CVE202620045: Exploited Unauthenticated Remote Code Execution Vulnerability in Cisco Unified Communications Products

On January 21, 2026, Cisco released fixes for a high-severity vulnerability impacting Cisco Unified Communications products that is under active exploitation, tracked as CVE-2026-20045. The flaw arises from improper input validation of user-supplied data in HTTP requests to the web-based management interface of affected devices.

UK Cybersecurity and Resilience Bill Provides a New Era of Accountability for Critical Infrastructure

The UK Government’s Cybersecurity and Resilience Bill marks a significant shift in how the nation safeguards critical infrastructure. The Bill moves beyond voluntary measures and fragmented self-regulation and introduces a mandated framework for resilience, signalling that cyber protection is now a strategic obligation for many sectors including healthcare, critical national infrastructure (CNI) transport and digital infrastructure.

How to Ignore Cybersecurity AI Bubble FOMO

Cybersecurity teams are no longer circling an AI bubble. Rather, they are staffing inside it, buying within it, and getting measured by it. This matters because bubbles create a predictable trap: expectations are set higher than teams truly can deliver. Cato Networks CEO Shlomo Kramer recently told Business Insider the market is experiencing an AI bubble driven by heavy investment and AI-driven profit improvements, which he expects to unwind. A correction will not pause attacker activity.

USB Drive Security Best Practices to Protect Your Data

I’ve seen more data breaches caused by USB drives than you think. Not fancy hacks. Not nation-state attacks. Just people moving files quickly because they had to get something done. A USB drive feels harmless. It’s small, familiar and fast. You plug it in, copy a file, unplug it and move on. That’s exactly why it’s dangerous. USB flash drives and external storage devices carry the most valuable data an individual or organization owns. Contracts. Client records.

Agentic SecOps Workspace demo: AI agents operating inside LimaCharlie

LimaCharlie CEO/Founder, Maxime Lamothe-Brassard, walks through LimaCharlie's Agentic SecOps Workspace in this demo, showing how AI agents can directly operate security infrastructure using the platform's complete API coverage. What you'll see.

Vendor Acquired? What It Means for Your PAM Strategy

Over the past two years, we’ve watched a steady wave of acquisitions reshape the privileged access market. For many security leaders, that wave has now hit home. Your PAM vendor has been acquired, absorbed into a larger platform, and suddenly the roadmap you once relied on feels less certain. This moment is easy to dismiss as “business as usual.” It is also one of the rare points where it actually makes sense to step back and reassess your PAM strategy with fresh eyes.

From the Data Lake to the Edge: Why Universal Visibility is the Future of API Security

If you look at an enterprise architecture diagram from five years ago, it looks relatively tidy. You had a data center, maybe a cloud provider, and a few gateways. Today, that diagram looks like a constellation. Data is living in AI platforms like Databricks. Frontend applications are pushed to the edge on Netlify. Logic is scattered across microservices, serverless functions, and legacy IIS servers. For security teams, this fragmentation creates a massive headache: Blind Spots.