Cybersecurity News and Headlines

Global Cybercrime Crackdown: Over 373,000 Dark Web Sites Shut Down
NewsMar 20, 2026

Global Cybercrime Crackdown: Over 373,000 Dark Web Sites Shut Down

Operation Alice, a March 2026 Europol‑led initiative, dismantled the largest known network of fraudulent dark‑web platforms, shutting down over 373,000 sites that hosted child sexual abuse material and cyber‑crime‑as‑a‑service tools. German authorities identified the platform’s operator and, together with 22...

By DataBreaches.net
University College of Dublin Staff Member Due in Court over Accessing Student Data
NewsMar 20, 2026

University College of Dublin Staff Member Due in Court over Accessing Student Data

A University College Dublin employee in his 50s has been arrested and charged for unlawfully accessing student records, appearing in court today. The investigation, led by Ireland's Garda Síochána, uncovered unauthorized database queries that exposed personal information of dozens of...

By DataBreaches.net
Jaguar Land Rover's Cyber Bailout Sets Worrying Precedent, Watchdog Warns
NewsMar 20, 2026

Jaguar Land Rover's Cyber Bailout Sets Worrying Precedent, Watchdog Warns

The UK government provided Jaguar Land Rover with a £1.5 billion loan guarantee after a ransomware attack that the Cyber Monitoring Centre estimates cost up to £1.9 billion to the British economy. The cyber watchdog warned that rescuing a single firm without clear criteria...

By The Register — Networks
5 Best Password Managers for Teams (Free & Paid) in 2026
NewsMar 20, 2026

5 Best Password Managers for Teams (Free & Paid) in 2026

The updated 2026 guide ranks the five best password managers for teams, naming Dashlane as the overall leader, Keeper for enterprise, 1Password for small teams, Bitwarden as the top open‑source option, and Enpass for third‑party cloud storage. It highlights that...

By TechRepublic – Articles
Fake Interactive Zoom Call Leads to Malicious ScreenConnect Download
NewsMar 20, 2026

Fake Interactive Zoom Call Leads to Malicious ScreenConnect Download

Security researchers discovered a novel phishing campaign that uses a fake, interactive Zoom call to trick users into downloading a malicious update. The lure relies on AI‑generated JavaScript to mimic a glitchy Zoom meeting, directing victims to a counterfeit Microsoft...

By SC Media
UK Cyber Monitoring Centre Plans Expansion in US Amid Risk of Category 5 Attack
NewsMar 20, 2026

UK Cyber Monitoring Centre Plans Expansion in US Amid Risk of Category 5 Attack

The UK Cyber Monitoring Centre (CMC) is preparing a US‑based operation to quantify the financial fallout of cyber incidents, targeting a 2027 launch after proving its model in Britain. In its first year, the CMC rated two 2025 attacks –...

By ComputerWeekly
Oracle Pushes Emergency Fusion Middleware Patch
NewsMar 20, 2026

Oracle Pushes Emergency Fusion Middleware Patch

Oracle released an out‑of‑band emergency patch for a critical pre‑authentication remote code execution vulnerability (CVE‑2026‑21992) affecting Oracle Identity Manager and Oracle Web Services Manager. The flaw, located in the Fusion Middleware REST and security components, is easily exploitable and resembles...

By The Stack (TheStack.technology)
Linux Kernel Scale Is Swamping an Already-Flawed CVE System
NewsMar 20, 2026

Linux Kernel Scale Is Swamping an Already-Flawed CVE System

The Linux kernel became a CVE Numbering Authority in 2024, prompting a policy shift that assigns identifiers to virtually every defect. In 2025 the kernel topped vulnerability lists with over 48,000 CVEs, flooding security feeds with low‑impact and theoretical issues...

