
Over 300 Vietnamese Arrested After Cambodia Scam Bust
More than 300 Vietnamese were arrested in Dong Nai province after being repatriated from Cambodia, where authorities dismantled a transnational online‑scam ring. Cambodia deported 776 Vietnamese nationals linked to the illicit operation, highlighting the scale of Southeast Asia’s cyber‑fraud ecosystem. The suspects allegedly used social media platforms to defraud elderly and low‑tech users, though the total proceeds remain undisclosed. Vietnam has reported $1.5 billion in losses since 2020 across 24,000 fraud cases.
Is Your Signal Secure?
At the NAB Show, a panel titled “Securing the Signal” examined how broadcasters can shift from reactive security to proactive risk management across distributed field operations. Experts from Fox, Dataminr, Smith Entertainment Group and Verkdata discussed integrating real‑time threat‑intelligence platforms...

The Compliance Blind Spot in Cyber Risk
Financial institutions are discovering that compliance can fail even when core systems stay online. Automated compliance judgments degrade silently when underlying data conditions change during cyber incidents, eroding the validity of regulatory outputs. Regulators are shifting focus from mere control...
CareCloud Notifies the SEC After Attack on One of Its EHR Environments
CareCloud disclosed to the SEC that an unauthorized third party accessed one of its six electronic health record (EHR) environments on March 16, causing an eight‑hour disruption that was fully restored the same evening. The company promptly notified its cyber‑insurance carrier,...

The 2026 Cyber Risk Horizon: Why AI Is Changing the Game for European Finance
AI is reshaping cyber risk for European financial institutions, turning generic phishing into highly personalized, multilingual attacks powered by deep‑fakes and synthetic identity documents. Regulators such as the ECB and EBA warn that AI‑driven fraud attempts are surging, while the...
Scaling AI Demands a New Infrastructure Playbook
Enterprises moving AI from pilots to production face a fundamentally different infrastructure challenge, requiring tight integration of accelerated compute, high‑performance networking, security and observability. Fragmented stacks cause fragile deployments and costly GPU idle time, especially during intensive training or retrieval‑augmented...

File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites
A file‑read flaw (CVE‑2026‑3098) in the Smart Slider 3 WordPress plugin allows any authenticated user, even a subscriber, to export arbitrary server files. The vulnerability stems from missing capability checks in the plugin’s AJAX export function, enabling access to sensitive files...

Cybersecurity AI Awareness Training for Texas Government Agencies: How Kratikal’s Threatcop Meets the DIR Mandate
Texas’ Department of Information Resources (DIR) has mandated AI‑aware cybersecurity awareness training for all state and local government employees, with a certification deadline of August 31. Kratikal’s Threatcop platform is one of only five vendors approved under the DIR certification, offering...
Do Emergency Microsoft, Oracle Patches Point to Wider Issues?
Microsoft and Oracle have each released emergency out‑of‑band patches this week, drawing attention to the fragility of enterprise update cycles. Microsoft’s KB5085516 fixes a sign‑in error that showed a “no internet” message for standard Microsoft accounts after the latest Patch...
Thankfully, the Infinite Campus Incident Did Not Involve a Lot of Non-Directory Student Information
DataBreaches downloaded the Infinite Campus leak posted by ShinyHunters and examined its contents. The majority of files were proprietary or client‑related and did not contain personal student information. Approximately two dozen support tickets referenced students by name, with two tickets...

Lessons From CalPrivacy PlayOn Order
California Privacy Protection Agency (CalPrivacy) fined PlayOn Sports $1.1 million for illegal tracking of student data between January 2023 and December 2024. The company sold personal information to third parties without a functional opt‑out, used a cookie banner that forced consent, and ignored...

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
Iran‑linked threat actors operating under the Handala Hack persona breached the personal email of FBI Director Kash Patel, leaking historical messages from 2010 and 2019. The same group claimed a destructive wiper attack on medical‑device giant Stryker, wiping thousands of...

