Cybersecurity News and Headlines

Telstra Business Launches Managed IT Service for SMB Market
NewsMar 30, 2026

Telstra Business Launches Managed IT Service for SMB Market

Telstra Business announced a new managed IT service aimed at small‑ to medium‑sized enterprises with up to 500 staff. The offering bundles IT support, security and maintenance into Basic, Standard and Premium tiers, each featuring a 24/7 service desk and...

By ARN (Australia)
Don’t Count on Government Guidance After a Smart Home Breach
NewsMar 30, 2026

Don’t Count on Government Guidance After a Smart Home Breach

Researchers examined government cybersecurity guidance across 11 countries for smart homes and found that most advice concentrates on prevention—such as regular updates and changing default credentials—while post‑breach support is minimal. Reporting mechanisms exist but are generic and not tailored to...

By Help Net Security
Microsoft’s March Security Update of High-Risk Vulnerability Notice for Multiple Products
NewsMar 30, 2026

Microsoft’s March Security Update of High-Risk Vulnerability Notice for Multiple Products

Microsoft issued its March 2026 security update, fixing 83 vulnerabilities across Windows, Office, SQL Server, Azure and other core products. The bulletin includes eight critical and 75 important flaws, notably remote‑code‑execution bugs in Office (CVE‑2026‑26110, CVE‑2026‑26113) and the Print Spooler service...

By Security Boulevard
Model Resource Exhaustion as a Denial-of-Intelligence Attack
NewsMar 30, 2026

Model Resource Exhaustion as a Denial-of-Intelligence Attack

The article introduces “denial‑of‑intelligence” attacks, where adversaries drain AI inference resources instead of bandwidth. By sending crafted prompts that trigger long contexts, deep reasoning, or multiple tool calls, attackers force costly compute cycles on the target. Because AI request costs...

By e27
Attribute-Based Access Control for AI Capability Negotiation
NewsMar 30, 2026

Attribute-Based Access Control for AI Capability Negotiation

The article provides a practical guide for users and developers to disconnect from Apple Single Sign‑On (SSO) and replace it with enterprise‑grade identity solutions. It details the UI steps for consumers, explains why SaaS firms view Apple SSO as a...

By Security Boulevard
Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10
NewsMar 30, 2026

Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10

Red Hat released Advanced Cluster Security for Kubernetes version 4.10, extending its security platform across OpenShift clusters in public, private and hybrid clouds. The update adds a technology‑preview plug‑in that surfaces real‑time vulnerability data inside the OpenShift Console, and introduces a...

By Red Hat – DevOps
Strengthening Spain's Digital Sovereignty: Red Hat Enterprise Linux Achieves Top-Tier ENS Security Certification
NewsMar 30, 2026

Strengthening Spain's Digital Sovereignty: Red Hat Enterprise Linux Achieves Top-Tier ENS Security Certification

Red Hat Enterprise Linux (RHEL) 9.0 Extended Update Support has been added to Spain’s CPSTIC catalogue, earning top‑tier certification under the National Security Framework (ENS). The inclusion authorises public‑sector bodies to deploy RHEL while meeting the strict confidentiality, integrity and...

By Red Hat – DevOps
Cyber Security’s Workforce Gap Is a Capability Risk for Government
NewsMar 29, 2026

Cyber Security’s Workforce Gap Is a Capability Risk for Government

Australia is pouring billions into cyber security hardware and sovereign capability, yet its workforce remains a critical vulnerability. Women represent only 17% of the nation’s cyber professionals, highlighting a stark diversity gap that hampers problem‑solving under pressure. The Australian Public...

By The Mandarin (Australia)
Always-On Assurance: Moving APS Security From “Trust” To Reproducible Evidence
NewsMar 29, 2026

Always-On Assurance: Moving APS Security From “Trust” To Reproducible Evidence

The latest Commonwealth Cyber Security Posture report highlights a decisive move from point‑in‑time audit snapshots to always‑on, automated evidence of control effectiveness. Organizations are urged to replace frantic pre‑audit scrambles with continuous monitoring that delivers reproducible compliance data in real...