By The New Stack
Rapid7 Enhances Exposure Command with Runtime Validation and DSPM for Risk Analysis
NewsMar 20, 2026

Rapid7 Enhances Exposure Command with Runtime Validation and DSPM for Risk Analysis

Rapid7 has added runtime validation and Data Security Posture Management (DSPM) to its Exposure Command platform, turning continuous assessment into continuous validation. The new features use eBPF‑based sensors and AI to identify which cloud vulnerabilities and misconfigurations are actively exploitable...

By Help Net Security
Listed Firms Risk 30% Share Plunge Amid Rising Cyber Attacks
NewsMar 20, 2026

Listed Firms Risk 30% Share Plunge Amid Rising Cyber Attacks

JSE‑listed companies face the risk of a 30% share‑price plunge after a cyber‑attack, as weekly cyber incidents in South Africa jumped 36% year‑on‑year to 2,145. Response speed dramatically influences losses: incidents contained within hours limit share erosion to 4%, while...

By ITWeb (South Africa) – Public Sector
Thousands of Magento Sites Hit in Ongoing Defacement Campaign
NewsMar 20, 2026

Thousands of Magento Sites Hit in Ongoing Defacement Campaign

A coordinated defacement campaign has compromised over 7,500 Magento sites in just three weeks, leveraging an unauthenticated file‑upload flaw across Open Source, Enterprise and B2B deployments. Threat actors are posting plaintext files, often bearing the handle “Typical Idiot Security,” to...

By SecurityWeek
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
NewsMar 20, 2026

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

Artificial intelligence is empowering cybercriminals to craft hyper‑personalized phishing, automate credential abuse, and generate adaptive malware that mimics legitimate user behavior. Traditional rule‑based and signature‑based defenses struggle because AI‑driven attacks operate within normal activity thresholds and continuously evolve their code....

By The Hacker News
Critical Langflow Vulnerability Exploited Hours After Public Disclosure
NewsMar 20, 2026

Critical Langflow Vulnerability Exploited Hours After Public Disclosure

Langflow, a widely used open‑source AI workflow builder, disclosed a critical remote code execution flaw (CVE‑2026‑33017) with a CVSS score of 9.3. The vulnerability affects an unauthenticated POST endpoint that processes a ‘data’ parameter, allowing attackers to inject Python code...

By SecurityWeek
Android Malware Campaign Targets Indian Users via Fake eChallan Alerts
NewsMar 20, 2026

Android Malware Campaign Targets Indian Users via Fake eChallan Alerts

CERT-In has warned of a coordinated Android malware campaign that lures Indian vehicle owners with fake eChallan and RTO challan SMS alerts. The messages direct users to download malicious APKs such as "RTO Challan.apk," which act as droppers for multi‑stage...

By The Cyber Express
Semgrep Multimodal Brings AI Reasoning and Rule-Based Analysis to Code Security
NewsMar 20, 2026

Semgrep Multimodal Brings AI Reasoning and Rule-Based Analysis to Code Security

Semgrep unveiled Multimodal, a hybrid system that merges its deterministic Pro engine with large‑language‑model reasoning to boost code‑security detection. The solution claims up to eight times more true positives and a 50% reduction in noise compared with LLM‑only scans, already...

By Help Net Security
ConductorOne Unveils AI Access Management to Accelerate Secure, Compliant AI Adoption
NewsMar 20, 2026

ConductorOne Unveils AI Access Management to Accelerate Secure, Compliant AI Adoption

ConductorOne launched AI Access Management, a unified control plane that governs access to AI tools, agents, and managed connectivity points across enterprises. The solution lets employees request AI services and be provisioned in under 60 seconds while IT retains full...

By Help Net Security
Clean up Your Digital Clutter or Face the Risks, Firms Warn
NewsMar 20, 2026

Clean up Your Digital Clutter or Face the Risks, Firms Warn

South African firms are warned that unchecked digital clutter—dubbed “data toxicity”—is costing millions and exposing them to security breaches. Experts from Integrity360 and KnowBe4 Africa argue that redundant, obsolete (ROT) data inflates cloud storage fees, increases cognitive load, and creates...

