Cybersecurity News and Headlines

Kusari and CNCF: Advancing Software Supply Chain Security for Cloud Native Projects
NewsMar 23, 2026

Kusari and CNCF: Advancing Software Supply Chain Security for Cloud Native Projects

Kusari announced a partnership with the Cloud Native Computing Foundation (CNCF) to give CNCF projects free access to its AI‑powered security tool, Kusari Inspector. The platform embeds code‑review and dependency‑management checks directly into pull‑request workflows, offering visualized dependency graphs, risk...

By CNCF Blog
Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
NewsMar 23, 2026

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

Microsoft’s threat intel team warned that a tax‑season phishing campaign compromised 29,000 users in 10,000 organizations, primarily in the United States. The attacks impersonated the IRS and used QR‑code, CPA, and cryptocurrency lures to deliver malicious links and attachments. Many...

By The Hacker News
Open Source Maintainers Are Drowning in AI-Generated Security Noise - $12.5 Million Is Being Deployed to Throw Them a Lifeline
NewsMar 23, 2026

Open Source Maintainers Are Drowning in AI-Generated Security Noise - $12.5 Million Is Being Deployed to Throw Them a Lifeline

The Linux Foundation announced a $12.5 million grant from Anthropic, AWS, GitHub, Google, Microsoft and OpenAI to bolster open‑source security through Alpha‑Omega and the OpenSSF. The funding targets the flood of AI‑generated vulnerability reports that are overwhelming project maintainers with low‑context...

By Diginomica
Tycoon 2FA Fully Operational Despite Law Enforcement Takedown
NewsMar 23, 2026

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA, a subscription‑based phishing‑as‑a‑service platform, continued operating at full capacity despite an international takedown effort. The service was responsible for 62 % of Microsoft‑blocked phishing attempts in 2025 and generated over 30 million malicious emails each month, affecting roughly half a million...

By SecurityWeek
Vanta Introduces Automation Tools to Streamline Enterprise Compliance
NewsMar 23, 2026

Vanta Introduces Automation Tools to Streamline Enterprise Compliance

Vanta unveiled a new suite of automation tools aimed at streamlining enterprise compliance and privacy management. The offering introduces three context‑aware agents—Compliance, Third‑party Risk Management, and Customer Trust—that continuously monitor evidence, assess vendor risk, and automate security query responses. New...

By TechMonitor
ZachXBT Says Fake X Accounts Used Viral War Content to Drive Crypto Scams
NewsMar 23, 2026

ZachXBT Says Fake X Accounts Used Viral War Content to Drive Crypto Scams

Blockchain analyst ZachXBT exposed a coordinated network of more than ten X accounts that used AI‑generated war and geopolitical posts to lure users into crypto scams. The fake profiles impersonated influencers, posted sensational "doomposts," and then promoted fraudulent token giveaways,...

By Cointelegraph
Global Crackdown Dismantles 4 Botnets Behind Major DDoS Attacks
NewsMar 23, 2026

Global Crackdown Dismantles 4 Botnets Behind Major DDoS Attacks

International law enforcement agencies, led by the US DOJ and FBI, dismantled four major botnets—Aisuru, KimWolf, JackSkid and Mossad—that had compromised over three million IoT devices. At their peak, the networks could generate 30 terabits per second of traffic, powering some...

By HackRead
10 Things Keeping IT Leaders up at Night
NewsMar 23, 2026

10 Things Keeping IT Leaders up at Night

CIOs are juggling long‑standing uptime worries with a surge of AI‑related challenges. Cybersecurity, especially third‑party risk, remains the top nightmare, while data security and privacy grow more complex as AI deployments accelerate. Leaders must embed AI responsibly at scale, align...

By CIO.com
UIDAI Launches Bug Bounty Programme to Enhance Aadhaar Security
NewsMar 23, 2026

UIDAI Launches Bug Bounty Programme to Enhance Aadhaar Security

The Unique Identification Authority of India (UIDAI) has launched a structured bug bounty program to harden the public‑facing components of the Aadhaar ecosystem. Twenty vetted ethical hackers will probe the UIDAI website, the myAadhaar portal and the Secure QR Code...

By Identity Week
Phakamo Tech Champions Integrated GRC Approach at ITWeb Security Summit 2026
NewsMar 23, 2026

Phakamo Tech Champions Integrated GRC Approach at ITWeb Security Summit 2026

Phakamo Tech announced its sponsorship of the ITWeb Security Summit in Johannesburg, scheduled for 2‑3 June 2026, where it will present an integrated cyber security, governance and risk management (GRC) framework. The company argues that African organisations must align security controls...

