Server-room lock was nothing but a crock

This article highlights a severe physical security lapse where a server room's lock was easily bypassed, demonstrating how weak physical security can undermine even robust digital defenses. The author uses this incident as an example of a "pwned" situation, emphasizing that cybersecurity is only as strong as its weakest link, including physical access.

Was bei der Cloud-Konfiguration schiefläuft – und wie es besser geht

A recent Qualys report indicates that a significant percentage of businesses experienced cloud-related breaches in the past year, with misconfigured services being a primary concern. The study also found that a large proportion of virtual machines across AWS, GCP, and Azure exhibit misconfigured resources.

Critical Nginx UI auth bypass flaw now actively exploited in the wild

A critical vulnerability in Nginx UI, specifically affecting its Model Context Protocol (MCP) support, is actively being exploited in the wild. Attackers can leverage this flaw to gain full server control without needing any authentication.

Critical MCP Integration Flaw Puts NGINX at Risk

A critical vulnerability in the nginx-ui component allows attackers to abuse a near-maximum severity flaw. This flaw enables attackers to restart, create, modify, and delete NGINX configuration files, posing a significant risk to web server security.

Navigating the Unique Security Risks of Asia's Digital Supply Chain

Asia's digital supply chain faces unique security risks due to varying regulatory landscapes, highly interconnected digital ecosystems, and the increasing adoption of AI. These factors create a complex environment that organizations in the region must navigate to ensure security.

Rolling Networks: Securing the Transportation Sector

Modern trucks are increasingly complex, resembling 'rolling networks' due to their extensive sensors and connectivity. This technological evolution introduces significant cybersecurity risks to the transportation sector. Industry leaders are convening at NMFTA's Cybersecurity Conference to address these emerging threats.

Microsoft fixes bug behind Windows Server 2025 automatic upgrades

Microsoft has released a fix for a bug that caused unintended automatic upgrades from Windows Server 2019 and 2022 to Windows Server 2025. This issue could have disrupted operations and caused compatibility problems for organizations.

UK told its Big Tech habit is now a national security risk

A new report by the Open Rights Group indicates that the UK's extensive reliance on Big Tech companies, primarily US-based, has created a significant national security risk. Years of integrating these services into the public sector have left the nation exposed.

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Eight major industrial automation companies, including Siemens, Schneider Electric, and Mitsubishi Electric, have released new security advisories as part of ICS Patch Tuesday. These advisories address vulnerabilities within their operational technology (OT) products.

4 questions to ask before outsourcing MDR

Managed Detection and Response (MDR) is presented as a practical solution for security teams struggling with alert fatigue and limited resources. The article outlines four key questions organizations should consider when evaluating MDR services to ensure they effectively enhance cyber resilience through 24/7 threat detection and the ability to distinguish real threats from noise.

McGraw-Hill confirms data breach following extortion threat

Education company McGraw-Hill has confirmed a data breach resulting from hackers exploiting a misconfiguration in Salesforce. The attackers gained access to internal data and subsequently issued an extortion threat.

AI Agents Unleashed: Governing the Invisible Workforce

Organizations are rapidly adopting AI agents, creating significant security blind spots as traditional identity and access management (IAM) frameworks are inadequate for managing these autonomous systems. These agents can gain system-level access and operate at high speeds, posing risks of breaches and compliance failures. Addressing this requires treating AI agents as a distinct identity class with policy-as-code, dynamic authorization, and full observability.

5 Ways Zero Trust Maximizes Identity Security

Stolen credentials are a primary cause of data breaches and privilege escalation. The article explains how a Zero Trust security model, by focusing on identity, can mitigate these risks. It highlights Zero Trust's ability to restrict access, verify device trust, and prevent attackers from moving laterally within a network.

China-linked cloud credential heist runs on typos and SMTP

China-linked APT41 (Winnti) group is using a Linux-based backdoor to steal cloud credentials from major cloud providers like AWS, GCP, Azure, and Alibaba Cloud. The malware employs SMTP port 25 for covert command and control and uses typosquatted domains for exfiltration.

Cyber-Inspekteur: Hybride Attacken nehmen weiter zu

Hybrid attacks targeting critical infrastructure in Germany and deployed Bundeswehr troops abroad have significantly increased since 2022, according to Vizeadmiral Thomas Daum, Inspector of Cyber and Information Space of the German Armed Forces. These attacks, attributed to state-sponsored actors from Russia, China, Iran, and North Korea, include cyber intrusions, disinformation campaigns, and physical sabotage attempts, as observed during the NATO cyber defense exercise 'Locked Shields'.

