Cybersecurity News and Headlines

Why Revenue Cycle Teams Must Prepare for Extended Downtime in the Age of Cyber Threats
NewsMar 25, 2026

Why Revenue Cycle Teams Must Prepare for Extended Downtime in the Age of Cyber Threats

Healthcare providers face escalating ransomware and cloud‑outage threats that can instantly cripple revenue cycle operations, halting claim submissions and cash flow. Recent incidents, such as the Change Healthcare clearinghouse outage and a regional system’s backup encryption, exposed critical blind spots...

By HFMA – Healthcare Financial Management Association
In-Sensor Cryptography Links Physical Process to Digital Identity
NewsMar 25, 2026

In-Sensor Cryptography Links Physical Process to Digital Identity

Researchers unveiled a monolithic in‑sensor cryptographic system that hashes and digitally signs data at the moment of capture, linking each measurement to an immutable digital identity. The prototype, built on 180 nm CMOS, demonstrated real‑time signing of cardiac cell voltage recordings...

By Bioengineer.org
Bubble AI App Builder Abused to Steal Microsoft Account Credentials
NewsMar 25, 2026

Bubble AI App Builder Abused to Steal Microsoft Account Credentials

Threat actors are exploiting Bubble, an AI‑powered no‑code app builder, to host malicious web apps that impersonate Microsoft login pages. By serving phishing pages from the trusted *.bubble.io domain, email security solutions fail to flag the links, allowing credentials to...

By BleepingComputer
TeamPCP Supply Chain Attack Hits LiteLLM PyPI Package
NewsMar 25, 2026

TeamPCP Supply Chain Attack Hits LiteLLM PyPI Package

Open‑source Python library LiteLLM was compromised by the TeamPCP threat group, which uploaded malicious versions to PyPI that have since been removed. The packages deployed a three‑stage intrusion: credential harvesting, a Kubernetes lateral‑movement toolkit, and a persistent systemd backdoor. Endor...

By SC Media
Trojanized ConnectWise ScreenConnect Installers Deployed in Tax-Themed Malvertising Campaign
NewsMar 25, 2026

Trojanized ConnectWise ScreenConnect Installers Deployed in Tax-Themed Malvertising Campaign

Cybercriminals have been running a tax‑season malvertising campaign since January 2026, hijacking Google Ads to serve fake W‑2 and W‑9 download pages that redirect to malicious ConnectWise ScreenConnect installers. The trojanized installers launch a trial instance, inject a multi‑stage crypter...

By SC Media
Updates to GitHub Copilot Interaction Data Usage Policy
NewsMar 25, 2026

Updates to GitHub Copilot Interaction Data Usage Policy

GitHub announced that, starting April 24, interaction data from Copilot Free, Pro, and Pro+ users will be used to train its AI models unless users opt out. The policy excludes Copilot Business and Enterprise customers, whose data remains untouched. Users can...

By Hacker News
BSidesSLC 2025 – LLM-Powered Network Intrusion Detection
NewsMar 25, 2026

BSidesSLC 2025 – LLM-Powered Network Intrusion Detection

At BSidesSLC 2025, Pattern Inc. Machine Learning Engineer Taeyang Kim unveiled an LLM‑powered network intrusion detection system (NIDS). The solution leverages large language models to parse raw packet data and identify malicious patterns in real time. Kim demonstrated a prototype...

By Security Boulevard
Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report - Aamir Lakhani - RSAC26 #3
NewsMar 25, 2026

Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report - Aamir Lakhani - RSAC26 #3

Fortinet’s FortiGuard Labs released its 2026 Global Threat Landscape Report, highlighting a sharp rise in AI‑enabled cybercrime. The report shows AI is accelerating attack techniques, from automated ransomware encryption to AI‑driven supply‑chain exploits. Aamir Lakhani, Fortinet’s Global Director of Threat Intelligence...

By SC Media
New Torg Grabber Infostealer Malware Targets 728 Crypto Wallets
NewsMar 25, 2026

New Torg Grabber Infostealer Malware Targets 728 Crypto Wallets

Researchers at Gen Digital have uncovered Torg Grabber, a rapidly evolving infostealer that has harvested data from 850 browser extensions, including 728 cryptocurrency wallets, between December 2025 and February 2026. The malware gains initial access via the ClickFix clipboard‑hijacking technique, then executes...

By BleepingComputer
Gov Proposes Disclosure Delay for Most Serious Cyberattacks
NewsMar 25, 2026

Gov Proposes Disclosure Delay for Most Serious Cyberattacks

Australia is consulting on new rules that would allow a temporary, roughly 30‑day delay in publicly disclosing serious cyber‑attacks on critical‑infrastructure operators, including ASX‑listed firms. The proposal aims to give entities time to mitigate threats without compromising national security or...

