Cybersecurity News and Headlines

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure
NewsMar 26, 2026

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

Rapid7 disclosed that a China‑linked state‑sponsored threat actor has embedded kernel‑level implants and passive backdoors deep within global telecom backbone infrastructure. The campaign leverages the BPFdoor Linux backdoor, CrossC2 beacons and the TinyShell framework to achieve long‑term, stealthy persistence across...

By SecurityWeek
OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns
NewsMar 26, 2026

OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns

OpenAI announced a Safety Bug Bounty program on March 26, hosted on Bugcrowd, to solicit disclosures of AI abuse and safety risks beyond traditional security flaws. The initiative complements its existing Security Bug Bounty, which has already rewarded 409 vulnerabilities since...

By Infosecurity Magazine
Intermediaries Driving Global Spyware Market Expansion
NewsMar 26, 2026

Intermediaries Driving Global Spyware Market Expansion

Intermediaries such as brokers, resellers, and exploit engineers are expanding the global spyware market by obscuring supply chains and facilitating sales to sanctioned or low‑tech nations. A recent Atlantic Council report highlights examples like a South African intermediary for Memento...

By Dark Reading
Quarantining Risk: How Public Health Is Scaling AI without Exposing Sensitive Data
NewsMar 26, 2026

Quarantining Risk: How Public Health Is Scaling AI without Exposing Sensitive Data

Public health agencies are turning to cloud‑native scientific computing to run massive genomics and epidemiological models without compromising patient privacy. The UK Health Security Agency (UKHSA) standardized its fragmented pandemic‑era infrastructure by adopting Red Hat OpenShift on Azure and integrating Nvidia...

By SiliconANGLE
Compliance Emerges as Competitive Differentiator Amid Rising Data Sovereignty Scrutiny
NewsMar 26, 2026

Compliance Emerges as Competitive Differentiator Amid Rising Data Sovereignty Scrutiny

Data sovereignty has moved from a niche compliance checkbox to a core business priority, expanding beyond traditional sensitive records to include email addresses, logs, and metadata. Executives now demand real‑time visibility into where data originates, travels, and resides, as illustrated...

By Diginomica
Nova Scotia Power Data Breach Compromises Data of Over 900,000 Users
NewsMar 26, 2026

Nova Scotia Power Data Breach Compromises Data of Over 900,000 Users

Nova Scotia Power disclosed a data breach affecting more than 900,000 current and former customers, exposing names, contact details, birth dates, banking information, driver’s licenses and Social Insurance Numbers. The intrusion began around March 19, 2025 when an employee clicked...

By The Cyber Express
Invoice Fraud Costs UK Construction Sector Millions, NCA Warns
NewsMar 26, 2026

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

UK’s National Crime Agency, together with the National Federation of Builders, has launched an awareness campaign targeting invoice‑fraud in the construction sector. In September 2025, fraudulent invoices cost the industry almost £4 million (≈$5.3 million) across 83 reported cases, and construction plus...

By Infosecurity Magazine
Blackwired and ARMIS Join Forces to Boost Cyber Resilience
NewsMar 26, 2026

Blackwired and ARMIS Join Forces to Boost Cyber Resilience

Blackwired and ARMIS International have formed a strategic alliance to enhance cyber resilience against nation‑state attacks. The partnership combines Blackwired’s ThirdWatch platform—featuring 3‑D threat visualisation and the Aim‑Ready‑Fire methodology—with ARMIS’s operational crisis frameworks and deep government relationships. Together they aim...

By RegTech Analyst
Dell and HP Roll Out Quantum-Resistant Device Security
NewsMar 26, 2026

Dell and HP Roll Out Quantum-Resistant Device Security

HP and Dell announced new hardware‑level security features aimed at defending against physical attacks and emerging quantum‑computing threats. HP introduced TPM Guard, which encrypts the TPM‑CPU link, and added quantum‑resistant cryptography to its LaserJet Pro and Enterprise printer lines along...

By SecurityWeek
Node.js Fixes Critical Flaws, Patches DoS Risk in Latest Security Update
NewsMar 26, 2026

Node.js Fixes Critical Flaws, Patches DoS Risk in Latest Security Update

The Node.js project released a March 2026 security rollout covering its 20.x, 22.x, 24.x and 25.x branches. The update patches a critical TLS handling flaw (CVE-2026-21637) that could trigger remote denial‑of‑service, and a high‑severity HTTP header bug (CVE-2026-21710) that may...

