Cybersecurity News and Headlines

Three Insights You May Have Missed From theCUBE’s Coverage of RSAC 2026
NewsApr 3, 2026

Three Insights You May Have Missed From theCUBE’s Coverage of RSAC 2026

RSAC 2026 highlighted three emerging security trends: AI‑driven attacks are forcing enterprises to adopt machine‑speed, lateral‑focused defenses; the looming quantum threat is accelerating adoption of post‑quantum cryptography and crypto‑agility; and AI agents are reshaping identity management while helping close the cybersecurity...

By SiliconANGLE
LinkedIn Secretly Scans for 6,000+ Chrome Extensions, Collects Data
NewsApr 3, 2026

LinkedIn Secretly Scans for 6,000+ Chrome Extensions, Collects Data

LinkedIn has embedded a hidden JavaScript file that scans visitors' browsers for more than 6,200 Chrome extensions and collects detailed device information. The script, confirmed by BleepingComputer, checks extension IDs to identify installed add‑ons, including rivals such as Apollo, Lusha,...

By BleepingComputer
Trump Admin To Court: Don't Strike Down Video Privacy Act
NewsApr 3, 2026

Trump Admin To Court: Don't Strike Down Video Privacy Act

The Department of Justice is urging the First Circuit to uphold the 1988 Video Privacy Protection Act (VPPA) as Hearst Television faces a lawsuit over sharing users' video‑viewing data with ad‑tech firms. A lower court dismissed the case, finding the...

By MediaPost
OpenClaw Gives Users yet Another Reason to Be Freaked Out About Security
NewsApr 3, 2026

OpenClaw Gives Users yet Another Reason to Be Freaked Out About Security

OpenClaw, the viral AI‑agent tool with 347,000 GitHub stars, was found to contain a critical flaw (CVE‑2026‑33579) rated 8.1‑9.8 that lets an attacker with the lowest pairing permission silently upgrade to full administrative control. The vulnerability stems from a missing...

By Ars Technica – Security
Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users
NewsApr 3, 2026

Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users

A counterfeit Chrome extension named “ChatGPT Ad Blocker” was discovered harvesting users' ChatGPT conversations under the guise of removing ads. DomainTools found the malicious add‑on on the Chrome Web Store in February 2026, where it cloned the page’s DOM, stripped...

By HackRead
Trump’s FY27 Budget Makes Both Boosts and Cuts to Tech Operations
NewsApr 3, 2026

Trump’s FY27 Budget Makes Both Boosts and Cuts to Tech Operations

President Trump’s FY27 budget proposes a $707 million cut to the Cybersecurity and Infrastructure Security Agency while preserving and expanding funding for emerging technologies. Artificial intelligence research across the Department of Energy receives $1.2 billion, and the National Nuclear Security Administration sees...

By Nextgov/FCW (GovExec)
Uffizi Museum in Florence Denies Severity of Security Breaches Resulting From February Cyber Attack
NewsApr 3, 2026

Uffizi Museum in Florence Denies Severity of Security Breaches Resulting From February Cyber Attack

The Uffizi Gallery in Florence confirmed it was hit by a cyber attack on February 1, 2026, but insists no data, security maps, or employee contacts were stolen. The museum attributes the temporary closure of the Pitti Palace and the relocation...

By Art in America
A Core Infrastructure Engineer Pleads Guilty to Federal Charges in Insider Attack
NewsApr 3, 2026

A Core Infrastructure Engineer Pleads Guilty to Federal Charges in Insider Attack

Core infrastructure engineer Daniel Rhyne pleaded guilty to a $750,000 bitcoin extortion scheme after using ordinary admin tools to shut down his former employer's network. He opened unauthorized RDP sessions, deleted admin accounts, altered passwords, and scheduled tasks on the...

By Computerworld – IT Leadership
EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking Group
NewsApr 3, 2026

EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking Group

EU cybersecurity agency CERT‑EU confirmed that the hacking group TeamPCP breached the European Commission’s Amazon Web Services account, exfiltrating about 92 GB of data on March 19. The stolen information, affecting 42 internal clients and at least 29 EU entities, included names,...

