Vendors' News

Vendor announcements

  

What Is Data Residency? Why Data Location Is a Security Decision 

Data residency sounds like a hosting detail, but it is really a security, compliance, and governance issue. In cloud environments,

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 4, 2026 to May 10, 2026) 
  

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 4, 2026 to May 10, 2026) 

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were

When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps 
  

When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps 

Exposed UIs, weak authentication, and risky defaults could turn cloud-native AI apps on Kubernetes into potential targets by threat actors.

Defense in depth for autonomous AI agents 
  

Defense in depth for autonomous AI agents 

As AI agents gain autonomy, defense in depth must evolve, with application-layer design, identity, and human oversight at the center.

Kazuar: Anatomy of a nation-state botnet 
  

Kazuar: Anatomy of a nation-state botnet 

Kazuar, a sophisticated malware family attributed to the Russian state actor Secret Blizzard, has been under constant development for years

  

Trends in Radio Frequency Spectrum Activity and Its Impact on the Geopolitical Landscape 

Although it is true that the terrestrial, maritime, air, space, and cyberspace domains are the usual focus of analysis, the

Our billing pipeline was suddenly slow. The culprit was a hidden bottleneck in ClickHouse 
  

Our billing pipeline was suddenly slow. The culprit was a hidden bottleneck in ClickHouse 

When a partitioning change to our petabyte-scale ClickHouse cluster caused critical billing jobs to stall, standard metrics showed no obvious

  

The Internet Has a Front Door — The Edge Is Now Intelligent 

Recent improvements in the capabilities of the edge network have created a smarter, more connected edge. These changes call for

The “Why” Behind NextWave’s New Requirements 
  

The “Why” Behind NextWave’s New Requirements 

Learn the NextWave Partner Program new requirements designed to boost partner capabilities, accelerate next-gen security specialization, and deliver greater customer

LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises 
  

LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises 

Editor’s note: The analysis is authored by Moises Cerqueira, malware researcher & threat hunter. You can find Moises on LinkedIn and X.

Kimsuky targets organizations with PebbleDash-based tools 
  

Kimsuky targets organizations with PebbleDash-based tools 

Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the

  

Device Code Phishing is an Evolution in Identity Takeover 

Key Findings Device code phishing is exploding across the threat landscape, with new device code phishing tools emerging every week.   The spike

  

Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft 

Our research examines the April 22 Checkmarx KICS and April 24 elementary-data incidents as part of a broader TeamPCP supply

Beyond the Frontier — Expanding the Ecosystem for Autonomous Defense 
  

Beyond the Frontier — Expanding the Ecosystem for Autonomous Defense 

Palo Alto Networks expands the Frontier AI Alliance with top partners to deliver autonomous, machine-speed defense against frontier AI threats

The Convergence of Cloud Secrets & AI Risk 
  

The Convergence of Cloud Secrets & AI Risk 

SentinelOne’s latest report examines the evolving ‘secrets’ threatscape, showing how modern cloud and AI infrastructures are being exploited.SentinelOneRead More

200,000 WordPress Sites at Risk from Critical Authentication Bypass Vulnerability in Burst Statistics Plugin 
  

200,000 WordPress Sites at Risk from Critical Authentication Bypass Vulnerability in Burst Statistics Plugin 

On May 8, 2026, PRISM, Wordfence Threat Intelligence’s autonomous vulnerability research platform, discovered a critical Authentication Bypass vulnerability in Burst

Latest

 

Zero Trust alapelvek alkalmazása OT környezetekben

Az amerikai Kiberbiztonsági és Infrastruktúra-biztonsági Ügynökség (CISA) az amerikai Hadügyminisztériummal, az Energiaügyi Minisztériummal, az FBI-jal és a Külügyminisztériummal együttműködve kiadta

Zero Trust alapelvek alkalmazása OT környezetekben

Az amerikai Kiberbiztonsági és Infrastruktúra-biztonsági Ügynökség (CISA) az amerikai Hadügyminisztériummal, az Energiaügyi Minisztériummal, az FBI-jal és a Külügyminisztériummal együttműködve kiadta

Europe shouldn’t buy Myanmar junta’s Suu Kyi ploy

Europe shouldn’t buy Myanmar junta’s Suu Kyi ploy

Myanmar’s military is trying to sell former State Councilor Aung San Suu Kyi’s transfer from prison to a “designated residence”

