
Readying Industrial Connectivity for Cybersecurity Requirements
Cyber attacks on industrial operations have highlighted the lag in OT cybersecurity compared with IT. The EU Cyber Resilience Act (CRA), effective from December 2024, forces manufacturers to report vulnerabilities and obtain CE marking for new digital products by December 2027. Standards such as IEC 62443 and collaborative groups like the Industrial Security Harmonization Group (ISHG) are positioned to translate CRA’s outcome‑based mandates into concrete, interoperable practices. FieldComm Group is steering these efforts, offering tools and frameworks to help suppliers achieve CRA compliance.

Why Revenue Cycle Teams Must Prepare for Extended Downtime in the Age of Cyber Threats
Healthcare providers face escalating ransomware and cloud‑outage threats that can instantly cripple revenue cycle operations, halting claim submissions and cash flow. Recent incidents, such as the Change Healthcare clearinghouse outage and a regional system’s backup encryption, exposed critical blind spots...
In-Sensor Cryptography Links Physical Process to Digital Identity
Researchers unveiled a monolithic in‑sensor cryptographic system that hashes and digitally signs data at the moment of capture, linking each measurement to an immutable digital identity. The prototype, built on 180 nm CMOS, demonstrated real‑time signing of cardiac cell voltage recordings...

Bubble AI App Builder Abused to Steal Microsoft Account Credentials
Threat actors are exploiting Bubble, an AI‑powered no‑code app builder, to host malicious web apps that impersonate Microsoft login pages. By serving phishing pages from the trusted *.bubble.io domain, email security solutions fail to flag the links, allowing credentials to...

TeamPCP Supply Chain Attack Hits LiteLLM PyPI Package
Open‑source Python library LiteLLM was compromised by the TeamPCP threat group, which uploaded malicious versions to PyPI that have since been removed. The packages deployed a three‑stage intrusion: credential harvesting, a Kubernetes lateral‑movement toolkit, and a persistent systemd backdoor. Endor...

Trojanized ConnectWise ScreenConnect Installers Deployed in Tax-Themed Malvertising Campaign
Cybercriminals have been running a tax‑season malvertising campaign since January 2026, hijacking Google Ads to serve fake W‑2 and W‑9 download pages that redirect to malicious ConnectWise ScreenConnect installers. The trojanized installers launch a trial instance, inject a multi‑stage crypter...
Updates to GitHub Copilot Interaction Data Usage Policy
GitHub announced that, starting April 24, interaction data from Copilot Free, Pro, and Pro+ users will be used to train its AI models unless users opt out. The policy excludes Copilot Business and Enterprise customers, whose data remains untouched. Users can...
BSidesSLC 2025 – LLM-Powered Network Intrusion Detection
At BSidesSLC 2025, Pattern Inc. Machine Learning Engineer Taeyang Kim unveiled an LLM‑powered network intrusion detection system (NIDS). The solution leverages large language models to parse raw packet data and identify malicious patterns in real time. Kim demonstrated a prototype...

Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report - Aamir Lakhani - RSAC26 #3
Fortinet’s FortiGuard Labs released its 2026 Global Threat Landscape Report, highlighting a sharp rise in AI‑enabled cybercrime. The report shows AI is accelerating attack techniques, from automated ransomware encryption to AI‑driven supply‑chain exploits. Aamir Lakhani, Fortinet’s Global Director of Threat Intelligence...

New Torg Grabber Infostealer Malware Targets 728 Crypto Wallets
Researchers at Gen Digital have uncovered Torg Grabber, a rapidly evolving infostealer that has harvested data from 850 browser extensions, including 728 cryptocurrency wallets, between December 2025 and February 2026. The malware gains initial access via the ClickFix clipboard‑hijacking technique, then executes...

Gov Proposes Disclosure Delay for Most Serious Cyberattacks
Australia is consulting on new rules that would allow a temporary, roughly 30‑day delay in publicly disclosing serious cyber‑attacks on critical‑infrastructure operators, including ASX‑listed firms. The proposal aims to give entities time to mitigate threats without compromising national security or...
Chained Vulnerabilities in Cisco Catalyst Switches Could Induce Denial-of-Service
Cisco disclosed four vulnerabilities in its widely deployed Catalyst 9300 series switches, two of which (CVE‑2026‑20114 and CVE‑2026‑20110) can be chained to elevate a low‑privilege Lobby Ambassador account into maintenance mode, effectively causing a denial‑of‑service outage. The chain requires only...
$300 AI Tool Kits Let Criminals Bypass Bank Security
Criminals can now purchase AI‑enabled identity‑fraud kits for under $300, combining stolen personal data, synthetic‑material printers and deep‑fake software to bypass bank KYC checks in minutes. Demonstrations at the 2026 RSAC conference showed tools like ProKYC feeding fabricated videos into...

