Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Microsoft releases record‑size Patch Tuesday for April

The April update cycle delivered 165 patches addressing roughly 340 unique CVEs, including two zero‑day flaws, one of which is already being exploited in the wild. Microsoft urges immediate deployment across all product families.

U.S. Government Bans Foreign‑Made Wi‑Fi Routers Over Security Concerns
NewsMar 30, 2026

U.S. Government Bans Foreign‑Made Wi‑Fi Routers Over Security Concerns

The U.S. government announced a ban on foreign‑manufactured Wi‑Fi routers, citing national‑security concerns. The move immediately affects retailers and consumers, raising questions about supply‑chain adjustments and future regulatory actions.

By Pulse
IRS Warns Real‑Estate Investors of Ten Tax Scams That Can Slash Returns
NewsMar 30, 2026

IRS Warns Real‑Estate Investors of Ten Tax Scams That Can Slash Returns

The IRS’s 2026 “Dirty Dozen” warning highlights ten tax‑scam tactics that could drain real‑estate investors’ returns. Industry analysts say the scams—ranging from phishing emails to fake tax credits—are especially risky for investors who file complex returns, and they urge stricter...

By Pulse
Surfshark Names COO Dovydas Godelis CEO, Aims to Turn VPN Into Mass‑Adopted Cybersecurity Suite
NewsMar 30, 2026

Surfshark Names COO Dovydas Godelis CEO, Aims to Turn VPN Into Mass‑Adopted Cybersecurity Suite

Surfshark announced that COO Dovydas Godelis will replace founder Vytautas Kaziukonis as chief executive. Godelis, 36, says the company will evolve from a niche VPN provider into a full‑stack cybersecurity solution for everyday users worldwide.

By Pulse
Ripple Deploys AI‑Powered Security for XRP Ledger Amid Growing Crypto Threat Landscape
NewsMar 30, 2026

Ripple Deploys AI‑Powered Security for XRP Ledger Amid Growing Crypto Threat Landscape

Ripple announced the integration of artificial‑intelligence‑driven security tools into the XRP Ledger, aiming to boost fraud detection and network resilience. While the company did not reveal technical details, the move reflects a broader push for AI in crypto, echoing trends...

By Pulse
Attribute-Based Access Control for AI Capability Negotiation
NewsMar 30, 2026

Attribute-Based Access Control for AI Capability Negotiation

The article provides a practical guide for users and developers to disconnect from Apple Single Sign‑On (SSO) and replace it with enterprise‑grade identity solutions. It details the UI steps for consumers, explains why SaaS firms view Apple SSO as a...

By Security Boulevard
Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10
NewsMar 30, 2026

Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10

Red Hat released Advanced Cluster Security for Kubernetes version 4.10, extending its security platform across OpenShift clusters in public, private and hybrid clouds. The update adds a technology‑preview plug‑in that surfaces real‑time vulnerability data inside the OpenShift Console, and introduces a...

By Red Hat – DevOps
Strengthening Spain's Digital Sovereignty: Red Hat Enterprise Linux Achieves Top-Tier ENS Security Certification
NewsMar 30, 2026

Strengthening Spain's Digital Sovereignty: Red Hat Enterprise Linux Achieves Top-Tier ENS Security Certification

Red Hat Enterprise Linux (RHEL) 9.0 Extended Update Support has been added to Spain’s CPSTIC catalogue, earning top‑tier certification under the National Security Framework (ENS). The inclusion authorises public‑sector bodies to deploy RHEL while meeting the strict confidentiality, integrity and...

By Red Hat – DevOps
Cyber Security’s Workforce Gap Is a Capability Risk for Government
NewsMar 29, 2026

Cyber Security’s Workforce Gap Is a Capability Risk for Government

Australia is pouring billions into cyber security hardware and sovereign capability, yet its workforce remains a critical vulnerability. Women represent only 17% of the nation’s cyber professionals, highlighting a stark diversity gap that hampers problem‑solving under pressure. The Australian Public...

By The Mandarin (Australia)
Always-On Assurance: Moving APS Security From “Trust” To Reproducible Evidence
NewsMar 29, 2026

Always-On Assurance: Moving APS Security From “Trust” To Reproducible Evidence

The latest Commonwealth Cyber Security Posture report highlights a decisive move from point‑in‑time audit snapshots to always‑on, automated evidence of control effectiveness. Organizations are urged to replace frantic pre‑audit scrambles with continuous monitoring that delivers reproducible compliance data in real...