By The Cyber Express
DataBahn Brings AI-Driven Intelligence Into the Security Pipeline
NewsMar 26, 2026

DataBahn Brings AI-Driven Intelligence Into the Security Pipeline

DataBahn.ai unveiled Autonomous In‑Stream Data Intelligence (AIDI), an AI‑native model that interprets, validates, and acts on security telemetry as it flows through the pipeline. The accompanying DataBahn Agent Farm deploys specialized AI agents to automate connector creation, asset mapping, and...

By Help Net Security
Scalefusion Unveils the Future of Endpoint Management at 33rd Convergence India Expo
NewsMar 26, 2026

Scalefusion Unveils the Future of Endpoint Management at 33rd Convergence India Expo

Scalefusion showcased its unified endpoint management vision at the 33rd Convergence India Expo in Delhi, demonstrating its UEM, OneIdP, and Veltar solutions. The startup highlighted a single‑agent platform that merges device management, zero‑trust identity, and compliance security. Thousands of attendees...

By Entrackr
Announcing Kubescape 4.0 Enterprise Stability Meets the AI Era
NewsMar 26, 2026

Announcing Kubescape 4.0 Enterprise Stability Meets the AI Era

Kubescape 4.0 launches with enterprise‑grade stability, delivering General Availability for Runtime Threat Detection and a new Kubernetes‑native Storage layer. The release consolidates security agents by deprecating the host‑sensor and merging its functions into a single node‑agent, simplifying cluster management. It...

By CNCF Blog
Breaking Down “The Mosaic Effect”
NewsMar 26, 2026

Breaking Down “The Mosaic Effect”

Artificial intelligence is accelerating the "mosaic effect," where separate, permissible data points are combined to reveal sensitive insights. The effect, originally noted in intelligence work, now emerges in seconds as AI correlates thousands of low‑risk records, threatening compliance in regulated...

By Security Magazine (Cybersecurity)
Zero-Trust on OKE: How to Actually Secure Your Clusters With Terraform
NewsMar 26, 2026

Zero-Trust on OKE: How to Actually Secure Your Clusters With Terraform

The article outlines a Terraform‑driven approach to building a zero‑trust Oracle Kubernetes Engine (OKE) cluster. It replaces overlay networking with OCI VCN‑Native CNI, deploys a private control plane without a public IP, and enables AMD SEV confidential computing for memory...

By Container Journal
Importance Of Hardware Security Verification In Pre-Silicon Design
NewsMar 26, 2026

Importance Of Hardware Security Verification In Pre-Silicon Design

Hardware security verification is becoming a prerequisite for any silicon destined for cloud, automotive, industrial or edge AI applications. The discipline rests on two pillars: functional security verification, which confirms that security features behave as specified, and protection verification, which...

By Semiconductor Engineering
UAE Positions Cyber Security as Pillar of National Resilience and Digital Growth
NewsMar 26, 2026

UAE Positions Cyber Security as Pillar of National Resilience and Digital Growth

The United Arab Emirates has formalized a nationally coordinated cyber‑security framework that links government, strategic industries and private partners. Continuous monitoring, AI‑enhanced threat detection and 24/7 response teams are embedded in a unified structure to protect critical infrastructure. The strategy...

By ComputerWeekly – DevOps
Grafana Security Release: Critical and High Severity Security Fixes for CVE-2026-27876 and CVE-2026-27880
NewsMar 26, 2026

Grafana Security Release: Critical and High Severity Security Fixes for CVE-2026-27876 and CVE-2026-27880

Grafana Labs announced version 12.4.2 and patched releases for 12.3, 12.2, 12.1 and 11.6, addressing two high‑impact vulnerabilities. CVE‑2026‑27876 is a critical 9.1‑rated remote‑code‑execution flaw in the sqlExpressions feature that allows arbitrary file writes. CVE‑2026‑27880 is a high‑severity 7.5‑rated denial‑of‑service...

By Grafana Labs – Blog
Incident Response & Hiring Trends: What HR Can Learn From Semperis
NewsMar 26, 2026

Incident Response & Hiring Trends: What HR Can Learn From Semperis

Semperis has positioned its platform as a full‑stack incident response solution, offering real‑time threat detection, automated alerting, and rapid containment tools. The suite also streamlines recovery by rolling back unauthorized changes and supports compliance with detailed audit logs. In addition...

By Onrec
LEO Satellite Operators Could Be Beyond Australian Data Laws
NewsMar 25, 2026

LEO Satellite Operators Could Be Beyond Australian Data Laws

Australia’s Cyber Security Centre, together with international partners, warned that commercial low‑Earth‑orbit (LEO) satellite operators can deliver connectivity to Australian users without a local footprint, leaving data outside the reach of domestic privacy laws. The advisory highlights that LEO constellations...