The United States Router Ban, Explained
The FCC announced a ban on future consumer Wi‑Fi routers that are manufactured abroad, citing national‑security concerns. Existing routers can remain in use and receive firmware updates through March 1 2027, but no new foreign‑made devices will receive FCC authorization. The rule...

AI Social Media Scams Are Coming for Your Accounting Firm: Why DNS Filtering Belongs in Your Security Stack
Artificial intelligence is enabling highly personalized social‑media phishing campaigns that target accountants with fake client messages, ads and login pages. These AI‑driven scams increase the risk of wire fraud, data theft and ransomware for firms handling sensitive financial information. DNS...
What Is Antivirus Software and Do You Still Need It in 2026?
Antivirus software remains relevant in 2026 as cyber threats grow more sophisticated, with AI‑driven phishing, malicious app bundles, and polymorphic malware outpacing built‑in defenses. While Microsoft Defender and macOS XProtect provide a solid baseline, they often miss newer variants and...

The Dark Side of DDoS: Why DDoS Downtime Is Harder to Prevent
Cloudflare’s 2026 report reveals DDoS attacks are growing larger, more frequent, and increasingly AI‑driven, shifting from blunt traffic floods to precise, low‑volume Layer 7 assaults timed around high‑impact events. Traditional point‑in‑time testing can’t keep pace with rapid network changes, leading to...

StarTech.com Is Raising the Bar for Classified Workstations
StarTech.com has introduced a new line of secure KVM switches designed for classified workstations, achieving National Information Assurance Partnership (NIAP) compliance and supporting zero‑trust architectures. The devices provide hardware‑based isolation that physically separates classified and unclassified systems while allowing a...

Seceon Wins Four Global InfoSec Awards at RSA 2026 and Launches ADMP and SeraAI 2.0 Autonomous SOC
Seceon Inc. swept four Global InfoSec Awards at RSA 2026, confirming its Open Threat Management platform as the most recognized unified XDR solution. At the same event the company launched ADMP, a module that discovers and protects shadow AI agents, LLM...

Helping MSPs Take Control of Certificate Management: Introducing Sectigo Partner Platform
Only 13% of organizations feel confident tracking every digital certificate, creating a sizable visibility gap. Managed service providers (MSPs) see this as a high‑margin opportunity to offer Certificate Lifecycle Management (CLM) services. Sectigo launched the Partner Platform, the first true...

Russia Arrests Alleged Owner of Cybercrime Forum LeakBase, Report Says
Russian police detained the alleged administrator of LeakBase, a cybercrime forum once described by the U.S. Department of Justice as one of the world’s largest platforms for sharing hacking tools and stolen credentials. The site, which was shut down earlier...

Hightower Faces Class Action Suit Over Data Breach
Hightower, a wealth‑management firm, is facing a class‑action lawsuit after a cyber‑criminal breach exposed the personal data of roughly 131,483 clients, including Social Security and driver’s license numbers. The suit, filed by former employee Elliott Adams in Illinois federal court,...

Vicarius Launches vIntelligence, a Second Flagship Product for Continuous Agentic Validation
Vicarius unveiled vIntelligence, its second flagship product, adding continuous agentic validation to its security suite. The solution tackles the “assurance gap” by independently validating findings and re‑checking exposures as environments evolve. vIntelligence can operate alone or integrate with the existing...

Entro Security Launches AGA to Govern AI Agents and Non-Human Identities Across the Enterprise
Entro Security unveiled Agentic Governance & Administration (AGA), a new platform pillar designed to govern AI agents and non‑human identities across enterprise systems. AGA tackles the shortcomings of traditional Identity Governance and Administration tools, which were built for people and...

Ransomware Attack Disrupts Operation at Major Spanish Fishing Port
A ransomware attack on Spain’s Port of Vigo forced the isolation of critical cargo‑management servers, compelling the port to run operations manually. The breach was detected on Tuesday, and officials have refused to reconnect the systems until they can guarantee...

