
Inconsistent Privacy Labels Don't Tell Users What They Are Getting
App‑store privacy labels, introduced by Apple in 2020 and soon after by Google, aim to inform users about data collection, usage, and sharing. Experts Lorrie Cranor and Kelly Peterson argue the labels are inconsistent, often inaccurate, and provide little real protection. Studies reveal many developers misunderstand labeling requirements, leading to honest mistakes rather than deliberate deception. The consensus is that without standardization and verification, the labels remain largely ineffective for consumers.

Three Insights You May Have Missed From theCUBE’s Coverage of RSAC 2026
RSAC 2026 highlighted three emerging security trends: AI‑driven attacks are forcing enterprises to adopt machine‑speed, lateral‑focused defenses; the looming quantum threat is accelerating adoption of post‑quantum cryptography and crypto‑agility; and AI agents are reshaping identity management while helping close the cybersecurity...

LinkedIn Secretly Scans for 6,000+ Chrome Extensions, Collects Data
LinkedIn has embedded a hidden JavaScript file that scans visitors' browsers for more than 6,200 Chrome extensions and collects detailed device information. The script, confirmed by BleepingComputer, checks extension IDs to identify installed add‑ons, including rivals such as Apollo, Lusha,...

Trump Admin To Court: Don't Strike Down Video Privacy Act
The Department of Justice is urging the First Circuit to uphold the 1988 Video Privacy Protection Act (VPPA) as Hearst Television faces a lawsuit over sharing users' video‑viewing data with ad‑tech firms. A lower court dismissed the case, finding the...

OpenClaw Gives Users yet Another Reason to Be Freaked Out About Security
OpenClaw, the viral AI‑agent tool with 347,000 GitHub stars, was found to contain a critical flaw (CVE‑2026‑33579) rated 8.1‑9.8 that lets an attacker with the lowest pairing permission silently upgrade to full administrative control. The vulnerability stems from a missing...

Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users
A counterfeit Chrome extension named “ChatGPT Ad Blocker” was discovered harvesting users' ChatGPT conversations under the guise of removing ads. DomainTools found the malicious add‑on on the Chrome Web Store in February 2026, where it cloned the page’s DOM, stripped...

Trump’s FY27 Budget Makes Both Boosts and Cuts to Tech Operations
President Trump’s FY27 budget proposes a $707 million cut to the Cybersecurity and Infrastructure Security Agency while preserving and expanding funding for emerging technologies. Artificial intelligence research across the Department of Energy receives $1.2 billion, and the National Nuclear Security Administration sees...
Uffizi Museum in Florence Denies Severity of Security Breaches Resulting From February Cyber Attack
The Uffizi Gallery in Florence confirmed it was hit by a cyber attack on February 1, 2026, but insists no data, security maps, or employee contacts were stolen. The museum attributes the temporary closure of the Pitti Palace and the relocation...
A Core Infrastructure Engineer Pleads Guilty to Federal Charges in Insider Attack
Core infrastructure engineer Daniel Rhyne pleaded guilty to a $750,000 bitcoin extortion scheme after using ordinary admin tools to shut down his former employer's network. He opened unauthorized RDP sessions, deleted admin accounts, altered passwords, and scheduled tasks on the...

EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking Group
EU cybersecurity agency CERT‑EU confirmed that the hacking group TeamPCP breached the European Commission’s Amazon Web Services account, exfiltrating about 92 GB of data on March 19. The stolen information, affecting 42 internal clients and at least 29 EU entities, included names,...

Reality Defender Strikes Deal to Provide Deepfake Detection to French Orange
Reality Defender, a U.S. AI‑security firm, has signed a deal to embed its multimodal deep‑fake detection into Orange Business, the enterprise arm of French telecom giant Orange. The integration will protect Orange’s video‑conferencing, contact‑center and voice‑telephony services with real‑time, API‑driven...
Internet Bug Bounty Program Hits Pause on Payouts
HackerOne announced a pause on payouts for the Internet Bug Bounty program as AI‑generated vulnerability submissions surge. Since its 2012 launch, the program has awarded over $1.5 million, with 80 % of payouts for new flaws. The shift in discovery speed has...

