
FBI Issues Urgent Warning: Cybercriminals Are Targeting Musicians
The FBI’s Internet Crime Complaint Center warned that cybercriminals are increasingly targeting musicians, industry staff, and fans. Between early 2024 and late 2025, complaints surged, highlighting extortion, AI‑driven streaming fraud, romance scams, and intellectual‑property theft. Criminals breach social‑media accounts, steal unreleased tracks, and demand payment to avoid public leaks. The agency urges multi‑factor authentication, strong password hygiene, and vigilance against high‑pressure scams.

How to Give Your Google Account a Quick ‘Security Checkup’
Google’s Security Checkup is a free, web‑based audit that guides users through essential account protections, including password strength, two‑factor authentication, recent sign‑in activity, and third‑party app access. The tool, introduced in 2018, helps both consumers and enterprises quickly identify and...

RSAC 2026: Cohesity Enhances Cyber Resilience with Next-Generation Malware Scanning Powered by Sophos
Cohesity announced native integration of Sophos next‑generation malware scanning into its Data Cloud platform. The feature, included with the Enterprise Edition, detects zero‑day, polymorphic and fileless threats hidden in backup data without requiring a separate Sophos license. Scans run incrementally...

RSAC 2026: Commvault Extends Enterprise Resilience to Structured and AI Data with Real-Time Governance Controls
Commvault announced an expansion of its data security posture management (DSPM) to include structured data and AI‑driven vector databases, leveraging its recent acquisition of Satori. The new real‑time data access governance lets security teams monitor and control structured data usage,...

RSAC 2026: Druva Pioneers Identity-Aware Resilience for Okta, Active Directory, and Entra ID
Druva unveiled Identity Resilience, extending its SaaS platform to protect identities across Okta, Microsoft Active Directory and Entra ID. The solution continuously models identity state, correlates privileges, activity and data, and stores this intelligence in the MetaGraph engine. By unifying hybrid...

Rubrik and Rackspace Technology Launch UK Sovereign Cyber Recovery Cloud
Rackspace Technology and Rubrik have launched the UK Sovereign Cyber Recovery Cloud, a ransomware‑focused recovery service that keeps all data, hardware and management within UK borders. The offering provides an automated, isolated "clean‑room" environment that can restore public‑sector and regulated...

Nakivo Expands Platform Support and Elevates Security in v11.2
Nakivo released Backup & Replication v11.2, adding native support for VMware vSphere 9 and Proxmox VE 9.0/9.1 while introducing built‑in OAuth 2.0 for email notifications. The update also bundles broader platform compatibility and critical security patches. Customers can now protect the latest hypervisor versions...

Keepit Signs Strategic Agreement with Hammer Distribution
Keepit, a cloud‑native data protection provider, has signed a strategic agreement with Hammer Distribution to strengthen its UK and Ireland market presence. The partnership leverages Hammer’s value‑added distribution network and Keepit’s local data centers to deliver vendor‑independent SaaS backup that...
Vibrations in Your Skull May Be Your Next Password
Rutgers researchers unveiled VitalID, a software biometric that authenticates XR users via skull‑borne vibrations from breathing and heartbeat. The method captures unique vibration patterns with headset motion sensors, eliminating passwords, PINs, and iris scans. In trials with 52 participants across...

Qilin Ransomware Allegedly Breached Chemical Manufacturer Giant Dow Inc
Cybercrime group Qilin ransomware announced it breached chemical giant Dow Inc., adding the company to its Tor data‑leak site. Dow, a $40 billion global manufacturer with 36,000 employees, has not provided evidence of stolen data. The claim follows Qilin’s rapid growth...
Has GSA Adopted DOD’s CMMC Requirements?
On January 5 2026 the General Services Administration issued an IT Security Procedural Guide that instantly raises cybersecurity requirements for any contractor handling Controlled Unclassified Information. The guide forces compliance with NIST SP 800‑171 Rev 3, selected SP 800‑172 Rev 3 controls, and privacy controls from...