From Data to Intelligence: Why More Signals Don’t Equal Better Security
The article argues that simply accumulating more security signals does not improve protection; instead, organizations need to convert raw data into actionable intelligence through verification, attribution, and context, especially around identity. It highlights problems like alert fatigue, false positives, and...
New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures
Infinity Stealer, a new macOS infostealer, uses a Python payload compiled with the open‑source Nuitka compiler to produce a native binary that evades static analysis. The malware is delivered via a ClickFix lure that mimics Cloudflare’s CAPTCHA, prompting users to...

Woodfords Family Services Notifying Patients and Families About 2024 Ransomware Attack
Woodfords Family Services, a Maine provider for people with disabilities, disclosed a ransomware breach that first occurred on April 8, 2024 but was only publicly notified on March 27, 2026 for some victims. The organization previously reported a 2023 incident...
Simple Ways to Stay Safe When Installing New Software
The article emphasizes proactive security habits when installing new software, highlighting system updates, reputable sources, and careful installation steps as primary defenses. It recommends consulting niche tech blogs and community sites for practical risk assessments beyond generic advice. Core practices...
Thousands of Corewell Health Patients Affected by Security Breach
Corewell Health disclosed that its former consulting partner, Pinnacle Holdings, suffered a data breach in 2024, potentially compromising the personal information of thousands of patients. The health system promptly initiated an internal review to determine the scope of exposure and...

Secure Authentication Starts With Secure Software Development
The MojoAuth blog stresses that secure authentication begins with secure software development, not just choosing the right protocol. It highlights how modern methods like passkeys, WebAuthn, OAuth, and JWT introduce implementation challenges that can become breach vectors. The article outlines...

What Is Shift Left Security?
Shift‑Left Security embeds protection into the earliest phases of the software development lifecycle, moving security checks leftward on the SDLC diagram. Gartner forecasts cloud spending will exceed $1 trillion by 2028, intensifying the need for proactive AppSec. By integrating automated SAST,...

Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live
Open VSX, the extension marketplace for VS Code forks, patched a critical “Open Sesame” vulnerability that let malicious extensions bypass its pre‑publish scanning pipeline. The flaw stemmed from a Boolean logic error that treated scanner failures as a “no scanners configured”...

China Used Fake LinkedIn Profiles to Spy on NATO, EU: Security Source
Chinese state security operatives deployed fabricated LinkedIn recruiter accounts to infiltrate NATO and EU institutions, posing as head‑hunters to solicit sensitive information. The fake profiles, such as the "Kevin Zhang" persona, offered paid reports before requesting classified data, paying recruits...

A New Phishing Scheme Is Targeting NFL and NBA Stars: Here’s How the ‘Adult Film Star’ Scam Works
A Georgia man, Kwamaine Jerell Ford, is accused of running a phishing operation that duped NFL and NBA players by posing as an adult film star. The scheme harvested iCloud credentials, stole credit‑card data and secretly filmed victims during coerced...
Don't YOLO Your File System
Developers are increasingly seeing AI agents wipe files, empty directories, and corrupt home folders when given unrestricted system access. The new open‑source tool jai offers a single‑command sandbox that isolates an agent’s workspace while keeping the current working directory writable....

'From 16 Hours to Under 5 Minutes': How Gen AI Is Turning Fraud Into a $400B+ Global Industry — and...
Generative AI is slashing the time needed to craft fraud schemes from over 16 hours to under five minutes. The acceleration has helped push global financial losses past $400 billion in a single year, with two‑thirds of scams succeeding within a...

Breach of Confidence – 27 March 2026
The security community faced a wave of incidents in late March, starting with the compromise of Trivy, a popular open‑source scanner, which turned a defensive tool into an attack vector. A separate breach of McKinsey’s AI platform exposed 22 unauthenticated...

ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database
The ShinyHunters hacker collective announced it is abandoning BreachForums, labeling the platform a waste of time after an FBI seizure in October 2025. Simultaneously, the group released a fresh dump containing data on more than 300,000 BreachForums users, including full...

