Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 27, 2026 Emerging Threats Weekly

This week’s briefing covers: The attack chain invokes two preparatory batch scripts before the final wiper stage. Those scripts disable services, enumerate users, change passwords, log off sessions, disable network interfaces and begin destructive actions with diskpart, robocopy and fsutil before the final payload is launched. Dive deeper.

Darling Ingredients Consolidates Vendors, Increases Agility, and Saves $750K+ Annually with Cato

As Darling Ingredients expanded, so did the opportunity to modernize how its global operations are connected and secured. With the Cato SASE Platform, the Darling Ingredients’ IT team replaced complexity with consistency, reduced costs, and gained the agility to support smarter growth, elevating IT as a strategic partner to the business.

How AKRF Orchestrated a Network Shift, Optimizing IT to Drive Expansion

The consulting firm wanted a secure, reliable network to better manage resources for modern applications so employees could work more effectively. With the Cato SASE Platform, they got that and much more: centralized visibility, control, and the foundation for secure growth.

The Silent Data Problem in Hospitals

We’ve all been there: a temporary file created for a claim gets saved and forgotten. Ten years later, that "temporary" file is a massive liability. Stephen Bader from Powers Health shares how they are tackling sensitive data sprawl. It’s not malicious; it’s just how work happens. But identifying and securing that PHI is a multi-year project every healthcare system needs to start today. Hear how Powers Health is cleaning up their data footprint with Josh Howell.

[Webinar] How to Detect Privileged Access Misuse Early | Syteca

Privileged accounts are one of the most common attack paths, yet misuse often goes unnoticed until serious damage is done. As identity becomes the new security perimeter, cybersecurity leaders face a growing challenge: privileged misuse often looks like normal administrative activity until real damage has already occurred. Watch this webinar to explore how organizations can move beyond traditional privileged access management and build an effective early detection strategy for privilege-based threats.

The AI Bubble Is About to Burst (Here's Why)

The AI bubble is about to burst. Energy costs, chip shortages and computer pricing are reaching unsustainable levels. The economics don't add up anymore and something has to crack. In this episode of Razorwire Raw, Jim Rees explains why AI is hitting an economic wall nobody's talking about. World energy consumption is climbing vertically because of AI. Data centres are on hold because there isn't enough electricity. GPU, RAM and CPU prices are spiralling. Large language model providers are raising prices because compute costs are exploding.

How Hackers Get In: What Is a Vulnerability? (Containers Explained)

A vulnerability is a weakness in software—and in containerized environments, even one small flaw can open the door. From buggy code to outdated images and misconfigurations, risk can exist at every layer of the stack. And if a vulnerability is already known… attackers often already know how to exploit it. In this video, we break down: Next up: What is a CVE?

SecurityScorecard Weekly Brief: The Cyber Risk and Policy Edition - Amanda Smith

In this week’s Weekly Brief: The Cyber Risk and Policy Edition, SecurityScorecard’s Director, Public Sector Channel Amanda Smith breaks down why the U.S. war with Iran is more than just what takes place on the physical battlefront. In 2026, as conflict unfolds in the Middle East, the digital battlefield has a direct impact on the homeland and U.S. critical infrastructure, too. “It's a global digital confrontation that hits a lot closer to home than a lot of people realize.”