By iTnews (Australia) – Government
Got One of Those Weird Fake Microsoft Security Warning Screens
NewsMar 25, 2026

Got One of Those Weird Fake Microsoft Security Warning Screens

A fake Microsoft security warning overlay appeared in the Brave browser, locking the screen and preventing normal navigation. The pop‑up, triggered by malicious ads—often from Facebook—forced the user to terminate the browser via Task Manager. Upon restart, the warning did...

By AnandTech
GitHub Adds AI-Powered Bug Detection to Expand Security Coverage
NewsMar 25, 2026

GitHub Adds AI-Powered Bug Detection to Expand Security Coverage

GitHub announced an AI‑powered scanning layer for its Code Security suite, complementing the existing CodeQL static analysis. The hybrid approach expands vulnerability detection to languages and frameworks such as Bash, Dockerfiles, Terraform, and PHP, while CodeQL continues deep semantic analysis...

By BleepingComputer
European Officials Highlight Private Sector Help in Major Cybercrime Takedowns
NewsMar 25, 2026

European Officials Highlight Private Sector Help in Major Cybercrime Takedowns

European cyber law enforcement leaders at RSAC highlighted the growing role of private‑sector partners in dismantling major ransomware groups such as LockBit and Scattered Spider. Officials from the Netherlands, UK and Germany noted that industry briefings helped legitimize takedowns and...

By FCW (GovExec Technology)
Beyond IOCs: A Framework for High-Impact Cyber Threat Intelligence - Samuel Hassine - RSAC26 #3
NewsMar 25, 2026

Beyond IOCs: A Framework for High-Impact Cyber Threat Intelligence - Samuel Hassine - RSAC26 #3

Samuel Hassine, CEO of Filigran, outlined a shift from reactive indicator‑of‑compromise (IOC) alerts to a business‑focused Continuous Threat Exposure Management (CTEM) framework. He emphasized unifying threat intelligence with adversarial attack simulation using platforms like OpenCTI to drive measurable risk reduction....

By SC Media
Alleged RedLine Infostealer Conspirator Extradited to US
NewsMar 25, 2026

Alleged RedLine Infostealer Conspirator Extradited to US

An Armenian national, Hambardzum Minasyan, was extradited to the United States and appeared in a Texas federal court on charges tied to the RedLine infostealer. Prosecutors allege he helped develop, host, and monetize the malware, which siphons billions of user...

By CyberScoop
ORNL Introduces ‘Photon’ Framework for Accelerating AI Vulnerability Discovery on Frontier
NewsMar 25, 2026

ORNL Introduces ‘Photon’ Framework for Accelerating AI Vulnerability Discovery on Frontier

Oak Ridge National Laboratory’s CAISER team unveiled Photon, a new framework that uses the Frontier exascale supercomputer to accelerate AI vulnerability discovery. By repurposing the DeepHyper training system, Photon runs thousands of jailbreak prompts in parallel, achieving over 95% GPU...

By EnterpriseAI (AIwire)
7 Employer Tips For Handling Calif. Privacy Risk Assessments
NewsMar 25, 2026

7 Employer Tips For Handling Calif. Privacy Risk Assessments

California employers must now meet the California Consumer Privacy Act’s (CCPA) risk assessment mandate, which requires a systematic review of personal data practices. Law360 outlines seven practical steps, including data mapping, privacy impact analyses, vendor oversight, employee training, documentation, continuous...

By Littler – Insights/News
Convicted Spyware Chief Hints that Greece’s Government Was Behind Dozens of Phone Hacks
NewsMar 25, 2026

Convicted Spyware Chief Hints that Greece’s Government Was Behind Dozens of Phone Hacks

Intellexa founder Tal Dilian, convicted of orchestrating a mass‑wiretapping campaign in Greece, announced his intention to appeal the eight‑year prison sentence. The scandal, dubbed “Greek Watergate,” involved the Predator spyware compromising phones of ministers, opposition leaders, military officials and journalists....

By TechCrunch (Cybersecurity)
AI Supply Chain Attacks Don’t Even Require Malware…just Post Poisoned Documentation
NewsMar 25, 2026

AI Supply Chain Attacks Don’t Even Require Malware…just Post Poisoned Documentation

Andrew Ng's Context Hub service supplies up‑to‑date API documentation to AI coding agents, but its open‑pull‑request workflow lacks any content sanitisation. Security researcher Mickey Shmueli demonstrated a proof‑of‑concept where poisoned documentation caused agents to add malicious PyPI packages to generated code....

