The CYBER360 study, cited by The Hacker News, found that a large share of national‑security agencies still move sensitive files using manual, offline methods—USB sticks, external hard drives, CDs, and even printed media.
Microsoft Defender Security Research uncovered a new “AI Recommendation Poisoning” attack that leverages hidden prompts attached to “Summarize with AI” buttons on compromised websites. When a user clicks the button, the malicious script injects a
Microsoft’s February 2026 Patch Tuesday released updates for more than 50 vulnerabilities, among them six zero‑day flaws that have already been observed in active exploitation campaigns. One of the most critical, CVE‑2026‑
VMware’s security team announced vDefend, a new suite that extends Zero Trust controls to private cloud workloads. By tightly coupling NSX’s micro‑segmentation with continuous, real‑time analytics, vDefend monitors each workload’s
Microsoft Defender Security Research uncovered a new attack chain in which threat actors compromise a website and insert a counterfeit “Summarize with AI” button. When a user clicks the button, the request is sent to
Check Point’s 16 February threat‑intel report reveals that threat actors compromised Odido’s customer‑management platform by using stolen administrator credentials. The attackers leveraged unpatched components in the web‑application stack, a classic
CrowdStrike’s identity security suite earned the Gartner Peer Insights “Customer’s Choice” award, signaling strong user satisfaction and market validation for its authentication capabilities. The accolade spotlights the platform’s multi‑factor authentication, single