Know What's Happening in Cybersecurity

Today's Cybersecurity Pulse

Microsoft releases record‑size Patch Tuesday for April

The April update cycle delivered 165 patches addressing roughly 340 unique CVEs, including two zero‑day flaws, one of which is already being exploited in the wild. Microsoft urges immediate deployment across all product families.

HackerOne Discloses Supply‑Chain Breach Exposing Data of 287 Employees via Navia
NewsMar 26, 2026

HackerOne Discloses Supply‑Chain Breach Exposing Data of 287 Employees via Navia

HackerOne confirmed that a supply‑chain attack on its benefits provider Navia exposed the personal data of 287 employees, including Social Security numbers and health‑plan details. The breach, discovered in early 2026, adds to a larger Navia incident that impacted roughly...

By Pulse
Germany Classifies Cybersecurity Threats for Energy Infrastructure
NewsMar 26, 2026

Germany Classifies Cybersecurity Threats for Energy Infrastructure

Germany’s Federal Network Agency will adopt a new classification framework developed by Fraunhofer IOSB‑AST to evaluate cybersecurity incidents in the energy sector under the EU NIS 2 Directive. The methodology introduces a three‑stage, risk‑based model that moves from initial incident reporting...

By pv magazine
Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies with Custom Ransomware
NewsMar 26, 2026

Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies with Custom Ransomware

Pro‑Ukraine hacker group Bearlyfy has launched more than 70 cyber‑attacks against Russian companies in the past year, escalating its campaign with a custom Windows ransomware strain called GenieLocker. Early operations demanded only a few thousand dollars, but recent ransom notes...

By The Record by Recorded Future
Security, Resilience, and the Future of Mobile Infrastructure
PodcastMar 26, 202641 min

Security, Resilience, and the Future of Mobile Infrastructure

The episode explores the massive security breach known as Salt Typhoon, which gave China access to U.S. cellular networks, and discusses how the Navy and a startup called CAPE are building a resilient, secure mobile infrastructure that can operate over...

By a16z Podcast
Cybersecurity Tops List of Infrastructure Deal Risks
NewsMar 26, 2026

Cybersecurity Tops List of Infrastructure Deal Risks

Research by S‑RM shows cybersecurity has become the top reason digital and telecom infrastructure deals collapse, with 76 % of 150 global investors citing cyber concerns as the primary blocker. Over the past three years, 65 % of those investors experienced at...

By Mobile World Live
New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware
NewsMar 26, 2026

New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware

Threat actors are standardizing a ClickFix social‑engineering attack that lures victims into running malicious commands via the Windows Run dialog, PowerShell, or macOS Terminal. Insikt Group identified five active clusters since May 2024, impersonating brands like QuickBooks, Booking.com, and Zillow. The...

By GBHackers On Security
More on Vendor AI Risks
BlogMar 26, 2026

More on Vendor AI Risks

Companies are grappling with how to treat AI‑enhanced vendor upgrades under existing shadow‑AI bans. The article argues that such upgrades are fundamentally an IT control issue—un‑tested software entering production—rather than a new compliance violation. It highlights recent high‑profile incidents like...

By Radical Compliance
EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts
NewsMar 26, 2026

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

Researchers at eSentire disclosed a new EtherRAT campaign that hides command‑and‑control (C2) addresses inside Ethereum smart contracts, a technique they call EtherHiding. The malware, delivered via Node.js backdoors after initial access through Teams support scams and ClickFix attacks, retrieves C2...

By Infosecurity Magazine
AI-Powered Dependency Decisions Introduce, Ignore Security Bugs
NewsMar 26, 2026

AI-Powered Dependency Decisions Introduce, Ignore Security Bugs

Sonatype’s latest research reveals that even the most advanced AI models—referred to as frontier models—frequently generate erroneous software‑dependency recommendations, with nearly 28% of suggestions being outright hallucinations. The study examined 258,000 recommendations across Maven, npm, PyPI and NuGet, finding that...

