Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Release 875: New Mac Features, Enhanced Monitoring, and Granular Data Mapping

This release delivers heavy-hitting updates to the Mac Agent, extends Windows monitoring into native desktop applications like WhatsApp, and provides administrators with more granular tools to manage data and triage security alerts. Here is a summary of the new features and improvements available in this release.

DNS anomaly detection with machine learning: How ManageEngine DDI Central stops threats before they start

Most breaches don't announce themselves; they whisper. A subtly malformed DNS query here. A DHCP lease request that looks almost normal there. A client that suddenly requests a domain no one in your organization has ever heard of. By the time these whispers become alarms on a SIEM dashboard, attackers have often already moved laterally, exfiltrated data, or cemented persistence. In traditional DNS, DHCP, and IPAM (DDI) setups, these signals are buried under millions of legitimate transactions.

CVE-2026-32201: SharePoint Spoofing Vulnerability Enabling Unauthenticated Impersonation

Over 1,300 Microsoft SharePoint servers exposed online remain unpatched against a spoofing vulnerability that was exploited as a zero-day. The vulnerability in question, CVE-2026-32201, is a spoofing vulnerability rooted in improper input validation that requires no login, no user interaction, and no special conditions to exploit. The vulnerability allows unauthenticated attackers to influence how content is rendered, making attacker-controlled data appear as legitimate output.

The AI Bubble Is About to Burst (Here's Why)

The AI bubble is about to burst. Energy costs, chip shortages and computer pricing are reaching unsustainable levels. The economics don't add up anymore and something has to crack. In this episode of Razorwire Raw, Jim Rees explains why AI is hitting an economic wall nobody's talking about. World energy consumption is climbing vertically because of AI. Data centres are on hold because there isn't enough electricity. GPU, RAM and CPU prices are spiralling. Large language model providers are raising prices because compute costs are exploding.

How Hackers Get In: What Is a Vulnerability? (Containers Explained)

A vulnerability is a weakness in software—and in containerized environments, even one small flaw can open the door. From buggy code to outdated images and misconfigurations, risk can exist at every layer of the stack. And if a vulnerability is already known… attackers often already know how to exploit it. In this video, we break down: Next up: What is a CVE?

Monitoring vs. Prevention: Why Your IRM Tool Needs to Do Both

Insider risk management (IRM) is the practice of identifying, assessing, and responding to data security threats that originate from people inside an organization, including employees, contractors, and partners. Modern IRM programs combine behavioral analytics, data visibility, and policy enforcement to detect risky activity before sensitive data leaves the organization. The operative word in that definition is "before." Most security teams assume their IRM tool does this. However, many are wrong.

An Introduction to the NIST Risk Management Framework (RMF)

While inherently critical to today’s businesses that run on data, implementing and enforcing data security and privacy has never been straightforward. Between collecting different types of sensitive data and deploying unique architectures, organizations cannot adopt a one-size-fits-all solution, meaning that every security architecture is unique.

SecurityScorecard Weekly Brief: The Cyber Risk and Policy Edition - Amanda Smith

In this week’s Weekly Brief: The Cyber Risk and Policy Edition, SecurityScorecard’s Director, Public Sector Channel Amanda Smith breaks down why the U.S. war with Iran is more than just what takes place on the physical battlefront. In 2026, as conflict unfolds in the Middle East, the digital battlefield has a direct impact on the homeland and U.S. critical infrastructure, too. “It's a global digital confrontation that hits a lot closer to home than a lot of people realize.”

FedRAMP's June 2026 Rule Overhaul: CR26 Explained

The first quarter of 2026 is behind us, and that means the next wave of rules, program phases, and other shifts in governmental policy are starting to take effect. One that you may have seen mentioned coming soon is the Consolidated Rules update. What is CR26, when does it take effect, and what does it do? We’ve been eyeing this update for months now, because it makes some very exciting changes, so let’s go through it and see how it will affect the FedRAMP process.