RPKI vs Social Engineering: A Case Study in Route Hijacking
At APRICOT 2026, APNIC and LACNIC disclosed a BGP hijack in July 2025 that combined technical spoofing with social engineering. The attacker forged identity documents to convince a multinational upstream provider to activate transit for a stolen ASN, enabling short‑lived, unauthorized route...
![[Payments Arriving] Evolve Bank & Trust Data Breach + $20 Settlement](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://www.doctorofcredit.com/wp-content/uploads/2024/07/evolve-data-breach.png)
[Payments Arriving] Evolve Bank & Trust Data Breach + $20 Settlement
Evolve Bank & Trust disclosed a ransomware breach in May 2024 attributed to the LockBit criminal group. An employee’s click on a malicious link allowed attackers to download customer data and encrypt files, though backups limited operational loss and no...

ILTA Just-in-Time: When Data Becomes More Valuable Than Downtime, Law Firms Become a Prime Target
Ransomware attacks have shifted focus from merely disrupting operations to stealing and monetizing sensitive data, making downtime less valuable than the information compromised. Law firms, with their troves of confidential client and case files, have become prime targets for these...

It’s a Mystery … Alleged Unpatched Telegram Zero-Day Allows Device Takeover, but Telegram Denies
TrendAI Zero Day researcher Michael DePlante disclosed a critical zero‑click vulnerability in Telegram (ZDI‑CAN‑30207) that could allow remote code execution via a crafted animated sticker, earning a CVSS score of 9.8. The flaw impacts Android and Linux clients and currently...
Eon and SentinelOne Announce Partnership to Advance Cloud Data Security and AI Resilience
Eon and SentinelOne have formed a partnership to fuse AI‑driven security with cloud‑native data resilience. The collaboration integrates SentinelOne’s Singularity Platform, including DSPM discovery and ransomware heuristics, with Eon’s Data Protection and Cloud Backup Posture Management solutions. Together they provide...
Investing Blog Roundup: Getting Used to Passkeys
The blog post urges readers to start using passkeys—cryptographic login tokens that replace passwords—by experimenting on low‑stakes sites like Target or Walmart. It explains that the user experience differs across ecosystems: Apple‑only households enjoy a seamless flow, while mixed environments...

Aderant Achieves SOC 2 Type 2 for Onyx
Aderant announced on March 30 that its outside‑counsel guideline platform, Onyx, successfully completed a SOC 2 Type 2 audit. The examination, conducted by Schellman & Company, assessed controls for security, availability, and confidentiality over the period Nov 1 2025 through Jan 31 2026. Achieving Type...
Cyber Incidents: Share Price Response Immediate and Sustained
ISS STOXX and ISS‑Corporate analyzed cyber incident disclosures for Russell 3000 companies from 2022‑2024. They found that firms reporting significant cyber breaches underperform the market by roughly 5% on average, with the gap widening to nearly 4.9% after 250 trading...

World Back Up Day 2026 – What Are the Takeaways?
World Backup Day 2026 highlighted that backups alone no longer guarantee security. Experts from WatchGuard, KnowBe4, and Keeper urged organizations to move beyond storage and implement fully tested, recovery‑focused resilience plans. The discussion emphasized that data loss is inevitable, ransomware...

MAESTRO Threat Modeling — NemoClaw
NemoClaw, an open‑source stack for always‑on AI assistants, was examined using the MAESTRO threat‑modeling framework. The static analysis of version 0.1.0 uncovered 23 distinct threats across seven layers, including four critical and seven high‑severity vulnerabilities. While sandbox isolation and network policies...

VRadar Security Achieves Patent-Pending Status for Quantum-Resistant System
Vietnamese engineer Nguyen Xuan Dong has obtained patent‑pending status for VRadar, a cloud‑native Security Operations Center that incorporates NIST‑approved post‑quantum cryptography. Built alone in eight months with AI assistance, the platform processes 1.35 million alerts in 34 days and resolves 91 %...
ENISA Overhauls Its Cybersecurity Market Analysis Playbook With Version 3.0 of ECSMAF
ENISA unveiled version 3.0 of its Cybersecurity Market Analysis Framework (ECSMAF) in March 2026, adding configurable analytical pathways, recurrent study cycles, and a semi‑automated continuous‑monitoring engine. The new version separates analyses by initiation (planned vs. ad‑hoc) and duration (short 6 months), providing detailed guidance...

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 90
Security Affairs released its Malware Newsletter Round 90, curating roughly 18 recent threat reports spanning nation‑state campaigns, supply‑chain compromises, and novel malware vectors. Highlights include a new Cobra DocGuard infostealer, Iranian actors using Telegram as a command‑and‑control channel, and a supply‑chain attack...

