Patched FortiGate Firewalls Hacked, Cisco RCE Probed

▼ Summary
– A new book provides a guide for enterprise AI strategy, treating adoption as an organizational discipline spanning planning, security, and operations.
– Research shows a gap between employee access to AI tools and their routine reliance on them for work.
– Multiple critical security vulnerabilities are being actively exploited, affecting Cisco, Fortinet, and enterprise browser extensions.
– Cybercriminals are using sophisticated methods like hijacked software packages, phishing kits, and supply chain attacks to target organizations.
– New tools and standards are emerging to address security and privacy concerns, including open-source DevOps platforms and a European AI security standard.
The cybersecurity landscape remains a dynamic battlefield, with recent incidents underscoring the persistent challenge of securing even foundational infrastructure. A critical authentication bypass flaw in Fortinet’s FortiGate firewalls, tracked as CVE-2025-59718, is reportedly still affecting appliances running newer, supposedly patched versions of FortiOS. This development raises serious questions about patch efficacy and the lifecycle of vulnerabilities in complex network devices. Simultaneously, Cisco has urgently addressed a critical remote code execution vulnerability (CVE-2026-20045) in its unified communications products, warning that exploitation attempts have already been observed in active attacks. These events highlight the relentless pace at which threat actors probe and exploit systemic weaknesses.
Enterprise security faces multifaceted threats beyond network hardware. A sophisticated phishing campaign is specifically targeting organizations in the energy sector, using compromised email accounts from trusted partners to distribute malicious links. In the identity and access management space, modern phishing kits are turbocharging vishing attacks against Okta users, allowing attackers to intercept credentials and manipulate browser authentication flows in real-time. The software supply chain also remains vulnerable, as evidenced by cryptocurrency thieves hijacking legitimate Linux applications on the Snap Store by taking over expired publisher domains to push malicious updates.
The integration of artificial intelligence into business processes brings its own set of risks and considerations. While a new guide on AI Strategy and Security provides a framework for organizational adoption, experts warn that unbounded AI use can break systems when large language model features are deployed without proper limits or guardrails. On the regulatory front, a new European standard from ETSI outlines baseline cybersecurity requirements for AI models intended for real-world deployment, aiming to standardize security practices.
Data privacy and exposure continue to be pressing concerns. A new study reveals that one-time SMS links, often considered low-risk, can expose personal data for years because they frequently lack expiration mechanisms. In response to the sprawling data broker ecosystem, tools like PrivacyHawk for iOS help users track and remove personal information from these aggregators to reduce digital footprints and associated risks like identity theft.
The open-source community is actively bolstering its security posture. The Rust package registry, crates.io, has integrated a Security tab that displays known advisories for individual crates, helping developers make safer dependency choices. For Python developers, the open-source tool Bandit provides a quick way to scan code for common security issues early in the development lifecycle. In the database management space, Bytebase offers an open-source DevOps platform for handling schema and data changes through a structured workflow.
Notable updates from major technology providers include Microsoft’s release of a new security baseline for Microsoft 365 Apps for enterprise and OpenAI’s rollout of age prediction in ChatGPT to strengthen protections for younger users. In the certificate authority space, Let’s Encrypt has made its short-lived, 6-day TLS certificates generally available, an option that reduces reliance on traditional revocation mechanisms.
As global events approach, their digital infrastructure becomes a target. A new threat study anticipates how attackers will operate across the ecosystem of the Milan Cortina 2026 Winter Olympic Games, from ticketing to telecoms. Meanwhile, the foundational trust mechanisms of the internet are under strain; a domain security study finds that large organizations often leave their domain portfolios underprotected, making them a weak link for enterprise attacks.
The human element of cybersecurity presents ongoing challenges. Young people are increasingly being recruited by cybercriminal groups that operate with a business-like structure, offering crypto payments and valuing skill over age. When individuals face confusing security incidents, many now turn to platforms like Reddit for cybersecurity advice, seeking guidance from strangers on everything from strange bank charges to compromised social media accounts.
In the physical security domain, Ring has introduced a video verification feature that adds a digital seal to footage, allowing users to confirm it hasn’t been altered. The automotive sector’s vulnerabilities were on display as security researchers uncovered 37 zero-day flaws in systems from Tesla, Sony, and Alpine on the first day of the Pwn2Own Automotive 2026 competition.
Looking forward, strategic priorities are coming into focus. A new framework helps financial institutions prioritize post-quantum cryptography migration by scoring systems based on quantum risk and migration time. For penetration testing, the 2026 State of Pentesting report argues that delivery and follow-through on remediation are now more critical than ever for actually reducing organizational risk. However, a gap persists between aspiration and reality, as security leaders continue to push for continuous control monitoring while many audits remain manual processes.
(Source: HelpNet Security)