Cloud Phones Linked to Rising Financial Fraud Threat
A Group‑IB report released on March 25 reveals that cloud phones—remote‑access Android devices hosted in data centres—are being weaponized for financial fraud. Because they replicate genuine smartphones, they bypass conventional device‑fingerprinting tools, allowing fraudsters to create and operate dropper accounts...

NetApp Seals Elastio and Commvault Deals for More Resilience and Less Ransomware
NetApp announced partnerships with Elastio and Commvault to bolster its Ransomware Resilience Service. Elastio’s agent‑less detection and Provable Recovery controls will be embedded in ONTAP snapshots to spot zero‑day ransomware and provide immutable recovery points. Together with Commvault, NetApp will...

Why Strong Authentication Beyond the Browser Will Define the Future of Connected Devices
The rise of connected cars, smart homes, wearables and industrial IoT is stretching authentication beyond the traditional web browser. Regulators such as UNECE WP.29 and the U.S. IoT labeling program are imposing baseline security requirements for vehicle software and consumer...

Hackers Exploit Compromised Enterprise Identities at Industrial Scale, Warns SentinelOne
SentinelOne’s 2026 Annual Threat Report warns that identity‑based attacks have escalated to an industrial scale, with threat actors exploiting legitimate enterprise credentials to bypass traditional defenses. Attackers are using social‑engineering, MFA‑bypass kits, and brute‑force tactics to hijack high‑privilege accounts, even...

Puerto Rico Government Agency Cancels Driver’s License Appointments After Cyberattack
Puerto Rico’s Department of Transportation halted all driver‑license and registration appointments after a cyberattack forced the agency to disconnect its networks on Monday. The Puerto Rico Innovation and Technology Service (PRITS) is working with the DOT to assess the breach,...
.png?width=1200&auto=webp&crop=3%3A2)
The Online Security Features You Need While Travelling or Working Abroad
Surfshark One is an all‑in‑one cybersecurity suite designed for travelers and remote workers. It combines VPN, antivirus, price‑masking, and identity‑protection tools to secure connections on public Wi‑Fi, bypass regional blocks, and prevent price discrimination. The platform also offers breach alerts...

US Clouds Cast Long Shadow over EU Data Sovereignty, Says Osmium
Osmium Data Group warns that using US‑owned cloud providers for backups undermines European data‑sovereignty, even when the physical datacenter sits in the EU. The firm evaluated four source‑and‑destination scenarios, ranking a Europe‑owned source and datacenter as highest compliance, while a...

Deploy Best-Practice Security Policies Instantly with Transaction Security Policy Accelerator
Salesforce Labs has launched the Transaction Security Policy Accelerator, a free AppExchange app that lets administrators install a library of pre‑configured, best‑practice Transaction Security Policies with a single click. The policies are aligned with Salesforce’s Essential Transaction Security documentation and...
_Panther_Media_GmbH_Alamy.jpg?width=1280&auto=webp&quality=80&disable=upscale)
Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam
Unit 42 at Palo Alto Networks has uncovered a seven‑month phishing campaign in which attackers impersonated the company’s recruiters to target senior professionals. The scammers harvest LinkedIn data to craft highly personalized emails that claim a candidate’s résumé failed an...

Deepfakes Vulnerable to AI Fingerprint Hacks, Study Finds
Researchers at the University of Edinburgh demonstrated that AI fingerprints used to identify deepfake images can be easily removed or forged. Their evaluation of 12 generators and 14 fingerprinting methods showed removal success rates above 80% for attackers with full...

Marlink Reports 50% Surge in GNSS Interference Impacting Global Shipping
Marlink’s March 25 technical bulletin reports a 50% jump in GNSS interference incidents across its maritime fleet, driven by jamming and spoofing in the Middle East and other high‑traffic corridors. The disruptions threaten vessel navigation, satellite antenna tracking, and broadband connectivity....

Why a 'Near Miss' Database Is Key to Improving Information Sharing
At RSAC 2026, security leaders Wendy Nather and Bob Lord urged the cybersecurity community to treat near‑miss incidents with the same transparency as full breaches. They defined a near miss as an event that almost succeeded, highlighting that many organizations lack...