By The Record by Recorded Future
Reality Defender Strikes Deal to Provide Deepfake Detection to French Orange
NewsApr 3, 2026

Reality Defender Strikes Deal to Provide Deepfake Detection to French Orange

Reality Defender, a U.S. AI‑security firm, has signed a deal to embed its multimodal deep‑fake detection into Orange Business, the enterprise arm of French telecom giant Orange. The integration will protect Orange’s video‑conferencing, contact‑center and voice‑telephony services with real‑time, API‑driven...

By Biometric Update
Internet Bug Bounty Program Hits Pause on Payouts
NewsApr 3, 2026

Internet Bug Bounty Program Hits Pause on Payouts

HackerOne announced a pause on payouts for the Internet Bug Bounty program as AI‑generated vulnerability submissions surge. Since its 2012 launch, the program has awarded over $1.5 million, with 80 % of payouts for new flaws. The shift in discovery speed has...

By InfoWorld
Apple Breaks Precedent, Patches DarkSword for iOS 18
NewsApr 3, 2026

Apple Breaks Precedent, Patches DarkSword for iOS 18

Apple has extended a back‑ported patch for the DarkSword exploit chain to iOS 18 devices, a move previously reserved for the newest iOS 26 release. The fix arrived on April 1, days after the tool leaked on GitHub, and covers vulnerabilities that span...

By Dark Reading
Die Linke German Political Party Confirms Data Stolen by Qilin Ransomware
NewsApr 3, 2026

Die Linke German Political Party Confirms Data Stolen by Qilin Ransomware

The Qilin ransomware group infiltrated Die Linke, Germany’s left‑wing parliamentary party, and stole internal data, though the membership database remained untouched. The attackers threatened to publish sensitive communications and employee information, prompting the party to report the incident to authorities. Die Linke...

By BleepingComputer
Senators Ask Tulsi Gabbard To Tell Americans That VPN Use Might Subject Them To Domestic Surveillance
NewsApr 3, 2026

Senators Ask Tulsi Gabbard To Tell Americans That VPN Use Might Subject Them To Domestic Surveillance

A group of progressive senators and two representatives wrote to Director of National Intelligence Tulsi Gabbard warning that commercial VPN use could inadvertently expose Americans to domestic surveillance, as encrypted traffic may be classified as foreign. The letter cites billions...

By Techdirt
Trump’s FY2027 Budget Again Targets CISA
NewsApr 3, 2026

Trump’s FY2027 Budget Again Targets CISA

President Trump’s FY2027 budget proposal slashes the Cybersecurity and Infrastructure Security Agency’s (CISA) funding by $707 million, roughly a 30 percent reduction from its FY2025 $2.4 billion budget. The administration frames the cuts as a refocus on protecting federal networks and critical infrastructure...

By Cybersecurity Dive (Industry Dive)
SAP Security Investment Still Misses Where Risk Is Highest, Benchmark Data Shows
NewsApr 3, 2026

SAP Security Investment Still Misses Where Risk Is Highest, Benchmark Data Shows

SecurityBridge introduced the Cybersecurity Resilience Index for SAP (CRIS), a benchmarking model built on anonymized data from thousands of production systems. The index evaluates eight security domains against more than 550 controls, revealing that most organizations score only 30‑40% overall...

By ERP Today
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
NewsApr 3, 2026

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Microsoft’s Defender Security Research team has uncovered a new web‑shell tradecraft that leverages HTTP cookies as a covert control channel for PHP loaders on Linux servers. The shells remain dormant until a specific cookie value is presented, then execute malicious...

By The Hacker News
6G Could Introduce New Cybersecurity Vulnerabilities, Report Finds
NewsApr 3, 2026

6G Could Introduce New Cybersecurity Vulnerabilities, Report Finds

The FCC’s Communications Security, Reliability and Interoperability Council warned that 6G networks could bring unprecedented cybersecurity and reliability risks. The report highlights that 6G’s reliance on virtualization, artificial intelligence, and cloud‑native infrastructure expands attack surfaces and complicates threat detection. It...

By Broadband Breakfast
Sri Lanka Arrests 152 in Alleged Chinese-Run Cyberscam
NewsApr 3, 2026

Sri Lanka Arrests 152 in Alleged Chinese-Run Cyberscam

Sri Lankan police arrested 152 foreign nationals, primarily Chinese, in a hotel‑based cyber‑scam raid in Chilaw. The operation uncovered 143 laptops, 120 desktops and 370 mobile phones, indicating a sophisticated fraud hub. The Chinese embassy pledged cooperation, while officials cited...

