
News for today:
- [N-able] New additions to N-able’s TAP. N-able announced that Zensec and Atomatik have joined its Technology Alliance Program – Zensec brings structured, expert led incident response services, and Atomatik offers hyperautomation capabilities for repeatable, rules-driven security and IT workflows. The N‑able Technology Alliance Program is a strategic initiative that brings together industry-leading technology companies to build deeper, more secure integrations across N‑able’s award‑winning business resilience platform—enabling scalable collaboration and delivering greater flexibility and value for vendors and customers worldwide. N-able
- [Exabeam] Strengthening capabilities for baselining normal behavior. Exabeam added direct visibility into how employees are using AI assistants to its Exabeam Agent Behavior Analytics platform, for enriching baselining to detect insider threats. Among other additions: Exabeam builds dynamic behavior profiles for users and their AI agents, tracking patterns across request volumes, token usage, tool invocations, web sessions, and outbound activity. When behavior deviates from established norms, such as sudden spikes in API calls or token consumption. Exabeam flags the anomaly, helping security teams detect misuse before it escalates. Exabeam
- [Fortra] Acquisition of Zero-Point Security. Fortra acquired Zero-Point Security, to inform and expand Fortra’s offensive security education capabilities. Zero-Point Security’s well-known courses include Red Team Operations I and II, both which meet the high standards to be certified by the Council of Registered Ethical Security Testers (CREST). Successful completion of these programs helps participants achieve Certified Red Team Operator (CRTO) status, an industry-respected credential that validates expertise in offensive security techniques. Fortra
- [GreyNoise] Weaponization of home internet connections. GreyNoise released a new report on the scale and frequency of compromised home internet connections being used as a cover to route malicious traffic. For this research, GreyNoise leveraged its Global Observation Grid (GOG), with coverage across 80+ countries to observe unsolicited internet traffic for 90 days, between November 29, 2025-February 27, 2026. The dataset encompasses 4,020,000,000 sessions from 5,720,000 unique source IPs targeting internet-facing infrastructure, excluding known benign scanners and spoofable traffic. GreyNoise’s network observes scanning and probing attempts that also reach internet-facing infrastructure. GreyNoise