Chrome 148 Update Patches Critical Vulnerabilities

The refresh resolves critical-severity use-after-free and other types of bugs in various browser components. The post Chrome 148 Update Patches

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active

On-call techie decided job was done and hit the bottle – just before his pager went off

On-call techie decided job was done and hit the bottle – just before his pager went off

Lazy weekend of Grand Prix fun turned into a terrifying all-nighterwww.theregister.com – ArticlesRead More

Defender’s Guide to the Frontier AI Impact on Cybersecurity: May 2026 Update 
  

Defender’s Guide to the Frontier AI Impact on Cybersecurity: May 2026 Update 

Get the May 2026 update on Frontier AI-driven exploits. Learn the 4 immediate steps for agentic defense, vulnerability finding and

Browser Run: now running on Cloudflare Containers, it’s faster and more scalable 
  

Browser Run: now running on Cloudflare Containers, it’s faster and more scalable 

We’ve enabled higher usage limits, faster performance, better reliability, and increased shipping velocity for our Browser Run product by rebuilding

  

Investigating server compromises with cgroups: A Linux DFIR primer 

Used primarily for resource management, cgroups unlock valuable telemetry for investigating malicious processes on LinuxRed CanaryRead More

From WarGames to Cyberwar 
  

From WarGames to Cyberwar 

Code War author Allie Mellen explains how nations hack, why attribution fails, and what AI changes in cyberwarfare. Learn why

Thus Spoke…The Gentlemen 
  

Thus Spoke…The Gentlemen 

Key Points Introduction The Gentlemen ransomware‑as‑a‑service (RaaS) operation is a relatively new group that emerged around mid‑2025. Its operators advertise

New SOC-Ready Reporting for Faster Triage, Escalation, and Incident Response with ANY.RUN  
  

New SOC-Ready Reporting for Faster Triage, Escalation, and Incident Response with ANY.RUN  

Successful SOC operations require more than accurate detections. Instant access to context, clear conclusions, and operationally relevant insights allow incidents to move across workflows without delays:  Making ANY.RUN’s Interactive Sandbox a part

Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark 
  

Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark 

Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH).

Accelerating detection engineering using AI-assisted synthetic attack logs generation 
  

Accelerating detection engineering using AI-assisted synthetic attack logs generation 

What if you could generate realistic attack telemetry on demand? Explore research methods that translate attacker behaviors (TTPs) into synthetic

Is Anthropic’s New A.I. Really That Scary? It Depends Whom You Ask 
  

Is Anthropic’s New A.I. Really That Scary? It Depends Whom You Ask 

Anthropic said that Claude Mythos was too dangerous to release to the public. That claim has reopened an old debate

LLMjacking: what these attacks are, and how to protect AI servers 
  

LLMjacking: what these attacks are, and how to protect AI servers 

An analysis of attacks on Ollama, LM Studio, AutoGPT, and LangServe servers, and recommendations on protecting your organization from the

1,000,000 WordPress Sites Affected by Arbitrary File Read and SQL Injection Vulnerabilities in Avada Builder WordPress Plugin 
  

1,000,000 WordPress Sites Affected by Arbitrary File Read and SQL Injection Vulnerabilities in Avada Builder WordPress Plugin 

On March 21st, 2026, we received a submission for an Arbitrary File Read and an SQL Injection vulnerability in Avada

Defending consumer web properties against modern DDoS attacks 
  

Defending consumer web properties against modern DDoS attacks 

Read how to protect consumer websites and defend against modern DDoS attacks with layered security, resilient architecture, and graceful service

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise 
  

Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise 

Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend seamlessly into routine operations and

Idira — Our Journey to Democratize Privilege Controls 
  

Idira — Our Journey to Democratize Privilege Controls 

Introducing Idira: The AI-Driven Identity security platform. Extend Zero Standing Privilege to every human, machine, and AI agent identity in

When “idle” isn’t idle: how a Linux kernel optimization became a QUIC bug 
  

When “idle” isn’t idle: how a Linux kernel optimization became a QUIC bug 

We investigated a bug where CUBIC’s congestion window became pinned at its minimum floor, causing a performance to plummet. The

ANY.RUN & Elastic Security: Bring Threat Intelligence into Detection and Investigation Workflows       
  

ANY.RUN & Elastic Security: Bring Threat Intelligence into Detection and Investigation Workflows       

Security teams don’t lack data. They lack timely, usable intelligence. Analysts spend too much time validating indicators, switching between tools, and figuring out what actually matters.

