Cybersecurity News and Headlines

Rethinking Vulnerability Management Strategies for Mid-Market Security
NewsMar 31, 2026

Rethinking Vulnerability Management Strategies for Mid-Market Security

Mid‑market security teams are confronting a widening gap between the surge in disclosed vulnerabilities—rising from roughly 30,000 to 50,000 CVEs annually—and their ability to remediate them quickly. Chris Wallis, founder of Intruder, argues that counting CVEs is insufficient; the real...

By Dark Reading
AI and Quantum Are Forcing a Rethink of Digital Trust
NewsMar 31, 2026

AI and Quantum Are Forcing a Rethink of Digital Trust

Enterprises are confronting a seismic shift in digital trust as AI agents multiply, pushing machine‑to‑human identity ratios from 100:1 toward 1,000:1. At the same time, digital certificates are being issued with ever‑shorter lifespans, complicating lifecycle management and increasing the risk...

By Dark Reading
Linx Security Raises $50M Series B as Identity Becomes Security’s Biggest Failure Point
NewsMar 31, 2026

Linx Security Raises $50M Series B as Identity Becomes Security’s Biggest Failure Point

Linx Security announced a $50 million Series B round led by Insight Partners, bringing its total capital to $83 million. The New York‑based startup offers an AI‑native identity governance platform that continuously maps, monitors and automates control of human, machine and AI‑agent identities. With...

By Insight Partners (Insights)
How to Handle Unexpected Calls About Unclaimed Funds
NewsMar 31, 2026

How to Handle Unexpected Calls About Unclaimed Funds

Scammers are increasingly posing as government agencies to lure victims with promises of unclaimed funds, often citing specific amounts and urgent deadlines. They use phishing tactics such as fake texts, phone calls, and requests for upfront processing fees. Legitimate unclaimed...

By FTC – Press Releases
Iran Conflict Highlights Cyberthreat Exposure of U.S. Facilities
NewsMar 31, 2026

Iran Conflict Highlights Cyberthreat Exposure of U.S. Facilities

State‑backed actors tied to the Iran conflict are exploiting insecure smart‑building and operational‑technology systems, as highlighted in WiredScore’s 2026 resiliency report. The report notes that retrofitted legacy assets and internet‑connected IoT devices dramatically expand the cyber‑physical attack surface for commercial...

By Facilities Dive
Securing Cloud Infrastructure for AI
NewsMar 31, 2026

Securing Cloud Infrastructure for AI

The brief warns that AI workloads running in cloud environments create novel attack surfaces that existing vulnerability‑management frameworks cannot adequately protect. Nation‑state actors are accelerating discovery and exploitation cycles, while public resources like the National Vulnerability Database are overwhelmed by...

By Atlantic Council – All Content
Axios Software Tool Used by Millions Compromised in Hack
NewsMar 31, 2026

Axios Software Tool Used by Millions Compromised in Hack

Axios, a widely used NPM client for HTTP requests, was compromised after a hacker breached a maintainer's GitHub account and published malicious versions. The package, downloaded roughly 80 million times weekly, could deliver payloads to Windows, macOS and Linux machines. By...

By Claims Journal
Siemens Adds Viakoo Platform for OT and IoT Security
NewsMar 31, 2026

Siemens Adds Viakoo Platform for OT and IoT Security

Siemens Smart Infrastructure has signed an agreement with Viakoo to integrate the Viakoo Action Platform into its service portfolio. The cloud‑based solution provides automated firmware updates, certificate management, password enforcement, and compliance tracking for OT and IoT device fleets. By...

By Engineering.com
CrewAI Vulnerabilities Expose Devices to Hacking
NewsMar 31, 2026

CrewAI Vulnerabilities Expose Devices to Hacking

Open‑source AI orchestration framework CrewAI disclosed four interrelated vulnerabilities. The flaws—CVE‑2026‑2275, ‑2285, ‑2286, and ‑2287—stem from the Code Interpreter tool’s fallback to an insecure sandbox and improper configuration checks. Exploited together, they enable remote code execution, SSRF, and arbitrary file...

By SecurityWeek
Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
NewsMar 31, 2026

Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations

Iran has resurrected the state‑backed Pay2Key ransomware operation, enlisting Russian cybercriminal affiliates to target high‑impact U.S. and Israeli entities. The campaign employs “pseudo‑ransomware,” encrypting data while delivering destructive wiper payloads to obscure motives. Affiliate rewards have been boosted to 80%...

