Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Ignore Cybersecurity AI Bubble FOMO

Cybersecurity teams are no longer circling an AI bubble. Rather, they are staffing inside it, buying within it, and getting measured by it. This matters because bubbles create a predictable trap: expectations are set higher than teams truly can deliver. Cato Networks CEO Shlomo Kramer recently told Business Insider the market is experiencing an AI bubble driven by heavy investment and AI-driven profit improvements, which he expects to unwind. A correction will not pause attacker activity.

CVE202620045: Exploited Unauthenticated Remote Code Execution Vulnerability in Cisco Unified Communications Products

On January 21, 2026, Cisco released fixes for a high-severity vulnerability impacting Cisco Unified Communications products that is under active exploitation, tracked as CVE-2026-20045. The flaw arises from improper input validation of user-supplied data in HTTP requests to the web-based management interface of affected devices.

Building a Resilient City: How Cato Rolls Out PoP Changes Safely

Imagine a new city that promises cheap housing and ultra-modern infrastructure. People move in, only to discover that the roads are constantly jammed, power cuts happen every evening, water pressure drops without warning, and there are no cameras or sensors to detect where things are breaking. There is no central control room to test changes safely before the next “improvement” hits the streets. It does not matter how attractive the city looked on paper.

DSPM for the Modern Enterprise: One Unified View of Data Risk Everywhere

Security teams today aren't struggling with a lack of data, they're struggling with a lack of clarity. Sensitive data now lives and moves across endpoints, SaaS applications, cloud infrastructure, and AI systems. Understanding where that data is, how it's used, and when it becomes risky has never been more important — or more difficult.

Utilities Under Pressure: Delivering Resilience That Holds Up

Regulators view operational resilience as a top priority. This is not surprising as according to Sophos, in 2024 nearly two-thirds of energy, oil, gas, and utilities organisations reported ransomware attacks, with average recovery costs rising to around $3 million. This is a clear reminder that real-world disruptions are already affecting the sector.

Agentic SecOps Workspace demo: AI agents operating inside LimaCharlie

LimaCharlie CEO/Founder, Maxime Lamothe-Brassard, walks through LimaCharlie's Agentic SecOps Workspace in this demo, showing how AI agents can directly operate security infrastructure using the platform's complete API coverage. What you'll see.

New Phishing Campaign Spreads Via LinkedIn Comments

A widespread phishing campaign is targeting LinkedIn users by posting comments on users’ posts, BleepingComputer reports. Threat actors are using bots to post the comments, which impersonate LinkedIn itself and inform the user that their account has been restricted due to policy violations. The comments contain links to supposedly allow the user to appeal the restriction.

AI Literacy Training: From Best Practice to Legal Requirement Under the New EU AI Act

For those of you who are like me, when I first heard about the new EU AI Act, I had flashbacks to the implementation of the General Data Protection Act (GDPR) back in 2018. There are certainly a lot of similarities with the EU leading the way in consumer protections that will likely lead to more, similar legislation across the globe. I’m also reminded of the iPhone when it was introduced in the consumer market and bled into the workplace (I for one held onto my Blackberry for as long as I could).