By ITWeb (South Africa) – Public Sector
Bonfy ACS 2.0 Helps Organizations Control Data Use in AI Environments
NewsMar 20, 2026

Bonfy ACS 2.0 Helps Organizations Control Data Use in AI Environments

Bonfy.AI unveiled Bonfy Adaptive Content Security (ACS) 2.0, a platform that extends enterprise data protection to AI agents, copilots, and generative applications across cloud, SaaS, and on‑premises environments. The solution adds real‑time, context‑aware controls—including a data‑in‑use guardrail, browser extension for...

By Help Net Security
U.S. Shuts Down Websites Behind Iran-Linked Cyber Attacks and Death Threats
NewsMar 20, 2026

U.S. Shuts Down Websites Behind Iran-Linked Cyber Attacks and Death Threats

The U.S. Justice Department seized four domains—Justicehomeland.org, Handala‑Hack.to, Karmabelow80.org and Handala‑Redwanted.to—allegedly operated by Iran’s Ministry of Intelligence and Security. Investigators say the sites acted as fake hacktivist fronts that claimed cyberattacks, published stolen data and issued death threats against journalists,...

By The Cyber Express
Everything You Need to Know About Online Fraud
NewsMar 20, 2026

Everything You Need to Know About Online Fraud

Online fraud, encompassing financial scams and identity theft, surged as pandemic‑driven digital adoption expanded across banking, retail, and services. In South Africa, criminal syndicates generated between R200 billion and R300 billion in annual losses, with banking fraud alone exceeding R3.3 billion in 2023....

By ITWeb (South Africa) – Public Sector
Perseus Android Malware Targets Mobile Banking Users via Fake IPTV Apps
NewsMar 20, 2026

Perseus Android Malware Targets Mobile Banking Users via Fake IPTV Apps

Researchers at ThreatFabric have uncovered a new Perseus Android malware variant that masquerades as IPTV streaming apps to infiltrate smartphones. The strain builds on Cerberus and Phoenix code, leveraging Accessibility Services to stealthily control devices, scan note‑taking apps, and overlay...

By The Cyber Express
Exabeam Adds MSSP Commercial Framework to APEX Partner Program
NewsMar 20, 2026

Exabeam Adds MSSP Commercial Framework to APEX Partner Program

Exabeam has introduced a dedicated commercial framework for managed security service providers within its APEX partner program. The new structure replaces fragmented licensing with a single pooled licence for high‑volume, multi‑tenant deployments and a federated subscription model for region‑specific isolation....

By ARN (Australia)
Cyble Partners with Optiv to Bring Digital Risk Protection Into MSSP Operations
NewsMar 20, 2026

Cyble Partners with Optiv to Bring Digital Risk Protection Into MSSP Operations

Cyble has partnered with Optiv to embed its digital risk protection services into Optiv’s managed security service provider operations. The integration feeds Cyble’s open, deep, and dark‑web threat intelligence directly into Optiv’s fusion center, giving analysts a unified view of...

By The Cyber Express
Canada’s Supreme Court Scrutinizes Facebook’s Role in Cambridge Analytica Privacy Scandal
NewsMar 20, 2026

Canada’s Supreme Court Scrutinizes Facebook’s Role in Cambridge Analytica Privacy Scandal

Canada’s Supreme Court is hearing a challenge to Facebook over the Cambridge Analytica scandal. The Privacy Commissioner alleges Facebook violated PIPEDA by lacking meaningful consent and failing safeguards. Facebook argues users consented via terms and that data isn’t sensitive. Justices...