GitHub Outlines Its 2026 Actions Security Roadmap
GitHub unveiled its 2026 security roadmap for GitHub Actions, emphasizing safer defaults, tighter policy controls, and improved observability. The plan targets a broader software‑supply‑chain hardening strategy rather than isolated feature releases. Enterprise users will gain centralized tools to govern workflows,...
LeakWatch 2026 – Security Incidents, Data Breaches, and IT Incidents for the Current Calendar Week 13
During calendar week 13 (March 23‑29 2026), LeakWatch recorded a series of breaches that targeted publicly accessible web platforms, outsourced support channels, and software supply‑chain pipelines rather than traditional data‑center assets. High‑profile incidents included a cyber‑attack on the European Commission’s Europa web platform,...

Worth Reading 032826
Recent technical publications from NIST, APNIC, and industry commentators expose a series of systemic challenges across internet infrastructure and emerging technologies. NIST’s new DNS deployment guidelines emphasize zero‑trust controls, while APNIC highlights architectural bottlenecks that curb eBPF’s use in web...

Pete Recommends – Weekly Highlights on Cyber Security Issues, March 28, 2026
The weekly highlights expose a surge in cyber‑security threats: WebinarTV covertly records Zoom webinars and repurposes them as AI‑generated podcasts; the FCC has banned all new foreign‑made routers, reshaping the U.S. hardware market; a novel CAPTCHA‑based scam is delivering malware;...

RSAC 2026 Innovation Sandbox
The RSAC 2026 Innovation Sandbox showcased ten finalists, each tackling security challenges that emerged only after 2024, such as autonomous AI agents, non‑human identities, and AI‑generated code vulnerabilities. Geordie AI captured the top prize with its Beam platform, a proactive...

Fake Airline ‘Help’ Accounts Surge on X as Middle East Disruption Fuels New Wave of Scams
Travelers across the UK and Europe are seeing a sharp rise in fake airline customer‑service accounts on X as the Middle East conflict forces widespread flight cancellations and delays. Fraudsters impersonate carriers such as Emirates, Etihad and Qatar Airways, replying...
![[Expired – Class Action Settlement] [Targeted, CA only] Patelco Credit Union $300 Checking Bonus](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://www.doctorofcredit.com/wp-content/uploads/2025/01/patelco-400.png)
[Expired – Class Action Settlement] [Targeted, CA only] Patelco Credit Union $300 Checking Bonus
Patelco Credit Union is offering a $400 new‑account bonus, split into $300 for opening a free or interest checking account, $50 for adding a Money Market account, and $50 for enrolling in the RoundUp savings feature. To earn the $300...

Salesforce’s New Email Domain Verification Explained
Salesforce is mandating verification of any custom email domain used to send messages from its platform, effective with the Spring ’26 release. Administrators must configure either a DKIM key or an Authorized Email Domain record to prove ownership, or outbound...

Android 17 to Introduce Quantum-Safe Architecture Based on NIST PQC Standards
Google announced that Android 17 will embed post‑quantum cryptography (PQC) based on the U.S. NIST standards, marking the first major mobile OS to adopt quantum‑safe algorithms at the system level. The company will begin beta testing later this year, covering key...

Apple Says Customers Should ‘Update iOS to Protect Your iPhone From Web Attacks
Apple has issued an urgent advisory urging iPhone owners to update to the latest iOS version after identifying sophisticated web‑based attacks targeting older software. The company is rolling out critical background security patches that can be applied automatically on supported...

U.S. CISA Adds an Aquasecurity Trivy Flaw to Its Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added Aquasecurity's Trivy vulnerability CVE-2026-33634, a 9.3‑severity flaw, to its Known Exploited Vulnerabilities (KEV) catalog. The flaw was weaponized on March 19 when attackers used compromised credentials to publish a malicious...
Even If You’re Just Transiting Hong Kong, Refusing To Unlock Your Devices Is Now A Crime
Hong Kong has amended its National Security Law, making it a criminal offense to refuse police access to passwords or decryption assistance for any personal electronic device. The rule applies to all individuals, including U.S. citizens, whether arriving or merely transiting...

How to Spot Artificial Intelligence Recruiters Who Target Candidates From LinkedIn
Research firm Gartner predicts that by 2028 one in four job candidates worldwide will be fabricated, fueling a surge in AI‑generated recruiter outreach. Executives are receiving polished, generic emails that often originate from Gmail accounts and contain vague role descriptions,...