By iTnews (Australia) – Government
Chained Vulnerabilities in Cisco Catalyst Switches Could Induce Denial-of-Service
NewsMar 25, 2026

Chained Vulnerabilities in Cisco Catalyst Switches Could Induce Denial-of-Service

Cisco disclosed four vulnerabilities in its widely deployed Catalyst 9300 series switches, two of which (CVE‑2026‑20114 and CVE‑2026‑20110) can be chained to elevate a low‑privilege Lobby Ambassador account into maintenance mode, effectively causing a denial‑of‑service outage. The chain requires only...

By CSO Online
$300 AI Tool Kits Let Criminals Bypass Bank Security
NewsMar 25, 2026

$300 AI Tool Kits Let Criminals Bypass Bank Security

Criminals can now purchase AI‑enabled identity‑fraud kits for under $300, combining stolen personal data, synthetic‑material printers and deep‑fake software to bypass bank KYC checks in minutes. Demonstrations at the 2026 RSAC conference showed tools like ProKYC feeding fabricated videos into...

By American Banker
The United States Router Ban, Explained
NewsMar 25, 2026

The United States Router Ban, Explained

The FCC announced a ban on future consumer Wi‑Fi routers that are manufactured abroad, citing national‑security concerns. Existing routers can remain in use and receive firmware updates through March 1 2027, but no new foreign‑made devices will receive FCC authorization. The rule...

By The Verge – Policy
AI Social Media Scams Are Coming for Your Accounting Firm: Why DNS Filtering Belongs in Your Security Stack
NewsMar 25, 2026

AI Social Media Scams Are Coming for Your Accounting Firm: Why DNS Filtering Belongs in Your Security Stack

Artificial intelligence is enabling highly personalized social‑media phishing campaigns that target accountants with fake client messages, ads and login pages. These AI‑driven scams increase the risk of wire fraud, data theft and ransomware for firms handling sensitive financial information. DNS...

By CPA Practice Advisor
What Is Antivirus Software and Do You Still Need It in 2026?
NewsMar 25, 2026

What Is Antivirus Software and Do You Still Need It in 2026?

Antivirus software remains relevant in 2026 as cyber threats grow more sophisticated, with AI‑driven phishing, malicious app bundles, and polymorphic malware outpacing built‑in defenses. While Microsoft Defender and macOS XProtect provide a solid baseline, they often miss newer variants and...

By ZDNet Robotics
The Dark Side of DDoS: Why DDoS Downtime Is Harder to Prevent
NewsMar 25, 2026

The Dark Side of DDoS: Why DDoS Downtime Is Harder to Prevent

Cloudflare’s 2026 report reveals DDoS attacks are growing larger, more frequent, and increasingly AI‑driven, shifting from blunt traffic floods to precise, low‑volume Layer 7 assaults timed around high‑impact events. Traditional point‑in‑time testing can’t keep pace with rapid network changes, leading to...

By Security Boulevard
StarTech.com Is Raising the Bar for Classified Workstations
NewsMar 25, 2026

StarTech.com Is Raising the Bar for Classified Workstations

StarTech.com has introduced a new line of secure KVM switches designed for classified workstations, achieving National Information Assurance Partnership (NIAP) compliance and supporting zero‑trust architectures. The devices provide hardware‑based isolation that physically separates classified and unclassified systems while allowing a...

By FedTech Magazine
Seceon Wins Four Global InfoSec Awards at RSA 2026 and Launches ADMP and SeraAI 2.0 Autonomous SOC
NewsMar 25, 2026

Seceon Wins Four Global InfoSec Awards at RSA 2026 and Launches ADMP and SeraAI 2.0 Autonomous SOC

Seceon Inc. swept four Global InfoSec Awards at RSA 2026, confirming its Open Threat Management platform as the most recognized unified XDR solution. At the same event the company launched ADMP, a module that discovers and protects shadow AI agents, LLM...

By Security Boulevard
Helping MSPs Take Control of Certificate Management: Introducing Sectigo Partner Platform
NewsMar 25, 2026

Helping MSPs Take Control of Certificate Management: Introducing Sectigo Partner Platform

Only 13% of organizations feel confident tracking every digital certificate, creating a sizable visibility gap. Managed service providers (MSPs) see this as a high‑margin opportunity to offer Certificate Lifecycle Management (CLM) services. Sectigo launched the Partner Platform, the first true...