By Dark Reading
New Bitdefender Assessment Helps Organizations Identify and Eliminate Hidden Internal Attack Paths
NewsMar 31, 2026

New Bitdefender Assessment Helps Organizations Identify and Eliminate Hidden Internal Attack Paths

Bitdefender launched a complimentary Internal Attack Surface Assessment to help enterprises pinpoint hidden internal cyber risks tied to excessive user access and shadow IT. The service leverages the GravityZone PHASR platform to deliver data‑driven visibility down to the individual user...

By Help Net Security
ChatGPT Security Issue Enabled Data Theft via Single Prompt
NewsMar 31, 2026

ChatGPT Security Issue Enabled Data Theft via Single Prompt

Security researchers at Check Point uncovered a vulnerability in ChatGPT that allows a single crafted prompt to create a covert data‑exfiltration channel. The flaw leveraged a hidden DNS side‑channel from the model's isolated container, enabling both data leakage and remote...

By Infosecurity Magazine
Download: 2026 SANS Identity Threats & Defenses Survey
NewsMar 31, 2026

Download: 2026 SANS Identity Threats & Defenses Survey

The 2026 SANS Identity Threats & Defenses Survey reveals that 55% of organizations suffered an identity‑related breach in the past year. MFA fatigue contributed to 26% of those attacks, indicating user weariness with multi‑factor prompts. The report details how threat...

By Help Net Security
Companies House ‘Developing a Case for Upgrade Investments’ After Five-Month Data-Security Breach
NewsMar 31, 2026

Companies House ‘Developing a Case for Upgrade Investments’ After Five-Month Data-Security Breach

Companies House disclosed a five‑month data‑security flaw that let any user potentially edit another company’s details by pressing the back button four times. The defect, traced to an October software update, prompted a temporary shutdown of the WebFiling service and...

By PublicTechnology.net (UK)
Board Briefing: Data at Risk: What Boards Are Missing on Cyber, AI & Regulation
NewsMar 31, 2026

Board Briefing: Data at Risk: What Boards Are Missing on Cyber, AI & Regulation

Corporate Board Member Network is hosting a one‑hour virtual briefing on April 23, 2026, titled “Data at Risk: What Boards Are Missing on Cyber, AI & Regulation.” The session features privacy‑law expert Kwabena Appenteng, who will explain where companies are...

By Corporate Board Member (Chief Executive Group)
­EnSilica Joins UK CHERI Adoption Collective to Accelerate Secure-by-Design Silicon
NewsMar 31, 2026

­EnSilica Joins UK CHERI Adoption Collective to Accelerate Secure-by-Design Silicon

EnSilica has been selected to join the newly formed CHERI Adoption Collective, a UK‑government‑backed initiative aimed at embedding hardware‑level memory safety into critical systems. The collective brings together infrastructure operators such as BT, National Grid and SSE, along with semiconductor...

By Microwave Journal
Emerging Innovator Naveen Reddy Burramukku Recognized for Pioneering
NewsMar 31, 2026

Emerging Innovator Naveen Reddy Burramukku Recognized for Pioneering

Naveen Reddy Burramukku, a systems and network architect, has been highlighted as an emerging innovator in secure infrastructure engineering. His scholarly work spans virtualization protection, identity governance, disaster recovery, and hybrid cloud security, introducing methods that boost resilience and reduce...

By TechBullion
Cato Networks Unveils Modular Adoption Model for SASE Platform
NewsMar 31, 2026

Cato Networks Unveils Modular Adoption Model for SASE Platform

Cato Networks announced a modular adoption model for its core SASE platform, allowing enterprises to select and add capabilities such as AI security, SD‑WAN, SSE and universal ZTNA on demand. The solution runs on the GPU‑powered Cato Neural Edge, a...

By ComputerWeekly
Guidance: Industry Security Notice (ISN)
NewsMar 31, 2026

Guidance: Industry Security Notice (ISN)

The UK Ministry of Defence’s Industry Security Notices (ISNs) continue to evolve, with the latest revision on 31 March 2026 adding Defence Cyber Certification (DCC) guidance under DEFCON 658 and clarifying the cyber‑security model scope. Over the past six years the ISNs have...

By UK Ministry of Defence (GOV.UK)
This App Makes Even the Sketchiest PDF or Word Doc Safe to Open
NewsMar 31, 2026

This App Makes Even the Sketchiest PDF or Word Doc Safe to Open

Dangerzone is a free, open‑source tool that sanitizes PDFs, Word, Excel, PowerPoint, OpenOffice, EPUB and image files by sandboxing them and converting each page to an image‑only PDF. The process runs in a container or virtual machine with no internet...