  

Operational Review of Public ENUM Under e164.arpa 

A 2026 operational review of Public ENUM under e164.arpa found that half of the current delegations show some form of

Announcing Foundry Security Spec: an open specification for agentic security evaluation 
  

Announcing Foundry Security Spec: an open specification for agentic security evaluation 

We open-sourced Foundry Security Spec: a model-agnostic blueprint for agentic security evaluation. Turn noisy alerts into actionable, verifiable findings.More RSS

State of ransomware in 2026 
  

State of ransomware in 2026 

Kaspersky researchers are sharing insights into the main ransomware trends for 2026: EDR killers on the rise, switching from data

A New Era of Security: Frontier AI Defense 
  

A New Era of Security: Frontier AI Defense 

Palo Alto Networks introduces Frontier AI Defense to counter autonomous AI cyber threats. Get continuous protection and autonomous remediation against

  

Vibe Hacking: Two AI-Augmented Campaigns Target Government and Financial Sectors in Latin America 

TrendAI™ Research has identified two emerging threat campaigns—SHADOW-AETHER-040 and SHADOW-AETHER-064—that use agentic AI to drive intrusion operations against government and

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools 
  

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools 

Unit 42 analyzes AD CS exploitation through template misconfigurations and shadow credential misuse while offering behavioral detection for defenders. The

  

The RIPE Chair Team Reports – May 2026 

The RIPE Chair Team reports on what to expect at RIPE 92, including the main programme and parallel events, WG

  

11th May – Threat Intelligence Report 

For the latest discoveries in cyber research for the week of 11th May, please download our Threat Intelligence Bulletin. TOP

The State of Ransomware – Q1 2026 
  

The State of Ransomware – Q1 2026 

Key Findings Ransomware in Q1 2026: Consolidation at Scale During the first quarter of 2026, we monitored more than 70

Threat Intelligence Insights: Pivoting off the Blockchain 
  

Threat Intelligence Insights: Pivoting off the Blockchain 

Background “EtherHiding” is a technique that we keep seeing with increased popularity in the threat landscape. Threat actors store data

  

What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do 

The Instructure Canvas breach affects universities, K–12 school districts, and teaching hospitals globally. This blog entry intends to provide context

  

Active attack: Dirty Frag Linux vulnerability expands post-compromise risk 

Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and memory-fragment handling components including esp4,

The Evolution of Kaspersky SIEM | Kaspersky official blog 
  

The Evolution of Kaspersky SIEM | Kaspersky official blog 

The evolution of correlation rules in the Kaspersky Unified Monitoring and analysis SIEM system.Kaspersky official blogRead More

Nearly half of the world’s passwords can be cracked in under a minute | Kaspersky official blog 
  

Nearly half of the world’s passwords can be cracked in under a minute | Kaspersky official blog 

Using just a powerful graphics card, hackers can crack 60% of real user passwords in less than an hour. Even

  

What Is a Sovereign Cloud? 5 Reasons You May Need One 

A sovereign cloud is more than a regional cloud deployment. It is a cloud environment designed to keep data, operations,

  

CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability 

Read the technical details of a security vulnerability (CVE-2026-34354) in Akamai Guardicore Platform Agent for Windows — and get clear

The Good, the Bad and the Ugly in Cybersecurity – Week 19 
  

The Good, the Bad and the Ugly in Cybersecurity – Week 19 

Karakurt and DPRK facilitators sentenced, PCPJack worm steals cloud credentials while evicting rivals, and attackers exploit an unpatched PAN-OS zero-day.SentinelOneRead

Remcos Alerts from FlowCarp in EveBox 
  

Remcos Alerts from FlowCarp in EveBox 

There is a wonderful little web based alert and event front-end called EveBox, which renders Eve JSON formatted data to

CVE-2025-68670: discovering an RCE vulnerability in xrdp 
  

CVE-2025-68670: discovering an RCE vulnerability in xrdp 

During a security assessment of Kaspersky USB Redirector, we discovered CVE-2025-68670: a pre-auth RCE in the xrdp server component. Project

