Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

fast-draft Open VSX Extension Compromised by BlokTrooper

The KhangNghiem/fast-draft extension, listed on open-vsx.org/extension/KhangNghiem/fast-draft and now sitting above 26,000 downloads, had multiple malicious releases that execute a GitHub-hosted downloader and pull a second-stage RAT and infostealer from the BlokTrooper/extension repository. The confirmed malicious releases in the version line we inspected are 0.10.89, 0.10.105, 0.10.106, and 0.10.112.

MWC 2026: AI Infrastructure Meets the Telecom Cloud

Attending Mobile World Congress (MWC) 2026 in Barcelona was once again an incredible experience. Each year the event seems to evolve, and 2026 showcased just how quickly the telecom and cloud infrastructure landscape is changing. The show floor was packed, the conversations were engaging, and the innovations on display reinforced the pace at which our industry is moving.

Unlock AI with GPU as a Service in VCF 9

Many IT professionals struggle to integrate artificial intelligence (AI) into their existing environments. You often find expensive hardware trapped in isolated clusters or dedicated hosts. Your infrastructure team manages access through manual ticket queues, which leads to low utilization and frustrating bottlenecks for developers. When you don’t have a standardized way to share and monitor accelerator resources, every hardware change risks downtime for your critical applications.

APIs Are Critical Infrastructure. Why Aren't We Treating Them That Way?

‍In this session, we take an in-depth look at what it truly means to treat APIs as critical infrastructure. Using industry data and real-world examples, we explore the gap between how much businesses rely on APIs and how well they are actually protected. And we talk about why that gap introduces operational and regulatory risks.

Secure Enterprise AI Apps and Agents: Visibility, Governance, Runtime Protection

When you deploy an AI application, do you know what's being sent into it — or what's coming back out? Cato AI Security provides runtime protection for the AI applications your organization builds and deploys, with real-time enforcement, sensitive data anonymization, and a complete audit trail across every interaction. Learn more or request a demo at catonetworks.com.

Modern Application Delivery Requires Unified Management & Flexible Licensing

Modern Application Delivery Requires Unified Management & Flexible Licensing Jamison Utter and Priyanka Mullan, Senior Product Marketing Manager at A10 Networks, discuss the fundamental infrastructure that powers today's modern applications. While technologies like AI and APIs often steal the spotlight, the true backbone of high-performing digital services lies in robust Application Delivery Controllers (ADCs).

Rethinking Application Delivery for the AI Era

Rethinking Application Delivery for the AI Era Is your network strategy keeping up with the AI era? Jamison Utter, Field CISO at A10 Networks, challenges IT leaders to move beyond "piecemeal" infrastructure and rethink their approach to application delivery. As organizations face the dual pressure of integrating AI workloads and managing a vast "fleet" of hybrid devices, the old ways of operating are becoming a liability. Jamison discusses the true cost of administrative overhead and the urgent need for a more flexible, simple, and future-proof vendor strategy.

From Intent to Outcome: How Agentic Coding is Transforming the SOC

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Security teams are being asked to move faster and handle more complexity, while the threats they defend against are increasingly AI-assisted. When I wrote about VoidLink in January, my point was simple: you cannot fight machine-speed threats with human-speed defense. Attackers are using AI to code, adapt, and scale attacks while humans are still grinding away doing the heavy lifting in the SOC.

Shipping-Themed Phishing Scams Target the Middle East and Africa

A surge in shipping-related phishing scams is targeting the Middle East and Africa (MEA) region, according to researchers at Group-IB. “To deliver the scam, the attacker sends a phishing link to victims via SMS using various spoofing or bulk-message techniques,” the researchers write. “These links are typically optimized for mobile devices, since most victims open SMS messages on their phones.