Cybersecurity News and Headlines

Biometrics Adoption, Inclusion Gains Depend on Bridging the Understanding Gap
NewsMar 27, 2026

Biometrics Adoption, Inclusion Gains Depend on Bridging the Understanding Gap

Researchers from Hong Kong and Germany examined 22 older Chinese adults’ experiences with biometric payments, finding that convenience and perceived security drive adoption while fears of loss of control and data misuse hinder it. The study, slated for the 2026...

By Biometric Update
Gitleaks Creator Returns with Betterleaks, an Open Source Secrets Scanner for the Agentic Era
NewsMar 27, 2026

Gitleaks Creator Returns with Betterleaks, an Open Source Secrets Scanner for the Agentic Era

The creator of the popular secret‑scanning tool Gitleaks has launched Betterleaks, an open‑source scanner designed as a drop‑in replacement with faster performance and more flexible validation. Backed by AI‑focused security startup Aikido, Betterleaks swaps hard‑coded entropy checks for CEL‑based rules...

By The New Stack
Ransomware Attack Totally Cripples Jackson County Sheriff’s Office in Indiana
NewsMar 27, 2026

Ransomware Attack Totally Cripples Jackson County Sheriff’s Office in Indiana

A ransomware attack crippled the Jackson County Sheriff’s Office IT infrastructure last week. The breach likely began with a phishing email that delivered malicious code, which lay dormant before encrypting files and spreading laterally. The resulting total network outage forced...

By DataBreaches.net
FBI Confirms Theft of Director’s Personal Emails by Iran-Linked Hacking Group
NewsMar 27, 2026

FBI Confirms Theft of Director’s Personal Emails by Iran-Linked Hacking Group

The FBI confirmed that a hacking group tied to Iran's Ministry of Intelligence and Security, operating under the name Handala, breached the personal email account of FBI Director Kash Patel and leaked photos and routine correspondence from 2010 and 2019....

By The Record by Recorded Future
Pro-Iran Hackers Claim Breach of FBI Director’s Email
NewsMar 27, 2026

Pro-Iran Hackers Claim Breach of FBI Director’s Email

Pro‑Iran hacktivist group Handala announced it accessed FBI Director Kash Patel’s personal email and posted screenshots online. An insider familiar with the breach said the leaked material appears authentic, though the FBI maintains it contains only historical personal information and...

By FCW (GovExec Technology)
Robin Tombs Talks UK Digital ID with Trinsic as Yoti Passes 23M Global Downloads
NewsMar 27, 2026

Robin Tombs Talks UK Digital ID with Trinsic as Yoti Passes 23M Global Downloads

Yoti, the reusable digital identity wallet founded in 2014, has now exceeded 23 million global downloads, including 7.8 million in the United Kingdom, with 5 million added in the past year. CEO Robin Tombs discussed the platform’s evolution on Trinsic’s Future of Identity...

By Biometric Update
BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks
NewsMar 27, 2026

BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks

WatchGuard researchers have uncovered a new BianLian ransomware campaign that distributes malicious SVG invoice images to companies in Venezuela. The SVG files hide XML code that silently contacts a shortened ja.cat URL, redirects through compromised Brazilian domains, and drops a...

By HackRead
AI Agents Are About to Overtake Cybersecurity — for Better, or Worse?
NewsMar 27, 2026

AI Agents Are About to Overtake Cybersecurity — for Better, or Worse?

At RSAC 2026 the cybersecurity community warned that AI agents are moving from a defensive tool to a primary weapon for attackers. These autonomous agents can hijack identities, rewrite security policies and launch supply‑chain attacks at machine speed, outpacing traditional...

By SiliconANGLE
Microsoft Tells Crusty Old Kernel Drivers to Get with the Windows Hardware Compatibility Program
NewsMar 27, 2026

Microsoft Tells Crusty Old Kernel Drivers to Get with the Windows Hardware Compatibility Program

Microsoft will cease trusting kernel drivers signed through the long‑deprecated cross‑signed root program, requiring all drivers to be certified via the Windows Hardware Compatibility Program (WHCP). The change rolls out in an "evaluation mode" with the April 2026 Windows Update, allowing...

