Cybersecurity News and Headlines

Is Your Signal Secure?
NewsMar 29, 2026

Is Your Signal Secure?

At the NAB Show, a panel titled “Securing the Signal” examined how broadcasters can shift from reactive security to proactive risk management across distributed field operations. Experts from Fox, Dataminr, Smith Entertainment Group and Verkdata discussed integrating real‑time threat‑intelligence platforms...

By Radio World
The Compliance Blind Spot in Cyber Risk
NewsMar 29, 2026

The Compliance Blind Spot in Cyber Risk

Financial institutions are discovering that compliance can fail even when core systems stay online. Automated compliance judgments degrade silently when underlying data conditions change during cyber incidents, eroding the validity of regulatory outputs. Regulators are shifting focus from mere control...

By The European Financial Review
CareCloud Notifies the SEC After Attack on One of Its EHR Environments
NewsMar 29, 2026

CareCloud Notifies the SEC After Attack on One of Its EHR Environments

CareCloud disclosed to the SEC that an unauthorized third party accessed one of its six electronic health record (EHR) environments on March 16, causing an eight‑hour disruption that was fully restored the same evening. The company promptly notified its cyber‑insurance carrier,...

By DataBreaches.net
The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance
NewsMar 29, 2026

The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance

AI is reshaping cyber risk for European financial institutions, turning generic phishing into highly personalized, multilingual attacks powered by deep‑fakes and synthetic identity documents. Regulators such as the ECB and EBA warn that AI‑driven fraud attempts are surging, while the...

By The European Financial Review
Scaling AI Demands a New Infrastructure Playbook
NewsMar 29, 2026

Scaling AI Demands a New Infrastructure Playbook

Enterprises moving AI from pilots to production face a fundamentally different infrastructure challenge, requiring tight integration of accelerated compute, high‑performance networking, security and observability. Fragmented stacks cause fragile deployments and costly GPU idle time, especially during intensive training or retrieval‑augmented...

By CIO.com
File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites
NewsMar 29, 2026

File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites

A file‑read flaw (CVE‑2026‑3098) in the Smart Slider 3 WordPress plugin allows any authenticated user, even a subscriber, to export arbitrary server files. The vulnerability stems from missing capability checks in the plugin’s AJAX export function, enabling access to sensitive files...

By BleepingComputer
Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate
NewsMar 29, 2026

Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate

Texas’ Department of Information Resources (DIR) has mandated AI‑aware cybersecurity awareness training for all state and local government employees, with a certification deadline of August 31. Kratikal’s Threatcop platform is one of only five vendors approved under the DIR certification, offering...

By Security Boulevard
Do Emergency Microsoft, Oracle Patches Point to Wider Issues?
NewsMar 29, 2026

Do Emergency Microsoft, Oracle Patches Point to Wider Issues?

Microsoft and Oracle have each released emergency out‑of‑band patches this week, drawing attention to the fragility of enterprise update cycles. Microsoft’s KB5085516 fixes a sign‑in error that showed a “no internet” message for standard Microsoft accounts after the latest Patch...

By Slashdot
Thankfully, the Infinite Campus Incident Did Not Involve a Lot of Non-Directory Student Information
NewsMar 28, 2026

Thankfully, the Infinite Campus Incident Did Not Involve a Lot of Non-Directory Student Information

DataBreaches downloaded the Infinite Campus leak posted by ShinyHunters and examined its contents. The majority of files were proprietary or client‑related and did not contain personal student information. Approximately two dozen support tickets referenced students by name, with two tickets...

By DataBreaches.net
Lessons From CalPrivacy PlayOn Order
NewsMar 28, 2026

Lessons From CalPrivacy PlayOn Order

California Privacy Protection Agency (CalPrivacy) fined PlayOn Sports $1.1 million for illegal tracking of student data between January 2023 and December 2024. The company sold personal information to third parties without a functional opt‑out, used a cookie banner that forced consent, and ignored...

By National Law Review – Employment Law
Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
NewsMar 28, 2026

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

Iran‑linked threat actors operating under the Handala Hack persona breached the personal email of FBI Director Kash Patel, leaking historical messages from 2010 and 2019. The same group claimed a destructive wiper attack on medical‑device giant Stryker, wiping thousands of...