By ITWeb (South Africa) – Public Sector
When Tiny Magnets Attack PV Systems
NewsMar 23, 2026

When Tiny Magnets Attack PV Systems

Cybersecurity researcher Mohammad Al Faruque demonstrated that low‑cost magnetic, electrical and acoustic perturbations can manipulate current and voltage sensors in photovoltaic inverters without physical access. Using a $45 kit of Arduino, MOSFETs, Zigbee and an ultrasonic sensor, his team generated controllable...

By pv magazine
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
NewsMar 23, 2026

Oblivion RAT Masquerades as Play Store Update to Spy on Android Users

Oblivion RAT, a new Android remote access trojan, is sold as a malware‑as‑service platform for as little as $300 per month. It uses a two‑stage infection chain that mimics Google Play Store updates to trick users into sideloading a malicious...

By GBHackers On Security
Proofpoint Unifies Email, Data, and AI Security to Reduce Enterprise Blind Spots
NewsMar 23, 2026

Proofpoint Unifies Email, Data, and AI Security to Reduce Enterprise Blind Spots

Proofpoint introduced a unified security platform that merges its Secure Email Gateway with API‑based protection, adds AI‑driven data access governance, and extends AI‑native DSPM to on‑premises environments. The integrated architecture shares threat intelligence and behavioral signals across inbound, outbound, and...

By Help Net Security
Zero Networks Kubernetes Access Matrix Exposes Hidden Access Paths and Blast Radius
NewsMar 23, 2026

Zero Networks Kubernetes Access Matrix Exposes Hidden Access Paths and Blast Radius

Zero Networks introduced the Kubernetes Access Matrix, a real‑time visual map that displays every allowed and denied network rule inside Kubernetes clusters. The tool automatically discovers existing network policies and presents namespace‑to‑namespace, application‑to‑application, and workload‑to‑workload connections in a single matrix....

By Help Net Security
3.7M Records Exposed, Many Belonging to Sears Home Services
NewsMar 23, 2026

3.7M Records Exposed, Many Belonging to Sears Home Services

Cybersecurity researcher Jeremiah Fowler uncovered three publicly exposed databases containing 3.7 million records tied to Sears Home Services' AI virtual assistant. The leak includes audio recordings, call transcriptions, and chat logs, revealing names, contact details, service information, and extended recordings up...

By Security Magazine (Cybersecurity)
Security Credentials Inadvertently Leaked on Thousands of Websites
NewsMar 23, 2026

Security Credentials Inadvertently Leaked on Thousands of Websites

A recent investigation uncovered that critical security credentials, including RSA private keys, have been inadvertently exposed on thousands of websites, affecting organizations from small firms to major banks and healthcare providers. The leak could enable attackers to impersonate servers, decrypt...

By New Scientist – Robots
Zilliz Cloud Launches Customer-Managed Encryption Keys for Enterprise Data Sovereignty
NewsMar 23, 2026

Zilliz Cloud Launches Customer-Managed Encryption Keys for Enterprise Data Sovereignty

Zilliz announced the general availability of Customer‑Managed Encryption Keys (CMEK) on its Zilliz Cloud platform, giving enterprises full control over encryption keys for AI‑scale vector workloads. The feature separates key ownership from data processing, ensuring Zilliz never accesses customer keys...

By MarTech Series
Booz Allen’s Vellox Brings AI Vs. AI Defense to Protect Critical Infrastructure and National Security
NewsMar 23, 2026

Booz Allen’s Vellox Brings AI Vs. AI Defense to Protect Critical Infrastructure and National Security

Booz Allen Hamilton unveiled Vellox, an AI‑native cyber‑defense suite designed to counter AI‑driven attacks that now breach enterprises in minutes. The company’s threat report shows breach dwell time fell below 30 minutes in 2025, with some incidents resolved in seconds....

By Help Net Security
Building a Layered Security Stack: Identity, Network and Device Protection
NewsMar 23, 2026

Building a Layered Security Stack: Identity, Network and Device Protection

Modern enterprises increasingly rely on cloud services and remote work, exposing them to broader cyber threats. To counter this, organizations are adopting a layered security stack that spans identity, network, and device protections. Each layer adds distinct controls—passwordless authentication, MFA,...

By Security Boulevard
A Week in Security (March 16 – March 22)
NewsMar 23, 2026

A Week in Security (March 16 – March 22)

Malwarebytes’ weekly roundup highlights a surge in privacy‑focused regulations and a wave of novel cyber threats. New legislation in New York aims to curb biometric tracking, while researchers uncovered a font‑rendering trick that masks malicious commands. High‑profile vulnerabilities were disclosed,...