By WIRED – Gear
Fewer CVEs in Your Camunda 8 Containers with Hardened Base Images
NewsMar 31, 2026

Fewer CVEs in Your Camunda 8 Containers with Hardened Base Images

Camunda announced that its Camunda 8 self‑managed containers now use hardened Minimus base images, eliminating 354 known CVEs from the base layer. The transition covers Node, OpenJDK, OpenJRE and PHP images and includes a build‑time option for Zeebe’s container. Ongoing...

By Camunda – Blog
7,655 Ransomware Claims in One Year: Group, Sector, and Country Breakdown
NewsMar 31, 2026

7,655 Ransomware Claims in One Year: Group, Sector, and Country Breakdown

From March 2025 to March 2026 ransomware groups posted 7,655 victim claims on public leak sites, averaging about 20 claims per day. The five most active groups—Qilin, Akira, INC Ransom, Play and Safepay—account for 40% of all claims, with Qilin alone responsible...

By Hacker News
Employee Data Breaches Surge to Seven-Year High
NewsMar 31, 2026

Employee Data Breaches Surge to Seven-Year High

Employee data breach reports to the UK Information Commissioner’s Office reached 3,872 incidents in 2025, the highest level in at least seven years. That marks a 5% rise from the previous year and a 29% increase versus 2019, when reporting...

By Infosecurity Magazine
Change Intelligence and Deployment Connectors for Liquibase Secure
NewsMar 31, 2026

Change Intelligence and Deployment Connectors for Liquibase Secure

Liquibase Secure announced two new capabilities—Change Intelligence and Deployment Connectors for ServiceNow, GitHub, Harness, and Terraform. Change Intelligence aggregates change data, applies AI‑driven risk analysis, and automatically captures audit evidence in a single view. Deployment Connectors embed governed database change...

By Security Boulevard
KYND Warns Insurers of Surge in US Website Privacy Lawsuits
NewsMar 31, 2026

KYND Warns Insurers of Surge in US Website Privacy Lawsuits

Cyber‑risk firm KYND warns insurers that U.S. privacy lawsuits tied to routine website tracking have surged from a few hundred to over 2,000 cases annually. The claims focus on marketing pixels and analytics tools rather than data breaches and can...

By Fintech Global
Let’s Stop Sovereignty Washing
NewsMar 31, 2026

Let’s Stop Sovereignty Washing

The article warns that cloud providers are marketing “sovereignty” while delivering only data residency, creating a gap between promises and technical reality. It explains that U.S. laws such as the CLOUD Act can compel access to data stored in Europe,...

By Security Boulevard
Hacker Charged with Stealing $53 Million From Uranium Crypto Exchange
NewsMar 31, 2026

Hacker Charged with Stealing $53 Million From Uranium Crypto Exchange

U.S. prosecutors have charged Maryland resident Jonathan Spalletta with stealing more than $53 million from the decentralized Uranium Finance exchange through two separate smart‑contract exploits in April 2021. The attacks drained liquidity pools, forced the platform to shut down, and the...

By BleepingComputer
Huawei Secure SD-WAN Full SASE Solution: Secure, Intelligent Connectivity for Modern Enterprises
NewsMar 31, 2026

Huawei Secure SD-WAN Full SASE Solution: Secure, Intelligent Connectivity for Modern Enterprises

Huawei has launched its Secure SD‑WAN Full SASE solution, a unified platform that blends networking, security and AI‑driven management for enterprise connectivity. The solution dynamically routes traffic over MPLS, broadband, LTE or 5G while encrypting tunnels and providing integrated firewall,...

By ITWeb (South Africa) – Public Sector
The External Pressures Redefining Cybersecurity Risk
NewsMar 31, 2026

The External Pressures Redefining Cybersecurity Risk

External pressures are reshaping cybersecurity risk, with third‑party breaches now accounting for over 35% of incidents. Geopolitical conflicts are spilling battle‑tested tactics into operational technology (OT) and IoT environments, raising safety and continuity stakes. Generative AI accelerates attacker capabilities while...

By CSO Online
California Gets Serious About Regulation (Again)
NewsMar 31, 2026

California Gets Serious About Regulation (Again)

Effective Jan 1 2026, California expanded its CCPA/CPRA into a unified governance framework that blends privacy, cybersecurity, and AI regulations. The new rules mandate formal risk assessments for high‑risk processing, regulate automated decision‑making technologies, and require independent cybersecurity audits. Obligations roll out...