Apple Breaks Precedent, Patches DarkSword for iOS 18
Apple has extended a back‑ported patch for the DarkSword exploit chain to iOS 18 devices, a move previously reserved for the newest iOS 26 release. The fix arrived on April 1, days after the tool leaked on GitHub, and covers vulnerabilities that span...

Die Linke German Political Party Confirms Data Stolen by Qilin Ransomware
The Qilin ransomware group infiltrated Die Linke, Germany’s left‑wing parliamentary party, and stole internal data, though the membership database remained untouched. The attackers threatened to publish sensitive communications and employee information, prompting the party to report the incident to authorities. Die Linke...

Senators Ask Tulsi Gabbard To Tell Americans That VPN Use Might Subject Them To Domestic Surveillance
A group of progressive senators and two representatives wrote to Director of National Intelligence Tulsi Gabbard warning that commercial VPN use could inadvertently expose Americans to domestic surveillance, as encrypted traffic may be classified as foreign. The letter cites billions...
Trump’s FY2027 Budget Again Targets CISA
President Trump’s FY2027 budget proposal slashes the Cybersecurity and Infrastructure Security Agency’s (CISA) funding by $707 million, roughly a 30 percent reduction from its FY2025 $2.4 billion budget. The administration frames the cuts as a refocus on protecting federal networks and critical infrastructure...
SAP Security Investment Still Misses Where Risk Is Highest, Benchmark Data Shows
SecurityBridge introduced the Cybersecurity Resilience Index for SAP (CRIS), a benchmarking model built on anonymized data from thousands of production systems. The index evaluates eight security domains against more than 550 controls, revealing that most organizations score only 30‑40% overall...

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
Microsoft’s Defender Security Research team has uncovered a new web‑shell tradecraft that leverages HTTP cookies as a covert control channel for PHP loaders on Linux servers. The shells remain dormant until a specific cookie value is presented, then execute malicious...

6G Could Introduce New Cybersecurity Vulnerabilities, Report Finds
The FCC’s Communications Security, Reliability and Interoperability Council warned that 6G networks could bring unprecedented cybersecurity and reliability risks. The report highlights that 6G’s reliance on virtualization, artificial intelligence, and cloud‑native infrastructure expands attack surfaces and complicates threat detection. It...

Sri Lanka Arrests 152 in Alleged Chinese-Run Cyberscam
Sri Lankan police arrested 152 foreign nationals, primarily Chinese, in a hotel‑based cyber‑scam raid in Chilaw. The operation uncovered 143 laptops, 120 desktops and 370 mobile phones, indicating a sophisticated fraud hub. The Chinese embassy pledged cooperation, while officials cited...

Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
TeamPCP’s supply‑chain campaign has broadened, compromising open‑source tools like Trivy and LiteLLM and giving attackers stolen AWS credentials. The breaches surfaced at AI startup Mercor and the European Commission, where compromised code‑scanning utilities enabled unauthorized cloud access. Third‑party groups ShinyHunters...

High-Severity Vulnerabilities, Supply Chain Breaches, and AI Threats Redefine Cybersecurity This Week
This week’s cybersecurity landscape was dominated by a wave of high‑severity flaws, including a Cisco IMC vulnerability (CVSS 9.8) that grants unauthenticated admin access, a Chrome WebGPU use‑after‑free exploit actively seen in the wild, and a critical GIGABYTE Control Center remote‑code‑execution...
Data Privacy At The Kitchen Table
Lawmakers are increasingly prioritizing data privacy as voters bring the issue to the kitchen table, highlighted by Delaware Rep. Krista Griffith at the IAB Public Policy & Legal Summit. The topic gained further traction at two Washington, DC privacy conferences,...

Evolution of Ransomware: Multi-Extortion Ransomware Attacks
Ransomware attacks surged 49% in 2025, affecting healthcare, finance and manufacturing, with incidents like the University of Mississippi Medical Center shutdown forcing chemotherapy cancellations. Threat actors have evolved from simple encryption to double and triple extortion, stealing data before encrypting...

