- All Posts
- News - February 2026

Microsoft has initiated a three-stage plan to phase out NTLM authentication in Windows, moving to Kerberos. This post explains the risks of NTLM, the phases of the transition, and actionable steps for organizations to prepare for a more secure authentication...

Mid-market organizations face unique cybersecurity challenges with limited budgets and lean teams. This beginner-friendly guide explains how to implement complete threat lifecycle protection, prevention, protection, detection, and response, while leveraging frameworks like MITRE ATT&CK. Discover practical steps, common mistakes, and...

In February 2026, Notepad++ revealed a sophisticated supply chain attack where the official update mechanism was hijacked to deliver malware to selected users. This post breaks down the attack flow, MITRE ATT&CK mapping, and essential defenses for developers and security...

In January 2026, eScan's update infrastructure was breached, pushing malicious updates to thousands. This post breaks down the multi-stage attack, the PowerShell backdoor, and how to defend against software supply chain compromises.

In February 2026, attackers compromised a legitimate developer account on Open VSX to push malicious extension updates carrying the sophisticated GlassWorm malware. This post breaks down the attack chain, maps it to MITRE ATT&CK, and provides actionable defense steps for...












