By The Mandarin (Australia)
Apple’s Age Verification Move Is Bigger than It Looks
NewsMar 29, 2026

Apple’s Age Verification Move Is Bigger than It Looks

Apple has rolled out mandatory age verification for iCloud users in the United Kingdom, shifting the check from individual apps to the account level. The change aligns with the UK’s Online Safety framework, which demands tighter age controls for digital...

By Biometric Update
Are Your NHIs Fully Supported for Optimal Performance?
NewsMar 29, 2026

Are Your NHIs Fully Supported for Optimal Performance?

Non‑Human Identities (NHIs), or machine identities, are becoming a cornerstone of modern cybersecurity, especially in cloud‑first environments. Organizations must manage the full NHI lifecycle—from discovery and classification to threat detection, remediation, and continuous monitoring—to prevent breaches. Traditional point solutions like...

By Security Boulevard
What Role Does Innovation Play in Agentic AI Development?
NewsMar 29, 2026

What Role Does Innovation Play in Agentic AI Development?

Non‑human identities (NHIs), also known as machine identities, are becoming a critical focus for cybersecurity, especially in cloud environments. Managing the full lifecycle of these encrypted secrets and permissions reduces breach risk, improves compliance, and drives operational efficiency. The article...

By Security Boulevard
Councils Push for Federal Shared Security Centre Funding
NewsMar 29, 2026

Councils Push for Federal Shared Security Centre Funding

Australian local councils are lobbying the federal government for shared security operations centres (SOCs) to bolster cyber defences. Ahead of the ALGA national assembly, identical motions call for $10 million AUD (about $6.6 million USD) to fund SOC infrastructure, 24/7 monitoring, SIEM...

By iTnews (Australia) – Government
ChatGPT Won't Let You Type Until Cloudflare Reads Your React State
NewsMar 29, 2026

ChatGPT Won't Let You Type Until Cloudflare Reads Your React State

Every ChatGPT request now triggers a Cloudflare Turnstile challenge that runs a virtual‑machine program inside the browser. The bytecode arrives encrypted as a 28,000‑character base64 string, but the decryption key – a server‑generated float – is embedded directly in the...

By Hacker News
NAB Is Co-Designing a SIEM with Databricks
NewsMar 29, 2026

NAB Is Co-Designing a SIEM with Databricks

National Australia Bank (NAB) has joined four other design partners to co‑design Lakewatch, a new security information and event management (SIEM) platform built on Databricks. The solution, currently in private preview, leverages the bank’s existing Databricks‑on‑AWS data lake, Ada, to...

By iTnews (Australia) – Government
Did You Sign up for the New White House App?  Don’t Use It Until You Read This!
NewsMar 29, 2026

Did You Sign up for the New White House App? Don’t Use It Until You Read This!

The White House launched a mobile app on March 28, 2026, branded “Unparalleled access to the Trump Administration.” Security researcher Thereallo decompiled the APK and uncovered multiple privacy and data‑security violations that breach federal cybersecurity standards. Patrick Quirk highlighted the...

By DataBreaches.net
CVE Funding Secured, Yet Deal Details Remain Opaque
SocialMar 29, 2026

CVE Funding Secured, Yet Deal Details Remain Opaque

CVE funding secured, but the deal details remain a black box. Plus: lookup.disclose.io is live in beta, exploited vulns surged 105%, and the EU CRA clock is ticking. Policy Pulse #8: https://blog.disclose.io/policy-pulse-issue-8-week-of-march-29-2026/

By Casey Ellis
Beyond Heatmaps: Quantify Cyber Risk Financially
SocialMar 29, 2026

Beyond Heatmaps: Quantify Cyber Risk Financially

Heatmaps aren’t enough anymore for cyber risk. Leaders want to understand financial impact, not just red, yellow, green. https://buff.ly/zGxWwLP

By Sean D. Mack
MAESTRO Threat Modeling — NemoClaw
BlogMar 29, 2026

MAESTRO Threat Modeling — NemoClaw

NemoClaw, an open‑source stack for always‑on AI assistants, was examined using the MAESTRO threat‑modeling framework. The static analysis of version 0.1.0 uncovered 23 distinct threats across seven layers, including four critical and seven high‑severity vulnerabilities. While sandbox isolation and network policies...

