Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shipping-Themed Phishing Scams Target the Middle East and Africa

A surge in shipping-related phishing scams is targeting the Middle East and Africa (MEA) region, according to researchers at Group-IB. “To deliver the scam, the attacker sends a phishing link to victims via SMS using various spoofing or bulk-message techniques,” the researchers write. “These links are typically optimized for mobile devices, since most victims open SMS messages on their phones.

From Intent to Outcome: How Agentic Coding is Transforming the SOC

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Security teams are being asked to move faster and handle more complexity, while the threats they defend against are increasingly AI-assisted. When I wrote about VoidLink in January, my point was simple: you cannot fight machine-speed threats with human-speed defense. Attackers are using AI to code, adapt, and scale attacks while humans are still grinding away doing the heavy lifting in the SOC.

Unlock AI with GPU as a Service in VCF 9

Many IT professionals struggle to integrate artificial intelligence (AI) into their existing environments. You often find expensive hardware trapped in isolated clusters or dedicated hosts. Your infrastructure team manages access through manual ticket queues, which leads to low utilization and frustrating bottlenecks for developers. When you don’t have a standardized way to share and monitor accelerator resources, every hardware change risks downtime for your critical applications.

MWC 2026: AI Infrastructure Meets the Telecom Cloud

Attending Mobile World Congress (MWC) 2026 in Barcelona was once again an incredible experience. Each year the event seems to evolve, and 2026 showcased just how quickly the telecom and cloud infrastructure landscape is changing. The show floor was packed, the conversations were engaging, and the innovations on display reinforced the pace at which our industry is moving.

fast-draft Open VSX Extension Compromised by BlokTrooper

The KhangNghiem/fast-draft extension, listed on open-vsx.org/extension/KhangNghiem/fast-draft and now sitting above 26,000 downloads, had multiple malicious releases that execute a GitHub-hosted downloader and pull a second-stage RAT and infostealer from the BlokTrooper/extension repository. The confirmed malicious releases in the version line we inspected are 0.10.89, 0.10.105, 0.10.106, and 0.10.112.

SOAR is Dead. Here's What Replaces It in 2026.

When SOAR emerged around 2015, it was trying to solve a real problem: SOC analysts were drowning in manual, repetitive tasks across disconnected tools. SOAR promised to connect those tools, automate the workflows between them, and give analysts their time back. For a while, it mostly delivered. That era is long dead.

Survive the AI Code Blizzard: Introducing Snippet Detection

In 2026, software development speed is an AI-solved problem. Yet, as AI-generated code volumes surge, organizations face a new kind of risk visibility gap. Developers are increasingly copying third-party snippets into their codebases—from both AI prompts and open-source software components—creating large security and compliance blind spots that lead to significant risks.

RMM AI tools: Choosing AI-powered RMM software for MSPs and IT teams

Modern managed service providers (MSPs) are increasingly adopting RMM AI tools — remote monitoring and management software enhanced with artificial intelligence — to keep pace with growing IT demands. Traditional RMM platforms allow MSPs to remotely monitor client endpoints, deploy patches, run scripts and troubleshoot issues from a central console. Now, AI-powered RMM software is taking this a step further.

What Is Format-Preserving Encryption (FPE)?

Your database stores a credit card number: 4532 1234 5678 9010. You encrypt it for security. Now it looks like this: %Xk92@!mQz#Lp&7. Problem. Your payment system can’t process that. It expects a 16-digit number. Your billing software breaks. Your downstream analytics fail. Your whole pipeline comes to a halt. This is the exact problem that format-preserving encryption was built to solve.