Monday 1/12
Attackers Move into Microsoft Teams: Automated Remediation for Lateral Threats (Abnormal AI)
Attackers increasingly rely on collaboration tools like Microsoft Teams because they move fast and operate on implicit trust. Automated detection and remediation changes that dynamic by addressing malicious messages as they appear—before users have a chance to interact and before threats can propagate across chats and channels.
https://abnormal.ai/blog/microsoft-teams-automated-remediation
Nutanix Accelerates Agentic AI Time to Value with the NVIDIA Rubin Platform (Nutanix)
The Nutanix integrated AI operating environment is a turnkey, complete system to operationalize AI factories built on NVIDIA AI infrastructure and NVIDIA AI Enterprise software, including NVIDIA NIM microservices. We make it simple to activate AI infrastructure investments and get from dock delivery to producing tokens as rapidly as possible, all from one OS vendor, while fully integrated with the NVIDIA AI Enterprise ecosystem.
https://www.nutanix.com/blog/nutanix-accelerates-agentic-ai-time-to-value-with-the-nvidia-rubin-platform
Tuesday 1/13
Preparing for Post-Quantum Cryptography (Wiz)
A Cryptographically Relevant Quantum Computer (CRQC) does not exist today that can break encryption, but one may exist at some point in the future, and there are steps you should begin taking now to prepare for that.
https://www.wiz.io/blog/preparing-for-post-quantum-cryptography
Microsoft to enforce MFA for Microsoft 365 admin center sign-ins
Microsoft said that enforcing MFA for all admin center sign-ins adds critical protection beyond standard password security, making it significantly harder for attackers to compromise accounts.
https://www.bleepingcomputer.com/news/microsoft/microsoft-to-enforce-mfa-for-microsoft-365-admin-center-sign-ins/
Wednesday 1/14
CIS Safeguard 7.6: Perform Automated Scans of Externally-Exposed Assets
https://www.gothamtg.com/blog/cis-safeguard-76-perform-automated-scans-of-externally-exposed-assets
2026 Application Access Governance predictions: Securing AI agents and modernizing controls (Delinea)
The shift to embedding AI agents directly in business applications for enhanced user productivity raises the bar for security. This blog covers four predictions for application access governance in 2026, based on where software publishers and their customers appear to be heading.
https://delinea.com/blog/application-access-governance-predictions-for-2026
Thursday 1/15
VoidLink: The Cloud-Native Malware Framework Weaponizing Linux Infrastructure (Check Point)
Check Point Research has identified a new and highly advanced malware framework, VoidLink, designed specifically to operate inside modern Linux-based cloud environments. While much of today’s cyber threat landscape still focuses on Windows systems, VoidLink highlights a clear and concerning shift toward targeting the infrastructure that powers cloud services and the critical systems organizations rely on to keep businesses, governments, and essential services running.
https://blog.checkpoint.com/research/voidlink-the-cloud-native-malware-framework-weaponizing-linux-infrastructure/
Insider risk in the age of AI: the outlook for 2026 (Proofpoint)
With easy access to AI tools, careless insiders have new ways to create security risks, whether intended or not. AI assistants based on large language models (LLMs), such as Copilot, ChatGPT, and Gemini, make it easy for users to expose sensitive information.
https://www.proofpoint.com/us/blog/information-protection/ai-next-insider-threat-turning-point-for-insider-risk
Friday 1/16
What came first: the CNAME or the A record? (Cloudflare)
While most modern software treats the order of records in DNS responses as irrelevant, we discovered that some implementations expect CNAME records to appear before everything else. When that order changed, resolution started failing.
https://blog.cloudflare.com/cname-a-record-order-dns-standards/
Bridging Cybersecurity and AI (Palo Alto Networks)
Attacks on AI systems represent a critical departure from traditional cybersecurity threats as they operate insidiously, subtly corrupting core reasoning processes, causing persistent, systemic failures, some of which only become evident over time. Most traditional cybersecurity tools are not equipped to recognize those breakdowns because they assume deterministic behavior and rules-based logic.
https://www.paloaltonetworks.com/blog/2026/01/bridging-cybersecurity-and-ai/