Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS

On April 4, 2026, Fortinet released a hotfix for a critical vulnerability in FortiClient EMS (CVE-2026-35616) that allows unauthenticated remote threat actors to execute unauthorized code or commands via crafted requests. The flaw stems from improper access control in the API authentication. Fortinet has confirmed observing exploitation of CVE-2026-35616 in the wild. The vulnerability was responsibly disclosed by Defused, which had observed exploitation prior to Fortinet’s official disclosure.

Detection and Prevention of Misdirected Emails: What to Know

When it comes to email security, phishing and other social engineering attacks tend to grab headlines. But a simple mistake by an employee, like addressing an email to the wrong person, can be just as damaging. Misdirected emails like these remain one of the most common and costly forms of accidental data exposure.

What Is AI Data Exfiltration and How Do You Stop It?

AI adoption does not happen uniformly across an organization. Some employees have integrated generative AI (genAI) tools into core parts of their workflow. Others have barely opened one. Most are somewhere in between, experimenting on an ad hoc basis, without consistent visibility into what data those tools handle or where it goes. That variance is the problem. Security programs built around either universal AI adoption or zero AI adoption will miss most of the actual risk.

Vendor Lock-In: How to Avoid It and Stay Flexible

You picked a cloud provider, migrated your workloads, customized everything to fit their ecosystem, and now switching feels nearly impossible. That’s vendor lock-in, and it’s one of the biggest strategic risks facing IT teams today. Nearly all (94%) of IT leaders worry about it, pushing many organizations toward hybrid infrastructure.

Why the smartest security leaders use PAM compliance to drive operational excellence

Most organizations treat compliance as a cost of doing business — a box to check, an audit to survive, a regulatory hurdle to clear. Compliance rarely inspires excitement. For many organizations it is treated as a necessary obligation, something to satisfy regulators and auditors so the business can move forward. Security and IT teams often experience compliance as a cycle of documentation, manual processes and audit preparation that consumes valuable time and resources.

The Context Gap: How Nearly Half of Your Time is Lost to Investigation

The classic tradeoff in cybersecurity has always been simple: more visibility at the cost of speed. But today, that tradeoff is breaking down. As attackers leverage AI to find and exploit vulnerabilities at unprecedented scale, the sheer volume of alerts is burying security teams. The result? An expanding exposure gap. It is taking longer than ever to triage and remediate threats, creating a dangerous window between when a tool pings and when a human in the SOC can actually take action.