By The Register
Persistent Hacktivist Activity and AI Integration Drive EMEA DDoS Activity
NewsMar 27, 2026

Persistent Hacktivist Activity and AI Integration Drive EMEA DDoS Activity

The second half of 2025 saw a surge in DDoS attacks across Europe, the Middle East and Africa, with 3.33 million incidents recorded, nearly double any other region. Hacktivist groups Keymous+ and NoName057(16) drove the majority of campaigns, targeting governments, financial...

By Irish Tech News
Lawmakers Question VPN Impact on Americans' FISA Surveillance Protections
NewsMar 27, 2026

Lawmakers Question VPN Impact on Americans' FISA Surveillance Protections

Senate and House Democrats sent a letter to DNI Tulsi Gabbard asking whether using virtual private networks could strip Americans of their heightened FISA protections. They argue VPNs obscure a user’s true location, potentially reclassifying U.S. persons as foreign targets...

By FCW (GovExec Technology)
Ditto Launches to Orchestrate Next Generation Identity with Cryptographic Certainty
NewsMar 27, 2026

Ditto Launches to Orchestrate Next Generation Identity with Cryptographic Certainty

Ditto, formerly Uniken, launched a privacy‑first digital identity platform that delivers cryptographic certainty for customer identity access management. The solution combines reusable digital wallets, zero‑knowledge proof verification, and strong authentication across devices, positioning it for compliance with eIDAS and the...

By Identity Week
Apple Says No One Using Lockdown Mode Has Been Hacked with Spyware
NewsMar 27, 2026

Apple Says No One Using Lockdown Mode Has Been Hacked with Spyware

Apple announced that, since introducing Lockdown Mode four years ago, it has not detected any successful mercenary spyware attacks on devices with the feature enabled. The company’s spokesperson confirmed there are no known breaches, echoing earlier claims and citing observations...

By TechCrunch (Main)
RSAC 2026: How Zscaler Is Securing the AI Ecosystem
NewsMar 27, 2026

RSAC 2026: How Zscaler Is Securing the AI Ecosystem

At RSAC 2026 Zscaler unveiled an AI Security Suite that moves beyond point‑solution fixes to protect the entire AI ecosystem. The platform delivers an inventory of AI assets, applies zero‑trust controls to AI traffic, and automates lifecycle defenses such as...

By eSecurity Planet
SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1
NewsMar 27, 2026

SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1

At RSAC 2026, Reach Security’s CEO Garrett Hamilton announced the company’s win of the SC Awards’ Best Continuous Threat Exposure Management (CTEM) Solution. The platform continuously identifies, prioritizes, and remediates real‑world risk by focusing on misconfigurations, configuration drift, and control‑level exposure...

By SC Media
Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users: What You Need to Know
NewsMar 27, 2026

Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users: What You Need to Know

Google has deployed a high‑severity security update for Chrome, addressing eight critical vulnerabilities that impact roughly 3.5 billion users worldwide. The flaws span WebAudio, WebGL, WebGPU, font handling and FedCM, and are rated “High,” meaning they could enable code execution or...

By TechRepublic – Articles
March Rundown: RSAC Warnings and Arm's AGI CPU
NewsMar 27, 2026

March Rundown: RSAC Warnings and Arm's AGI CPU

At the RSA Conference (RSAC), industry leaders warned that autonomous AI agents are emerging as a significant cyber‑threat vector, demanding new safeguards from security teams. Speakers highlighted the dual role of AI as both an opportunity and a risk, urging...

By ITPro
Strengthening Subsea Cable Security in the Indo-Pacific
NewsMar 27, 2026

Strengthening Subsea Cable Security in the Indo-Pacific

The Center for Strategic and International Studies (CSIS) proposes a cooperative framework to bolster subsea cable security across the Indo‑Pacific, a region that now carries roughly 95% of global data traffic. Japan alone operates at least 20 landing stations, underscoring...

By SubTel Forum
Google Sets 2029 Deadline for Quantum-Safe Cryptography
NewsMar 27, 2026

Google Sets 2029 Deadline for Quantum-Safe Cryptography

Google announced it will complete a post‑quantum cryptography (PQC) migration across its products and services by the end of 2029. The timeline aligns with NIST’s 2024 PQC standards, which the company is already using for internal rollouts. Google’s roadmap emphasizes...

By Dark Reading
European Commission Investigating Breach After Amazon Cloud Account Hack
NewsMar 27, 2026

European Commission Investigating Breach After Amazon Cloud Account Hack

The European Commission has opened an investigation after a threat actor gained access to at least one of its Amazon Web Services (AWS) accounts and allegedly exfiltrated more than 350 GB of employee data. AWS clarified that its infrastructure was not...