By Dark Reading
AI: Cybersecurity’s Double‑Edged Sword Demands New Strategies
SocialMar 26, 2026

AI: Cybersecurity’s Double‑Edged Sword Demands New Strategies

AI in cybersecurity is your new frenemy. It supercharges attacks via rogue AI and blind spots, yet also defends at machine speed, spotting patterns and automating responses. Success requires adapting classic security. https://t.co/9XdfJYGyDr

By Cristina Dolan
AviaGames Opens Global Trust Centre in Singapore to Boost Real-Money Game Security
NewsMar 26, 2026

AviaGames Opens Global Trust Centre in Singapore to Boost Real-Money Game Security

AviaGames has opened a Global Trust Centre in Singapore to centralise cybersecurity and data‑protection for its real‑money games. The facility will be overseen by former AWS security leader Dr. Jan Wang, who will drive compliance strategy across multiple jurisdictions. AviaGames...

By PocketGamer.biz
Leak Bazaar Converts Stolen Corporate Data Into Organized Criminal Marketplace
NewsMar 26, 2026

Leak Bazaar Converts Stolen Corporate Data Into Organized Criminal Marketplace

Leak Bazaar, a new Russian‑speaking cyber‑crime service, debuted on March 25, 2026, offering a structured marketplace that transforms raw stolen corporate data into refined, buyer‑ready datasets. The platform combines automated filtering, machine‑learning analysis, and human validation to repackage information into...

By GBHackers On Security
Cloud Phones Become New Threat to Banking App Users
SocialMar 26, 2026

Cloud Phones Become New Threat to Banking App Users

Cloud phones are the latest tool to be used against banking app users and the security community should take notice. https://t.co/temWl9DMlh

By TechRadar
TikTok for Business Accounts Targeted in New Phishing Campaign
NewsMar 26, 2026

TikTok for Business Accounts Targeted in New Phishing Campaign

A new phishing campaign is specifically targeting TikTok for Business accounts, luring users with fake “Schedule a Call” pages that mimic TikTok and Google Careers interfaces. The malicious sites are hosted on a shared Google Storage bucket and use Cloudflare...

By BleepingComputer
New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data
NewsMar 26, 2026

New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data

CyberProof reports a 8‑10% surge in PXA Stealer attacks on financial institutions during Q1 2026, positioning the malware as the successor to takedown‑prone infostealers like RedLine and Lumma. The campaign spreads through convincing phishing emails that mimic tax forms, legal notices, or...

By HackRead
Don't Rely on Hope for Firmware Security
SocialMar 26, 2026

Don't Rely on Hope for Firmware Security

This is how many view firmware updates. Wishing for the best is not the best security strategy... https://t.co/MnyAcBQT6u

By Paul Asadoorian
Acalvio ShadowPlex Review: Deception-Based Preemptive Cybersecurity
NewsMar 26, 2026

Acalvio ShadowPlex Review: Deception-Based Preemptive Cybersecurity

Acalvio ShadowPlex is an AI‑powered, agentless deception platform that projects decoys, breadcrumbs, and honeytokens across endpoints, cloud, OT, and identity layers to detect attacker intent early. The solution feeds high‑confidence alerts into existing SOC workflows via integrations with SIEM, SOAR,...

By HackRead
Two Popular Apps Poisoned in One Week – Don’t Fall Victim!
BlogMar 26, 2026

Two Popular Apps Poisoned in One Week – Don’t Fall Victim!

Two supply‑chain poisoning incidents hit popular development tools this week, the first involving Apifox’s content‑delivery network. After March 4, the app loaded a tampered 77KB JavaScript file instead of the legitimate 34KB version. The malicious script leveraged Apifox’s Electron framework, which...

By AI Disruption
Keepit Annual Data Report 2026 Highlights the Path From SaaS Adoption to Proven Recovery Readiness
NewsMar 26, 2026

Keepit Annual Data Report 2026 Highlights the Path From SaaS Adoption to Proven Recovery Readiness

Keepit released its Annual Data Report 2026, analyzing real‑world backup and restore activity across SaaS users from 2025. The study shows that 90% of restores are single‑file downloads while nine‑in‑ten enterprises have validated bulk recovery, indicating growing maturity among larger...

By AiThority » Sales Enablement
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
NewsMar 26, 2026

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

The upcoming cybersecurity webinar teaches organizations how to move beyond guesswork by validating defenses against real‑world attack paths, including those targeting autonomous AI agents. It emphasizes CTI‑driven, automated testing that integrates with existing pipelines, delivering continuous, accurate posture assessments. Attendees...

By The Hacker News
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
NewsMar 26, 2026

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

Security researchers uncovered a zero‑click XSS flaw in Anthropic’s Claude Chrome extension that let any website inject prompts into the AI assistant without user interaction. The vulnerability, dubbed ShadowPrompt, combined an overly permissive *.claude.ai origin allow‑list with an XSS bug...