By Security Boulevard
This Month in Security with Tony Anscombe – March 2026 Edition
NewsMar 31, 2026

This Month in Security with Tony Anscombe – March 2026 Edition

In March 2026, ESET’s chief security evangelist Tony Anscombe highlighted four major cyber incidents. A hack claimed by Iran‑linked Handala crippled med‑tech giant Stryker, wiping over 200,000 devices and exfiltrating 50 TB of data. Google’s Threat Intelligence Group reported that 77 %...

By WeLiveSecurity
Here's a Thing - What if Shadow AI Is Actually Telling Us Something Useful?
NewsMar 31, 2026

Here's a Thing - What if Shadow AI Is Actually Telling Us Something Useful?

Enterprises are confronting a surge of shadow AI—unauthorized, employee‑driven use of large language models and autonomous agents. As governance lags, these tools make decisions and act independently, amplifying risk beyond traditional shadow IT. Experts argue that treating employees as AI...

By Diginomica
Razorpay Introduces RBI-Compliant Biometric Authentication Solution ‘Passkey’
NewsMar 31, 2026

Razorpay Introduces RBI-Compliant Biometric Authentication Solution ‘Passkey’

Razorpay has launched “Passkey,” an RBI‑compliant biometric authentication solution for online card payments, developed with Mastercard and slated to integrate Visa soon. The technology leverages device‑bound fingerprints or facial scans, removing the need for one‑time passwords that cause roughly 35%...

By Entrackr
UK Seeks Views on Reshaping Cyber Laws for Downstream Gas and Electricity
NewsMar 31, 2026

UK Seeks Views on Reshaping Cyber Laws for Downstream Gas and Electricity

The UK government, together with regulator Ofgem, has launched a consultation on revising cyber‑resilience rules for downstream gas and electricity licensees. The proposal would impose baseline cyber security requirements on all Ofgem‑licensed operators, while applying stricter standards to the most...

By Energy Live News
STV Group and Post-Quantum Successfully Trial World’s First Quantum-Resilient Drones
NewsMar 31, 2026

STV Group and Post-Quantum Successfully Trial World’s First Quantum-Resilient Drones

STV Group and UK‑based Post‑Quantum announced the successful trial of the world’s first quantum‑resilient drones, demonstrating secure, future‑proof communications between unmanned aircraft and operators. The tests, conducted in operational environments linked to Ukraine and other allied theatres, proved the drones...

By Business Wire — Executive Appointments
What Makes Browser Hijacking a Silent Threat?
NewsMar 31, 2026

What Makes Browser Hijacking a Silent Threat?

Browser hijacking, where attackers covertly alter browser settings or install malicious extensions, is emerging as a silent threat to enterprises. Researchers have identified 33 rogue extensions affecting over 2.6 million users, and Microsoft reported a 111 % surge in token‑replay attacks in...

By Security Boulevard
World Backup Day 2026: A Telecom B2B Guide to Data Protection in the AI Age
NewsMar 31, 2026

World Backup Day 2026: A Telecom B2B Guide to Data Protection in the AI Age

World Backup Day on March 31 highlights telecoms’ need for robust data protection amid AI‑driven growth. AI adoption has surged, with 77% of telecom executives citing operational benefits and 61% using AI for analytics, but it also inflates data volumes and...

By Telecom Review
Axios Compromised on NPM – Malicious Versions Drop Remote Access Trojan
NewsMar 31, 2026

Axios Compromised on NPM – Malicious Versions Drop Remote Access Trojan

On March 30‑31 2026, attackers compromised the npm maintainer account for the popular HTTP client library axios and published two malicious releases, axios@1.14.1 and axios@0.30.4. Both versions added a fake dependency, plain‑crypto‑js@4.2.1, which runs a post‑install script that drops a...

By Hacker News
How We Eliminated Long-Lived CI Secrets Across 70+ Repos
NewsMar 31, 2026

How We Eliminated Long-Lived CI Secrets Across 70+ Repos

Pulumi eliminated long‑lived CI secrets across more than 70 repositories by swapping static GitHub secrets for short‑lived, OIDC‑driven credentials via Pulumi ESC. The new flow exchanges a GitHub‑issued JWT for a Pulumi access token, which then opens an ESC environment...