By South China Morning Post – Asia
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
NewsApr 3, 2026

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

TeamPCP’s supply‑chain campaign has broadened, compromising open‑source tools like Trivy and LiteLLM and giving attackers stolen AWS credentials. The breaches surfaced at AI startup Mercor and the European Commission, where compromised code‑scanning utilities enabled unauthorized cloud access. Third‑party groups ShinyHunters...

By Dark Reading
High-Severity Vulnerabilities, Supply Chain Breaches, and AI Threats Redefine Cybersecurity This Week
NewsApr 3, 2026

High-Severity Vulnerabilities, Supply Chain Breaches, and AI Threats Redefine Cybersecurity This Week

This week’s cybersecurity landscape was dominated by a wave of high‑severity flaws, including a Cisco IMC vulnerability (CVSS 9.8) that grants unauthenticated admin access, a Chrome WebGPU use‑after‑free exploit actively seen in the wild, and a critical GIGABYTE Control Center remote‑code‑execution...

By eSecurity Planet
Data Privacy At The Kitchen Table
NewsApr 3, 2026

Data Privacy At The Kitchen Table

Lawmakers are increasingly prioritizing data privacy as voters bring the issue to the kitchen table, highlighted by Delaware Rep. Krista Griffith at the IAB Public Policy & Legal Summit. The topic gained further traction at two Washington, DC privacy conferences,...

By Multichannel Merchant
Evolution of Ransomware: Multi-Extortion Ransomware Attacks
NewsApr 3, 2026

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Ransomware attacks surged 49% in 2025, affecting healthcare, finance and manufacturing, with incidents like the University of Mississippi Medical Center shutdown forcing chemotherapy cancellations. Threat actors have evolved from simple encryption to double and triple extortion, stealing data before encrypting...

By BleepingComputer
AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech
NewsApr 3, 2026

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech

Tech week saw a surge in AI investment and model releases, highlighted by OpenAI’s record $122 billion funding round and Alibaba’s Qwen3.5 Omni multimodal system. At the same time, major security incidents—from the NoVoice Android rootkit infecting 2.3 million devices to a...

By TechRepublic – Articles
Massachusetts Emergency Communications System Impacted by Cyberattack
NewsApr 3, 2026

Massachusetts Emergency Communications System Impacted by Cyberattack

A cyberattack on the Patriot Regional Emergency Communications Center disrupted non‑emergency and business phone lines for several northern Massachusetts towns, though 9‑1‑1 services remained functional. The intrusion affected municipal public‑safety computer systems, prompting officials to engage insurers, external cybersecurity firms,...

By The Record by Recorded Future
Ukraine Warns Russian Hackers Are Revisiting Past Breaches to Prepare New Attacks
NewsApr 3, 2026

Ukraine Warns Russian Hackers Are Revisiting Past Breaches to Prepare New Attacks

Ukraine’s cyber incident response team (CERT‑UA) warns Russian‑linked hackers are revisiting previously compromised systems to re‑establish footholds, marking a shift from the 2025 “steal‑and‑go” approach to sustained, long‑term access. Attackers now favor sophisticated social‑engineering, using phone calls and video chats...

By The Record by Recorded Future
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
NewsApr 3, 2026

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Chainguard introduced Factory 2.0 at the Assemble conference, revamping its supply‑chain hardening platform with an AI‑powered control plane and agentic reconciliation bots. The new DriftlessAF framework continuously updates and patches approved open‑source artifacts across containers, libraries, and CI/CD workflows. Chainguard also...

By Dark Reading
FIDO Seminar: Advancing Passkeys in the Workforce
NewsApr 3, 2026

FIDO Seminar: Advancing Passkeys in the Workforce

On the opening day of the RSA Conference, the FIDO Alliance hosted a one‑day seminar titled “Advancing Passkeys in the Workforce.” The event gathered senior security and identity executives to discuss practical rollout strategies, user‑experience considerations, and measurable impact of...

By FIDO Alliance – News/Blog
In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware
NewsApr 3, 2026

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

This week’s cybersecurity roundup revealed a wave of high‑profile threats, from a new Android banking trojan called Mirax that can be rented for $3,000 a month to an Android rootkit dubbed NoVoice that has infected roughly 2.3 million devices via Google...

