Last year was defined by AI hype, new attack models, and intensifying global tensions. As 2026 begins, security teams are asking what…
Date Archives January 2026
Fortinet confirms new zero-day attacks against customer devices
Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The…
Identity Management and Information Security News for the Week of January 23rd: Radware, Cohesity, Ping Identity, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
The cybercrime industry continues to challenge CISOs in 2026
Cybercriminals have built structured criminal groups with an organizational model similar to that of a legitimate business. “Cybercrime has become industrialized, a…
NETSCOUT recognized for leadership in network detection and response
We’re proud to share that NETSCOUT has been recognized for industry-leading excellence in network detection and response (NDR). This acknowledgment, from Quadrant Knowledge…
Smarter DDoS security at scale
In today’s digital landscape, encrypted traffic is the norm—not the exception. While encryption such as Transport Layer Security (TLS) 1.3 protects user…
Ransomware-Attacke auf Verkehrsgesellschaft Main-Tauber
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″…
Unterschätztes Risiko: Insider-Bedrohungen endlich ernst nehmen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=444%2C250&quality=50&strip=all 444w”…
Ransomware gang’s slip-up led to data recovery for 12 US firms
Twelve US companies hit by the INC ransomware group were able to recover encrypted data after a cybersecurity firm discovered the cloud…
Trivial Telnet authentication bypass exposes devices to complete takeover
Computers with Telnet open are in immediate danger of being compromised due to a critical vulnerability that allows attackers to bypass authentication….