Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2026-24858: Fortinet Multiple Products Authentication Bypass Zero-Day Analysis

CVE-2026-24858 is a critical authentication bypass vulnerability(CWE-288: Authentication Bypass Using an Alternate Path or Channel) in Fortinet products. It affects FortiOS, FortiAnalyzer, FortiManager, and potentially FortiProxy. An attacker with a FortiCloud account and registered device can log into devices registered to other accounts if FortiCloud SSO is enabled. Disclosed January 27, 2026, as actively exploited zero-day. CVSS 9.4 (some sources cite 9.8).

Emerging Ransomware Threat: Reverse Engineering the Green Blood Group Golang Payload

During routine Dark Web Monitoring activities, Our Threat Intelligence Team identified a newly active ransomware operation calling itself The Green Blood Group. The group operates a dedicated Tor-based leak site and follows a double-extortion model, threatening public disclosure of victim data when negotiations fail. The screenshot shown above captures the group’s Tor portal in its current state.

CVE-2026-1281 and CVE-2026-1340: Unauthenticated RCE Zero-Day Vulnerabilities in Ivanti Endpoint Manager Mobile

On January 29, 2026, Ivanti released fixes for two critical zero-day code injection vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). The vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, impact the In-House Application Distribution and Android File Transfer Configuration features and allow unauthenticated remote threat actors to achieve remote code execution.

What Is Managed ITDR and How MSPs Use It for Identity Threat Detection

There are numerous ways of carrying out cyberattacks. Identity is now one of the most common ways attackers gain access to systems. Instead of malware or exploits, attackers rely on stolen credentials or reused passwords. They abuse permissions to carry out sophisticated attacks that appear normal on the surface. Basic monitoring tools cannot detect these attacks. Identity misuse is becoming more common. Many organizations now work across cloud services and remote access.

Agentic AI and NonHuman Identities Demand a Paradigm Shift In Security: Lessons from NHIcon 2026

In the race to innovate, software has repeatedly reinvented how we define identity, trust, and access. In the 1990's, the web made every server a perimeter. In the 2010's, the cloud made every identity a workload. Here in 2026, agentic AI makes every action autonomous.

LevelBlue and Fortra Partner to Deliver Next-Generation Managed Detection and Response

To counter sophisticated modern threats, LevelBlue is partnering with Fortra to integrate Fortra’s best-in-class solutions with LevelBlue’s elite managed services, delivering a comprehensive security offering. As part of this long-term partnership, LevelBlue will acquire the managed services of Fortra’s Alert Logic Managed Detection and Response (MDR), Extended Detection and Response (XDR), and Web Application Firewall (WAF) solutions.

Security advisory for AI-assisted browsing interactions with the 1Password browser extension

This advisory describes an ecosystem-level risk that emerges when AI agents are able to autonomously read and act on untrusted content while operating with user-level permissions in a web browser.

Failover Testing: A Complete Guide for IT Teams

Your disaster recovery plan might look bulletproof on paper, but there’s only one way to know if it works: Test it. Failover testing validates whether your backup systems can actually handle the load when production goes down. Most IT teams find gaps during their first test, like misconfigured settings, outdated documentation, or dependencies that nobody remembered to document.

How Agentic Tool Chain Attacks Threaten AI Agent Security

AI agents are rapidly transforming enterprise operations. Unlike traditional software that follows fixed code paths, AI agents interpret prompts, form plans, select tools, and react to results in a continuous loop. At the heart of this capability is the agent's ability to actively select and execute capabilities based on natural language descriptions, schemas, and examples.

How to Build Custom Data Detectors Without Regex: DLP for Context-Aware Detection

DLP systems have traditionally relied on regex pattern matching to identify sensitive information. While regex excels at finding patterns, it fundamentally can’t understand context. It’s a massive limitation that forces security teams into endless cycles of tuning expressions and triaging false positives. Nightfall AI built prompt-based entity detection to solve this problem.