By The Mandarin (Australia)
Apple’s Age Verification Move Is Bigger than It Looks
NewsMar 29, 2026

Apple’s Age Verification Move Is Bigger than It Looks

Apple has rolled out mandatory age verification for iCloud users in the United Kingdom, shifting the check from individual apps to the account level. The change aligns with the UK’s Online Safety framework, which demands tighter age controls for digital...

By Biometric Update
Are Your NHIs Fully Supported for Optimal Performance?
NewsMar 29, 2026

Are Your NHIs Fully Supported for Optimal Performance?

Non‑Human Identities (NHIs), or machine identities, are becoming a cornerstone of modern cybersecurity, especially in cloud‑first environments. Organizations must manage the full NHI lifecycle—from discovery and classification to threat detection, remediation, and continuous monitoring—to prevent breaches. Traditional point solutions like...

By Security Boulevard
What Role Does Innovation Play in Agentic AI Development?
NewsMar 29, 2026

What Role Does Innovation Play in Agentic AI Development?

Non‑human identities (NHIs), also known as machine identities, are becoming a critical focus for cybersecurity, especially in cloud environments. Managing the full lifecycle of these encrypted secrets and permissions reduces breach risk, improves compliance, and drives operational efficiency. The article...

By Security Boulevard
Councils Push for Federal Shared Security Centre Funding
NewsMar 29, 2026

Councils Push for Federal Shared Security Centre Funding

Australian local councils are lobbying the federal government for shared security operations centres (SOCs) to bolster cyber defences. Ahead of the ALGA national assembly, identical motions call for $10 million AUD (about $6.6 million USD) to fund SOC infrastructure, 24/7 monitoring, SIEM...

By iTnews (Australia) – Government
ChatGPT Won't Let You Type Until Cloudflare Reads Your React State
NewsMar 29, 2026

ChatGPT Won't Let You Type Until Cloudflare Reads Your React State

Every ChatGPT request now triggers a Cloudflare Turnstile challenge that runs a virtual‑machine program inside the browser. The bytecode arrives encrypted as a 28,000‑character base64 string, but the decryption key – a server‑generated float – is embedded directly in the...

By Hacker News
NAB Is Co-Designing a SIEM with Databricks
NewsMar 29, 2026

NAB Is Co-Designing a SIEM with Databricks

National Australia Bank (NAB) has joined four other design partners to co‑design Lakewatch, a new security information and event management (SIEM) platform built on Databricks. The solution, currently in private preview, leverages the bank’s existing Databricks‑on‑AWS data lake, Ada, to...

By iTnews (Australia) – Government
Did You Sign up for the New White House App?  Don’t Use It Until You Read This!
NewsMar 29, 2026

Did You Sign up for the New White House App? Don’t Use It Until You Read This!

The White House launched a mobile app on March 28, 2026, branded “Unparalleled access to the Trump Administration.” Security researcher Thereallo decompiled the APK and uncovered multiple privacy and data‑security violations that breach federal cybersecurity standards. Patrick Quirk highlighted the...

By DataBreaches.net
Over 300 Vietnamese Arrested After Cambodia Scam Bust
NewsMar 29, 2026

Over 300 Vietnamese Arrested After Cambodia Scam Bust

More than 300 Vietnamese were arrested in Dong Nai province after being repatriated from Cambodia, where authorities dismantled a transnational online‑scam ring. Cambodia deported 776 Vietnamese nationals linked to the illicit operation, highlighting the scale of Southeast Asia’s cyber‑fraud ecosystem....

By New Straits Times (Malaysia) – Business
Is Your Signal Secure?
NewsMar 29, 2026

Is Your Signal Secure?

At the NAB Show, a panel titled “Securing the Signal” examined how broadcasters can shift from reactive security to proactive risk management across distributed field operations. Experts from Fox, Dataminr, Smith Entertainment Group and Verkdata discussed integrating real‑time threat‑intelligence platforms...

By Radio World
The Compliance Blind Spot in Cyber Risk
NewsMar 29, 2026

The Compliance Blind Spot in Cyber Risk

Financial institutions are discovering that compliance can fail even when core systems stay online. Automated compliance judgments degrade silently when underlying data conditions change during cyber incidents, eroding the validity of regulatory outputs. Regulators are shifting focus from mere control...