Paid AI Accounts Are Now a Hot Underground Commodity
Cybercriminals are building a thriving underground market for premium AI platform access, reselling accounts for tools like ChatGPT, Claude, and Microsoft Copilot. Flare’s analysis of fraud‑oriented forums shows recurring listings that bundle subscriptions, claim reduced restrictions, and target buyers seeking...

BlueFinity Evoke Offers Enhanced Two-Factor Security
BlueFinity has rolled out two‑factor authentication (2FA) as a standard feature in Release 3 of its Evoke low‑code platform. The update adds native Active Directory integration and OAuth‑compatible email handling for Exchange, Gmail and other services. Users can enable 2FA with...

Cyera Closes Major Gaps in Securing Enterprise AI
Cyera unveiled three new AI‑security tools—Browser Shield, Data Lineage, and the Cyera MCP platform—to plug critical gaps in enterprise AI adoption. Browser Shield monitors and blocks sensitive data at the prompt level for public AI models like ChatGPT, while Data...

Endpoint Security USA Launches New Site, Expands Endpoint Protection Services
Endpoint Security USA, a managed security services provider, has unveiled a redesigned website that showcases its expanded portfolio of endpoint protection solutions. The platform highlights services such as endpoint detection and response, cloud and IoT endpoint security, 24/7 SOC monitoring,...

Vorlon Adds Forensics and Response to Secure AI Agents
Vorlon introduced two new products—the AI Agent Flight Recorder and the AI Agent Action Center—to give enterprises forensic visibility and coordinated response for AI‑driven workloads. A 2026 Vorlon survey found 99.4% of U.S. organizations suffered at least one SaaS or...

Platformisation or Platform Theatre? Navigating Cyber Consolidation
Enterprise security consolidation is accelerating, with a 2025 IBM‑Palo Alto report showing firms juggle an average of 83 tools from 29 vendors. While unified platforms promise streamlined operations, many deliver only superficial integration, creating a hidden single point of failure....

SentinelOne Expands Strategic Collaboration with Google Cloud to Deliver Autonomous, AI-Powered Security at Global Scale
SentinelOne announced a multi‑year strategic collaboration with Google Cloud to fuse its AI‑native Singularity platform with Google’s global infrastructure and threat intelligence. The partnership expands SentinelOne’s autonomous EDR availability to three Google Cloud regions—North America, Frankfurt, and Saudi Arabia—addressing data‑sovereignty...

DigiCert Document Trust Manager Enhancements Improve Document Security and Compliance
DigiCert has upgraded its Document Trust Manager to counter AI‑driven document fraud by centralising signing key management and workflow visibility. The enhancements add unified monitoring, a secure certificate repository with MFA, and pre‑integrated support for DocuSign, Adobe Sign and other...

NY Army Guard's Cyber Protection Team 173 Fights Computer Battle During Kingston Armory Exercise
From February 23‑26, 2026, the New York Army National Guard’s Cyber Protection Team 173 conducted a four‑day simulated ransomware attack against an electrical utility at the Kingston Armory, using the U.S. Cyber Command’s Persistent Cyber Training Environment. Thirty‑four soldiers, many...

Drata Unveils Agentic AI to Transform Enterprise Trust Workflows
Drata announced a suite of agentic AI tools—including Agentic TPRM Assessment, Agentic Questionnaire Response (beta), and AI Trust Center Setup—to automate third‑party risk reviews, security questionnaire handling, and trust‑center creation. The new capabilities promise to cut manual effort, accelerate procurement...

Solink Upgrades VerifEye Platform to Streamline Global Security Operations Centers
Solink Corp. announced a major upgrade to its VerifEye platform, adding vision‑language AI to cut alert fatigue and speed incident response. The new system filters false positives, prioritizes genuine threats, and can shrink response times to as little as three...

Gemini Picks up Criminal Activity Buried in Dark Web Noise
Google has launched a dark‑web intelligence feature within Google Threat Intelligence, powered by its Gemini AI model. The service scans millions of dark‑web events daily and automatically builds a profile of an organization’s operations, adjusting as business parameters change. By...

How to Detect and Remove Malware From an iPhone
iPhones, despite strong security, can still be compromised by malware, phishing, and other mobile threats. The article outlines six warning signs such as unfamiliar apps, excessive data usage, and battery drain, and provides a step‑by‑step removal process that includes checking...