By The Hacker News
From Data to Intelligence: Why More Signals Don’t Equal Better Security
NewsMar 28, 2026

From Data to Intelligence: Why More Signals Don’t Equal Better Security

The article argues that simply accumulating more security signals does not improve protection; instead, organizations need to convert raw data into actionable intelligence through verification, attribution, and context, especially around identity. It highlights problems like alert fatigue, false positives, and...

By Security Boulevard
New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures
NewsMar 28, 2026

New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

Infinity Stealer, a new macOS infostealer, uses a Python payload compiled with the open‑source Nuitka compiler to produce a native binary that evades static analysis. The malware is delivered via a ClickFix lure that mimics Cloudflare’s CAPTCHA, prompting users to...

By BleepingComputer
Woodfords Family Services Notifying Patients and Families About 2024 Ransomware Attack
NewsMar 28, 2026

Woodfords Family Services Notifying Patients and Families About 2024 Ransomware Attack

Woodfords Family Services, a Maine provider for people with disabilities, disclosed a ransomware breach that first occurred on April 8, 2024 but was only publicly notified on March 27, 2026 for some victims. The organization previously reported a 2023 incident...

By DataBreaches.net
Simple Ways to Stay Safe When Installing New Software
NewsMar 28, 2026

Simple Ways to Stay Safe When Installing New Software

The article emphasizes proactive security habits when installing new software, highlighting system updates, reputable sources, and careful installation steps as primary defenses. It recommends consulting niche tech blogs and community sites for practical risk assessments beyond generic advice. Core practices...

By AnandTech
Thousands of Corewell Health Patients Affected by Security Breach
NewsMar 28, 2026

Thousands of Corewell Health Patients Affected by Security Breach

Corewell Health disclosed that its former consulting partner, Pinnacle Holdings, suffered a data breach in 2024, potentially compromising the personal information of thousands of patients. The health system promptly initiated an internal review to determine the scope of exposure and...

By DataBreaches.net
Secure Authentication Starts With Secure Software Development
NewsMar 28, 2026

Secure Authentication Starts With Secure Software Development

The MojoAuth blog stresses that secure authentication begins with secure software development, not just choosing the right protocol. It highlights how modern methods like passkeys, WebAuthn, OAuth, and JWT introduce implementation challenges that can become breach vectors. The article outlines...

By Security Boulevard
What Is Shift Left Security?
NewsMar 28, 2026

What Is Shift Left Security?

Shift‑Left Security embeds protection into the earliest phases of the software development lifecycle, moving security checks leftward on the SDLC diagram. Gartner forecasts cloud spending will exceed $1 trillion by 2028, intensifying the need for proactive AppSec. By integrating automated SAST,...

By Security Boulevard
Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live
NewsMar 28, 2026

Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live

Open VSX, the extension marketplace for VS Code forks, patched a critical “Open Sesame” vulnerability that let malicious extensions bypass its pre‑publish scanning pipeline. The flaw stemmed from a Boolean logic error that treated scanner failures as a “no scanners configured”...

By GBHackers On Security
China Used Fake LinkedIn Profiles to Spy on NATO, EU: Security Source
NewsMar 28, 2026

China Used Fake LinkedIn Profiles to Spy on NATO, EU: Security Source

Chinese state security operatives deployed fabricated LinkedIn recruiter accounts to infiltrate NATO and EU institutions, posing as head‑hunters to solicit sensitive information. The fake profiles, such as the "Kevin Zhang" persona, offered paid reports before requesting classified data, paying recruits...

By Hong Kong Free Press – News (Finance/Business coverage)
A New Phishing Scheme Is Targeting NFL and NBA Stars: Here’s How the ‘Adult Film Star’ Scam Works
NewsMar 28, 2026

A New Phishing Scheme Is Targeting NFL and NBA Stars: Here’s How the ‘Adult Film Star’ Scam Works

A Georgia man, Kwamaine Jerell Ford, is accused of running a phishing operation that duped NFL and NBA players by posing as an adult film star. The scheme harvested iCloud credentials, stole credit‑card data and secretly filmed victims during coerced...

