and intensifying global tensions. As 2026 begins, security teams are asking what the next phase will look like. Will AI continue to accelerate risk, or will controls and governance finally catch…...
Smarter DDoS security at scale
2+ day, 14+ hour ago (167+ words) In today's digital landscape, encrypted traffic is the norm'not the exception. While encryption such as Transport Layer Security (TLS) 1.3 protects user privacy and data integrity, it also presents a growing challenge for security teams: How do you defend against threats…...
NETSCOUT recognized for leadership in network detection and response
2+ day, 14+ hour ago (516+ words) We're proud to share that NETSCOUT has been recognized for industry-leading excellence in'network detection and response (NDR). This acknowledgment, from Quadrant Knowledge Solutions' 2025 SPARK Matrix" for NDR, highlights what our customers already know: NETSCOUT delivers unmatched visibility, precision, and forensic…...
Trivial Telnet authentication bypass exposes devices to complete takeover
3+ day, 2+ hour ago (386+ words) Computers with Telnet open are in immediate danger of being compromised due to a critical vulnerability that allows attackers to bypass authentication. The Telnet remote access protocol has long been superseded by the more secure and encrypted SSH, but many…...
Fortinet confirms new zero-day attacks against customer devices
3+ day, 9+ hour ago (490+ words) Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks are different from a previous campaign seen in December that targeted two vulnerabilities related to FortiCloud…...
Actively exploited Cisco UC bug requires immediate, version‑specific patching
3+ day, 20+ hour ago (587+ words) Cisco has released patches for a critical remote code execution vulnerability in its unified communications products that attackers are actively exploiting. The US Cybersecurity and Infrastructure Security Agency has added the flaw to its Known Exploited Vulnerabilities catalog, confirming the…...
VoidLink malware was almost entirely made by AI
3+ day, 20+ hour ago (424+ words) VoidLink, the high-impact Linux malware framework disclosed last week, is back under scrutiny for claims that the bulk of its development was done by artificial intelligence (AI). According to the follow-up analysis from Check Point Research (CPR), which first disclosed…...
Misconfigured demo environments are turning into cloud backdoors to the enterprise
4+ day, 1+ hour ago (559+ words) Internal testing, product demonstrations, and security training are critical practices in cybersecurity, giving defenders and everyday users the tools and wherewithal to prevent and respond to enterprise threats. However, according to new research from Pentera Labs, when left in default…...
73% of CISOs more likely to consider AI-enabled security solution
4+ day, 4+ hour ago (956+ words) CISO's are increasingly turning to AI-enabled security technologies to augment their organizations' cyber defense and extend the capabilities of their teams. According to Foundry's latest Security Priorities Study, 73% of security decision-makers are now more likely to consider a security solution…...
Oracle releases 337 security patches, including fix for critical Apache Tika flaw
4+ day, 7+ hour ago (557+ words) Oracle has handed security teams their first big patching workload of the year, with its latest quarterly update containing a hefty 337 security fixes across its product range, including 27 rated critical. This imposing number of patches won't surprise anyone whose job…...