Nutanix and Palo Alto Networks Integrate for Robust Model Trust 
  

Nutanix and Palo Alto Networks Integrate for Robust Model Trust 

Secure your AI models. The Nutanix and Palo Alto Networks Prisma AIRS integration provides advanced AI Model Security and AI

  

Building for the future 

This afternoon, we sent the following email to our global team. One of our core values at Cloudflare is transparency,

When prompts become shells: RCE vulnerabilities in AI agent frameworks 
  

When prompts become shells: RCE vulnerabilities in AI agent frameworks 

New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these vulnerabilities

Wordfence Intelligence Weekly WordPress Vulnerability Report (April 27, 2026 to May 3, 2026) 
  

Wordfence Intelligence Weekly WordPress Vulnerability Report (April 27, 2026 to May 3, 2026) 

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were

  

World Passkey Day: Advancing passwordless authentication 

This World Passkey Day, read how Microsoft is advancing passkey adoption to replace passwords, cut phishing risk, and deliver simpler,

How Cloudflare responded to the “Copy Fail” Linux vulnerability 
  

How Cloudflare responded to the “Copy Fail” Linux vulnerability 

When a critical Linux kernel privilege escalation was publicly disclosed, Cloudflare’s security and engineering teams detected, investigated, and mitigated the

  

Spring cleaning your browser 

Clean up your browser by removing unneeded extensions, clearing cached data, scanning for info-stealing malware, and more.Red CanaryRead More

How VoidStealer bypasses Chrome’s protections to hijack sessions and steal data | Kaspersky official blog 
  

How VoidStealer bypasses Chrome’s protections to hijack sessions and steal data | Kaspersky official blog 

The VoidStealer malware employs a new technique to circumvent Chrome’s App-Bound Encryption mechanism, gaining access to session cookies and other

Exploits and vulnerabilities in Q1 2026 
  

Exploits and vulnerabilities in Q1 2026 

This report provides statistical data on published vulnerabilities and exploits we researched during Q1 2026. It also includes summary data

Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution 
  

Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution 

Unit 42 details CVE-2026-0300, a buffer overflow vulnerability in the PAN-OS User-ID Authentication Portal. Read now for details. The post

  

Supporting the National Cyber Strategy: How TrendAI™ Helps 

A deeper look at the first three pillars and outlining how our capabilities directly support government agencies working to bring

  

AI Survey: 50% of Organizations Struggle to Maintain Latency at Scale 

The Akamai State of AI Inference report captures real data from the field that describes how AI inference is being

  

Akamai Is the 2026 Gartner® Peer Insights™ Customers’ Choice for API Protection 

Read why Akamai was named the only Customers’ Choice in the 2026 Gartner Peer Insights Voice of the Customer for

When DNSSEC goes wrong: how we responded to the .de TLD outage 
  

When DNSSEC goes wrong: how we responded to the .de TLD outage 

On May 5, 2026, DENIC published broken DNSSEC signatures for the .de TLD, making millions of domains unreachable. Here’s what

​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​ 
  

​​Microsoft named an overall leader in KuppingerCole Analyst’s 2026 Emerging AI Security Operations Center (SOC) report ​​ 

Microsoft is excited to be named an Overall Leader, and the Market Leader in the Kuppinger Cole Analyst’s 2026 Emerging

ClickFix campaign uses fake macOS utilities lures to deliver infostealers 
  

ClickFix campaign uses fake macOS utilities lures to deliver infostealers 

Threat actors are targeting macOS users with fake utility fixes that trick them into running malicious Terminal commands. This campaign

Authenticated Arbitrary File Upload Vulnerability Patched in Slider Revolution 7 WordPress Plugin 
  

Authenticated Arbitrary File Upload Vulnerability Patched in Slider Revolution 7 WordPress Plugin 

On April 18th, 2026, we received a submission for an Authenticated Arbitrary File Upload vulnerability in Slider Revolution, a WordPress

39 Seconds — That’s How Long It Takes to Lose Your Data 
  

39 Seconds — That’s How Long It Takes to Lose Your Data 

Speed is the new cyber perimeter. Wendi Whitmore, CISO at Palo Alto Networks, explains how to fight machine-speed attacks and