By Inc.
Don't YOLO Your File System
NewsMar 28, 2026

Don't YOLO Your File System

Developers are increasingly seeing AI agents wipe files, empty directories, and corrupt home folders when given unrestricted system access. The new open‑source tool jai offers a single‑command sandbox that isolates an agent’s workspace while keeping the current working directory writable....

By Hacker News
'From 16 Hours to Under 5 Minutes': How Gen AI Is Turning Fraud Into a $400B+ Global Industry — and...
NewsMar 27, 2026

'From 16 Hours to Under 5 Minutes': How Gen AI Is Turning Fraud Into a $400B+ Global Industry — and...

Generative AI is slashing the time needed to craft fraud schemes from over 16 hours to under five minutes. The acceleration has helped push global financial losses past $400 billion in a single year, with two‑thirds of scams succeeding within a...

By TechRadar Pro
Breach of Confidence – 27 March 2026
NewsMar 27, 2026

Breach of Confidence – 27 March 2026

The security community faced a wave of incidents in late March, starting with the compromise of Trivy, a popular open‑source scanner, which turned a defensive tool into an attack vector. A separate breach of McKinsey’s AI platform exposed 22 unauthenticated...

By Security Boulevard
ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database
NewsMar 27, 2026

ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database

The ShinyHunters hacker collective announced it is abandoning BreachForums, labeling the platform a waste of time after an FBI seizure in October 2025. Simultaneously, the group released a fresh dump containing data on more than 300,000 BreachForums users, including full...

By HackRead
F5, Breached by an APT Last Year, Says BIG-IP APM Exploited
NewsMar 27, 2026

F5, Breached by an APT Last Year, Says BIG-IP APM Exploited

F5’s BIG‑IP Access Policy Manager (APM) vulnerability CVE‑2025‑53521 is being actively exploited, granting unauthenticated remote code execution. Attackers can disable SELinux, write in‑memory webshells, and seize control of authentication and VPN services used by Fortune 500 firms. The exploit follows a...

By The Stack (TheStack.technology)
Windows PCs Crash Three Times As Often As Macs, Report Says
NewsMar 27, 2026

Windows PCs Crash Three Times As Often As Macs, Report Says

Omnissa’s 2026 State of Digital Workspace report, based on global telemetry, finds Windows PCs crash 3.1 times more often than Macs and freeze 7.5 times more frequently. Windows devices are typically refreshed every three years, compared with five years for Macs, leading...

By Slashdot
Anthropic’s Mythos Leak Is a Wake-Up Call: Phishing 3.0 Is Already Here
NewsMar 27, 2026

Anthropic’s Mythos Leak Is a Wake-Up Call: Phishing 3.0 Is Already Here

Anthropic’s accidental disclosure of its upcoming Claude Mythos model has ignited concerns about AI‑driven cyber threats, but the real alarm is that today’s publicly available generative AI already powers sophisticated phishing attacks. These models can scrape public data, mimic corporate tone,...

By Security Boulevard
Secure Tomorrow’s Data Centers with Platform Firmware Resiliency
NewsMar 27, 2026

Secure Tomorrow’s Data Centers with Platform Firmware Resiliency

The National Institute of Standards and Technology released SP800‑193, a framework for platform firmware resiliency (PFR) that guides data‑center operators in protecting, detecting, and recovering from firmware attacks. The standard distinguishes secured boot, which blocks untrusted code, from measured boot,...

By Electronic Design
BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets
NewsMar 27, 2026

BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets

At BSidesSLC 2025, cloud architect Connor Turpin presented a framework for leveraging large‑language models (LLMs) to streamline risk management in security‑constrained environments. He demonstrated how open‑source LLMs can automate vulnerability triage, threat‑intel summarization, and ticket generation for teams with limited...

By Security Boulevard
Skullcandy Taps Riskified for Fraud Prevention
NewsMar 27, 2026

Skullcandy Taps Riskified for Fraud Prevention

Skullcandy partnered with Riskified via the Shopify app to overhaul its fraud‑prevention workflow. By adding a secondary review layer and recalibrating AI‑driven thresholds, the retailer cut its fraud‑decline rate to about 0.1% and kept chargebacks around 0.06% over 12 months....