By Agentic AI
Over 300 Vietnamese Arrested After Cambodia Scam Bust
NewsMar 29, 2026

Over 300 Vietnamese Arrested After Cambodia Scam Bust

More than 300 Vietnamese were arrested in Dong Nai province after being repatriated from Cambodia, where authorities dismantled a transnational online‑scam ring. Cambodia deported 776 Vietnamese nationals linked to the illicit operation, highlighting the scale of Southeast Asia’s cyber‑fraud ecosystem....

By New Straits Times (Malaysia) – Business
Compliance as Code: GENIUS Act Redefines Financial Infrastructure
SocialMar 29, 2026

Compliance as Code: GENIUS Act Redefines Financial Infrastructure

🔺 Is the "old era" of compliance finally dead? 🪦 In this episode of Fintech Conversations & Insights, Beth Haddock (Stablecoin Standard) explains why the GENIUS Act is forcing a total rethink of financial infrastructure. We dive into: ❌ Why "Honeypot" data collection...

By Efi Pylarinou
Claude + Codex Automate Comprehensive PRD and Security Reviews
SocialMar 29, 2026

Claude + Codex Automate Comprehensive PRD and Security Reviews

Been doing this for months. Any PRD/Spec/Implementation/Bug + Security hunts includes Claude + Codex, much better thorough analysis and things one or the other misses it'll pick up. My Claude Code instance has hooks + gpt skills for doing...

By Dave Kennedy
Is Your Signal Secure?
NewsMar 29, 2026

Is Your Signal Secure?

At the NAB Show, a panel titled “Securing the Signal” examined how broadcasters can shift from reactive security to proactive risk management across distributed field operations. Experts from Fox, Dataminr, Smith Entertainment Group and Verkdata discussed integrating real‑time threat‑intelligence platforms...

By Radio World
Chinese Tech in Canadian Fisheries Raises Spy Concerns
SocialMar 29, 2026

Chinese Tech in Canadian Fisheries Raises Spy Concerns

And there is goes… all of Our North American seafood. What could possibly go wrong bringing Chinese technology and equipment into Canada? How much do you want to bet the CCP gives them free fish finding equipment that also sends submarine charts...

By John Konrad
Identity Security Advances, Yet Critical Gaps Persist
SocialMar 29, 2026

Identity Security Advances, Yet Critical Gaps Persist

How Identity Security Has Evolved and Where It Still Falls Short: Token at RSAC 2026 https://t.co/jSbKk2TLry

By Shashi Bellamkonda
The Compliance Blind Spot in Cyber Risk
NewsMar 29, 2026

The Compliance Blind Spot in Cyber Risk

Financial institutions are discovering that compliance can fail even when core systems stay online. Automated compliance judgments degrade silently when underlying data conditions change during cyber incidents, eroding the validity of regulatory outputs. Regulators are shifting focus from mere control...

By The European Financial Review
Apple Adds Extra Security for Older iPhones
SocialMar 29, 2026

Apple Adds Extra Security for Older iPhones

Apple is taking an additional step to keep older iPhones protected from the latest exploits. https://t.co/jPJ441uP8A

By TechRadar
CareCloud Notifies the SEC After Attack on One of Its EHR Environments
NewsMar 29, 2026

CareCloud Notifies the SEC After Attack on One of Its EHR Environments

CareCloud disclosed to the SEC that an unauthorized third party accessed one of its six electronic health record (EHR) environments on March 16, causing an eight‑hour disruption that was fully restored the same evening. The company promptly notified its cyber‑insurance carrier,...

By DataBreaches.net
The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance
NewsMar 29, 2026

The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance

AI is reshaping cyber risk for European financial institutions, turning generic phishing into highly personalized, multilingual attacks powered by deep‑fakes and synthetic identity documents. Regulators such as the ECB and EBA warn that AI‑driven fraud attempts are surging, while the...

By The European Financial Review
Scaling AI Demands a New Infrastructure Playbook
NewsMar 29, 2026

Scaling AI Demands a New Infrastructure Playbook

Enterprises moving AI from pilots to production face a fundamentally different infrastructure challenge, requiring tight integration of accelerated compute, high‑performance networking, security and observability. Fragmented stacks cause fragile deployments and costly GPU idle time, especially during intensive training or retrieval‑augmented...