By Security Boulevard
Russia Arrests Alleged Owner of Cybercrime Forum LeakBase, Report Says
NewsMar 25, 2026

Russia Arrests Alleged Owner of Cybercrime Forum LeakBase, Report Says

Russian police detained the alleged administrator of LeakBase, a cybercrime forum once described by the U.S. Department of Justice as one of the world’s largest platforms for sharing hacking tools and stolen credentials. The site, which was shut down earlier...

By TechCrunch (Main)
Hightower Faces Class Action Suit Over Data Breach
NewsMar 25, 2026

Hightower Faces Class Action Suit Over Data Breach

Hightower, a wealth‑management firm, is facing a class‑action lawsuit after a cyber‑criminal breach exposed the personal data of roughly 131,483 clients, including Social Security and driver’s license numbers. The suit, filed by former employee Elliott Adams in Illinois federal court,...

By WealthManagement.com – ETFs
Vicarius Launches vIntelligence, a Second Flagship Product for Continuous Agentic Validation
NewsMar 25, 2026

Vicarius Launches vIntelligence, a Second Flagship Product for Continuous Agentic Validation

Vicarius unveiled vIntelligence, its second flagship product, adding continuous agentic validation to its security suite. The solution tackles the “assurance gap” by independently validating findings and re‑checking exposures as environments evolve. vIntelligence can operate alone or integrate with the existing...

By Security Boulevard
Entro Security Launches AGA to Govern AI Agents and Non-Human Identities Across the Enterprise
NewsMar 25, 2026

Entro Security Launches AGA to Govern AI Agents and Non-Human Identities Across the Enterprise

Entro Security unveiled Agentic Governance & Administration (AGA), a new platform pillar designed to govern AI agents and non‑human identities across enterprise systems. AGA tackles the shortcomings of traditional Identity Governance and Administration tools, which were built for people and...

By Security Boulevard
Ransomware Attack Disrupts Operation at Major Spanish Fishing Port
NewsMar 25, 2026

Ransomware Attack Disrupts Operation at Major Spanish Fishing Port

A ransomware attack on Spain’s Port of Vigo forced the isolation of critical cargo‑management servers, compelling the port to run operations manually. The breach was detected on Tuesday, and officials have refused to reconnect the systems until they can guarantee...

By The Record by Recorded Future
Cloud Phones Linked to Rising Financial Fraud Threat
NewsMar 25, 2026

Cloud Phones Linked to Rising Financial Fraud Threat

A Group‑IB report released on March 25 reveals that cloud phones—remote‑access Android devices hosted in data centres—are being weaponized for financial fraud. Because they replicate genuine smartphones, they bypass conventional device‑fingerprinting tools, allowing fraudsters to create and operate dropper accounts...

By Infosecurity Magazine
NetApp Seals Elastio and Commvault Deals for More Resilience and Less Ransomware
NewsMar 25, 2026

NetApp Seals Elastio and Commvault Deals for More Resilience and Less Ransomware

NetApp announced partnerships with Elastio and Commvault to bolster its Ransomware Resilience Service. Elastio’s agent‑less detection and Provable Recovery controls will be embedded in ONTAP snapshots to spot zero‑day ransomware and provide immutable recovery points. Together with Commvault, NetApp will...

By Blocks & Files
Why Strong Authentication Beyond the Browser Will Define the Future of Connected Devices
NewsMar 25, 2026

Why Strong Authentication Beyond the Browser Will Define the Future of Connected Devices

The rise of connected cars, smart homes, wearables and industrial IoT is stretching authentication beyond the traditional web browser. Regulators such as UNECE WP.29 and the U.S. IoT labeling program are imposing baseline security requirements for vehicle software and consumer...

By TechRadar Pro
Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne
NewsMar 25, 2026

Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne

SentinelOne’s 2026 Annual Threat Report warns that identity‑based attacks have escalated to an industrial scale, with threat actors exploiting legitimate enterprise credentials to bypass traditional defenses. Attackers are using social‑engineering, MFA‑bypass kits, and brute‑force tactics to hijack high‑privilege accounts, even...

By Infosecurity Magazine
Puerto Rico Government Agency Cancels Driver’s License Appointments After Cyberattack
NewsMar 25, 2026

Puerto Rico Government Agency Cancels Driver’s License Appointments After Cyberattack

Puerto Rico’s Department of Transportation halted all driver‑license and registration appointments after a cyberattack forced the agency to disconnect its networks on Monday. The Puerto Rico Innovation and Technology Service (PRITS) is working with the DOT to assess the breach,...