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads

Organizations must rigorously test their distributed denial-of-service (DDoS) defenses under realistic, high-demand conditions, such as during peak operational periods like tax filing deadlines. This proactive approach is crucial for ensuring network resilience and maintaining service availability when it matters most.

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials

The China-linked APT41 threat group has been observed deploying a new backdoor designed to evade detection, specifically targeting cloud environments like AWS, Google Cloud, Azure, and Alibaba Cloud. This backdoor aims to harvest cloud credentials, and the group is employing typosquatting techniques to mask its command and control (C2) communications.

Seven IBM WebSphere Liberty flaws can be chained into full takeover

Security researchers have identified seven vulnerabilities in IBM WebSphere Liberty, a Java application server, which can be chained together to achieve full server compromise. The chain begins with a pre-authentication flaw (CVE-2026-1561) in the SAML Web SSO component, allowing attackers to execute arbitrary code remotely before authentication.

Was ist Federated Identity Management?

Federated Identity Management (FIM) is an Identity & Access Management (IAM) approach that allows users to authenticate once and access multiple services using a single digital identity. This optimizes user experience and can enhance security and resilience by reducing the need for multiple credentials, though it introduces architectural complexity.

Risky Bulletin: France takes first steps to ditch Windows for Linux

France is initiating a move away from Windows in favor of Linux for its public administration. This shift aims to enhance security and reduce reliance on foreign software. Meanwhile, OpenAI was affected by an Axios attack, Rockstar Games experienced another hack, and the UK is proposing jail time for tech executives who fail to prevent data breaches.

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises

Google has expanded end-to-end encryption for Gmail to Android and iOS devices for enterprise users, a move praised for offering verifiable customer-managed keys. This feature, available for specific Google Workspace editions, aims to enhance data security and regulatory compliance for organizations, particularly in regulated industries.

Nearly 4,000 US industrial devices exposed to Iranian cyberattacks

Iranian-linked cyber attackers are targeting thousands of U.S. industrial devices, specifically Rockwell Automation PLCs, potentially exposing critical infrastructure to attacks. The identified devices are connected to the internet, increasing their vulnerability.

Industrial Controllers Still Vulnerable As Conflicts Move to Cyber

The US government has issued a warning that programmable logic controllers (PLCs) are increasingly becoming targets in cyber conflicts. New research has identified 179 vulnerable operational technology (OT) devices, highlighting ongoing risks in industrial control systems.

Orthanc DICOM Vulnerabilities Lead to Crashes, RCE

Multiple vulnerabilities have been discovered in the Orthanc DICOM server, a popular medical imaging software. These flaws could allow attackers to cause denial-of-service, disclose sensitive information, or even achieve remote code execution.

Why most zero-trust architectures fail at the traffic layer

While many organizations invest heavily in identity and access controls for zero-trust architectures, most implementations fail at the traffic layer. Gaps often exist in how traffic enters and moves through the environment, stemming from inconsistent ownership between teams and overlooked areas like ingress paths, load balancers, and service-to-service communication.

CMMC compliance in the age of AI

CMMC 2.0 requires federal contractors to actively demonstrate their ability to protect sensitive government data, moving beyond self-attestation to a more risk-based approach. A key challenge for organizations is gaining a complete understanding of the scope of systems and data that fall under CMMC 2.0 controls, which often reveals a larger footprint than initially anticipated.

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google has made Device Bound Session Credentials (DBSC) generally available in Chrome 146 for Windows users. This feature aims to prevent session theft by tying web session credentials to the device, making it harder for attackers to steal and reuse them. Expansion to macOS is planned for a future release.

Chevin pulls the handbrake on FleetWave software after security scare

Chevin Fleet Solutions has taken parts of its FleetWave software offline due to a cybersecurity incident, affecting UK and US customers. This has resulted in a major outage for the fleet management SaaS platform, leaving customers unable to access their systems.

We let OpenClaw loose on an internal network. Here’s what it found

Sophos researchers tested OpenClaw, an open-source tool designed to find common network misconfigurations, on an internal network. The tool identified several security gaps, including exposed management interfaces and weak authentication, highlighting the need for regular security audits.

Contemporary Controls BASC 20T

A critical vulnerability (CVE-2025-13926) has been identified in Contemporary Controls BASC 20T devices, specifically version BASControl20 3.1. Successful exploitation could allow an attacker to gain control over the PLC's functionality, including reconfiguring, renaming, deleting, file transfers, and making remote procedure calls.