By Courthouse News Service
North Carolina Tech Worker Found Guilty of Insider Attack Netting $2.5M Ransom
NewsMar 20, 2026

North Carolina Tech Worker Found Guilty of Insider Attack Netting $2.5M Ransom

A 27‑year‑old North Carolina contractor, Cameron Nicholas Curry, was convicted of six extortion counts after stealing sensitive employee and compensation data from a D.C.‑based tech firm and demanding a $2.5 million ransom. Curry accessed the data between August and December 2023,...

By CyberScoop
My Personal Data Has Been Leaked Several Times - This Service Helped Clean It All Up
NewsMar 20, 2026

My Personal Data Has Been Leaked Several Times - This Service Helped Clean It All Up

DeleteMe is a subscription‑based data‑removal service that scans the web for personal information and files opt‑out requests on behalf of users. In a ZDNET test, the platform examined 371 listings and successfully removed 44 within five days, with additional takedowns...

By ZDNet – Business
Leap Strategies Sees Rise in Sovereignty Queries From Mid-Market
NewsMar 20, 2026

Leap Strategies Sees Rise in Sovereignty Queries From Mid-Market

Leap Strategies reports a surge in data sovereignty questions from Australian mid‑market firms as compliance mandates intensify. The company notes that governance, risk and compliance discussions have moved from purely legal concerns to deep technical involvement, prompting customers to consider...

By ARN (Australia)
Why Disabling the SQL Server Sa Account Still Matters in 2026
NewsMar 20, 2026

Why Disabling the SQL Server Sa Account Still Matters in 2026

Even with SQL Server’s 2026 security enhancements, the built‑in sa account remains a critical attack vector. Attack tools still assume sa exists and brute‑force its password, giving adversaries immediate sysadmin control. Because sa bypasses many modern access controls, compromising it...

By SQLServerCentral
Singapore, Japan Align IoT Security Frameworks for Digital Resilience
NewsMar 19, 2026

Singapore, Japan Align IoT Security Frameworks for Digital Resilience

Singapore and Japan have signed a Memorandum of Cooperation to mutually recognise each other’s IoT cybersecurity labelling schemes. The agreement lets devices certified in one country obtain the other’s Level 1 label through a streamlined process, cutting duplicate testing. It also...

By OpenGov Asia
OpenWebUI Servers Targeted for Extensive Cryptomining
NewsMar 19, 2026

OpenWebUI Servers Targeted for Extensive Cryptomining

OpenWebUI, a widely used open‑source AI interface, is being exploited through CVE‑2025‑63391, a flaw that allows unauthenticated script uploads. Attackers have compromised roughly 12,000 internet‑exposed instances, injecting Python backdoors that run cryptocurrency miners and steal credentials. About half of the...

By SC Media
Justice Department Disrupts Iranian Cyber Enabled Psychological Operations
NewsMar 19, 2026

Justice Department Disrupts Iranian Cyber Enabled Psychological Operations

The U.S. Justice Department seized four domains used by Iran’s Ministry of Intelligence and Security for cyber‑enabled psychological operations and transnational repression. The sites—Justicehomeland.org, Handala‑Hack.to, Karmabelow80.org, and Handala‑Redwanted.to—were employed to claim hack credit, publish stolen data, and issue death threats...

By DataBreaches.net
Scoop: Anthropic Meets with House Homeland Security Behind Closed Doors
NewsMar 19, 2026

Scoop: Anthropic Meets with House Homeland Security Behind Closed Doors

Anthropic co‑founder Jack Clark met privately with the bipartisan House Homeland Security Committee, discussing AI model distillation and export‑control challenges. The Pentagon dispute over Anthropic’s supply‑chain risk designation was only briefly mentioned. The session was described as friendly, reflecting Anthropic’s...

By Axios – General
AI Conundrum: Why MCP Security Can't Be Patched Away
NewsMar 19, 2026

AI Conundrum: Why MCP Security Can't Be Patched Away

Enterprises are rapidly wiring large language models to external services through the Model Context Protocol (MCP), unlocking powerful automation but also exposing a novel attack surface. Because MCP turns LLMs from passive responders into autonomous agents, they can execute actions...