By The European Financial Review
CareCloud Notifies the SEC After Attack on One of Its EHR Environments
NewsMar 29, 2026

CareCloud Notifies the SEC After Attack on One of Its EHR Environments

CareCloud disclosed to the SEC that an unauthorized third party accessed one of its six electronic health record (EHR) environments on March 16, causing an eight‑hour disruption that was fully restored the same evening. The company promptly notified its cyber‑insurance carrier,...

By DataBreaches.net
The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance
NewsMar 29, 2026

The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance

AI is reshaping cyber risk for European financial institutions, turning generic phishing into highly personalized, multilingual attacks powered by deep‑fakes and synthetic identity documents. Regulators such as the ECB and EBA warn that AI‑driven fraud attempts are surging, while the...

By The European Financial Review
Scaling AI Demands a New Infrastructure Playbook
NewsMar 29, 2026

Scaling AI Demands a New Infrastructure Playbook

Enterprises moving AI from pilots to production face a fundamentally different infrastructure challenge, requiring tight integration of accelerated compute, high‑performance networking, security and observability. Fragmented stacks cause fragile deployments and costly GPU idle time, especially during intensive training or retrieval‑augmented...

By CIO.com
File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites
NewsMar 29, 2026

File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites

A file‑read flaw (CVE‑2026‑3098) in the Smart Slider 3 WordPress plugin allows any authenticated user, even a subscriber, to export arbitrary server files. The vulnerability stems from missing capability checks in the plugin’s AJAX export function, enabling access to sensitive files...

By BleepingComputer
Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate
NewsMar 29, 2026

Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate

Texas’ Department of Information Resources (DIR) has mandated AI‑aware cybersecurity awareness training for all state and local government employees, with a certification deadline of August 31. Kratikal’s Threatcop platform is one of only five vendors approved under the DIR certification, offering...

By Security Boulevard
Do Emergency Microsoft, Oracle Patches Point to Wider Issues?
NewsMar 29, 2026

Do Emergency Microsoft, Oracle Patches Point to Wider Issues?

Microsoft and Oracle have each released emergency out‑of‑band patches this week, drawing attention to the fragility of enterprise update cycles. Microsoft’s KB5085516 fixes a sign‑in error that showed a “no internet” message for standard Microsoft accounts after the latest Patch...

By Slashdot
Thankfully, the Infinite Campus Incident Did Not Involve a Lot of Non-Directory Student Information
NewsMar 28, 2026

Thankfully, the Infinite Campus Incident Did Not Involve a Lot of Non-Directory Student Information

DataBreaches downloaded the Infinite Campus leak posted by ShinyHunters and examined its contents. The majority of files were proprietary or client‑related and did not contain personal student information. Approximately two dozen support tickets referenced students by name, with two tickets...

By DataBreaches.net
Lessons From CalPrivacy PlayOn Order
NewsMar 28, 2026

Lessons From CalPrivacy PlayOn Order

California Privacy Protection Agency (CalPrivacy) fined PlayOn Sports $1.1 million for illegal tracking of student data between January 2023 and December 2024. The company sold personal information to third parties without a functional opt‑out, used a cookie banner that forced consent, and ignored...

By National Law Review – Employment Law
Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
NewsMar 28, 2026

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

Iran‑linked threat actors operating under the Handala Hack persona breached the personal email of FBI Director Kash Patel, leaking historical messages from 2010 and 2019. The same group claimed a destructive wiper attack on medical‑device giant Stryker, wiping thousands of...

By The Hacker News
From Data to Intelligence: Why More Signals Don’t Equal Better Security
NewsMar 28, 2026

From Data to Intelligence: Why More Signals Don’t Equal Better Security

The article argues that simply accumulating more security signals does not improve protection; instead, organizations need to convert raw data into actionable intelligence through verification, attribution, and context, especially around identity. It highlights problems like alert fatigue, false positives, and...