By The Hacker News
LiteLLM Incident: Mitigated and Contained with SAP LeanIX
BlogMar 26, 2026

LiteLLM Incident: Mitigated and Contained with SAP LeanIX

LiteLLM, an open‑source large language model framework, was hit by a malicious supply‑chain attack that injected compromised code into its dependencies. SAP LeanIX’s security team identified the breach within hours and executed a coordinated response that isolated the threat and...

By EA Voices
Byte Sized Lessons Launches Cyber‑Safety Adventure Series for Kids
NewsMar 26, 2026

Byte Sized Lessons Launches Cyber‑Safety Adventure Series for Kids

Byte Sized Lessons with Zola and Zena, written by cybersecurity expert Dr. Rae Rivera, has been released worldwide as a new educational adventure for young readers. The book combines storytelling with hands‑on activities to teach children core online‑safety skills, targeting...

By Pulse
New “Disregard That!” Prompt‑Injection Attacks Threaten Enterprise LLM Deployments
NewsMar 26, 2026

New “Disregard That!” Prompt‑Injection Attacks Threaten Enterprise LLM Deployments

Security researchers have uncovered a new class of prompt‑injection attacks, dubbed “Disregard That!”, that can commandeer the context window of large language models. The technique can force chatbots to send fraudulent messages, such as a £45 ($57) transfer request to...

By Pulse
Cubs’ 150th‑Season Launch Leverages Cookie Data Up to 750 Days
NewsMar 26, 2026

Cubs’ 150th‑Season Launch Leverages Cookie Data Up to 750 Days

The Chicago Cubs have teamed with at least ten advertising‑technology vendors to harvest fan data through cookies that can persist for up to 750 days. The extensive collection of IP addresses, device identifiers, browsing behavior and precise location data raises...

By Pulse
Law and Security Merge as Supply Chain Regulations Multiply: RSA Panelists
NewsMar 26, 2026

Law and Security Merge as Supply Chain Regulations Multiply: RSA Panelists

At RSA 2026, security and legal leaders warned that digital‑heavy supply chains are expanding the attack surface, citing a recent breach of the open‑source tool Trivy used in AI pipelines. They highlighted hardware visibility gaps and the growing complexity of...

By Broadband Breakfast
Agentic AI Poised to Shape Both Offensive and Defensive Cyber Measures: Munich Re
BlogMar 26, 2026

Agentic AI Poised to Shape Both Offensive and Defensive Cyber Measures: Munich Re

Munich Re’s 2026 cyber‑insurance report warns that agentic AI will soon automate multi‑stage attacks, generate hyper‑personalised phishing, and manipulate AI models through prompt injection and data poisoning. The technology expands the attack surface while also offering defenders autonomous tools to...

By Reinsurance News
RSAC 2026: N-Able Report Reveals Why AI-Powered, Layered Cyber Defense Is Essential for Business Resilience
BlogMar 26, 2026

RSAC 2026: N-Able Report Reveals Why AI-Powered, Layered Cyber Defense Is Essential for Business Resilience

N‑able’s 2026 State of the SOC report shows a sharp resurgence of network‑perimeter attacks and a dramatic rise in alert volume, with the SOC processing roughly two alerts per minute in 2025. AI now automates about 90% of investigation tasks,...

By StorageNewsletter
LiteLLM Supply‑Chain Attack Exposes Up to 500,000 Cloud Tokens and Kubernetes Secrets
NewsMar 26, 2026

LiteLLM Supply‑Chain Attack Exposes Up to 500,000 Cloud Tokens and Kubernetes Secrets

Threat actors behind TeamPCP compromised the open‑source LiteLLM library, pushing malicious versions 1.82.7 and 1.82.8 that deployed an infostealer to as many as 500,000 users. The malware harvested cloud tokens, Kubernetes secrets and crypto wallets, forcing developers to rotate credentials...

By Pulse
GlassWorm Attack Installs Fake Browser Extension for Surveillance
NewsMar 26, 2026

GlassWorm Attack Installs Fake Browser Extension for Surveillance

GlassWorm is a multi‑stage malware chain that infiltrates developers through malicious npm, PyPI or VS Code packages. After a pre‑install script runs, it contacts the Solana blockchain to fetch a second‑stage infostealer that harvests browser extensions, crypto wallet seeds, cloud and...

