Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ASP.NET Core Privilege Escalation Vulnerability (CVE-2026-40372)

Microsoft has released an emergency out of band update for.NET to address a critical security vulnerability affecting ASP.NET Core applications. The issue, tracked as CVE-2026-40372, relates to improper verification of cryptographic signatures within the ASP.NET Core Data Protection framework. The vulnerability was introduced as a regression in earlier.NET 10 releases and has prompted the release of.NET 10.0.7 to mitigate risk.

Solving Four Common Incident Response Mistakes That Delay Containment and Drive Up Costs

Organizations often lose precious hours and sometimes millions of dollars because they lack a well-defined and tested incident response plan. In many cases, response roles are loosely defined and disconnected from key stakeholders, including digital forensics teams, breach counsel, and cyber insurance providers. Even large organizations fall into this trap, resulting in delayed containment, inefficient recovery, and prolonged business interruption.

From Data to Decisions: How CTI Is Evolving in 2026

Cyber Threat Intelligence is changing fast in 2026 as organisations face AI-powered threats, rising ransomware activity, and expanding digital attack surfaces. Modern CTI is no longer about collecting data, but delivering actionable insight that helps security teams make faster, smarter decisions. Technology is evolving fast, and so is the cyber threat landscape.

Supply chain attacks hit Checkmarx and Bitwarden developer tools

Sophos X-Ops is aware of reports that two widely-used developer tools – the Checkmarx KICs security scanner and the Bitwarden CLI – were hijacked on April 22, 2026, to steal credentials from development environments. These attacks occurred within hours of each other and share the same command-and-control (C2) domain – potentially pointing to a single threat actor running a coordinated campaign. Both vendors have since reportedly contained the incidents.

Token Bingo: Don't Let Your Code be the Winner

In early April 2026, Arctic Wolf began tracking a large-scale device code phishing campaign impacting organizations across multiple regions and sectors. Similar to the widespread “Riding the Rails” campaign first observed in late March by Huntress, the threat actors were observed abusing OAuth device code flow to trick victims into providing authentication codes and obtain initial access into victim environments.

10 Essential Tools Every Cybersecurity Professional Uses

Working in cybersecurity means that you are constantly dealing with all kinds of potential threats. And that's why it's inherently important to find ways of improving that security, which can prove to be very challenging a lot of the time. But that's why cybersecurity professionals are continually relying on professional tools to get their job done. Here's what they are using.

Designing Scalable Discord Collaboration Architectures for High-Efficiency Digital Workflows

Discord didn't really start as anything "serious." It was just a simple place for people to talk in communities, hang out, share ideas, that sort of thing. But if you look at how people use it now, it's completely different. A lot of teams-small startups, online groups, even remote working setups-are running daily communication through Discord. Not because it's fancy, but because it keeps everything in one place. You don't need five different apps open just to stay updated.

When a National VPN Crackdown Broke the Banks: What Russia's April 3 Outage Teaches Enterprise Security Leaders

On the afternoon of April 3, 2026, shoppers in Moscow discovered their contactless payments were dead. Payment terminals at Sberbank, VTB, and T-Bank - three of Russia's largest banks - threw errors simultaneously. The Moscow metro opened its turnstiles and waved commuters through. Restaurants reverted to cash. A zoo in the south of the country briefly stopped admitting paying visitors. The outage was not a cyberattack, a cloud failure, or a ransomware event. It was the Russian telecom regulator, Roskomnadzor, trying to block VPN traffic - and accidentally blackholing IP ranges belonging to its own critical banking infrastructure.

Overlooked Security Risks in Vehicle Relocation and How They're Being Solved

Vehicle relocation is often treated as a simple logistics task. You book a transporter, hand over the keys, and wait for delivery. What tends to be overlooked is the range of risks that exist throughout that journey. These risks are not always obvious, and many of them occur in moments people rarely consider. At the same time, the industry is evolving. New systems, better processes, and smarter technology are reshaping how vehicles are transported, making the entire process far more secure and transparent than before.