More on Vendor AI Risks
Companies are grappling with how to treat AI‑enhanced vendor upgrades under existing shadow‑AI bans. The article argues that such upgrades are fundamentally an IT control issue—un‑tested software entering production—rather than a new compliance violation. It highlights recent high‑profile incidents like...

Two Popular Apps Poisoned in One Week – Don’t Fall Victim!
Two supply‑chain poisoning incidents hit popular development tools this week, the first involving Apifox’s content‑delivery network. After March 4, the app loaded a tampered 77KB JavaScript file instead of the legitimate 34KB version. The malicious script leveraged Apifox’s Electron framework, which...
LiteLLM Incident: Mitigated and Contained with SAP LeanIX
LiteLLM, an open‑source large language model framework, was hit by a malicious supply‑chain attack that injected compromised code into its dependencies. SAP LeanIX’s security team identified the breach within hours and executed a coordinated response that isolated the threat and...

Agentic AI Poised to Shape Both Offensive and Defensive Cyber Measures: Munich Re
Munich Re’s 2026 cyber‑insurance report warns that agentic AI will soon automate multi‑stage attacks, generate hyper‑personalised phishing, and manipulate AI models through prompt injection and data poisoning. The technology expands the attack surface while also offering defenders autonomous tools to...

RSAC 2026: N-Able Report Reveals Why AI-Powered, Layered Cyber Defense Is Essential for Business Resilience
N‑able’s 2026 State of the SOC report shows a sharp resurgence of network‑perimeter attacks and a dramatic rise in alert volume, with the SOC processing roughly two alerts per minute in 2025. AI now automates about 90% of investigation tasks,...

Researchers Uncover WebRTC Skimmer Bypassing Traditional Defenses
Sansec researchers discovered a novel payment skimmer that leverages WebRTC DataChannels to load malicious code and exfiltrate payment data. Unlike traditional skimmers that rely on HTTP requests, this technique uses encrypted UDP traffic, bypassing Content Security Policy and standard network...

Smashing Security Podcast #460: Never Knock on the Door of a Nuclear Submarine Base and Ask for a Selfie
In episode 460 of the Smashing Security podcast, host Graham Cluley and guest Jenny Radcliffe dissect a cyber‑extortion case where a disgruntled data analyst stole a company payroll database and demanded $2.5 million in Bitcoin. The show also covers the arrest of an Iranian...

Secure by Default: Why Security That Assumes Failure Is Winning
At RSA 2024, the cybersecurity community is pivoting from the long‑standing "secure by design" mantra to a more pragmatic "secure by default" approach. The new model assumes misconfigurations, rushed deployments and human error, building safeguards that work even when users...

GenAI-Based Development Platform - Part 3: Announcing Isolarium, Three Flavors of Secure Sandboxes for GenAI-Based Coding Agents
Open‑source project Isolarium was announced as a companion to the Idea‑to‑Code workflow, providing secure sandboxes for GenAI coding agents such as Claude Code. The tool lets developers run agents in three isolation modes—Nono (lightweight), container, and virtual machine—balancing security against...
Dangerous DarkSword Malware Has Emerged—iPhone Users Should Take Action Now
Security researchers have released the DarkSword exploit kit on a public platform, turning a previously state‑level iOS attack tool into a commodity for cyber‑criminals. The kit chains multiple Apple OS vulnerabilities, enabling drive‑by compromise of iPhones without any user interaction...

The Price of Privacy? HK$100k and 1 Year in Prison.
Hong Kong’s National Security Law implementation rules were amended to criminalize refusal to provide passwords for seized electronic devices, imposing up to one year in prison and a fine of HK$100,000 (≈US$12,800). The changes were issued by decree, bypassing Legislative...

Romania Pays the Cyber Price for Backing Ukraine. Where Is the EU?
Romania’s water agency, coal‑power producer and oil‑pipeline operator have suffered ransomware attacks linked to Russian‑aligned groups such as Qilin and Gentlemen, which the country’s top cyber official says are timed with its support for Ukraine. The EU possesses a cyber‑sanctions...

Intent‑Based Access Control: A Technical Primer
Intent‑Based Access Control (IBAC) redefines authorization by linking a user’s declared intent to precise action‑resource tuples rather than static role permissions. The model parses natural‑language or JSON intents, maps them to fine‑grained policy tuples, and evaluates each via engines such...