By Security Boulevard
We Know You Can Pay a Million by Anja Shortland Review – the Terrifying New World of Ransomware
NewsMar 23, 2026

We Know You Can Pay a Million by Anja Shortland Review – the Terrifying New World of Ransomware

Anja Shortland’s new book charts ransomware’s rise from the 1989 AIDS‑Trojan prank to a $1 bn‑a‑year criminal industry that inflicts $57 bn in damages. She identifies three technical breakthroughs—TOR, Bitcoin and asymmetric encryption—that turned a hobbyist stunt into a global extortion machine....

By The Guardian
The Insider Threat Rises Again
NewsMar 23, 2026

The Insider Threat Rises Again

Insider threats are resurging, with 42% of organizations reporting more malicious incidents and a similar rise in negligent cases, according to Mimecast’s State of Human Risk Report. The average cost per insider‑driven breach now tops $13.1 million, and 66% of security...

By CSO Online
RegScale Recognized in the 2026 Gartner® Market Guide for DevOps Continuous Compliance Automation Tools
NewsMar 23, 2026

RegScale Recognized in the 2026 Gartner® Market Guide for DevOps Continuous Compliance Automation Tools

RegScale, a continuous controls monitoring platform, has been included in Gartner’s 2026 Market Guide for DevOps Continuous Compliance Automation Tools. The inclusion highlights growing enterprise demand for automated, AI‑driven compliance embedded directly in CI/CD pipelines. Gartner forecasts that by 2028,...

By AiThority » Sales Enablement
Coralogix and Skyflow Redefine Privacy-Safe Observability for the AI Era
NewsMar 23, 2026

Coralogix and Skyflow Redefine Privacy-Safe Observability for the AI Era

Coralogix and Skyflow announced a strategic partnership that introduces privacy‑safe observability for AI‑driven operations. The solution replaces sensitive customer data in logs with consistent, privacy‑preserving tokens, maintaining searchability, correlation, and AI analysis while keeping the raw data governed and isolated....

By MarTech Series
Your AI Agents Are Moving Sensitive Data. Do You Know Where?
NewsMar 23, 2026

Your AI Agents Are Moving Sensitive Data. Do You Know Where?

In a Help Net Security interview, Bonfy.AI CEO Gidi Cohen warns that the greatest threat from autonomous AI agents is data‑layer risk, not traditional prompt‑injection attacks. He outlines Bonfy's three‑pronged approach: controlling grounding data, monitoring content across tool calls and...

By Help Net Security
Zluri Expands Platform to Deliver Identity Security for the Modern Enterprise
NewsMar 23, 2026

Zluri Expands Platform to Deliver Identity Security for the Modern Enterprise

Zluri announced the Zluri Identity Security Platform, extending its SaaS governance suite to discover, govern, and monitor human, machine and AI identities across SaaS, cloud and on‑premises systems. The solution tackles the expanding non‑human identity attack surface by providing automated...

By Business Wire — Executive Appointments
Plumber: Open-Source Scanner of GitLab CI/CD Pipelines for Compliance Gaps
NewsMar 23, 2026

Plumber: Open-Source Scanner of GitLab CI/CD Pipelines for Compliance Gaps

Plumber is an open‑source Go tool that scans GitLab CI/CD pipelines for compliance gaps such as mutable container tags, unprotected branches, and outdated templates. It reads the .gitlab-ci.yml file and queries the GitLab API, offering eight configurable controls via a...

By Help Net Security
NIST Updates Its DNS Security Guidance for the First Time in over a Decade
NewsMar 23, 2026

NIST Updates Its DNS Security Guidance for the First Time in over a Decade

NIST released SP 800‑81r3, the first major update to its Secure Domain Name System Deployment Guide in over twelve years. The revision emphasizes protective DNS, encrypted DNS protocols (DoT, DoH, DoQ), and modern DNSSEC algorithms such as ECDSA and Ed25519. It...

By Help Net Security
Women Shaping the Future of Mobile Cybersecurity in a Digital-First Era
NewsMar 23, 2026

Women Shaping the Future of Mobile Cybersecurity in a Digital-First Era

India’s mobile‑first digital economy has turned smartphones into the most exposed point in the technology stack, prompting attackers to target mobile applications directly. Companies are shifting from traditional perimeter defenses to embedded solutions like runtime application self‑protection that monitor behavior...