By The Record by Recorded Future
The Online Security Features You Need While Travelling or Working Abroad
NewsMar 25, 2026

The Online Security Features You Need While Travelling or Working Abroad

Surfshark One is an all‑in‑one cybersecurity suite designed for travelers and remote workers. It combines VPN, antivirus, price‑masking, and identity‑protection tools to secure connections on public Wi‑Fi, bypass regional blocks, and prevent price discrimination. The platform also offers breach alerts...

By The Independent – Travel
US Clouds Cast Long Shadow over EU Data Sovereignty, Says Osmium
NewsMar 25, 2026

US Clouds Cast Long Shadow over EU Data Sovereignty, Says Osmium

Osmium Data Group warns that using US‑owned cloud providers for backups undermines European data‑sovereignty, even when the physical datacenter sits in the EU. The firm evaluated four source‑and‑destination scenarios, ranking a Europe‑owned source and datacenter as highest compliance, while a...

By Blocks & Files
Deploy Best-Practice Security Policies Instantly with Transaction Security Policy Accelerator
NewsMar 25, 2026

Deploy Best-Practice Security Policies Instantly with Transaction Security Policy Accelerator

Salesforce Labs has launched the Transaction Security Policy Accelerator, a free AppExchange app that lets administrators install a library of pre‑configured, best‑practice Transaction Security Policies with a single click. The policies are aligned with Salesforce’s Essential Transaction Security documentation and...

By Salesforce Blog (Sales/CRM)
Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam
NewsMar 25, 2026

Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam

Unit 42 at Palo Alto Networks has uncovered a seven‑month phishing campaign in which attackers impersonated the company’s recruiters to target senior professionals. The scammers harvest LinkedIn data to craft highly personalized emails that claim a candidate’s résumé failed an...

By Dark Reading
Deepfakes Vulnerable to AI Fingerprint Hacks, Study Finds
NewsMar 25, 2026

Deepfakes Vulnerable to AI Fingerprint Hacks, Study Finds

Researchers at the University of Edinburgh demonstrated that AI fingerprints used to identify deepfake images can be easily removed or forged. Their evaluation of 12 generators and 14 fingerprinting methods showed removal success rates above 80% for attackers with full...

By TV Tech (TVTechnology)
Marlink Reports 50% Surge in GNSS Interference Impacting Global Shipping
NewsMar 25, 2026

Marlink Reports 50% Surge in GNSS Interference Impacting Global Shipping

Marlink’s March 25 technical bulletin reports a 50% jump in GNSS interference incidents across its maritime fleet, driven by jamming and spoofing in the Middle East and other high‑traffic corridors. The disruptions threaten vessel navigation, satellite antenna tracking, and broadband connectivity....

By SatNews
Why a 'Near Miss' Database Is Key to Improving Information Sharing
NewsMar 25, 2026

Why a 'Near Miss' Database Is Key to Improving Information Sharing

At RSAC 2026, security leaders Wendy Nather and Bob Lord urged the cybersecurity community to treat near‑miss incidents with the same transparency as full breaches. They defined a near miss as an event that almost succeeded, highlighting that many organizations lack...

By Dark Reading
Paid AI Accounts Are Now a Hot Underground Commodity
NewsMar 25, 2026

Paid AI Accounts Are Now a Hot Underground Commodity

Cybercriminals are building a thriving underground market for premium AI platform access, reselling accounts for tools like ChatGPT, Claude, and Microsoft Copilot. Flare’s analysis of fraud‑oriented forums shows recurring listings that bundle subscriptions, claim reduced restrictions, and target buyers seeking...

By BleepingComputer
BlueFinity Evoke Offers Enhanced Two-Factor Security
NewsMar 25, 2026

BlueFinity Evoke Offers Enhanced Two-Factor Security

BlueFinity has rolled out two‑factor authentication (2FA) as a standard feature in Release 3 of its Evoke low‑code platform. The update adds native Active Directory integration and OAuth‑compatible email handling for Exchange, Gmail and other services. Users can enable 2FA with...

By Database Trends & Applications (DBTA)
Cyera Closes Major Gaps in Securing Enterprise AI
NewsMar 25, 2026

Cyera Closes Major Gaps in Securing Enterprise AI

Cyera unveiled three new AI‑security tools—Browser Shield, Data Lineage, and the Cyera MCP platform—to plug critical gaps in enterprise AI adoption. Browser Shield monitors and blocks sensitive data at the prompt level for public AI models like ChatGPT, while Data...