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech
Tech week saw a surge in AI investment and model releases, highlighted by OpenAI’s record $122 billion funding round and Alibaba’s Qwen3.5 Omni multimodal system. At the same time, major security incidents—from the NoVoice Android rootkit infecting 2.3 million devices to a...

Massachusetts Emergency Communications System Impacted by Cyberattack
A cyberattack on the Patriot Regional Emergency Communications Center disrupted non‑emergency and business phone lines for several northern Massachusetts towns, though 9‑1‑1 services remained functional. The intrusion affected municipal public‑safety computer systems, prompting officials to engage insurers, external cybersecurity firms,...

Ukraine Warns Russian Hackers Are Revisiting Past Breaches to Prepare New Attacks
Ukraine’s cyber incident response team (CERT‑UA) warns Russian‑linked hackers are revisiting previously compromised systems to re‑establish footholds, marking a shift from the 2025 “steal‑and‑go” approach to sustained, long‑term access. Attackers now favor sophisticated social‑engineering, using phone calls and video chats...

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
Chainguard introduced Factory 2.0 at the Assemble conference, revamping its supply‑chain hardening platform with an AI‑powered control plane and agentic reconciliation bots. The new DriftlessAF framework continuously updates and patches approved open‑source artifacts across containers, libraries, and CI/CD workflows. Chainguard also...
FIDO Seminar: Advancing Passkeys in the Workforce
On the opening day of the RSA Conference, the FIDO Alliance hosted a one‑day seminar titled “Advancing Passkeys in the Workforce.” The event gathered senior security and identity executives to discuss practical rollout strategies, user‑experience considerations, and measurable impact of...

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware
This week’s cybersecurity roundup revealed a wave of high‑profile threats, from a new Android banking trojan called Mirax that can be rented for $3,000 a month to an Android rootkit dubbed NoVoice that has infected roughly 2.3 million devices via Google...

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry
CrowdStrike announced that its Falcon Next‑Gen SIEM now ingests telemetry from Microsoft Defender for Endpoint, making Defender the first EDR integrated with the platform. The integration enables real‑time analytics, intelligent filtering and faster threat detection across heterogeneous endpoint stacks. CrowdStrike...

Windows Security App Gets Secure Boot Certificate Status Indicators as 2026 Expiration Approaches
Microsoft has introduced Secure Boot certificate status indicators in the Windows Security app to help IT teams monitor the replacement of 2011‑issued certificates that expire in 2026. The indicators are delivered via Windows Update, but they are disabled by default...

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
Third‑party risk has become the largest security gap for many organizations, accounting for 30% of data‑breach incidents and an average remediation cost of $4.91 million. The modern perimeter now extends across SaaS applications, vendor APIs, and subcontractors, prompting regulators such as...

Mobile Attack Surface Expands as Enterprises Lose Control
Jamf’s 2025 mobile security report, based on 1.7 million devices, reveals a sprawling, poorly‑controlled attack surface. Over half of enterprises host at least one device with a critically outdated OS, while 86% of the 135 most common apps contain known vulnerabilities....

T-Mobile Sets the Record Straight on Latest Data Breach Filing
T‑Mobile USA clarified that a recent data breach notification filed with the Maine Attorney General stemmed from an isolated insider incident affecting a single customer. The compromised data included personal identifiers such as name, address, SSN, driver’s license and account...
Finance of America Faces Early Data Breach Class Action
A Texas federal court received a class‑action lawsuit alleging Finance of America suffered a data breach two weeks ago. Consumer Melanie Place claims the ransomware group Word Leaks accessed customers’ personal data, including Social Security numbers. The suit is notable for...

Naoris Protocol's Quantum-Resistant Blockchain Goes Live as Bitcoin and Ethereum Face 'Q-Day' Threats
Naoris Protocol launched a quantum‑resistant mainnet built on NIST‑approved post‑quantum algorithms, marking its shift from proof‑of‑concept to production. The network has already validated over 100 million transactions and mitigated more than 603 million threats during testing. Its debut comes as Bitcoin and...
Understanding the Risks of OpenClaw
OpenClaw AI Agent Platform functions as an orchestration layer rather than a standalone cloud service, providing the plumbing for agents to interact with external models and enterprise systems. While it can be run locally, its real value emerges only when...