By The Cyber Express
Singapore Cybersecurity Firms Showcase SME-Focused Innovations to Counter Rising Cyber Threats at RSAC 2026 Conference
NewsMar 23, 2026

Singapore Cybersecurity Firms Showcase SME-Focused Innovations to Counter Rising Cyber Threats at RSAC 2026 Conference

Cyber threats are projected to cost the global economy $23.84 trillion by 2027, leaving small and medium‑sized enterprises especially exposed. Singapore’s CyberSG Talent, Innovation and Growth Collaboration Centre (TIG Centre), backed by S$20 million, is showcasing three home‑grown startups—AgileMark, Scantist and StrongKeep—at...

By The Manila Times – Business
Your Smart Home Can Be Easily Hacked. New Safety Standards Will Help, but Stay Vigilant
NewsMar 23, 2026

Your Smart Home Can Be Easily Hacked. New Safety Standards Will Help, but Stay Vigilant

The Australian government has rolled out mandatory minimum security standards for smart‑home devices, targeting weak default passwords, lack of update policies, and opaque vulnerability reporting. The rules require each product to ship with unique credentials, provide a clear disclosure process,...

By The Conversation – Business + Economy (US)
Apps That Track You: 17 Of The Worst Offenders In Privacy Invasion
NewsMar 23, 2026

Apps That Track You: 17 Of The Worst Offenders In Privacy Invasion

A new roundup highlights 17 mobile apps that are among the worst offenders in personal data collection, from Meta’s suite of social platforms to Amazon’s shopping and Alexa ecosystem. The article details the breadth of data each app gathers—Meta tracks...

By SlashGear
Cookies, “Significant Risk,” And 2026 CCPA Assessments
NewsMar 23, 2026

Cookies, “Significant Risk,” And 2026 CCPA Assessments

California’s privacy law now mandates written risk assessments for any activity that constitutes a “sale” of personal data and presents a significant risk, including behavioral‑advertising cookies, sensitive data processing, and high‑risk automated decision‑making. The final CCPA regulations, released in September 2025,...

By National Law Review – Employment Law
Microsoft Outlines Agentic AI Security Strategy with New Defender, Entra and Purview Capabilities
NewsMar 22, 2026

Microsoft Outlines Agentic AI Security Strategy with New Defender, Entra and Purview Capabilities

Microsoft unveiled an "agentic AI" security strategy, rolling out Agent 365 as a centralized control plane for AI agents and embedding new Defender, Entra and Purview capabilities across its suite. The Security Dashboard for AI, Entra backup and tenant‑governance tools, and...

By SiliconANGLE
The FBI Just Issued A Warning About A Hidden Threat In Your Home Wi-Fi Network
NewsMar 22, 2026

The FBI Just Issued A Warning About A Hidden Threat In Your Home Wi-Fi Network

The FBI has issued a warning that home and small‑business Wi‑Fi networks are vulnerable to residential proxy attacks. In such attacks, criminals compromise a router or device, steal its IP address, and use it as a camouflage for illicit online...

By SlashGear
Why Crypto Hacks Don’t End and Continue Even when the Money Is Gone
NewsMar 22, 2026

Why Crypto Hacks Don’t End and Continue Even when the Money Is Gone

Immunefi’s 2026 State of On‑chain Security report shows that crypto hacks inflict damage far beyond the initial theft. While the median hack value fell to $2.2 million, the average loss stayed near $24.5 million, with the five biggest exploits accounting for 62%...

By CryptoSlate
Analyst Warns Against Using Microsoft’s Copilot AI on Friday Afternoons
NewsMar 22, 2026

Analyst Warns Against Using Microsoft’s Copilot AI on Friday Afternoons

Microsoft’s Copilot AI has suffered several high‑profile mishaps, including hallucinated police reports, exposed passwords, and confidential email summaries. Gartner analyst Dennis Xu warned that companies should consider banning Copilot on Friday afternoons, when employee vigilance tends to wane. The advice...

By Futurism AI
I Had No Idea How Much Google Maps Was Tracking Me Until I Found These Settings
NewsMar 22, 2026

I Had No Idea How Much Google Maps Was Tracking Me Until I Found These Settings

Google Maps continuously records users' whereabouts through its Timeline feature, logging minute‑by‑minute movements and search queries. The app also retains live‑location shares, background location access, and a detailed Maps history unless users manually disable or delete these data streams. The...

