Category: News & Events

Stay Up-to-date with all the latest threat intelligence and follow DataComm.

The DataComm Network Blog is your source for thought leadership at the intersection of technology, security, and strategy. From deep dives into evolving IT trends to expert perspectives on cybersecurity best practices, our blog delivers the insights you need to stay informed, agile, and resilient in a rapidly changing digital world.

Security Advisory: Notepad++ CVE-2025-15556 (Actively Exploited)

DataComm is monitoring CVE-2025-15556, a vulnerability affecting Notepad++ (versions prior to 8.8.9) when using the WinGUp auto-updater. The issue stems from insufficient update integrity verification, meaning an attacker who can intercept or redirect update traffic could potentially trick systems into installing a malicious update, leading to arbitrary code execution with the user’s privileges. We recommend organizations upgrade Notepad++ to v8.8.9 or later and validate that endpoints are no longer running vulnerable versions, especially in managed environments where Notepad++ is widely deployed.

Security Advisory: Microsoft CVE-2024-43468 (Actively Exploited)

DataComm is monitoring CVE-2024-43468, a critical (CVSS 9.8) vulnerability in Microsoft Configuration Manager (SCCM) involving SQL injection that can lead to unauthenticated remote code execution. This CVE has been added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog (Date Added: Feb 12, 2026; federal remediation due Mar 5, 2026), indicating active exploitation risk and elevating patch urgency. We recommend organizations apply Microsoft’s updates immediately, validate Configuration Manager site server exposure, and confirm remediation across managed environments.

Security Advisory: Microsoft Releases 6 Actively Exploited Vulnerabilities

DataComm is promoting Microsoft’s February 2026 security release that fixes six actively exploited zero-day vulnerabilities affecting Windows and related components. Organizations should prioritize deploying the latest updates, validate impacted systems using the MSRC Security Update Guide entries for CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533, and ensure Windows 10 devices remain eligible for security updates via Extended Security Updates (ESU) where applicable. Apply patches immediately through Windows Update and confirm reboot/compliance status to reduce exposure.

Mitigating the AI Security Threat: A Practical, Standards-Aligned Playbook

Mitigating AI security threats requires more than traditional cyber controls. Using NIST AI RMF and financial-services guidance, this article covers governance, threat modeling, testing, and monitoring—plus lessons from incidents involving Samsung, Amazon, Arup, and T-Mobile. Includes a practical checklist, FAQ, and how DataComm can support your program.

Security Advisory: Fortinet CVE-2026-24858 (Active Exploitation)

DataComm is monitoring CVE-2026-24858, an actively exploited authentication-bypass vulnerability tied to FortiCloud Single Sign-On (SSO) across multiple Fortinet products (including FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb). CISA added this CVE to its Known Exploited Vulnerabilities (KEV) Catalog on January 27, 2026, underscoring the urgency to remediate. We recommend organizations apply Fortinet’s fixes immediately, confirm whether FortiCloud SSO administrative login is enabled in your environment, and review internet-exposed Fortinet devices for signs of compromise.

Strengthening the Human Element: The Most Underestimated Cyber Defense

Cybersecurity isn’t just a technology problem—it’s a people problem. Attackers increasingly rely on social engineering, phishing, and business email compromise to exploit trust and urgency, leading to costly mistakes. Strengthening the “human element” means building a culture of pause-and-verify, reinforcing role-based training for real-world scenarios, and designing simple processes that prevent errors before they happen. With the right mix of habits, safeguards, and measurement, organizations can reduce risk quickly—and DataComm can help you turn awareness into lasting, measurable defense.

Kofi’s Korner January 2026

DataComm Trust Center We have an exciting update to share! Our team has developed and launched a Trust Center, a secure platform that automates the security review process. We invite you to explore our Trust Center by visiting:https://trust.datacomm.com/While you’re there, we recommend clicking the Subscribe button at the top of the page. By subscribing, you […]

Supply Chain Risk Management (SCRM)

Mitigating risk across hardware, software, cloud services, and third-party ecosystems Supply chain risk now extends beyond hardware and on-premises software. Organizations rely on cloud service providers, SaaS platforms, managed service providers, and their subprocessors. Compromise of any upstream dependency can affect your environment, often through legitimate channels like APIs and delegated access. NIST SP 800-161 […]

Zero Trust Network Access (ZTNA): Why Modern Organizations Need a New Approach to Application Security

Hybrid work, SaaS adoption, and cloud migration have weakened traditional security perimeters. Effective protection now depends on dynamic, identity- and device-aware access. ZTNA enables application-specific, session-based permissions, reducing risk and limiting lateral movement. Zero Trust, According to NIST NIST Special Publication 800-207 describes Zero Trust as a set of cybersecurity paradigms that treat the network […]

Preparing for the Post-Quantum Era

How DataComm is future-proofing encrypted communications with post-quantum cryptography (PQC) Quantum computing is advancing rapidly and could, within the coming decade or two, enable attacks that break widely used public-key cryptographic algorithms like RSA and elliptic-curve cryptography (ECC). While no quantum system today can defeat modern encryption, adversaries may already be collecting encrypted data for […]

contact sales

SCHEDULE AN APPOINTMENT

Strengthen your bank’s IT with trusted experts in security, compliance, and modernization. Schedule a free consultation today to discuss tailored solutions that keep your institution secure, resilient, and audit-ready.

SecurNOC

Monitor your network devices and view their configuration changes.

SecurPortal

A live look at your events, security event charts and tickets.

Ticketing Portal

Login here to easily add and managed trouble tickets.

Remote Support

Let DataComm remotely access your computer to render aid.