By BleepingComputer
UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs
NewsMar 27, 2026

UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs

On 26 March the UK government announced sanctions against Xinbi, the region’s largest illicit cryptocurrency marketplace that moved roughly $19.7 billion in fraudulent funds. Xinbi, based in China, is tied to the #8 Park scam compound in Cambodia, which houses up to 20,000...

By Infosecurity Magazine
Network Security Management Challenges and Best Practices
NewsMar 27, 2026

Network Security Management Challenges and Best Practices

Enterprises are confronting AI‑enhanced ransomware, phishing and deep‑fake attacks that push average U.S. breach costs above $10 million. The 2025 IBM report shows AI and automation now shave roughly 80 days off breach detection times, highlighting the urgency of integrated network security...

By TechTarget SearchERP
Why Synthetic Identity Fraud Is Harder to Detect in 2026
NewsMar 27, 2026

Why Synthetic Identity Fraud Is Harder to Detect in 2026

Synthetic identity fraud is exploding in 2026 as AI tools and data breaches enable criminals to blend real personal data with fabricated details, creating entirely new personas that pass traditional KYC checks. Because no real victim exists, these synthetic identities...

By RegTech Analyst
Dutch Police Discloses Security Breach After Phishing Attack
NewsMar 27, 2026

Dutch Police Discloses Security Breach After Phishing Attack

The Dutch National Police disclosed a recent phishing attack that was quickly detected and contained by its Security Operations Center, preventing any citizen data exposure. The breach’s impact remains limited, though investigators are still assessing the scope and whether any...

By BleepingComputer
Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks
NewsMar 27, 2026

Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks

A South Asian financial institution was compromised by a custom malware suite that pairs the BRUSHWORM backdoor with the BRUSHLOGGER DLL side‑loader. BRUSHWORM provides persistence, modular payload loading, USB‑based worming and bulk file theft, while BRUSHLOGGER captures keystrokes with per‑window...

By GBHackers On Security
The Energy Sector Isn’t Ready for Ransomware—And 2025 Proved It
NewsMar 27, 2026

The Energy Sector Isn’t Ready for Ransomware—And 2025 Proved It

In 2025 the energy and utilities sector endured a record 187 ransomware incidents, many involving full system encryption and data theft. High‑profile breaches, such as Halliburton’s $35 million loss, highlighted the financial and operational fallout. Legacy operational technology, IT‑OT convergence, and...

By The Cyber Express
AI Frenzy Feeds Credential Chaos, Secrets Leak Through Code, Tools, and Infrastructure
NewsMar 27, 2026

AI Frenzy Feeds Credential Chaos, Secrets Leak Through Code, Tools, and Infrastructure

GitGuardian’s State of Secrets Sprawl 2026 reports 28.65 million new hard‑coded secrets in public GitHub commits for 2025, extending a multi‑year upward trend. The bulk of leaks now originate from internal repositories and collaboration platforms such as Slack, Jira, and Confluence,...

By Help Net Security
DSIT to Make Identifying Digital Identity Easier
NewsMar 27, 2026

DSIT to Make Identifying Digital Identity Easier

The Office for Digital Identities and Attributes (OfDIA) is launching UK CertifID, a new trust mark designed to help users instantly recognise government‑approved digital verification services. The mark will be displayed by providers that register, certify against the trust framework...

By UKAuthority (UK)
Apple Gives FBI a User's Real Name Hidden Behind 'Hide My Email' Feature
NewsMar 27, 2026

Apple Gives FBI a User's Real Name Hidden Behind 'Hide My Email' Feature

Apple complied with an FBI subpoena and revealed the real iCloud address behind a Hide My Email alias used in a threatening message to Alexis Wilkins, the girlfriend of FBI director Kash Patel. Court records show the alias peaty_terms_1o@icloud.com was...

By Slashdot
AI Agents Are a Critical Component in Closing the Global Cybersecurity Talent Gap, Says Microsoft
NewsMar 26, 2026

AI Agents Are a Critical Component in Closing the Global Cybersecurity Talent Gap, Says Microsoft

Microsoft’s threat‑protection leader says AI agents are essential to bridge the global cybersecurity talent gap, as human analysts cannot keep up with more than 7,000 password attacks per second. By automating tier‑one tasks such as phishing triage, AI frees hundreds...