By MakeUseOf – Productivity
I Stopped Using Google Authenticator for This 2FA App, and It’s Much Better
NewsMar 22, 2026

I Stopped Using Google Authenticator for This 2FA App, and It’s Much Better

Bitwarden Authenticator, a free open‑source 2FA app, now offers stronger security than Google Authenticator by encrypting codes locally and supporting biometric locks. The author switched after a brief three‑minute migration, noting the process is straightforward via QR export. Bitwarden also...

By MakeUseOf – Productivity
VoidStealer Malware Steals Chrome Master Key via Debugger Trick
NewsMar 22, 2026

VoidStealer Malware Steals Chrome Master Key via Debugger Trick

VoidStealer, a malware‑as‑a‑service platform, now bypasses Chrome’s Application‑Bound Encryption by attaching a debugger and setting hardware breakpoints to capture the v20_master_key in plaintext. The technique extracts the master key directly from memory during browser startup, requiring no privilege escalation or...

By BleepingComputer
Security and Compliance: What Nonprofits Should Know About Online Auction Platforms
NewsMar 22, 2026

Security and Compliance: What Nonprofits Should Know About Online Auction Platforms

Nonprofit organizations increasingly rely on online auction platforms to raise funds, but each event exposes donor names, payment details, and personal addresses to cyber risk. The article stresses that security and compliance are not optional features but core risk‑management criteria,...

By The European Financial Review
Resolv Labs’ Stablecoin Depegs as Attacker Mints Millions of Tokens
NewsMar 22, 2026

Resolv Labs’ Stablecoin Depegs as Attacker Mints Millions of Tokens

Resolv Labs’ USR stablecoin was exploited, allowing an attacker to mint 50 million unbacked tokens after depositing just $100,000 USDC, with an additional 30 million minted due to contract flaws. The sudden supply surge de‑pegged USR, driving its price from a $1...

By Cointelegraph
RSAC 2026 Innovation Sandbox | ZeroPath: From Alarm Accumulation to Executable Fixes
NewsMar 22, 2026

RSAC 2026 Innovation Sandbox | ZeroPath: From Alarm Accumulation to Executable Fixes

ZeroPath, an AI‑native application security startup founded in 2024, was named a finalist in the RSAC 2026 Innovation Sandbox. Its platform unifies SAST, SCA, secrets and IaC scanning into a single AI‑driven engine that verifies exploitability and produces automated repair pull...

By Security Boulevard
TUMCREATE to Develop Open-Source RISC-V Processor with Integrated Post-Quantum Security
NewsMar 22, 2026

TUMCREATE to Develop Open-Source RISC-V Processor with Integrated Post-Quantum Security

TUMCREATE, the research arm of Technical University of Munich, will lead the QUASAR‑CREATE program to build an open‑source 64‑bit RISC‑V processor with built‑in post‑quantum cryptographic (PQC) accelerators. The processor will be fabricated on GlobalFoundries’ 180‑nm node in Singapore and feature...

By Quantum Computing Report
Does Your NHI System Deliver Essential Value
NewsMar 21, 2026

Does Your NHI System Deliver Essential Value

Non‑Human Identities (NHIs) now outnumber human users, making machine‑credential security a top priority for enterprises. A robust NHI system manages secrets throughout their lifecycle, providing visibility, automated rotation, and context‑aware controls. Organizations that rely solely on point tools miss hidden...

By Security Boulevard
Is Your Agentic AI Optimized for Latest Threats
NewsMar 21, 2026

Is Your Agentic AI Optimized for Latest Threats

Non‑Human Identities (NHIs) are emerging as digital passports that secure machine credentials across cloud environments. A comprehensive lifecycle—discovery, classification, threat detection, and remediation—enables organizations to manage the exploding volume of machine identities in sectors such as finance and healthcare. Integrating...

By Security Boulevard
I Was Exposing My Home Server Every Time I Opened a Router Port — NetBird Fixed It
NewsMar 21, 2026

I Was Exposing My Home Server Every Time I Opened a Router Port — NetBird Fixed It

NetBird, an open‑source WireGuard‑based platform, eliminates the need for router port forwarding by creating private overlay networks for home servers. After installing lightweight clients on the server and endpoints, devices authenticate via a dashboard and connect through encrypted tunnels, with...

By MakeUseOf – Productivity
You're About to Lose Your Instagram Privacy, so You Might Want to Grab a VPN
NewsMar 21, 2026

You're About to Lose Your Instagram Privacy, so You Might Want to Grab a VPN

Instagram will discontinue end‑to‑end encryption for direct messages on May 8, meaning Meta, ISPs and governments can read private chats. The shift revives concerns that the platform will harvest message data for advertising and AI training. While a VPN can encrypt...

By PCGamesN