GPL Odorizers GPL750

A vulnerability in GPL Odorizers GPL750 devices allows low-privileged remote attackers to manipulate register values, potentially causing incorrect odorant injection into gas lines. Successful exploitation could lead to a critical infrastructure disruption.

On Microsoft’s Lousy Cloud Security

Federal cybersecurity evaluators found Microsoft's cloud offerings to have a "lack of proper detailed security documentation," leading to a "lack of confidence in assessing the system's overall security posture." Reviewers struggled to understand how sensitive information is protected across servers, preventing them from vouching for the technology's security.

Weak at the seams

The article discusses how cybersecurity risk is managed in silos across different industries and regulatory bodies, leading to overlooked exposures at the seams between these systems. As digital transformation increases interconnectedness, these seams represent a growing risk surface, despite increasing security spending.

Iran-linked hackers disrupt operations at US critical infrastructure sites

Iran-linked hackers have targeted and disrupted operations at multiple US critical infrastructure sites amidst escalating conflict. These attacks appear to be in response to the ongoing war between the US and Israel. The exact nature and impact of the disruptions are still being assessed.

Banning New Foreign Routers Mistargets Products to Fix Real Problem

The FCC has expanded its "Covered List" to ban the sale of new routers manufactured in foreign countries, citing security vulnerabilities exploited by nation-state actors. This broad ban aims to prevent domestic routers from being used in cyberattacks but is criticized for being too sweeping and potentially neglecting other vulnerable devices like IoT and smart home gadgets.

Arelion employs NETSCOUT Arbor DDoS protection products

Arelion, a global IP fiber backbone operator, is enhancing its DDoS protection by employing NETSCOUT Arbor DDoS protection products. The company sought to gain a clearer understanding of its current DDoS infrastructure's efficiency and value, leading to a deeper collaboration with NETSCOUT. This partnership aims to improve DDoS protection for both Arelion's internal systems and its customer base through enhanced threat intelligence and mitigation capabilities.

6 Winter 2026 G2 Leader Badges prove this DDoS protection stands out

NETSCOUT's Arbor Threat Mitigation System (TMS) and Arbor Sightline have received multiple 'Leader' badges on G2 for Winter 2026, specifically in DDoS protection and web security categories. These accolades are based on positive user reviews and NETSCOUT's market presence, highlighting the effectiveness of their AI/ML-powered solutions.

Iranian Threat Actors Disrupt US Critical Infrastructure Via Exposed PLCs

Iranian threat actors have successfully compromised internet-facing Operational Technology (OT) devices in US critical infrastructure, leading to file and display manipulation, operational disruptions, and financial losses. The attacks targeted Programmable Logic Controllers (PLCs) that were exposed to the internet.

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Modern enterprise Identity and Access Management (IAM) is becoming unmanageable due to fragmentation across applications, teams, and machine identities. This leads to 'Identity Dark Matter,' where activity falls outside centralized visibility. Identity Visibility and Intelligence Platforms (IVIPs) are emerging as a solution to address this growing complexity and improve security.

Microsoft hints at bit bunkers for war zones

Microsoft is reconsidering its datacenter designs, particularly for regions prone to conflict, following Iran's targeting of datacenters in the Middle East. President Brad Smith indicated that the company is exploring new designs to enhance the resilience and security of its facilities in war zones. This strategic shift aims to protect critical infrastructure from state-sponsored attacks.

Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks

Federal agencies have issued a warning regarding Iran-linked hackers who are actively disrupting critical infrastructure in the United States. The attackers are reportedly manipulating Programmable Logic Controllers (PLCs) and SCADA systems, leading to operational disruptions across various sectors and raising significant concerns about the targeting of Operational Technology (OT).

Iran cyber actors disrupting US water, energy facilities, FBI warns

Iranian-affiliated cyber actors have been escalating intrusions targeting critical US water and energy facilities, with some operations being disrupted. The FBI and other US cyber defense agencies have issued a warning about these activities.

5 practical steps to strengthen attack resilience with attack surface management

Attack surface management (ASM) is crucial for enhancing cyber resilience by continuously identifying and prioritizing an organization's exposure to potential attackers. The article outlines five practical steps for strengthening attack resilience, emphasizing the need for comprehensive visibility across all attack surface categories. It highlights that attackers exploit gaps in visibility, making continuous discovery fundamental.