By Security Boulevard
New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures
NewsMar 28, 2026

New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

Infinity Stealer, a new macOS infostealer, uses a Python payload compiled with the open‑source Nuitka compiler to produce a native binary that evades static analysis. The malware is delivered via a ClickFix lure that mimics Cloudflare’s CAPTCHA, prompting users to...

By BleepingComputer
Woodfords Family Services Notifying Patients and Families About 2024 Ransomware Attack
NewsMar 28, 2026

Woodfords Family Services Notifying Patients and Families About 2024 Ransomware Attack

Woodfords Family Services, a Maine provider for people with disabilities, disclosed a ransomware breach that first occurred on April 8, 2024 but was only publicly notified on March 27, 2026 for some victims. The organization previously reported a 2023 incident...

By DataBreaches.net
Simple Ways to Stay Safe When Installing New Software
NewsMar 28, 2026

Simple Ways to Stay Safe When Installing New Software

The article emphasizes proactive security habits when installing new software, highlighting system updates, reputable sources, and careful installation steps as primary defenses. It recommends consulting niche tech blogs and community sites for practical risk assessments beyond generic advice. Core practices...

By AnandTech
Thousands of Corewell Health Patients Affected by Security Breach
NewsMar 28, 2026

Thousands of Corewell Health Patients Affected by Security Breach

Corewell Health disclosed that its former consulting partner, Pinnacle Holdings, suffered a data breach in 2024, potentially compromising the personal information of thousands of patients. The health system promptly initiated an internal review to determine the scope of exposure and...

By DataBreaches.net
Secure Authentication Starts With Secure Software Development
NewsMar 28, 2026

Secure Authentication Starts With Secure Software Development

The MojoAuth blog stresses that secure authentication begins with secure software development, not just choosing the right protocol. It highlights how modern methods like passkeys, WebAuthn, OAuth, and JWT introduce implementation challenges that can become breach vectors. The article outlines...

By Security Boulevard
What Is Shift Left Security?
NewsMar 28, 2026

What Is Shift Left Security?

Shift‑Left Security embeds protection into the earliest phases of the software development lifecycle, moving security checks leftward on the SDLC diagram. Gartner forecasts cloud spending will exceed $1 trillion by 2028, intensifying the need for proactive AppSec. By integrating automated SAST,...

By Security Boulevard
Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live
NewsMar 28, 2026

Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live

Open VSX, the extension marketplace for VS Code forks, patched a critical “Open Sesame” vulnerability that let malicious extensions bypass its pre‑publish scanning pipeline. The flaw stemmed from a Boolean logic error that treated scanner failures as a “no scanners configured”...

By GBHackers On Security
China Used Fake LinkedIn Profiles to Spy on NATO, EU: Security Source
NewsMar 28, 2026

China Used Fake LinkedIn Profiles to Spy on NATO, EU: Security Source

Chinese state security operatives deployed fabricated LinkedIn recruiter accounts to infiltrate NATO and EU institutions, posing as head‑hunters to solicit sensitive information. The fake profiles, such as the "Kevin Zhang" persona, offered paid reports before requesting classified data, paying recruits...

By Hong Kong Free Press – News (Finance/Business coverage)
A New Phishing Scheme Is Targeting NFL and NBA Stars: Here’s How the ‘Adult Film Star’ Scam Works
NewsMar 28, 2026

A New Phishing Scheme Is Targeting NFL and NBA Stars: Here’s How the ‘Adult Film Star’ Scam Works

A Georgia man, Kwamaine Jerell Ford, is accused of running a phishing operation that duped NFL and NBA players by posing as an adult film star. The scheme harvested iCloud credentials, stole credit‑card data and secretly filmed victims during coerced...

By Inc.
Don't YOLO Your File System
NewsMar 28, 2026

Don't YOLO Your File System

Developers are increasingly seeing AI agents wipe files, empty directories, and corrupt home folders when given unrestricted system access. The new open‑source tool jai offers a single‑command sandbox that isolates an agent’s workspace while keeping the current working directory writable....

By Hacker News
'From 16 Hours to Under 5 Minutes': How Gen AI Is Turning Fraud Into a $400B+ Global Industry — and...
NewsMar 27, 2026

'From 16 Hours to Under 5 Minutes': How Gen AI Is Turning Fraud Into a $400B+ Global Industry — and...