By The Register — Networks
AI Agent Identity and Next‑gen Enterprise Authentication Prominent at RSAC 2026
NewsMar 25, 2026

AI Agent Identity and Next‑gen Enterprise Authentication Prominent at RSAC 2026

At RSA Conference 2026, vendors highlighted password‑less authentication for both humans and AI agents, with Swissbit unveiling a biometric FIDO2 key that adds post‑quantum resistance, and RSA extending its identity suite to Microsoft 365 E7. IBM, Auth0 and Yubico introduced...

By Biometric Update
Readying Industrial Connectivity for Cybersecurity Requirements
NewsMar 25, 2026

Readying Industrial Connectivity for Cybersecurity Requirements

Cyber attacks on industrial operations have highlighted the lag in OT cybersecurity compared with IT. The EU Cyber Resilience Act (CRA), effective from December 2024, forces manufacturers to report vulnerabilities and obtain CE marking for new digital products by December 2027. Standards...

By Control Design
Why Revenue Cycle Teams Must Prepare for Extended Downtime in the Age of Cyber Threats
NewsMar 25, 2026

Why Revenue Cycle Teams Must Prepare for Extended Downtime in the Age of Cyber Threats

Healthcare providers face escalating ransomware and cloud‑outage threats that can instantly cripple revenue cycle operations, halting claim submissions and cash flow. Recent incidents, such as the Change Healthcare clearinghouse outage and a regional system’s backup encryption, exposed critical blind spots...

By HFMA – Healthcare Financial Management Association
In-Sensor Cryptography Links Physical Process to Digital Identity
NewsMar 25, 2026

In-Sensor Cryptography Links Physical Process to Digital Identity

Researchers unveiled a monolithic in‑sensor cryptographic system that hashes and digitally signs data at the moment of capture, linking each measurement to an immutable digital identity. The prototype, built on 180 nm CMOS, demonstrated real‑time signing of cardiac cell voltage recordings...

By Bioengineer.org
Bubble AI App Builder Abused to Steal Microsoft Account Credentials
NewsMar 25, 2026

Bubble AI App Builder Abused to Steal Microsoft Account Credentials

Threat actors are exploiting Bubble, an AI‑powered no‑code app builder, to host malicious web apps that impersonate Microsoft login pages. By serving phishing pages from the trusted *.bubble.io domain, email security solutions fail to flag the links, allowing credentials to...

By BleepingComputer
TeamPCP Supply Chain Attack Hits LiteLLM PyPI Package
NewsMar 25, 2026

TeamPCP Supply Chain Attack Hits LiteLLM PyPI Package

Open‑source Python library LiteLLM was compromised by the TeamPCP threat group, which uploaded malicious versions to PyPI that have since been removed. The packages deployed a three‑stage intrusion: credential harvesting, a Kubernetes lateral‑movement toolkit, and a persistent systemd backdoor. Endor...

By SC Media
Trojanized ConnectWise ScreenConnect Installers Deployed in Tax-Themed Malvertising Campaign
NewsMar 25, 2026

Trojanized ConnectWise ScreenConnect Installers Deployed in Tax-Themed Malvertising Campaign

Cybercriminals have been running a tax‑season malvertising campaign since January 2026, hijacking Google Ads to serve fake W‑2 and W‑9 download pages that redirect to malicious ConnectWise ScreenConnect installers. The trojanized installers launch a trial instance, inject a multi‑stage crypter...

By SC Media
Updates to GitHub Copilot Interaction Data Usage Policy
NewsMar 25, 2026

Updates to GitHub Copilot Interaction Data Usage Policy

GitHub announced that, starting April 24, interaction data from Copilot Free, Pro, and Pro+ users will be used to train its AI models unless users opt out. The policy excludes Copilot Business and Enterprise customers, whose data remains untouched. Users can...

By Hacker News
BSidesSLC 2025 – LLM-Powered Network Intrusion Detection
NewsMar 25, 2026

BSidesSLC 2025 – LLM-Powered Network Intrusion Detection

At BSidesSLC 2025, Pattern Inc. Machine Learning Engineer Taeyang Kim unveiled an LLM‑powered network intrusion detection system (NIDS). The solution leverages large language models to parse raw packet data and identify malicious patterns in real time. Kim demonstrated a prototype...