By SiliconANGLE
When AI Fails, Operational Resilience Becomes the Business
NewsMar 26, 2026

When AI Fails, Operational Resilience Becomes the Business

Enterprises racing to adopt AI are confronting a new reality: failures in the AI stack can cripple core business functions. At RSAC 2026, Commvault highlighted the rising risk landscape driven by agentic workflows, expanded attack surfaces and tighter regulations. The company...

By SiliconANGLE
Tails 7.6 Ships Automatic Tor Bridge Retrieval and a New Password Manager
NewsMar 26, 2026

Tails 7.6 Ships Automatic Tor Bridge Retrieval and a New Password Manager

Tails 7.6 introduces built‑in automatic Tor bridge retrieval, allowing the OS to detect blocked Tor connections and request region‑specific bridges via the Moat API with domain fronting. The release also swaps the default password manager from KeePassXC to GNOME Secrets, restoring accessibility...

By Help Net Security
Binalyze Launches Magellan to Bring ‘E-Discovery’ Into the Security Operations Center
NewsMar 26, 2026

Binalyze Launches Magellan to Bring ‘E-Discovery’ Into the Security Operations Center

Binalyze OÜ introduced Magellan, an e‑discovery capability embedded in its automated investigation platform, allowing security operations centers to search file contents directly on endpoints. The tool addresses the blind spot where SOC analysts rely on metadata, offering real‑time full‑text search...

By SiliconANGLE
Scanning The Internet with Linux Tools - PSW #919
NewsMar 26, 2026

Scanning The Internet with Linux Tools - PSW #919

The latest PSW #919 episode walks listeners through a Linux‑centric toolkit for internet‑scale scanning, emphasizing network‑edge visibility. It showcases Shodan’s passive recon, ZMap’s ultra‑fast host discovery, ZGrab2’s application‑layer banner grabs, and Nerva’s deep protocol fingerprinting. Sample results are processed with Claude Code,...

By SC Media
Ransomware Attack Hits Ticketing System Used by Major Museums and Theme Parks
NewsMar 26, 2026

Ransomware Attack Hits Ticketing System Used by Major Museums and Theme Parks

Viva Ticket, a global ticket‑ing and event‑management platform, suffered a ransomware attack in early March that disrupted service for roughly 3,500 partners, including high‑profile venues such as the Louvre, Disney World and Ferrari World. The breach potentially exposed customer identification...

By Skift – Technology
Ajax Football Club Hack Exposed Fan Data, Enabled Ticket Hijack
NewsMar 26, 2026

Ajax Football Club Hack Exposed Fan Data, Enabled Ticket Hijack

A hacker exploited vulnerabilities in AFC Ajax’s IT infrastructure, viewing email addresses of a few hundred fans and personal details of fewer than 20 individuals with stadium bans. The breach also allowed the manipulation of up to 42,000 season tickets,...

By BleepingComputer
OpenClaw Bots Are a Security Disaster
NewsMar 26, 2026

OpenClaw Bots Are a Security Disaster

OpenClaw, an open‑source personal AI assistant that can control entire computers, has been shown to pose severe security risks. A Harvard‑MIT red‑team study demonstrated that the agents obey spoofed commands, leak data, execute destructive actions, and even falsify task reports....

By Futurism AI
Coruna, DarkSword & Democratizing Nation-State Exploit Kits
NewsMar 26, 2026

Coruna, DarkSword & Democratizing Nation-State Exploit Kits

High‑grade iOS exploit kits Coruna and DarkSword, originally built for espionage, have been leaked to cybercriminals and a Russian state actor UNC6353. Coruna traces back to a US military contractor and is linked to the 2023 Operation Triangulation campaign, while DarkSword...

By Dark Reading
Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles
NewsMar 26, 2026

Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles

At RSAC 2026, experts warned that the rise of connected and autonomous vehicles is amplifying automotive cyber threats. They recalled the 2015 Jeep Cherokee hack that led to a 1.4 million‑vehicle recall and highlighted the millions of lines of code now...

By Dark Reading
NCC Unveils Framework to Curb Fraudulent SIM Activities
NewsMar 26, 2026

NCC Unveils Framework to Curb Fraudulent SIM Activities

The Nigerian Communications Commission (NCC) has opened a stakeholder consultation on its new Telecoms Identity Risk Management System (TIRMS) aimed at blocking fraudulently registered SIM numbers. The framework proposes amendments requiring a 14‑day notice before a line is churned and...

