Blog | Arctic Wolf /resources/category/blog/ The Leaders in Security Operations Fri, 17 Apr 2026 21:54:28 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 /wp-content/uploads/2019/11/aw-favicon-rebrand-150x150.png Blog | Arctic Wolf /resources/category/blog/ 32 32 Microsoft Patch Tuesday: April 2026  /resources/blog/microsoft-patch-tuesday-april-2026/ Tue, 14 Apr 2026 21:19:21 +0000 /?p=130980 ... Microsoft Patch Tuesday: April 2026 ]]> Frontier AI Models Mark a Turning Point for Cybersecurity /resources/blog/project-glasswing-marks-a-turning-point-for-cybersecurity/ Thu, 09 Apr 2026 18:13:50 +0000 /?p=130924 ... Frontier AI Models Mark a Turning Point for Cybersecurity]]> CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS /resources/blog/cve-2026-35616/ Mon, 06 Apr 2026 20:36:22 +0000 /?p=130872 ... CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS]]> CVE-2026-2699 & CVE-2026-2701: Progress ShareFile Storage Zones Controller Pre-Auth RCE Chain /resources/blog/cve-2026-2699-cve-2026-2701/ Mon, 06 Apr 2026 18:49:02 +0000 /?p=130869 ... CVE-2026-2699 & CVE-2026-2701: Progress ShareFile Storage Zones Controller Pre-Auth RCE Chain]]> RSAC 2026 Wrap-Up: Defining the Future as the AI Cybersecurity Company /resources/blog/rsac-2026-wrap-up-defining-the-future-as-the-ai-cybersecurity-company/ Thu, 02 Apr 2026 20:28:06 +0000 /?p=130837 ... RSAC 2026 Wrap-Up: Defining the Future as the AI Cybersecurity Company]]> Unlocking Security Insights with Arctic Wolf Data Explorer /resources/blog/unlocking-security-insights-with-arctic-wolf-data-explorer/ Thu, 02 Apr 2026 17:53:19 +0000 /?p=130851 ... Unlocking Security Insights with Arctic Wolf Data Explorer]]> Building Cyber Resilience with Arctic Wolf: A Practical Approach for Security Leaders /resources/blog/building-cyber-resilience-with-arctic-wolf-a-practical-approach-for-security-leaders/ Thu, 02 Apr 2026 17:43:05 +0000 /?p=130821 ... Building Cyber Resilience with Arctic Wolf: A Practical Approach for Security Leaders]]> Enabling Arctic Wolf Active Response Using Your Existing Security Stack /resources/blog/enabling-arctic-wolf-active-response-using-your-existing-security-stack/ Thu, 02 Apr 2026 16:39:18 +0000 /?p=130814 ... Enabling Arctic Wolf Active Response Using Your Existing Security Stack]]> The Real Competitive Advantage in the Age of Frontier AI /resources/blog/the-real-competitive-advantage-in-the-age-of-frontier-ai/ Wed, 01 Apr 2026 15:20:50 +0000 /?p=130778 ... The Real Competitive Advantage in the Age of Frontier AI]]> Supply Chain Attack Impacts Widely Used Axios npm Package /resources/blog/supply-chain-attack-impacts-widely-used-axios-npm-package/ Tue, 31 Mar 2026 21:04:21 +0000 /?p=130759 ... Supply Chain Attack Impacts Widely Used Axios npm Package]]>