F5, Breached by an APT Last Year, Says BIG-IP APM Exploited
F5’s BIG‑IP Access Policy Manager (APM) vulnerability CVE‑2025‑53521 is being actively exploited, granting unauthenticated remote code execution. Attackers can disable SELinux, write in‑memory webshells, and seize control of authentication and VPN services used by Fortune 500 firms. The exploit follows a...
Windows PCs Crash Three Times As Often As Macs, Report Says
Omnissa’s 2026 State of Digital Workspace report, based on global telemetry, finds Windows PCs crash 3.1 times more often than Macs and freeze 7.5 times more frequently. Windows devices are typically refreshed every three years, compared with five years for Macs, leading...
Anthropic’s Mythos Leak Is a Wake-Up Call: Phishing 3.0 Is Already Here
Anthropic’s accidental disclosure of its upcoming Claude Mythos model has ignited concerns about AI‑driven cyber threats, but the real alarm is that today’s publicly available generative AI already powers sophisticated phishing attacks. These models can scrape public data, mimic corporate tone,...

Secure Tomorrow’s Data Centers with Platform Firmware Resiliency
The National Institute of Standards and Technology released SP800‑193, a framework for platform firmware resiliency (PFR) that guides data‑center operators in protecting, detecting, and recovering from firmware attacks. The standard distinguishes secured boot, which blocks untrusted code, from measured boot,...

BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets
At BSidesSLC 2025, cloud architect Connor Turpin presented a framework for leveraging large‑language models (LLMs) to streamline risk management in security‑constrained environments. He demonstrated how open‑source LLMs can automate vulnerability triage, threat‑intel summarization, and ticket generation for teams with limited...
Skullcandy Taps Riskified for Fraud Prevention
Skullcandy partnered with Riskified via the Shopify app to overhaul its fraud‑prevention workflow. By adding a secondary review layer and recalibrating AI‑driven thresholds, the retailer cut its fraud‑decline rate to about 0.1% and kept chargebacks around 0.06% over 12 months....

GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can.
Cybersecurity teams face a chronic talent gap, with 4.8 million positions unfilled and 71% of SOC analysts reporting burnout. General‑purpose LLMs like GPT‑4 can summarize alerts but fail to trace attack chains or correlate data across dozens of tools. Purpose‑built cybersecurity...

RSAC 2026: Sonar Shares Why Code Security Must Shift Before CI
At RSAC 2026, Sonar’s VP of Code Security Jeremy Katz warned that traditional CI/CD checkpoints are no longer sufficient as AI‑assisted, agent‑driven development accelerates code creation. He highlighted a critical gap: security must be applied before code reaches CI, with...

Biometrics Adoption, Inclusion Gains Depend on Bridging the Understanding Gap
Researchers from Hong Kong and Germany examined 22 older Chinese adults’ experiences with biometric payments, finding that convenience and perceived security drive adoption while fears of loss of control and data misuse hinder it. The study, slated for the 2026...
Gitleaks Creator Returns with Betterleaks, an Open Source Secrets Scanner for the Agentic Era
The creator of the popular secret‑scanning tool Gitleaks has launched Betterleaks, an open‑source scanner designed as a drop‑in replacement with faster performance and more flexible validation. Backed by AI‑focused security startup Aikido, Betterleaks swaps hard‑coded entropy checks for CEL‑based rules...
Ransomware Attack Totally Cripples Jackson County Sheriff’s Office in Indiana
A ransomware attack crippled the Jackson County Sheriff’s Office IT infrastructure last week. The breach likely began with a phishing email that delivered malicious code, which lay dormant before encrypting files and spreading laterally. The resulting total network outage forced...

FBI Confirms Theft of Director’s Personal Emails by Iran-Linked Hacking Group
The FBI confirmed that a hacking group tied to Iran's Ministry of Intelligence and Security, operating under the name Handala, breached the personal email account of FBI Director Kash Patel and leaked photos and routine correspondence from 2010 and 2019....

