Patch Tuesday – February 2026

Microsoft is publishing 55 vulnerabilities this February 2026 Patch Tuesday. Microsoft is aware of exploitation in the wild for six of today’s vulnerabilities, and notes public disclosure for three of those. Earlier in the month, All three of the publicly Read More …

SolarWinds Web Help Desk Exploitation – February 2026

Multiple intrusions have been publicly reported starting on February 6, 2026 stemming from Internet-connected servers utilizing SolarWinds Web Help Desk software. This exploitation activity reportedly first occurred in December 2025. Given the number of recent CVEs affecting this product, it’s Read More …

UK: Welsh firms ill-prepared to meet the challenges of cyber security threats

Many businesses in Wales lack the readiness to meet cyber security threats while also underestimating their potential costs, shows new research. Undertaken by Bridgend-based managed services provider CSG, the research focused on firms across construction, manufacturing, professional services, retail, public Read More …

Novel Technique to Detect Cloud Threat Actor Operations

Cloud-based alerting systems often struggle to distinguish between normal cloud activity and targeted malicious operations by known threat actors. The difficulty doesn’t lie in an inability to identify complex alerting operations across thousands of cloud resources or in a failure Read More …

Viral AI, Invisible Risks: What OpenClaw Reveals About Agentic Assistants

The name OpenClaw might not immediately be recognizable, partly because it has undergone several name changes, from Clawdbot to Moltbot, then finally to OpenClaw. Yet one thing is certain: This new digital assistant feels genuinely groundbreaking. It remembers past interactions, Read More …

Reducing the Attack Surface for End-of-Support Edge Devices

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.K.’s National Cyber Security Centre (NCSC) are releasing this fact sheet to urge defensive action against malicious cyber activity by nation-state threat actors. Nation-state threat Read More …

Malaysia to introduce new cybercrime bill to replace outdated computer crimes act

The government is drafting a new Cybercrime Bill aimed at strengthening Malaysia’s legal framework against the growing threat of online fraud, digital manipulation and emerging cyber risks. Deputy Prime Minister Datuk Seri Ahmad Zahid Hamidi (Bagan Datuk-BN) said the bill, Read More …

CISA: Fortinet Releases Guidance to Address Ongoing Exploitation of Authentication Bypass Vulnerability CVE-2026-24858

Newly disclosed vulnerability Common Vulnerabilities and Exposures (CVE)-2026-24858 [Common Weakness Enumeration (CWE)-288: Authentication Bypass Using an Alternate Path or Channel] allows malicious actors with a FortiCloud account and a registered device to log in to separate devices registered to other Read More …

No Agency Is Too Small

Back when nation-state threat actors were primarily targeting large government agencies, government contractors, and large companies, security through obscurity was a legitimate strategy. In years past, betting that attackers wouldn’t bother with smaller targets was a feasible way of operating. Read More …

Fortinet admits FortiGate SSO bug still exploitable despite December patch

Fortinet has confirmed that attackers are actively bypassing a December patch for a critical FortiCloud single sign-on (SSO) authentication flaw after customers reported suspicious logins on devices supposedly fully up to date. In a new advisory, Fortinet said it had Read More …