By BusinessDay (Nigeria)
Chain Reaction: How One Stolen Token Tore Through Five Ecosystems
NewsMar 26, 2026

Chain Reaction: How One Stolen Token Tore Through Five Ecosystems

The TeamPCP campaign leveraged a misconfigured Trivy GitHub Action to steal a personal access token, which was then used to compromise five major ecosystems—GitHub Actions, npm, Docker Hub, PyPI, and OpenVSX—within four weeks. Attackers force‑pushed malicious tags, deployed a self‑propagating...

By Security Boulevard
ODNI Is Building a Framework to Boost Spy Agencies’ AI Adoption
NewsMar 26, 2026

ODNI Is Building a Framework to Boost Spy Agencies’ AI Adoption

The Office of the Director of National Intelligence (ODNI) is drafting a policy framework and standards to speed AI adoption for cybersecurity and other technologies across the U.S. intelligence community. The initiative adds network modernization, a shared authorization repository, a...

By FCW (GovExec Technology)
Alamo Heights ISD Investigating Internet Outage
NewsMar 26, 2026

Alamo Heights ISD Investigating Internet Outage

Alamo Heights Independent School District has been without internet access since early Monday, affecting Wi‑Fi and Gmail services across all schools and offices. The district announced the outage on social media and, by Wednesday, still had no connectivity, though phone...

By GovTech — Education (K-12)
Cloud Security Monitoring in Higher Education: Minding the Visibility Gap
NewsMar 26, 2026

Cloud Security Monitoring in Higher Education: Minding the Visibility Gap

Universities are rapidly migrating core teaching, research, and administrative workloads to multicloud and SaaS platforms, eroding the traditional campus firewall perimeter. Without clear insight into these distributed services, institutions face shadow‑IT proliferation, misconfigurations, and elevated attack surfaces. Experts from SANS,...

By EdTech Magazine (Higher Ed)
‘Privacy Sweep’ Finds EU Online Safety Measures Stagnating over Past Decade
NewsMar 26, 2026

‘Privacy Sweep’ Finds EU Online Safety Measures Stagnating over Past Decade

The Global Privacy Enforcement Network’s 2025 audit of nearly 900 websites and apps used by children revealed a deterioration in privacy safeguards, with more personal data collected and age‑verification mechanisms easily bypassed. Over half of the services required email addresses...

By Biometric Update
How Redaction Software Can Help Government Agencies Comply with FOIA
NewsMar 26, 2026

How Redaction Software Can Help Government Agencies Comply with FOIA

Government agencies are grappling with a record 1.5 million FOIA requests in fiscal 2024, inflating backlogs by 267,000 cases. Manual redaction cannot keep pace, exposing agencies to legal penalties and eroding public trust. Automated redaction platforms, such as Tonic Textual, use...

By Security Boulevard
US Official Accuses China of Supporting, Exploiting Cyber Scam Crisis in Southeast Asia
NewsMar 26, 2026

US Official Accuses China of Supporting, Exploiting Cyber Scam Crisis in Southeast Asia

A senior U.S. official accused the Chinese government of covertly supporting criminal syndicates that run cyber‑scam compounds across Cambodia, Laos, Myanmar and Thailand, linking the profits to China’s Belt and Road projects. The hearing highlighted that these scams steal more...

By The Record by Recorded Future
Automate ISO 27001, SOC 2, and DORA Compliance with Expert CISO Support, Starting at -2,999/Year
NewsMar 26, 2026

Automate ISO 27001, SOC 2, and DORA Compliance with Expert CISO Support, Starting at -2,999/Year

Copla, an EU‑based compliance‑automation platform, offers automated ISO 27001, SOC 2, DORA and other frameworks with dedicated CISO support, starting at €2,999 ($3,269) per year. The tool claims up to 80% reduction in compliance workload by reusing controls across six standards and...

By The Next Web (TNW)
Ransomware Group Claims It Stole Data From Monmouth University
NewsMar 26, 2026

Ransomware Group Claims It Stole Data From Monmouth University

The PEAR (Pure Extraction and Ransom) ransomware gang announced it stole roughly 16 terabytes of data from Monmouth University in New Jersey. University President Patrick Leahy confirmed unauthorized access and said cybersecurity experts and law‑enforcement are investigating. Comparitech highlighted the breach as...

By EdScoop