This month in security with Tony Anscombe – February 2026 edition
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular...
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular...
Is Your AI Security Integrity Robust Enough? Where artificial intelligence is increasingly utilized across diverse sectors, the question of...
Are Non-Human Identities the Key to Scalable AI Security? How can organizations ensure their AI security solution stays scalable...
Canadian Tire 2025 data breach impacts 38 million users Pierluigi Paganini February 28, 2026 A data breach at Canadian Tire...
By Byron V. Acohido KINGSTON, Wash. — On Friday afternoon, President Trump ordered every federal agency to stop using...
OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to...
In light of today’s attack by the U.S. and Israel on Iran, it is prudent to ask: What can...
Let’s be honest. Nobody wakes up in the morning excited to debug XML. In the rush to slap OAuth2...
Iran ’s Internet near-totally blacked out amid US, Israeli strikes Pierluigi Paganini February 28, 2026 Iran experienced a near-total internet...
Microsoft warns of RAT delivered through trojanized gaming utilities Pierluigi Paganini February 28, 2026 Attackers spread trojanized gaming tools to...
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf, the...
Smaller organizations are increasingly under attack, with ransomware emerging as the dominant threat. According to the Verizon 2025 Data...
New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused...
Ravie LakshmananFeb 28, 2026National Security / Artificial Intelligence Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth...
Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them...