The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge
The Cyber Express weekly roundup highlights a sharp rise in ransomware incidents and supply‑chain compromises across multiple sectors. High‑profile breaches include a ransomware intrusion at Hasbro, a malicious package update that hit AI startup Mercor via the LiteLLM project, and...
A New Open-Source Protocol Wants to End the War Between Encryption and Safety
A new open‑source framework called the Open Moderation Safety Protocol (OMSP) proposes to reconcile end‑to‑end encryption with content safety by performing all classification locally on the user’s device or a platform‑controlled node. The protocol uses a three‑tier pipeline—pattern matching, a...
Keysight Introduces SBOM Manager for Cybersecurity Compliance
Keysight has launched an SBOM Manager platform that automates the creation and upkeep of software bills of materials for manufacturers facing tighter cybersecurity regulations. The tool scans binaries, firmware and containerised applications, linking components to multiple vulnerability databases and supporting...

Which Messaging App Takes the Most Limited Approach to Permissions on Android?
A recent analysis of Android versions of Messenger, Signal and Telegram reveals stark differences in permission requests and data handling. Messenger requests the most permissions (87 total, 24 dangerous), while Telegram requests the fewest (71 total) but the highest number...

Cambridge Global Advisors Wins Australian Grant for Pacific Cybersecurity
Cambridge Global Advisors has secured an Australian Department of Foreign Affairs and Trade grant to launch the Pacific Women in Cyber (PWiC) program, an 18‑month initiative delivering cybersecurity training and internships to women in Tonga, Fiji and Samoa. Funded under...

Data Security Posture Management Has Become Essential for Governments
State and local governments are rapidly expanding multicloud environments and adopting generative AI, yet many lack clear visibility into where sensitive citizen data resides. Data Security Posture Management (DSPM) emerges as a solution, continuously discovering, classifying, and monitoring data across...

Check City Notifies 322,687 People of March 2025 Data Breach
Check City, a payday‑loan provider, disclosed that a March 2025 cyber‑attack exposed personal data of 322,687 individuals. The breach compromised names, Social Security numbers, government IDs, financial account details, credit and debit card numbers, dates of birth, and addresses. A...

Americans' Passports Purportedly Stolen in Hacktivist Attack Against Dubai Airport
Nasir Security, a hacktivist group linked to Iran, claimed to have stolen a large data set from Dubai International Airport after a months‑long intrusion. The breach includes passport photos of American, Arab and Emirati travelers, as well as luggage and...
When Your Own Eyes Turn Against You: How Compromised Security Cameras and IoT/OT Devices Become Tools for Your Attackers
Security cameras, IoT and OT devices are increasingly being compromised and repurposed as attack vectors, enabling nation‑state reconnaissance, espionage, ransomware pivots, and massive botnets. Recent incidents include Iranian hackers hijacking Hikvision cameras during missile strikes, Russian operatives streaming compromised webcams...

PSA: Anyone with a Link Can View Your Granola Notes by Default
Granola, an AI‑powered note‑taking app, shares notes publicly by default to anyone with a link, contradicting its claim of private‑by‑default. Users can change the setting to “Only my company” or “Private,” but the default exposes potentially sensitive meeting content. The...

Agentic Development Security: Why AppSec Needs A New Operating Model
Application security is being reshaped by faster exploit cycles and the rise of AI‑driven coding agents. Traditional testing tools now detect vulnerabilities but struggle to provide real‑world context such as exploitability and business impact. Large language models are enabling richer...
Why Australia’s Tech Sovereignty Needs Smart Partnerships
Mark Hile, Managing Director of Datacom Infrastructure Products, warns that rising cyber threats, geopolitical risk and supply‑chain disruptions are forcing Australia to rethink its digital infrastructure. He argues the country must double down on regionally‑owned, sovereign technology or cede strategic...