By SecurityWeek
CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry
NewsApr 3, 2026

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

CrowdStrike announced that its Falcon Next‑Gen SIEM now ingests telemetry from Microsoft Defender for Endpoint, making Defender the first EDR integrated with the platform. The integration enables real‑time analytics, intelligent filtering and faster threat detection across heterogeneous endpoint stacks. CrowdStrike...

By Dark Reading
Windows Security App Gets Secure Boot Certificate Status Indicators as 2026 Expiration Approaches
NewsApr 3, 2026

Windows Security App Gets Secure Boot Certificate Status Indicators as 2026 Expiration Approaches

Microsoft has introduced Secure Boot certificate status indicators in the Windows Security app to help IT teams monitor the replacement of 2011‑issued certificates that expire in 2026. The indicators are delivered via Windows Update, but they are disabled by default...

By Help Net Security
Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
NewsApr 3, 2026

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture

Third‑party risk has become the largest security gap for many organizations, accounting for 30% of data‑breach incidents and an average remediation cost of $4.91 million. The modern perimeter now extends across SaaS applications, vendor APIs, and subcontractors, prompting regulators such as...

By The Hacker News
Mobile Attack Surface Expands as Enterprises Lose Control
NewsApr 3, 2026

Mobile Attack Surface Expands as Enterprises Lose Control

Jamf’s 2025 mobile security report, based on 1.7 million devices, reveals a sprawling, poorly‑controlled attack surface. Over half of enterprises host at least one device with a critically outdated OS, while 86% of the 135 most common apps contain known vulnerabilities....

By SecurityWeek
T-Mobile Sets the Record Straight on Latest Data Breach Filing
NewsApr 3, 2026

T-Mobile Sets the Record Straight on Latest Data Breach Filing

T‑Mobile USA clarified that a recent data breach notification filed with the Maine Attorney General stemmed from an isolated insider incident affecting a single customer. The compromised data included personal identifiers such as name, address, SSN, driver’s license and account...

By SecurityWeek
Finance of America Faces Early Data Breach Class Action
NewsApr 3, 2026

Finance of America Faces Early Data Breach Class Action

A Texas federal court received a class‑action lawsuit alleging Finance of America suffered a data breach two weeks ago. Consumer Melanie Place claims the ransomware group Word Leaks accessed customers’ personal data, including Social Security numbers. The suit is notable for...

By National Mortgage News
Naoris Protocol's Quantum-Resistant Blockchain Goes Live as Bitcoin and Ethereum Face 'Q-Day' Threats
NewsApr 3, 2026

Naoris Protocol's Quantum-Resistant Blockchain Goes Live as Bitcoin and Ethereum Face 'Q-Day' Threats

Naoris Protocol launched a quantum‑resistant mainnet built on NIST‑approved post‑quantum algorithms, marking its shift from proof‑of‑concept to production. The network has already validated over 100 million transactions and mitigated more than 603 million threats during testing. Its debut comes as Bitcoin and...

By CoinDesk
Understanding the Risks of OpenClaw
NewsApr 3, 2026

Understanding the Risks of OpenClaw

OpenClaw AI Agent Platform functions as an orchestration layer rather than a standalone cloud service, providing the plumbing for agents to interact with external models and enterprise systems. While it can be run locally, its real value emerges only when...

By InfoWorld
The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge
NewsApr 3, 2026

The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge

The Cyber Express weekly roundup highlights a sharp rise in ransomware incidents and supply‑chain compromises across multiple sectors. High‑profile breaches include a ransomware intrusion at Hasbro, a malicious package update that hit AI startup Mercor via the LiteLLM project, and...

By The Cyber Express
A New Open-Source Protocol Wants to End the War Between Encryption and Safety
NewsApr 3, 2026

A New Open-Source Protocol Wants to End the War Between Encryption and Safety

A new open‑source framework called the Open Moderation Safety Protocol (OMSP) proposes to reconcile end‑to‑end encryption with content safety by performing all classification locally on the user’s device or a platform‑controlled node. The protocol uses a three‑tier pipeline—pattern matching, a...

By TechBullion
Keysight Introduces SBOM Manager for Cybersecurity Compliance
NewsApr 3, 2026

Keysight Introduces SBOM Manager for Cybersecurity Compliance

Keysight has launched an SBOM Manager platform that automates the creation and upkeep of software bills of materials for manufacturers facing tighter cybersecurity regulations. The tool scans binaries, firmware and containerised applications, linking components to multiple vulnerability databases and supporting...