By Security Boulevard
Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report - Aamir Lakhani - RSAC26 #3
NewsMar 25, 2026

Trends Revealed in Fortinet’s FortiGuard Labs 2026 Global Threat Landscape Report - Aamir Lakhani - RSAC26 #3

Fortinet’s FortiGuard Labs released its 2026 Global Threat Landscape Report, highlighting a sharp rise in AI‑enabled cybercrime. The report shows AI is accelerating attack techniques, from automated ransomware encryption to AI‑driven supply‑chain exploits. Aamir Lakhani, Fortinet’s Global Director of Threat Intelligence...

By SC Media
New Torg Grabber Infostealer Malware Targets 728 Crypto Wallets
NewsMar 25, 2026

New Torg Grabber Infostealer Malware Targets 728 Crypto Wallets

Researchers at Gen Digital have uncovered Torg Grabber, a rapidly evolving infostealer that has harvested data from 850 browser extensions, including 728 cryptocurrency wallets, between December 2025 and February 2026. The malware gains initial access via the ClickFix clipboard‑hijacking technique, then executes...

By BleepingComputer
Gov Proposes Disclosure Delay for Most Serious Cyberattacks
NewsMar 25, 2026

Gov Proposes Disclosure Delay for Most Serious Cyberattacks

Australia is consulting on new rules that would allow a temporary, roughly 30‑day delay in publicly disclosing serious cyber‑attacks on critical‑infrastructure operators, including ASX‑listed firms. The proposal aims to give entities time to mitigate threats without compromising national security or...

By iTnews (Australia) – Government
Chained Vulnerabilities in Cisco Catalyst Switches Could Induce Denial-of-Service
NewsMar 25, 2026

Chained Vulnerabilities in Cisco Catalyst Switches Could Induce Denial-of-Service

Cisco disclosed four vulnerabilities in its widely deployed Catalyst 9300 series switches, two of which (CVE‑2026‑20114 and CVE‑2026‑20110) can be chained to elevate a low‑privilege Lobby Ambassador account into maintenance mode, effectively causing a denial‑of‑service outage. The chain requires only...

By CSO Online
$300 AI Tool Kits Let Criminals Bypass Bank Security
NewsMar 25, 2026

$300 AI Tool Kits Let Criminals Bypass Bank Security

Criminals can now purchase AI‑enabled identity‑fraud kits for under $300, combining stolen personal data, synthetic‑material printers and deep‑fake software to bypass bank KYC checks in minutes. Demonstrations at the 2026 RSAC conference showed tools like ProKYC feeding fabricated videos into...

By American Banker
The United States Router Ban, Explained
NewsMar 25, 2026

The United States Router Ban, Explained

The FCC announced a ban on future consumer Wi‑Fi routers that are manufactured abroad, citing national‑security concerns. Existing routers can remain in use and receive firmware updates through March 1 2027, but no new foreign‑made devices will receive FCC authorization. The rule...

By The Verge – Policy
AI Social Media Scams Are Coming for Your Accounting Firm: Why DNS Filtering Belongs in Your Security Stack
NewsMar 25, 2026

AI Social Media Scams Are Coming for Your Accounting Firm: Why DNS Filtering Belongs in Your Security Stack

Artificial intelligence is enabling highly personalized social‑media phishing campaigns that target accountants with fake client messages, ads and login pages. These AI‑driven scams increase the risk of wire fraud, data theft and ransomware for firms handling sensitive financial information. DNS...

By CPA Practice Advisor
What Is Antivirus Software and Do You Still Need It in 2026?
NewsMar 25, 2026

What Is Antivirus Software and Do You Still Need It in 2026?

Antivirus software remains relevant in 2026 as cyber threats grow more sophisticated, with AI‑driven phishing, malicious app bundles, and polymorphic malware outpacing built‑in defenses. While Microsoft Defender and macOS XProtect provide a solid baseline, they often miss newer variants and...

By ZDNet Robotics
The Dark Side of DDoS: Why DDoS Downtime Is Harder to Prevent
NewsMar 25, 2026

The Dark Side of DDoS: Why DDoS Downtime Is Harder to Prevent

Cloudflare’s 2026 report reveals DDoS attacks are growing larger, more frequent, and increasingly AI‑driven, shifting from blunt traffic floods to precise, low‑volume Layer 7 assaults timed around high‑impact events. Traditional point‑in‑time testing can’t keep pace with rapid network changes, leading to...

By Security Boulevard
StarTech.com Is Raising the Bar for Classified Workstations
NewsMar 25, 2026

StarTech.com Is Raising the Bar for Classified Workstations

StarTech.com has introduced a new line of secure KVM switches designed for classified workstations, achieving National Information Assurance Partnership (NIAP) compliance and supporting zero‑trust architectures. The devices provide hardware‑based isolation that physically separates classified and unclassified systems while allowing a...

By FedTech Magazine