By Dark Reading
Can Zero Trust Survive the AI Era?
NewsMar 19, 2026

Can Zero Trust Survive the AI Era?

Federal agencies are confronting a dual challenge: AI‑enabled attackers are slashing attack timelines to roughly 11 minutes and dramatically lowering malware development costs, while defenders must integrate AI into their security stacks. Zero Trust principles—continuous verification, least‑privilege access, and micro‑segmentation—remain...

By CyberScoop
Agents and Quantum: Cybersecurity World Confronts AI Vulnerabilities and Data Risks Amid an Expanding Threat Landscape
NewsMar 19, 2026

Agents and Quantum: Cybersecurity World Confronts AI Vulnerabilities and Data Risks Amid an Expanding Threat Landscape

Enterprise adoption of AI agents is exposing new security gaps, with tests showing agents can leak confidential data and 60% of AI‑related incidents resulting in data loss. Vendors are responding: F5 introduced NGINX Agentic Observability to monitor agent‑to‑agent traffic, while...

By SiliconANGLE
Navia Discloses Data Breach Impacting 2.7 Million People
NewsMar 19, 2026

Navia Discloses Data Breach Impacting 2.7 Million People

Navia Benefit Solutions disclosed a breach that affected nearly 2.7 million individuals, exposing personal identifiers such as names, dates of birth, Social Security numbers, and contact details. The unauthorized actors accessed Navia’s systems from December 22, 2025, to January 15, 2026, with the breach discovered...

By BleepingComputer
Lack of CISA Leadership Amid DHS Shutdown Raises Risks, Cyber Pros Say
NewsMar 19, 2026

Lack of CISA Leadership Amid DHS Shutdown Raises Risks, Cyber Pros Say

The U.S. Cybersecurity and Infrastructure Security Agency is operating with roughly one‑third of its staff as the DHS shutdown sidelines 1,500 employees and leaves the agency without a permanent director. Despite the staffing squeeze, CISA continues to issue critical alerts—such...

By SC Media
Post-Quantum Web Could Be Safer, Faster
NewsMar 19, 2026

Post-Quantum Web Could Be Safer, Faster

The IETF’s draft Merkle tree certificates (MTCs) promise a quantum‑resistant web that is both smaller and faster than existing post‑quantum solutions. By compressing certificate data to roughly 840 bytes, MTCs cut bandwidth and latency compared with ML‑DSA signatures that can exceed...

By Dark Reading
Vibhor Kumar: PostgreSQL HA Without SSH: Why Open Source Efm_extension Matters in a Zero-Trust World
NewsMar 19, 2026

Vibhor Kumar: PostgreSQL HA Without SSH: Why Open Source Efm_extension Matters in a Zero-Trust World

The open‑source efm_extension brings EDB Failover Manager operations into PostgreSQL via SQL, removing the need for SSH‑based control. It adds functions such as efm_cluster_status, efm_failover, efm_switchover, efm_allow_node and efm_disallow_node, with JSON output for programmatic consumption. The extension runs under a...

By Planet PostgreSQL
Campus Networks Have a Security Problem. Huawei's New Solution Can Fix It.
NewsMar 19, 2026

Campus Networks Have a Security Problem. Huawei's New Solution Can Fix It.

Huawei introduced its Xinghe AI Full‑Scope Security Campus Solution at MWC26, aiming to transform campus Wi‑Fi from a connectivity utility into a comprehensive defense platform. The solution bundles four AI‑driven layers—connectivity, asset, spatial, and privacy security—featuring post‑quantum encrypted Wi‑Fi Shield,...

By Telecoms.com
How We’re Helping You Avoid Scams This Tax Season
NewsMar 19, 2026

How We’re Helping You Avoid Scams This Tax Season

Google is rolling out five security features to shield consumers from a 67% surge in tax‑season scams, including fraudulent calls, texts, and fake websites. Pixel phones now offer Call Screen and on‑device AI scam detection, cutting spam calls by 70%....