By Pulumi Blog
Kernel Observability for Data Movement
NewsMar 30, 2026

Kernel Observability for Data Movement

Modern security stacks rely on user‑space logs, leaving a blind spot at the operating system layer where data actually moves. Kernel‑mediated events—file reads, network writes, process creation—provide a complete, immutable record of every data flow, yet most tools never tap...

By HackRead
Popular AI Gateway Startup LiteLLM Ditches Controversial Startup Delve
NewsMar 30, 2026

Popular AI Gateway Startup LiteLLM Ditches Controversial Startup Delve

LiteLLM, a widely used AI gateway for developers, announced it is ending its partnership with compliance startup Delve and will pursue new certifications through Vanta and an independent auditor. The move follows a credential‑stealing malware breach that exposed weaknesses in...

By TechCrunch (Main)
UN Norms: Tackling the Rise of Cyber Capabilities
NewsMar 30, 2026

UN Norms: Tackling the Rise of Cyber Capabilities

The UN Open‑Ended Working Group (OEWG) wrapped up its 2025 cycle, reaffirming the 2015 GGE’s eleven cyber norms but delivering few fresh agreements. A new permanent Global Mechanism has been created to keep multilateral dialogue on state behaviour in cyberspace...

By RUSI
Hybrid Vishing Campaigns Abuse Online Services to Evade Anti-Spam Filters
NewsMar 30, 2026

Hybrid Vishing Campaigns Abuse Online Services to Evade Anti-Spam Filters

Hybrid vishing attacks now combine phishing emails with voice scams by abusing trusted SaaS platforms such as Google Calendar, Microsoft Teams, Zoom, and Squarespace to deliver authenticated invitations that prompt victims to call fraudulent numbers. By leveraging SPF, DKIM, and...

By eSecurity Planet
Hackers Hit Patel Email While Cyber Defenses Weakened by Shutdown
NewsMar 30, 2026

Hackers Hit Patel Email While Cyber Defenses Weakened by Shutdown

The Cybersecurity and Infrastructure Security Agency (CISA) is operating with roughly 60% of its workforce furloughed amid a partial DHS shutdown, forcing the agency to shift from proactive threat hunting to merely reacting to imminent attacks. Within days, Iranian-linked hackers...

By Semafor – Business
OpenAI Codex Vulnerability Allowed Attackers to Steal GitHub Tokens
NewsMar 30, 2026

OpenAI Codex Vulnerability Allowed Attackers to Steal GitHub Tokens

BeyondTrust Phantom Labs uncovered a critical command‑injection flaw in OpenAI's Codex that leveraged hidden Unicode characters in GitHub branch names to steal OAuth tokens. The vulnerability affected the ChatGPT web interface, Codex SDK, and several developer extensions, exposing full repository...

By HackRead
New RoadK1ll WebSocket Implant Used to Pivot on Breached Networks
NewsMar 30, 2026

New RoadK1ll WebSocket Implant Used to Pivot on Breached Networks

Security firm Blackpoint uncovered a new Node.js WebSocket implant called RoadK1ll, which enables attackers to pivot from a compromised host to internal systems via outbound tunnels. The lightweight reverse‑tunneling tool establishes a persistent WebSocket connection to attacker infrastructure, allowing multiple...

By BleepingComputer
Enhancing Security Operations Builds on Zero Trust: Strengthening National Security Through Deception
NewsMar 30, 2026

Enhancing Security Operations Builds on Zero Trust: Strengthening National Security Through Deception

The Pentagon is moving zero‑trust from policy to full‑scale execution, establishing maturity goals across the department. Recognizing that breaches are inevitable, defense leaders are adding cyber deception to actively engage attackers and gather intelligence. AI‑driven deception platforms now automate decoy...

By Federal News Network
APRA Pulls Data Submission System After Security Pentest
NewsMar 30, 2026

APRA Pulls Data Submission System After Security Pentest

The Australian Prudential Regulation Authority (APRA) decommissioned its legacy Direct To APRA (D2A) data‑submission system after a routine penetration test on March 19 uncovered unnamed vulnerabilities. The regulator took the system offline on March 20 and urged all banks, insurers and superannuation funds to...

By iTnews (Australia) – Government
Why Identity-Led Security Services Matter Now for MSPs
NewsMar 30, 2026

Why Identity-Led Security Services Matter Now for MSPs

Identity-led security is becoming a growth engine for managed service providers as 60 % of breaches now involve compromised identities. MSPs that layer modern IAM—phishing‑resistant MFA, passwordless login, and continuous risk assessment—onto existing services can differentiate themselves and command higher margins....

By ChannelE2E