SecurityBrief Canada - Technology news for CISOs & cybersecurity decision-makers

Patching stories

Global upg. phase 2 partner blog header 3 1200x500px

Upgrade advantage: More value, less effort for partners, MSPs & MSSPs

Today
#
endpoint protection
#
digital transformation
#
network security
SonicWall's latest firewalls promise MSPs and MSSPs unified management, AI-driven insights and richer margins with less manual effort.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

Today
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Andy fielder cto at metacompliance

A resilient security culture is built in the flow of work, not the classroom

Last week
#
data protection
#
digital transformation
#
phishing
Rising UK cyber attacks show training alone is failing; firms must embed behavioural security cues into daily work to cut human risk.
Overworked sysadmin hybrid it sprawl tangled cables dark monitors

Structural stress rises for sysadmins in hybrid IT era

Last week
#
devops
#
digital transformation
#
it automation
Hybrid IT sprawl is driving “structural stress” for sysadmins as security risks rise, responsibilities grow and control over tools shrinks.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last week
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Msp security operations center analysts monitoring threat dashboards

LevelBlue & Tenable launch exposure service for MSPs

Last week
#
digital transformation
#
cloud security
#
iot security
LevelBlue and Tenable have teamed up to launch a tiered exposure management service giving MSPs continuous, risk-based visibility.
Cluttered small business it office unattended windows laptops dust

Slow patching leaves SMB endpoints exposed for weeks

Last week
#
it automation
#
risk & compliance
#
edr
Acronis finds SMBs patch Microsoft flaws in about eight days, but the slowest endpoints stay exposed to known bugs for over five weeks.
Story 299992

Codific maps five cyber paths threatening power grids

Last month
#
virtualisation
#
dr
#
ransomware
Codific warns power grids face repeat cyberattack patterns and urges utilities to bolster resilience to outages and cascading disruption.
Carlo stefanelli chief technology officer targa telematics

Targa Telematics shifts core systems to Equinix hubs

Last month
#
digital transformation
#
hyperscale
#
iot
Targa Telematics moves core systems to Equinix data centres in Milan and Frankfurt to bolster data sovereignty, resilience and growth.
Yadi narayana 01

Datadog flags rising DevSecOps risk from ageing code

Last month
#
devops
#
siem
#
application security
Datadog warns 87% of organisations run software with exploitable flaws as ageing code, fast releases and automation amplify DevSecOps risk.
Enterprise it ops room linux infrastructure cloud dashboards

CIQ launches RLC Pro to back Rocky Linux for enterprises

Last month
#
devops
#
hybrid cloud
#
hyperscale
CIQ unveils RLC Pro, a paid Rocky Linux subscription promising long-term support, FIPS-ready security and vendor-backed bug fixes.
Mark

Splashtop links endpoint management with CrowdStrike

Last month
#
ai security
#
edr
#
security operations
Splashtop has integrated its Autonomous Endpoint Management with CrowdStrike Falcon, unifying Windows endpoint status for IT and security teams.
Ai cyberattack on canadian city skyline with maple leaf binary

AI-fuelled cyberattacks put Canadian businesses at risk

Last month
#
saas
#
malware
#
data protection
AI-powered cyberattacks are rising sharply, leaving Canadian businesses exposed as legacy systems meet rapid AI adoption and automated threats.
Moody legacy code wall crumbling with bugs and stressed engineers

Security debt surges as legacy vulnerabilities pile up

Last month
#
data protection
#
devops
#
application security
Security debt hits 82% of organisations as legacy flaws linger over a year, with third-party code driving most critical vulnerabilities.
Dark control room ai ransomware cloud cyberattack red lock scene

AI-driven cyber threats grow as breakouts accelerate

Last month
#
virtualisation
#
ransomware
#
cloud security
AI-fuelled ransomware, rapid cloud intrusions and identity abuse are transforming cyber risk, slashing response times for defenders.
Ciso in dark ops room facing cloud ai chasm moody us scene

Tenable warns AI outpacing security, widening risk gap

Last month
#
pam
#
cloud security
#
application security
Tenable warns cloud and AI adoption is creating a widening 'zero‑margin' security gap as exposure grows faster than defenders can respond.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Last month
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Last month
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Last month
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Last month
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.