Generative AI is slashing the time needed to craft fraud schemes from over 16 hours to under five minutes. The acceleration has helped push global financial losses past $400 billion in a single year, with two‑thirds of scams succeeding within a...

By TechRadar Pro
Breach of Confidence – 27 March 2026
NewsMar 27, 2026

Breach of Confidence – 27 March 2026

The security community faced a wave of incidents in late March, starting with the compromise of Trivy, a popular open‑source scanner, which turned a defensive tool into an attack vector. A separate breach of McKinsey’s AI platform exposed 22 unauthenticated...

By Security Boulevard
ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database
NewsMar 27, 2026

ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database

The ShinyHunters hacker collective announced it is abandoning BreachForums, labeling the platform a waste of time after an FBI seizure in October 2025. Simultaneously, the group released a fresh dump containing data on more than 300,000 BreachForums users, including full...

By HackRead
F5, Breached by an APT Last Year, Says BIG-IP APM Exploited
NewsMar 27, 2026

F5, Breached by an APT Last Year, Says BIG-IP APM Exploited

F5’s BIG‑IP Access Policy Manager (APM) vulnerability CVE‑2025‑53521 is being actively exploited, granting unauthenticated remote code execution. Attackers can disable SELinux, write in‑memory webshells, and seize control of authentication and VPN services used by Fortune 500 firms. The exploit follows a...

By The Stack (TheStack.technology)
Windows PCs Crash Three Times As Often As Macs, Report Says
NewsMar 27, 2026

Windows PCs Crash Three Times As Often As Macs, Report Says

Omnissa’s 2026 State of Digital Workspace report, based on global telemetry, finds Windows PCs crash 3.1 times more often than Macs and freeze 7.5 times more frequently. Windows devices are typically refreshed every three years, compared with five years for Macs, leading...

By Slashdot
Anthropic’s Mythos Leak Is a Wake-Up Call: Phishing 3.0 Is Already Here
NewsMar 27, 2026

Anthropic’s Mythos Leak Is a Wake-Up Call: Phishing 3.0 Is Already Here

Anthropic’s accidental disclosure of its upcoming Claude Mythos model has ignited concerns about AI‑driven cyber threats, but the real alarm is that today’s publicly available generative AI already powers sophisticated phishing attacks. These models can scrape public data, mimic corporate tone,...

By Security Boulevard
Secure Tomorrow’s Data Centers with Platform Firmware Resiliency
NewsMar 27, 2026

Secure Tomorrow’s Data Centers with Platform Firmware Resiliency

The National Institute of Standards and Technology released SP800‑193, a framework for platform firmware resiliency (PFR) that guides data‑center operators in protecting, detecting, and recovering from firmware attacks. The standard distinguishes secured boot, which blocks untrusted code, from measured boot,...

By Electronic Design
BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets
NewsMar 27, 2026

BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets

At BSidesSLC 2025, cloud architect Connor Turpin presented a framework for leveraging large‑language models (LLMs) to streamline risk management in security‑constrained environments. He demonstrated how open‑source LLMs can automate vulnerability triage, threat‑intel summarization, and ticket generation for teams with limited...

By Security Boulevard
Skullcandy Taps Riskified for Fraud Prevention
NewsMar 27, 2026

Skullcandy Taps Riskified for Fraud Prevention

Skullcandy partnered with Riskified via the Shopify app to overhaul its fraud‑prevention workflow. By adding a secondary review layer and recalibrating AI‑driven thresholds, the retailer cut its fraud‑decline rate to about 0.1% and kept chargebacks around 0.06% over 12 months....

By Digital Commerce 360
GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can.
NewsMar 27, 2026

GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can.

Cybersecurity teams face a chronic talent gap, with 4.8 million positions unfilled and 71% of SOC analysts reporting burnout. General‑purpose LLMs like GPT‑4 can summarize alerts but fail to trace attack chains or correlate data across dozens of tools. Purpose‑built cybersecurity...

By Security Boulevard