By Google Analytics Blog
Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation
NewsMar 19, 2026

Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation

An affiliate known as ‘hastalamuerte’ disclosed internal details of the emerging ransomware‑as‑a‑service group The Gentlemen, revealing its dual‑extortion tactics, multi‑platform targets, and sophisticated evasion methods. Group‑IB’s March 19 report shows the group exploits FortiGate VPN devices, uses PowerShell, BYOVD drivers, and...

By Infosecurity Magazine
Latest White House Cybersecurity Strategy Talks Crypto, AI, Quantum
NewsMar 19, 2026

Latest White House Cybersecurity Strategy Talks Crypto, AI, Quantum

The White House released President Trump’s Cyber Strategy for America in mid‑March, outlining six policy pillars that target critical‑infrastructure protection, emerging‑technology superiority, and a broadened offensive cyber posture. Notably, the strategy calls for securing supply‑chain integrity, promoting U.S.‑made hardware, and...

By Via Satellite
UMMC Continues Investigating Cyberattack and Recovering From Impact.
NewsMar 19, 2026

UMMC Continues Investigating Cyberattack and Recovering From Impact.

University of Mississippi Medical Center (UMMC) shut dozens of clinics for nine days after a ransomware attack crippled its Epic EMR system. The Medusa ransomware gang later posted the breach on its leak site, claiming to have stolen more than...

By DataBreaches.net
SpiderOak Wins New UAS Systems Contract
NewsMar 19, 2026

SpiderOak Wins New UAS Systems Contract

SpiderOak has been awarded a contract by the U.S. Army Unmanned Aircraft Systems PMO to conduct supply‑chain analysis and cybersecurity assessments for vendors in the Drone Dominance Program. The company will apply its Advanced Cyber Threat & Resilience Assessments (ACTRA)...

By Via Satellite
The Compliance and Security Risks of Uncontrolled Hotel Communication
NewsMar 19, 2026

The Compliance and Security Risks of Uncontrolled Hotel Communication

Hotel staff increasingly rely on personal messaging apps, creating fragmented communication channels that jeopardize guest data and operational efficiency. This lack of centralized control makes it difficult to track conversations, enforce access policies, and meet regulatory standards such as GDPR...

By Hotel Business
Threat Groups Target Cyber-Physical Systems to Disrupt Critical Infrastructure Providers
NewsMar 19, 2026

Threat Groups Target Cyber-Physical Systems to Disrupt Critical Infrastructure Providers

Claroty's latest report reveals a surge in attacks on cyber‑physical systems that control critical infrastructure. State‑sponsored, hacktivist and other threat groups are exploiting internet‑exposed devices, default credentials and insecure protocols to compromise SCADA and HMI platforms, often without needing software...

By Facilities Dive
Water Utilities Need Hands-On Cybersecurity Help, Not Just Free Guidance, Pilot Program Finds
NewsMar 19, 2026

Water Utilities Need Hands-On Cybersecurity Help, Not Just Free Guidance, Pilot Program Finds

Microsoft, the Cyber Readiness Institute and CCTI ran a 2023‑2025 pilot to boost cybersecurity at small and medium water utilities. Of 113 utilities that expressed interest, 72 enrolled and only 43 completed the program, but utilities that received a dedicated...

By Cybersecurity Dive (Industry Dive)
Secure File Transfer Services: Types, Tools and Selection Tips
NewsMar 19, 2026

Secure File Transfer Services: Types, Tools and Selection Tips

Secure file transfer services replace legacy protocols with encrypted, access‑controlled solutions that meet modern compliance demands. The market spans simple SCP tools to sophisticated Managed File Transfer platforms offering AI‑driven threat detection, audit logging, and integration with identity providers. Leading...

By TechTarget SearchERP