By EE Times Europe
Which Messaging App Takes the Most Limited Approach to Permissions on Android?
NewsApr 3, 2026

Which Messaging App Takes the Most Limited Approach to Permissions on Android?

A recent analysis of Android versions of Messenger, Signal and Telegram reveals stark differences in permission requests and data handling. Messenger requests the most permissions (87 total, 24 dangerous), while Telegram requests the fewest (71 total) but the highest number...

By Help Net Security
Cambridge Global Advisors Wins Australian Grant for Pacific Cybersecurity
NewsApr 3, 2026

Cambridge Global Advisors Wins Australian Grant for Pacific Cybersecurity

Cambridge Global Advisors has secured an Australian Department of Foreign Affairs and Trade grant to launch the Pacific Women in Cyber (PWiC) program, an 18‑month initiative delivering cybersecurity training and internships to women in Tonga, Fiji and Samoa. Funded under...

By Vietnam Investment Review (VIR)
Data Security Posture Management Has Become Essential for Governments
NewsApr 3, 2026

Data Security Posture Management Has Become Essential for Governments

State and local governments are rapidly expanding multicloud environments and adopting generative AI, yet many lack clear visibility into where sensitive citizen data resides. Data Security Posture Management (DSPM) emerges as a solution, continuously discovering, classifying, and monitoring data across...

By StateTech Magazine
Check City Notifies 322,687 People of March 2025 Data Breach
NewsApr 3, 2026

Check City Notifies 322,687 People of March 2025 Data Breach

Check City, a payday‑loan provider, disclosed that a March 2025 cyber‑attack exposed personal data of 322,687 individuals. The breach compromised names, Social Security numbers, government IDs, financial account details, credit and debit card numbers, dates of birth, and addresses. A...

By PYMNTS
Americans' Passports Purportedly Stolen in Hacktivist Attack Against Dubai Airport
NewsApr 2, 2026

Americans' Passports Purportedly Stolen in Hacktivist Attack Against Dubai Airport

Nasir Security, a hacktivist group linked to Iran, claimed to have stolen a large data set from Dubai International Airport after a months‑long intrusion. The breach includes passport photos of American, Arab and Emirati travelers, as well as luggage and...

By SC Media
When Your Own Eyes Turn Against You: How Compromised Security Cameras and IoT/OT Devices Become Tools for Your Attackers
NewsApr 2, 2026

When Your Own Eyes Turn Against You: How Compromised Security Cameras and IoT/OT Devices Become Tools for Your Attackers

Security cameras, IoT and OT devices are increasingly being compromised and repurposed as attack vectors, enabling nation‑state reconnaissance, espionage, ransomware pivots, and massive botnets. Recent incidents include Iranian hackers hijacking Hikvision cameras during missile strikes, Russian operatives streaming compromised webcams...

By Security Boulevard
PSA: Anyone with a Link Can View Your Granola Notes by Default
NewsApr 2, 2026

PSA: Anyone with a Link Can View Your Granola Notes by Default

Granola, an AI‑powered note‑taking app, shares notes publicly by default to anyone with a link, contradicting its claim of private‑by‑default. Users can change the setting to “Only my company” or “Private,” but the default exposes potentially sensitive meeting content. The...

By The Verge Transportation
Agentic Development Security: Why AppSec Needs A New Operating Model
NewsApr 2, 2026

Agentic Development Security: Why AppSec Needs A New Operating Model

Application security is being reshaped by faster exploit cycles and the rise of AI‑driven coding agents. Traditional testing tools now detect vulnerabilities but struggle to provide real‑world context such as exploitability and business impact. Large language models are enabling richer...

By Forrester Blogs
Why Australia’s Tech Sovereignty Needs Smart Partnerships
NewsApr 2, 2026

Why Australia’s Tech Sovereignty Needs Smart Partnerships

Mark Hile, Managing Director of Datacom Infrastructure Products, warns that rising cyber threats, geopolitical risk and supply‑chain disruptions are forcing Australia to rethink its digital infrastructure. He argues the country must double down on regionally‑owned, sovereign technology or cede strategic...

By CIO.com