By Digital Commerce 360
GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can.
NewsMar 27, 2026

GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can.

Cybersecurity teams face a chronic talent gap, with 4.8 million positions unfilled and 71% of SOC analysts reporting burnout. General‑purpose LLMs like GPT‑4 can summarize alerts but fail to trace attack chains or correlate data across dozens of tools. Purpose‑built cybersecurity...

By Security Boulevard
RSAC 2026: Sonar Shares Why Code Security Must Shift Before CI
NewsMar 27, 2026

RSAC 2026: Sonar Shares Why Code Security Must Shift Before CI

At RSAC 2026, Sonar’s VP of Code Security Jeremy Katz warned that traditional CI/CD checkpoints are no longer sufficient as AI‑assisted, agent‑driven development accelerates code creation. He highlighted a critical gap: security must be applied before code reaches CI, with...

By eSecurity Planet
Biometrics Adoption, Inclusion Gains Depend on Bridging the Understanding Gap
NewsMar 27, 2026

Biometrics Adoption, Inclusion Gains Depend on Bridging the Understanding Gap

Researchers from Hong Kong and Germany examined 22 older Chinese adults’ experiences with biometric payments, finding that convenience and perceived security drive adoption while fears of loss of control and data misuse hinder it. The study, slated for the 2026...

By Biometric Update
Gitleaks Creator Returns with Betterleaks, an Open Source Secrets Scanner for the Agentic Era
NewsMar 27, 2026

Gitleaks Creator Returns with Betterleaks, an Open Source Secrets Scanner for the Agentic Era

The creator of the popular secret‑scanning tool Gitleaks has launched Betterleaks, an open‑source scanner designed as a drop‑in replacement with faster performance and more flexible validation. Backed by AI‑focused security startup Aikido, Betterleaks swaps hard‑coded entropy checks for CEL‑based rules...

By The New Stack
Ransomware Attack Totally Cripples Jackson County Sheriff’s Office in Indiana
NewsMar 27, 2026

Ransomware Attack Totally Cripples Jackson County Sheriff’s Office in Indiana

A ransomware attack crippled the Jackson County Sheriff’s Office IT infrastructure last week. The breach likely began with a phishing email that delivered malicious code, which lay dormant before encrypting files and spreading laterally. The resulting total network outage forced...

By DataBreaches.net
FBI Confirms Theft of Director’s Personal Emails by Iran-Linked Hacking Group
NewsMar 27, 2026

FBI Confirms Theft of Director’s Personal Emails by Iran-Linked Hacking Group

The FBI confirmed that a hacking group tied to Iran's Ministry of Intelligence and Security, operating under the name Handala, breached the personal email account of FBI Director Kash Patel and leaked photos and routine correspondence from 2010 and 2019....

By The Record by Recorded Future
Pro-Iran Hackers Claim Breach of FBI Director’s Email
NewsMar 27, 2026

Pro-Iran Hackers Claim Breach of FBI Director’s Email

Pro‑Iran hacktivist group Handala announced it accessed FBI Director Kash Patel’s personal email and posted screenshots online. An insider familiar with the breach said the leaked material appears authentic, though the FBI maintains it contains only historical personal information and...

By FCW (GovExec Technology)
Robin Tombs Talks UK Digital ID with Trinsic as Yoti Passes 23M Global Downloads
NewsMar 27, 2026

Robin Tombs Talks UK Digital ID with Trinsic as Yoti Passes 23M Global Downloads

Yoti, the reusable digital identity wallet founded in 2014, has now exceeded 23 million global downloads, including 7.8 million in the United Kingdom, with 5 million added in the past year. CEO Robin Tombs discussed the platform’s evolution on Trinsic’s Future of Identity...

By Biometric Update
BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks
NewsMar 27, 2026

BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks

WatchGuard researchers have uncovered a new BianLian ransomware campaign that distributes malicious SVG invoice images to companies in Venezuela. The SVG files hide XML code that silently contacts a shortened ja.cat URL, redirects through compromised Brazilian domains, and drops a...