OceanLotus suspected of using PyPI to deliver ZiChatBot malware 
  

OceanLotus suspected of using PyPI to deliver ZiChatBot malware 

Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware

Websites with an undefined trust level: avoiding the trap 
  

Websites with an undefined trust level: avoiding the trap 

We explain what suspicious websites are and how to distinguish a safe site from a fraudulent one. A new category

How CISOs Reduce Cyber Risk with MITRE ATT&CK  
  

How CISOs Reduce Cyber Risk with MITRE ATT&CK  

Nowadays CISOs face escalating threats that outpace traditional defenses. The strategy is evolving from compliance-driven checklists to a threat-informed approach. MITRE ATT&CK

  

EasterBunny: advanced espionage artifacts attributed to APT29 

During 2019, as part of the results of S2 Grupo’s incident management service, LAB52 gained access to a set of

  

PeeringDB Update October 2025 – April 2026 

PeeringDB is a widely used resource for interconnection data, and in these regular updates, we help users keep track of

Copy Fail: What You Need to Know About the Most Severe Linux Threat in Years 
  

Copy Fail: What You Need to Know About the Most Severe Linux Threat in Years 

Copy Fail (CVE-2026-31431) is a critical Linux kernel LPE that allows stealthy root access. This flaw impacts millions of systems.

  

InstallFix and Claude Code: How Fake Install Pages Lead to Real Compromise 

Targeting multiple industries worldwide, the InstallFix campaign uses fake Claude AI installer pages to trick users into running malware that

The Dangerous Momentum of Autodownload Phishing 
  

The Dangerous Momentum of Autodownload Phishing 

Learn how attackers weaponize SaaS auto-download links and rotating phishing lures to deliver RMM malware. See how Cortex Email Security

Attackers Actively Exploiting Critical Vulnerability in Breeze Cache Plugin 
  

Attackers Actively Exploiting Critical Vulnerability in Breeze Cache Plugin 

On April 22nd, 2026, we publicly disclosed a critical Arbitrary File Upload vulnerability in Breeze Cache, a WordPress plugin with

New Phishing Campaign Targets US with Credential Theft: What CISOs Need to Know 
  

New Phishing Campaign Targets US with Credential Theft: What CISOs Need to Know 

A new large-scale phishing campaign is targeting U.S. organizations with fake event invitations that lead to credential theft, OTP interception,

Supply chain attack via DAEMON Tools | Kaspersky official blog 
  

Supply chain attack via DAEMON Tools | Kaspersky official blog 

Kaspersky experts have detected a supply chain attack using the popular DAEMON Tools software.Kaspersky official blogRead More

  

Questioning the IPv8 Proposal 

The IPv8 proposal brings together routing, identity, and network management into a single design, but does it leave too many

  

Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities 

TrendAI™ Research breaks down Quasar Linux (QLNX), a previously undocumented sophisticated Linux RAT with low detection rates. In this blog,

Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise 
  

Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise 

Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step

  

Red Canary CFP tracker: May 2026 

Red Canary’s monthly roundup of upcoming security conferences and call for papers (CFP) submission deadlines May 2026Red CanaryRead More

Shields up: Guidance for defending in the age of AI-enabled attacks 
  

Shields up: Guidance for defending in the age of AI-enabled attacks 

Cisco’s latest paper details the evolving AI threat landscape and provides actionable recommendations to help customers secure their environments.More RSS

FlowCarp Identifies Protocols 
  

FlowCarp Identifies Protocols 

I am thrilled to announce the release of a brand new tool called FlowCarp! FlowCarp is a simple command line

  

4th May – Threat Intelligence Report 

For the latest discoveries in cyber research for the week of 4th May, please download our Threat Intelligence Bulletin. TOP

The motivation of droids from the “Star Wars” universe | Kaspersky official blog 
  

The motivation of droids from the “Star Wars” universe | Kaspersky official blog 

How and why droids from “Star Wars: Skeleton Crew” and “Andor” switch their allegiances.Kaspersky official blogRead More

“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 
  

“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security 

Kaspersky expert breaks down a new phishing scheme that uses the Amazon SES cloud email service. Let’s look at some

Unit 42 Expands Frontier AI Defense with Armadin Partnership 
  

Unit 42 Expands Frontier AI Defense with Armadin Partnership 

Unit 42 and Armadin partner to expand Frontier AI Defense. Get autonomous, AI-driven offensive security assessments and decision-grade proof of