By Security Boulevard – DevOps
Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure
NewsMar 26, 2026

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

Rapid7 disclosed that a China‑linked state‑sponsored threat actor has embedded kernel‑level implants and passive backdoors deep within global telecom backbone infrastructure. The campaign leverages the BPFdoor Linux backdoor, CrossC2 beacons and the TinyShell framework to achieve long‑term, stealthy persistence across...

By SecurityWeek
OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns
NewsMar 26, 2026

OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns

OpenAI announced a Safety Bug Bounty program on March 26, hosted on Bugcrowd, to solicit disclosures of AI abuse and safety risks beyond traditional security flaws. The initiative complements its existing Security Bug Bounty, which has already rewarded 409 vulnerabilities since...

By Infosecurity Magazine
Intermediaries Driving Global Spyware Market Expansion
NewsMar 26, 2026

Intermediaries Driving Global Spyware Market Expansion

Intermediaries such as brokers, resellers, and exploit engineers are expanding the global spyware market by obscuring supply chains and facilitating sales to sanctioned or low‑tech nations. A recent Atlantic Council report highlights examples like a South African intermediary for Memento...

By Dark Reading
Quarantining Risk: How Public Health Is Scaling AI without Exposing Sensitive Data
NewsMar 26, 2026

Quarantining Risk: How Public Health Is Scaling AI without Exposing Sensitive Data

Public health agencies are turning to cloud‑native scientific computing to run massive genomics and epidemiological models without compromising patient privacy. The UK Health Security Agency (UKHSA) standardized its fragmented pandemic‑era infrastructure by adopting Red Hat OpenShift on Azure and integrating Nvidia...

By SiliconANGLE
Compliance Emerges as Competitive Differentiator Amid Rising Data Sovereignty Scrutiny
NewsMar 26, 2026

Compliance Emerges as Competitive Differentiator Amid Rising Data Sovereignty Scrutiny

Data sovereignty has moved from a niche compliance checkbox to a core business priority, expanding beyond traditional sensitive records to include email addresses, logs, and metadata. Executives now demand real‑time visibility into where data originates, travels, and resides, as illustrated...

By Diginomica
Nova Scotia Power Data Breach Compromises Data of Over 900,000 Users
NewsMar 26, 2026

Nova Scotia Power Data Breach Compromises Data of Over 900,000 Users

Nova Scotia Power disclosed a data breach affecting more than 900,000 current and former customers, exposing names, contact details, birth dates, banking information, driver’s licenses and Social Insurance Numbers. The intrusion began around March 19, 2025 when an employee clicked...

By The Cyber Express
Researchers Uncover WebRTC Skimmer Bypassing Traditional Defenses
BlogMar 26, 2026

Researchers Uncover WebRTC Skimmer Bypassing Traditional Defenses

Sansec researchers discovered a novel payment skimmer that leverages WebRTC DataChannels to load malicious code and exfiltrate payment data. Unlike traditional skimmers that rely on HTTP requests, this technique uses encrypted UDP traffic, bypassing Content Security Policy and standard network...

By Security Affairs
Smashing Security Podcast #460: Never Knock on the Door of a Nuclear Submarine Base and Ask for a Selfie
BlogMar 26, 2026

Smashing Security Podcast #460: Never Knock on the Door of a Nuclear Submarine Base and Ask for a Selfie

In episode 460 of the Smashing Security podcast, host Graham Cluley and guest Jenny Radcliffe dissect a cyber‑extortion case where a disgruntled data analyst stole a company payroll database and demanded $2.5 million in Bitcoin. The show also covers the arrest of an Iranian...

By Graham Cluley (Security)
Secure by Default: Why Security That Assumes Failure Is Winning
BlogMar 26, 2026

Secure by Default: Why Security That Assumes Failure Is Winning

At RSA 2024, the cybersecurity community is pivoting from the long‑standing "secure by design" mantra to a more pragmatic "secure by default" approach. The new model assumes misconfigurations, rushed deployments and human error, building safeguards that work even when users...