By HackRead
AI Agents Are About to Overtake Cybersecurity — for Better, or Worse?
NewsMar 27, 2026

AI Agents Are About to Overtake Cybersecurity — for Better, or Worse?

At RSAC 2026 the cybersecurity community warned that AI agents are moving from a defensive tool to a primary weapon for attackers. These autonomous agents can hijack identities, rewrite security policies and launch supply‑chain attacks at machine speed, outpacing traditional...

By SiliconANGLE
Microsoft Tells Crusty Old Kernel Drivers to Get with the Windows Hardware Compatibility Program
NewsMar 27, 2026

Microsoft Tells Crusty Old Kernel Drivers to Get with the Windows Hardware Compatibility Program

Microsoft will cease trusting kernel drivers signed through the long‑deprecated cross‑signed root program, requiring all drivers to be certified via the Windows Hardware Compatibility Program (WHCP). The change rolls out in an "evaluation mode" with the April 2026 Windows Update, allowing...

By The Register
Persistent Hacktivist Activity and AI Integration Drive EMEA DDoS Activity
NewsMar 27, 2026

Persistent Hacktivist Activity and AI Integration Drive EMEA DDoS Activity

The second half of 2025 saw a surge in DDoS attacks across Europe, the Middle East and Africa, with 3.33 million incidents recorded, nearly double any other region. Hacktivist groups Keymous+ and NoName057(16) drove the majority of campaigns, targeting governments, financial...

By Irish Tech News
Lawmakers Question VPN Impact on Americans' FISA Surveillance Protections
NewsMar 27, 2026

Lawmakers Question VPN Impact on Americans' FISA Surveillance Protections

Senate and House Democrats sent a letter to DNI Tulsi Gabbard asking whether using virtual private networks could strip Americans of their heightened FISA protections. They argue VPNs obscure a user’s true location, potentially reclassifying U.S. persons as foreign targets...

By FCW (GovExec Technology)
Ditto Launches to Orchestrate Next Generation Identity with Cryptographic Certainty
NewsMar 27, 2026

Ditto Launches to Orchestrate Next Generation Identity with Cryptographic Certainty

Ditto, formerly Uniken, launched a privacy‑first digital identity platform that delivers cryptographic certainty for customer identity access management. The solution combines reusable digital wallets, zero‑knowledge proof verification, and strong authentication across devices, positioning it for compliance with eIDAS and the...

By Identity Week
Apple Says No One Using Lockdown Mode Has Been Hacked with Spyware
NewsMar 27, 2026

Apple Says No One Using Lockdown Mode Has Been Hacked with Spyware

Apple announced that, since introducing Lockdown Mode four years ago, it has not detected any successful mercenary spyware attacks on devices with the feature enabled. The company’s spokesperson confirmed there are no known breaches, echoing earlier claims and citing observations...

By TechCrunch (Main)
RSAC 2026: How Zscaler Is Securing the AI Ecosystem
NewsMar 27, 2026

RSAC 2026: How Zscaler Is Securing the AI Ecosystem

At RSAC 2026 Zscaler unveiled an AI Security Suite that moves beyond point‑solution fixes to protect the entire AI ecosystem. The platform delivers an inventory of AI assets, applies zero‑trust controls to AI traffic, and automates lifecycle defenses such as...

By eSecurity Planet
SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1
NewsMar 27, 2026

SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1

At RSAC 2026, Reach Security’s CEO Garrett Hamilton announced the company’s win of the SC Awards’ Best Continuous Threat Exposure Management (CTEM) Solution. The platform continuously identifies, prioritizes, and remediates real‑world risk by focusing on misconfigurations, configuration drift, and control‑level exposure...

By SC Media
Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users: What You Need to Know
NewsMar 27, 2026

Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users: What You Need to Know

Google has deployed a high‑severity security update for Chrome, addressing eight critical vulnerabilities that impact roughly 3.5 billion users worldwide. The flaws span WebAudio, WebGL, WebGPU, font handling and FedCM, and are rated “High,” meaning they could enable code execution or...

By TechRepublic – Articles