Sunday, March 1, 2026
Market Intelligence for Cybersecurity Professionals
What's happening: Iran-Backed Threat Groups Intensify State-Sponsored Cyber Attacks
Escalating geopolitical tensions have amplified Iran‑backed cyber activity, with groups such as Charming Kitten, APT33 and MuddyWater increasing spear‑phishing, zero‑day exploits and custom malware campaigns. Their targets span U.S. political institutions, critical infrastructure, healthcare and industrial control systems.
Also developing:

ChannelE2E
South Korean tax authority exposes wallet recovery phrase in security blunder A jaw dropping security failure by one of Asia’s top government agencies just reminded every investor why crypto demands constant vigilance. The South Korean National Tax Service published photographs of a seized hardware wallet alongside a fully visible mnemonic recovery phrase, according to Cointelegraph. […] The post ‘Best Crypto Presale for 2026’: South Korea Leaks Wallet Seed Phrase While Whales Quietly Load Up on Pepeto Before the Next Bull Explosion appeared first on TechBullion.
TechBullion

Session 14A: Software Security: Applications & Policies Authors, Creators & Presenters: Yue Xiao (IBM Research), Dhilung Kirat (IBM Research), Douglas Lee Schales (IBM Research), Jiyong Jang (IBM Research), Luyi Xing (Indiana University Bloomington), Xiaojing Liao (Indiana University) PAPER A Software Bill of Materials (SBOM) is a detailed inventory that lists the dependencies that make up a software product. Accurate, complete, and up-to-date SBOMs are essential for vulnerability management, reducing license compliance risks, and maintaining high software integrity. The US National Institute of Standards and Technology (NTIA) has established minimum requirements for SBOMs to comply with, especially the correctness and completeness of listed dependencies in SBOMs. However, these requirements remain unexamined in practice. This paper presents the first systematic study on the landscape of SBOMs, including their prevalence, release trends, and characteristics in the Java ecosystem. We developed an end-to-end tool to evaluate the completeness and accuracy of dependencies in SBOMs. Our tool analyzed 25,882 SBOMs and associated JAR files, identifying that 7,907 SBOMs failed to disclose direct dependencies, highlighting the prevalence and severity of SBOM noncompliance issues. Furthermore, 4.97% of these omitted dependencies were vulnerable, leaving software susceptible to potential exploits. Through detailed measurement studies and analysis of root causes, this research uncovers significant security implications of non-compliant SBOMs, especially concerning vulnerability management. These findings, crucial for enhancing SBOM compliance assurance, are being responsibly reported to relevant stakeholders. ABOUT NDSS Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel. Permalink The post NDSS 2025 – JBomAudit: Assessing The Landscape, Compliance, And Security Implications Of Java SBOMS appeared first on Security Boulevard.
Security Boulevard
An owner tried to shut off their interior lights using a voice command, but it turned off the car's headlights instead.
InsideEVs

Originally published at Why EasyDMARC Is the Best Enterprise DMARC Solution by EasyDMARC. Enterprise email environments are becoming increasingly complex, with ... The post Why EasyDMARC Is the Best Enterprise DMARC Solution appeared first on EasyDMARC. The post Why EasyDMARC Is the Best Enterprise DMARC Solution appeared first on Security Boulevard.
Security Boulevard
The loss of access to Microsoft Teams is gonna go down in history as one of the most consequential intelligence actions of all time