By Doug Levin
AI Now Contains Cyberattacks in Seconds, Humans as Exception Handlers
SocialMar 26, 2026

AI Now Contains Cyberattacks in Seconds, Humans as Exception Handlers

27 seconds. That's the fastest observed cyberattack breakout time. Average: 29 minutes. CrowdStrike + IBM just integrated their AIs for machine-speed containment. Human analysts are no longer the first responder. They're the exception handler. https://t.co/47q7R5dt3q

By Yves Mulkers
Coruna iPhone Exploit Kit Tied to Operation Triangulation
SocialMar 26, 2026

Coruna iPhone Exploit Kit Tied to Operation Triangulation

News about an iPhone exploit kit called Coruna has generated a lot of buzz. Boris Larin (@oct0xor) of the GReAT team digs into the kit and explores the attack chain. And yes, there are clear links to Operation Triangulation. Details:...

By Eugene Kaspersky
Foster City Ransomware Attack Triggers Emergency as RSAC Spotlights Municipal Threats
NewsMar 26, 2026

Foster City Ransomware Attack Triggers Emergency as RSAC Spotlights Municipal Threats

A ransomware intrusion crippled Foster City’s computer systems, leading the city council to declare a state of emergency. The incident unfolded as more than 40,000 cybersecurity professionals gathered at the RSAC conference in San Francisco, turning the breach into a...

By Pulse
Invoice Fraud Costs UK Construction Sector Millions, NCA Warns
NewsMar 26, 2026

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

UK’s National Crime Agency, together with the National Federation of Builders, has launched an awareness campaign targeting invoice‑fraud in the construction sector. In September 2025, fraudulent invoices cost the industry almost £4 million (≈$5.3 million) across 83 reported cases, and construction plus...

By Infosecurity Magazine
Google Says Quantum Computers Could Break RSA by 2029, Raising Security Alarm
NewsMar 26, 2026

Google Says Quantum Computers Could Break RSA by 2029, Raising Security Alarm

Google announced that a quantum computer with just one million noisy qubits could factor a 2048‑bit RSA key in under a week, shifting the industry‑wide “Q‑Day” deadline to 2029. The warning accelerates calls for rapid adoption of post‑quantum cryptography across...

By Pulse
Boost Student Data Security Awareness on World Backup Day
SocialMar 26, 2026

Boost Student Data Security Awareness on World Backup Day

🔦 Shine a light on student data security awareness this #WorldBackupDay next week 💽 Tune into this episode & learn how to enhance student data security 🔓Unlock powerful strategies for a secure future today https://t.co/SkQFRzN8q8 @roxi_thompson

By Monica Burns
Blackwired and ARMIS Join Forces to Boost Cyber Resilience
NewsMar 26, 2026

Blackwired and ARMIS Join Forces to Boost Cyber Resilience

Blackwired and ARMIS International have formed a strategic alliance to enhance cyber resilience against nation‑state attacks. The partnership combines Blackwired’s ThirdWatch platform—featuring 3‑D threat visualisation and the Aim‑Ready‑Fire methodology—with ARMIS’s operational crisis frameworks and deep government relationships. Together they aim...

By RegTech Analyst
Dell and HP Roll Out Quantum-Resistant Device Security
NewsMar 26, 2026

Dell and HP Roll Out Quantum-Resistant Device Security

HP and Dell announced new hardware‑level security features aimed at defending against physical attacks and emerging quantum‑computing threats. HP introduced TPM Guard, which encrypts the TPM‑CPU link, and added quantum‑resistant cryptography to its LaserJet Pro and Enterprise printer lines along...

By SecurityWeek
Node.js Fixes Critical Flaws, Patches DoS Risk in Latest Security Update
NewsMar 26, 2026

Node.js Fixes Critical Flaws, Patches DoS Risk in Latest Security Update

The Node.js project released a March 2026 security rollout covering its 20.x, 22.x, 24.x and 25.x branches. The update patches a critical TLS handling flaw (CVE-2026-21637) that could trigger remote denial‑of‑service, and a high‑severity HTTP header bug (CVE-2026-21710) that may...

By The Cyber Express
DataBahn Brings AI-Driven Intelligence Into the Security Pipeline
NewsMar 26, 2026

DataBahn Brings AI-Driven Intelligence Into the Security Pipeline

DataBahn.ai unveiled Autonomous In‑Stream Data Intelligence (AIDI), an AI‑native model that interprets, validates, and acts on security telemetry as it flows through the pipeline. The accompanying DataBahn Agent Farm deploys specialized AI agents to automate connector creation, asset mapping, and...

By Help Net Security