By CIO.com
VRadar Security Achieves Patent-Pending Status for Quantum-Resistant System
BlogMar 29, 2026

VRadar Security Achieves Patent-Pending Status for Quantum-Resistant System

Vietnamese engineer Nguyen Xuan Dong has obtained patent‑pending status for VRadar, a cloud‑native Security Operations Center that incorporates NIST‑approved post‑quantum cryptography. Built alone in eight months with AI assistance, the platform processes 1.35 million alerts in 34 days and resolves 91 %...

By Quantum Zeitgeist
File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites
NewsMar 29, 2026

File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites

A file‑read flaw (CVE‑2026‑3098) in the Smart Slider 3 WordPress plugin allows any authenticated user, even a subscriber, to export arbitrary server files. The vulnerability stems from missing capability checks in the plugin’s AJAX export function, enabling access to sensitive files...

By BleepingComputer
ENISA Overhauls Its Cybersecurity Market Analysis Playbook With Version 3.0 of ECSMAF
BlogMar 29, 2026

ENISA Overhauls Its Cybersecurity Market Analysis Playbook With Version 3.0 of ECSMAF

ENISA unveiled version 3.0 of its Cybersecurity Market Analysis Framework (ECSMAF) in March 2026, adding configurable analytical pathways, recurrent study cycles, and a semi‑automated continuous‑monitoring engine. The new version separates analyses by initiation (planned vs. ad‑hoc) and duration (short  6 months), providing detailed guidance...

By ComplexDiscovery
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 90
BlogMar 29, 2026

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 90

Security Affairs released its Malware Newsletter Round 90, curating roughly 18 recent threat reports spanning nation‑state campaigns, supply‑chain compromises, and novel malware vectors. Highlights include a new Cobra DocGuard infostealer, Iranian actors using Telegram as a command‑and‑control channel, and a supply‑chain attack...

By Security Affairs
GitHub Outlines Its 2026 Actions Security Roadmap
BlogMar 29, 2026

GitHub Outlines Its 2026 Actions Security Roadmap

GitHub unveiled its 2026 security roadmap for GitHub Actions, emphasizing safer defaults, tighter policy controls, and improved observability. The plan targets a broader software‑supply‑chain hardening strategy rather than isolated feature releases. Enterprise users will gain centralized tools to govern workflows,...

By Notebookcheck
Iranian Hackers Use SMS Spyware to Track Civilians Fleeing Missile Strikes
NewsMar 29, 2026

Iranian Hackers Use SMS Spyware to Track Civilians Fleeing Missile Strikes

Iranian-linked hackers sent text messages offering bomb‑shelter alerts that instead installed spyware on Android devices of fleeing civilians. The coordinated attack synced with missile strikes, giving attackers camera, location and data access, and is part of a broader wave of...

By Pulse
Compliance Checklists Aren't Enough to Stop Hacks
SocialMar 29, 2026

Compliance Checklists Aren't Enough to Stop Hacks

You filled out the checklist. You're 'compliant.' But I can still hack your systems. Compliance theater doesn't protect you. #DataGovernance #Cybersecurity https://t.co/ycxJfEqCmC

By Yves Mulkers
Anonymous Threat Follows Hertz IT Failure Exposé
SocialMar 29, 2026

Anonymous Threat Follows Hertz IT Failure Exposé

Posted an article about Hertz's IT failure and received a cryptic, anonymous voicemail warning: "Eric, I saw your article about Hertz. I would be careful if I were you." #TechFailures #Cybersecurity https://t.co/H9ugvwOIjq

By Eric Kimberling
Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate
NewsMar 29, 2026

Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate

Texas’ Department of Information Resources (DIR) has mandated AI‑aware cybersecurity awareness training for all state and local government employees, with a certification deadline of August 31. Kratikal’s Threatcop platform is one of only five vendors approved under the DIR certification, offering...

By Security Boulevard
LeakWatch 2026 – Security Incidents, Data Breaches, and IT Incidents for the Current Calendar Week 13
BlogMar 29, 2026

LeakWatch 2026 – Security Incidents, Data Breaches, and IT Incidents for the Current Calendar Week 13

During calendar week 13 (March 23‑29 2026), LeakWatch recorded a series of breaches that targeted publicly accessible web platforms, outsourced support channels, and software supply‑chain pipelines rather than traditional data‑center assets. High‑profile incidents included a cyber‑attack on the European Commission’s Europa web platform,...