Securing and Governing AI Agents At Scale Through A Unified AI Gateway 
  

Securing and Governing AI Agents At Scale Through A Unified AI Gateway 

Palo Alto Networks acquires Portkey, integrating its AI Gateway into Prisma AIRS. Get the unified control plane to securely govern

Enhancing AI-Driven Defense with Anthropic’s Claude Opus 4.7 
  

Enhancing AI-Driven Defense with Anthropic’s Claude Opus 4.7 

Palo Alto Networks enhances AI-Driven Defense using Anthropic’s Claude Opus 4.7. Outpace automated threats and rapidly find and fix vulnerabilities

CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments 
  

CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments 

A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud environments and Kubernetes workloads. With a working

Essential Data Sources for Detection Beyond the Endpoint 
  

Essential Data Sources for Detection Beyond the Endpoint 

Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here.

Code Orange: Fail Small is complete. The result is a stronger Cloudflare network 
  

Code Orange: Fail Small is complete. The result is a stronger Cloudflare network 

We have completed a massive engineering effort to make our infrastructure more resilient. Through new tools like Snapstone and the

Microsoft Agent 365, now generally available, expands capabilities and integrations 
  

Microsoft Agent 365, now generally available, expands capabilities and integrations 

​Today we’re announcing the general availability of Agent 365, plus previews of new capabilities to discover and manage shadow AI

Introducing Dynamic Workflows: durable execution that follows the tenant 
  

Introducing Dynamic Workflows: durable execution that follows the tenant 

Dynamic Workflows is a library that lets you route durable execution to tenant-provided code on the fly. Built on Dynamic

The Good, the Bad and the Ugly in Cybersecurity – Week 18 
  

The Good, the Bad and the Ugly in Cybersecurity – Week 18 

Authorities dismantle cybercrime rings, scammers extract billions using social media, and threat actors poison SAP-related npm packages.SentinelOneRead More

That AI Extension Helping You Write Emails? It’s Reading Them First 
  

That AI Extension Helping You Write Emails? It’s Reading Them First 

Unit 42 uncovers high-risk AI browser extensions. Disguised as productivity tools, they steal data, intercept prompts, and exfiltrate passwords. Protect

Wordfence Intelligence Weekly WordPress Vulnerability Report (April 20, 2026 to April 26, 2026) 
  

Wordfence Intelligence Weekly WordPress Vulnerability Report (April 20, 2026 to April 26, 2026) 

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were

What’s new, updated, or recently released in Microsoft Security 
  

What’s new, updated, or recently released in Microsoft Security 

Stay ahead of emerging threats with Microsoft’s newest security innovations and updates, delivered through the In the Loop series. The

  

AI is changing collaboration security faster than most organizations realize: key insights from the 2026 AI and Human Risk Landscape report 

For the first time, Proofpoint is publishing the AI and Human Risk Landscape report, a global study that examines how

Email threat landscape: Q1 2026 trends and insights 
  

Email threat landscape: Q1 2026 trends and insights 

In early 2026, email threats increased with a rise in credential phishing, QR code phishing, and CAPTCHA-gated campaigns, highlighted by

Post-quantum encryption for Cloudflare IPsec is generally available 
  

Post-quantum encryption for Cloudflare IPsec is generally available 

Cloudflare IPsec now has generally available support for post-quantum encryption via hybrid ML-KEM. We’ve confirmed interoperability with Cisco and Fortinet.The

Release Notes: Expanded Threat Intelligence Access, AI Assisted Search 1,770 New Detections and More 
  

Release Notes: Expanded Threat Intelligence Access, AI Assisted Search 1,770 New Detections and More 

April brought several updates across ANY.RUN’s Threat Intelligence and detection coverage.  The biggest change is expanded access to Threat Intelligence:

Empowering the Amazon: Cisco Networking Academy 
  

Empowering the Amazon: Cisco Networking Academy 

Cisco has brought networking and security skills to more than one million Brazilians. With its vast untapped wealth of talent,

  

Making Resource Holders Easier to Identify: Introducing reg-nr: in the RIPE Database 

Proposed at RIPE 91 in the Address Policy Working Group and then further discussed in the Database Working Group, the

Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 
  

Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India 

The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the