Closest call / honorable mention: LexisNexis confirmed a breach after a threat actor leaked data allegedly taken from a limited number of servers containing mostly legacy data from before 2020. It did not make my top five only because the company said the matter was contained and there was no evidence of impact to products […]
Identity Abuse The New Face of Fraud
Identity abuse is the deliberate misuse of someone’s personal or organizational identity to gain access, steal money, or manipulate systems. In cybersecurity terms, it’s what happens when an attacker successfully impersonates a real person (an employee, a vendor, a customer, even a board member) and uses that stolen or spoofed identity to bypass defenses built […]
Cyber Security Weekly: Top stories from Last Week (Feb 22–Feb 28, 2026)
Cisco Catalyst SD-WAN auth bypass — CVE-2026-20127 (actively exploited, CVSS 10)Why it’s top: Internet-exposed SD-WAN control-plane components are high-impact; exploitation has been publicly reported, and agencies have issued urgent guidance. Ivanti Endpoint Manager Mobile (EPMM) — CVE-2026-1281 / CVE-2026-1340 (widespread automated exploitation attempts)Fix-first: Patch/mitigate any internet-facing EPMM immediately; treat as mass-scanned. BeyondTrust Remote Support / […]
Part Three “A Cyber Security Parable: The Turn Toward Safety”
Who thought a cyber security breach could affect your perception of time? The days and weeks after the loss felt longer than the years before it. Lindon County kept running because it had to. The jail still opened its doors every morning. The court still processed filings. Roads still need repair. Budgets still had to […]
Cyber Security Weekly: The Attacks and Vulnerabilities That Mattered Most (Feb 16–22, 2026)
Top Cyber Security stories from Last Week (Feb 16–22, 2026) Need help addressing this or other cybersecurity concerns? Commonwealth Sentinel is a partner, not a vendor. We work alongside your leadership and IT team to strengthen day-to-day defenses, improve compliance and resilience, and help ensure that when something happens, you have a plan that keeps […]
Part Two “A Cyber Security Parable: The Call That Changed Everything”
The first sign wasn’t a cyber security red alert. It was a normal phone call. It came in on a Wednesday afternoon, the kind of afternoon where everything felt slightly behind schedule, and no one could remember the last time they ate lunch at a normal time. Janelle in Accounts Payable picked up the call […]