By Igor’sLAB
Do Emergency Microsoft, Oracle Patches Point to Wider Issues?
NewsMar 29, 2026

Do Emergency Microsoft, Oracle Patches Point to Wider Issues?

Microsoft and Oracle have each released emergency out‑of‑band patches this week, drawing attention to the fragility of enterprise update cycles. Microsoft’s KB5085516 fixes a sign‑in error that showed a “no internet” message for standard Microsoft accounts after the latest Patch...

By Slashdot
Soxton AI Acquires Cipher, Adding Agentic Security to Its AI Legal Platform
NewsMar 29, 2026

Soxton AI Acquires Cipher, Adding Agentic Security to Its AI Legal Platform

Soxton AI completed the acquisition of Cipher, a real‑time security platform for agentic applications, using its own AI‑driven legal tools and cutting legal fees by roughly $80,000. The deal broadens Soxton’s full‑stack offering to include autonomous workflow protection for early‑stage...

By Pulse
VDX.tv’s 90‑Day Cookie Harvest Triggers Privacy Alarm
NewsMar 29, 2026

VDX.tv’s 90‑Day Cookie Harvest Triggers Privacy Alarm

Exponential Interactive’s VDX.tv is gathering extensive personal and behavioural data through cookies that last up to 90 days, including IP addresses, device identifiers and browsing histories. The practice has ignited privacy‑governance concerns among regulators and consumer‑rights groups, highlighting the tension...

By Pulse
Google Pushes Back Q Day to 2029, Warns of Looming Encryption Risk
NewsMar 29, 2026

Google Pushes Back Q Day to 2029, Warns of Looming Encryption Risk

Google announced it now expects quantum computers capable of breaking today’s cryptographic algorithms by 2029, accelerating the timeline for industry‑wide security preparations. The company warned that the threat is imminent and called for rapid migration to quantum‑resistant solutions.

By Pulse
Iran-Linked Hackers Breach FBI Director Kash Patel’s Personal Email, Leak Photos and 300+ Messages
NewsMar 29, 2026

Iran-Linked Hackers Breach FBI Director Kash Patel’s Personal Email, Leak Photos and 300+ Messages

Iran-linked Handala Hack Team infiltrated FBI Director Kash Patel’s personal Gmail account and posted a cache of more than 300 emails along with personal photographs. The FBI said the data were historical and contained no classified material, but the breach...

By Pulse
Citrix NetScaler Faces Active Scans Exploiting Critical CVE‑2026‑3055 Flaw
NewsMar 29, 2026

Citrix NetScaler Faces Active Scans Exploiting Critical CVE‑2026‑3055 Flaw

Defended Cyber and watchTowr report that threat actors are actively probing Citrix NetScaler ADC and Gateway for CVE‑2026‑3055, a memory‑overread bug rated 9.3 on the CVSS scale. The vulnerability affects versions before 14.1‑66.59 and 13.1‑62.23, and experts urge immediate patching.

By Pulse
Surfshark Names COO Dovydas Godelis CEO, Aims to Evolve Beyond VPN
NewsMar 29, 2026

Surfshark Names COO Dovydas Godelis CEO, Aims to Evolve Beyond VPN

Surfshark announced that COO Dovydas Godelis will replace founder Vytautas Kaziukonis as CEO. The 36‑year‑old executive plans to reposition the firm as a comprehensive cybersecurity platform, while keeping its flagship VPN unchanged in the short term.

By Pulse
CISA Adds Critical F5 BIG‑IP AMP RCE Flaw to KEV Catalog
NewsMar 29, 2026

CISA Adds Critical F5 BIG‑IP AMP RCE Flaw to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) listed the critical F5 BIG‑IP AMP vulnerability (CVE‑2025‑53521, CVSS 9.8) in its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies must remediate the flaw by March 30, 2026, prompting a worldwide rush to patch vulnerable...

By Pulse
Ripple Deploys AI Tools to Bolster XRP Ledger Security
NewsMar 29, 2026

Ripple Deploys AI Tools to Bolster XRP Ledger Security

Ripple announced the integration of AI-driven security tools and an AI‑assisted red team to proactively identify and fix vulnerabilities on the XRP Ledger. The move follows recent upgrades and aims to keep the network resilient as it processes over 100 million...

By Pulse