By AI-TechPark
Endpoint Security USA Launches New Site, Expands Endpoint Protection Services
NewsMar 25, 2026

Endpoint Security USA Launches New Site, Expands Endpoint Protection Services

Endpoint Security USA, a managed security services provider, has unveiled a redesigned website that showcases its expanded portfolio of endpoint protection solutions. The platform highlights services such as endpoint detection and response, cloud and IoT endpoint security, 24/7 SOC monitoring,...

By AI-TechPark
Vorlon Adds Forensics and Response to Secure AI Agents
NewsMar 25, 2026

Vorlon Adds Forensics and Response to Secure AI Agents

Vorlon introduced two new products—the AI Agent Flight Recorder and the AI Agent Action Center—to give enterprises forensic visibility and coordinated response for AI‑driven workloads. A 2026 Vorlon survey found 99.4% of U.S. organizations suffered at least one SaaS or...

By Help Net Security
Platformisation or Platform Theatre? Navigating Cyber Consolidation
NewsMar 25, 2026

Platformisation or Platform Theatre? Navigating Cyber Consolidation

Enterprise security consolidation is accelerating, with a 2025 IBM‑Palo Alto report showing firms juggle an average of 83 tools from 29 vendors. While unified platforms promise streamlined operations, many deliver only superficial integration, creating a hidden single point of failure....

By ComputerWeekly
SentinelOne Expands Strategic Collaboration with Google Cloud to Deliver Autonomous, AI-Powered Security at Global Scale
NewsMar 25, 2026

SentinelOne Expands Strategic Collaboration with Google Cloud to Deliver Autonomous, AI-Powered Security at Global Scale

SentinelOne announced a multi‑year strategic collaboration with Google Cloud to fuse its AI‑native Singularity platform with Google’s global infrastructure and threat intelligence. The partnership expands SentinelOne’s autonomous EDR availability to three Google Cloud regions—North America, Frankfurt, and Saudi Arabia—addressing data‑sovereignty...

By AiThority » Sales Enablement
DigiCert Document Trust Manager Enhancements Improve Document Security and Compliance
NewsMar 25, 2026

DigiCert Document Trust Manager Enhancements Improve Document Security and Compliance

DigiCert has upgraded its Document Trust Manager to counter AI‑driven document fraud by centralising signing key management and workflow visibility. The enhancements add unified monitoring, a secure certificate repository with MFA, and pre‑integrated support for DocuSign, Adobe Sign and other...

By Help Net Security
NY Army Guard's  Cyber Protection Team 173 Fights Computer Battle During Kingston Armory Exercise
NewsMar 25, 2026

NY Army Guard's Cyber Protection Team 173 Fights Computer Battle During Kingston Armory Exercise

From February 23‑26, 2026, the New York Army National Guard’s Cyber Protection Team 173 conducted a four‑day simulated ransomware attack against an electrical utility at the Kingston Armory, using the U.S. Cyber Command’s Persistent Cyber Training Environment. Thirty‑four soldiers, many...

By U.S. Army – News
Drata Unveils Agentic AI to Transform Enterprise Trust Workflows
NewsMar 25, 2026

Drata Unveils Agentic AI to Transform Enterprise Trust Workflows

Drata announced a suite of agentic AI tools—including Agentic TPRM Assessment, Agentic Questionnaire Response (beta), and AI Trust Center Setup—to automate third‑party risk reviews, security questionnaire handling, and trust‑center creation. The new capabilities promise to cut manual effort, accelerate procurement...

By AI-TechPark
Solink Upgrades VerifEye Platform to Streamline Global Security Operations Centers
NewsMar 25, 2026

Solink Upgrades VerifEye Platform to Streamline Global Security Operations Centers

Solink Corp. announced a major upgrade to its VerifEye platform, adding vision‑language AI to cut alert fatigue and speed incident response. The new system filters false positives, prioritizes genuine threats, and can shrink response times to as little as three...

By SiliconANGLE
Gemini Picks up Criminal Activity Buried in Dark Web Noise
NewsMar 25, 2026

Gemini Picks up Criminal Activity Buried in Dark Web Noise

Google has launched a dark‑web intelligence feature within Google Threat Intelligence, powered by its Gemini AI model. The service scans millions of dark‑web events daily and automatically builds a profile of an organization’s operations, adjusting as business parameters change. By...

By Help Net Security
How to Detect and Remove Malware From an iPhone
NewsMar 25, 2026

How to Detect and Remove Malware From an iPhone

iPhones, despite strong security, can still be compromised by malware, phishing, and other mobile threats. The article outlines six warning signs such as unfamiliar apps, excessive data usage, and battery drain, and provides a step‑by‑step removal process that includes checking...

By TechTarget SearchERP