Pro-Iran Hackers Claim Breach of FBI Director’s Email
Pro‑Iran hacktivist group Handala announced it accessed FBI Director Kash Patel’s personal email and posted screenshots online. An insider familiar with the breach said the leaked material appears authentic, though the FBI maintains it contains only historical personal information and...

Robin Tombs Talks UK Digital ID with Trinsic as Yoti Passes 23M Global Downloads
Yoti, the reusable digital identity wallet founded in 2014, has now exceeded 23 million global downloads, including 7.8 million in the United Kingdom, with 5 million added in the past year. CEO Robin Tombs discussed the platform’s evolution on Trinsic’s Future of Identity...

BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks
WatchGuard researchers have uncovered a new BianLian ransomware campaign that distributes malicious SVG invoice images to companies in Venezuela. The SVG files hide XML code that silently contacts a shortened ja.cat URL, redirects through compromised Brazilian domains, and drops a...

AI Agents Are About to Overtake Cybersecurity — for Better, or Worse?
At RSAC 2026 the cybersecurity community warned that AI agents are moving from a defensive tool to a primary weapon for attackers. These autonomous agents can hijack identities, rewrite security policies and launch supply‑chain attacks at machine speed, outpacing traditional...

Microsoft Tells Crusty Old Kernel Drivers to Get with the Windows Hardware Compatibility Program
Microsoft will cease trusting kernel drivers signed through the long‑deprecated cross‑signed root program, requiring all drivers to be certified via the Windows Hardware Compatibility Program (WHCP). The change rolls out in an "evaluation mode" with the April 2026 Windows Update, allowing...

Persistent Hacktivist Activity and AI Integration Drive EMEA DDoS Activity
The second half of 2025 saw a surge in DDoS attacks across Europe, the Middle East and Africa, with 3.33 million incidents recorded, nearly double any other region. Hacktivist groups Keymous+ and NoName057(16) drove the majority of campaigns, targeting governments, financial...

Lawmakers Question VPN Impact on Americans' FISA Surveillance Protections
Senate and House Democrats sent a letter to DNI Tulsi Gabbard asking whether using virtual private networks could strip Americans of their heightened FISA protections. They argue VPNs obscure a user’s true location, potentially reclassifying U.S. persons as foreign targets...
Ditto Launches to Orchestrate Next Generation Identity with Cryptographic Certainty
Ditto, formerly Uniken, launched a privacy‑first digital identity platform that delivers cryptographic certainty for customer identity access management. The solution combines reusable digital wallets, zero‑knowledge proof verification, and strong authentication across devices, positioning it for compliance with eIDAS and the...

Apple Says No One Using Lockdown Mode Has Been Hacked with Spyware
Apple announced that, since introducing Lockdown Mode four years ago, it has not detected any successful mercenary spyware attacks on devices with the feature enabled. The company’s spokesperson confirmed there are no known breaches, echoing earlier claims and citing observations...

RSAC 2026: How Zscaler Is Securing the AI Ecosystem
At RSAC 2026 Zscaler unveiled an AI Security Suite that moves beyond point‑solution fixes to protect the entire AI ecosystem. The platform delivers an inventory of AI assets, applies zero‑trust controls to AI traffic, and automates lifecycle defenses such as...

SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1
At RSAC 2026, Reach Security’s CEO Garrett Hamilton announced the company’s win of the SC Awards’ Best Continuous Threat Exposure Management (CTEM) Solution. The platform continuously identifies, prioritizes, and remediates real‑world risk by focusing on misconfigurations, configuration drift, and control‑level exposure...

Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users: What You Need to Know
Google has deployed a high‑severity security update for Chrome, addressing eight critical vulnerabilities that impact roughly 3.5 billion users worldwide. The flaws span WebAudio, WebGL, WebGPU, font handling and FedCM, and are rated “High,” meaning they could enable code execution or...