Cybersecurity News and Headlines

HPE Bolsters Hybrid Mesh Firewall Platform
NewsMar 24, 2026

HPE Bolsters Hybrid Mesh Firewall Platform

Hewlett Packard Enterprise announced an upgrade to its hybrid mesh firewall portfolio, adding AI‑focused controls that surface usage of AI applications, block high‑risk AI sites, and filter keywords and file uploads. The enhancements unify policy enforcement across physical, virtual and...

By Network World
Popular AI Proxy LiteLLM Got Hacked with Malware that Spreads Through Kubernetes Clusters
NewsMar 24, 2026

Popular AI Proxy LiteLLM Got Hacked with Malware that Spreads Through Kubernetes Clusters

Open‑source AI proxy library LiteLLM was compromised on PyPI, with versions 1.82.7 and 1.82.8 containing malware. The malicious code steals SSH keys, cloud credentials, database passwords, and Kubernetes configurations, encrypts them, and exfiltrates data to an external server while propagating...

By THE DECODER
Why Mac Users Should Pay More Attention to Malware Risks
NewsMar 24, 2026

Why Mac Users Should Pay More Attention to Malware Risks

Macs are shedding their reputation as malware‑free devices as Apple’s market share and remote‑work adoption surge. Cybercriminals now deploy adware, spyware, infostealers and trojans that exploit both technical flaws and human error. Social‑engineering attacks, pirated software and fake update prompts...

By Inven Global
How Scammers Are Using the Iran Conflict to Try to Steal Your Money and Information
NewsMar 24, 2026

How Scammers Are Using the Iran Conflict to Try to Steal Your Money and Information

Scammers are exploiting the Iran conflict to launch impersonation, romance, and fake‑charity scams. They falsely claim fraudulent charges from Iran, pose as deployed military partners, or create bogus relief organizations to steal money and personal data. The Federal Trade Commission...

By FTC – Press Releases
Understanding Wiz’s Approach to Securing the AI Supply Chain
NewsMar 24, 2026

Understanding Wiz’s Approach to Securing the AI Supply Chain

The AI supply chain’s layered, multi‑cloud nature creates visibility gaps and unique vulnerabilities that traditional software‑security tools can’t fully address. Wiz proposes an AI‑CNAPP framework that unifies asset discovery, cloud‑posture management, workload protection, and continuous risk assessment across the entire...

By HackRead
All AI and Security Teams Need Transparent Data Pipelines
NewsMar 24, 2026

All AI and Security Teams Need Transparent Data Pipelines

Organizations that rely on opaque AI data sources expose themselves to integrity risks, compliance gaps, and trust deficits. Without auditable pipelines, security teams cannot verify data quality, leading to hallucinations and regulatory violations such as under the EU AI Act....

By HackRead
Biometric Privacy Laws: What Your Business Needs to Know About Compliance
NewsMar 24, 2026

Biometric Privacy Laws: What Your Business Needs to Know About Compliance

Employers increasingly use biometric technologies—fingerprint time clocks, facial recognition, and dash‑cam scanning—to boost security and efficiency. However, three states (Illinois, Texas, Washington) have enacted biometric privacy statutes that mandate employee notice, written consent, and strict data handling protocols. Illinois' Biometric...

By PA Labor & Employment Blog
Iran Wiped 50 Israeli Firms’ Data, Hacked Cameras, Official Says
NewsMar 24, 2026

Iran Wiped 50 Israeli Firms’ Data, Hacked Cameras, Official Says

Iran-linked hackers have intensified cyber operations against Israel since the recent war, wiping data from more than 50 small Israeli firms and breaching dozens of security cameras. Israel's National Cyber Directorate confirmed that critical infrastructure such as energy grids, banks...

By Bloomberg – Technology
Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector
NewsMar 24, 2026

Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector

Poland recorded a dramatic rise in cyber activity in 2025, logging roughly 270,000 attacks—2.5 times more than the previous year. The most serious incident was a destructive infiltration of a combined heat‑and‑power plant on Dec. 29, affecting services for about 500,000...

By SecurityWeek
OVHcloud Founder Denies Massive 590TB Data Breach Claims
NewsMar 24, 2026

OVHcloud Founder Denies Massive 590TB Data Breach Claims

OVHcloud founder Octave Klaba denied a purported 590 TB data breach alleged by a user on BreachForums. The poster claimed to have exfiltrated data from 1.6 million OVH Fresh customers and up to 6 million active websites, yet only supplied a trivial email‑and‑phone sample....

By HackRead
Cyber Pros Must Grasp the Vibe Coding Nettle, Says NCSC Chief
NewsMar 24, 2026

Cyber Pros Must Grasp the Vibe Coding Nettle, Says NCSC Chief

National Cyber Security Centre chief Richard Horne warned that AI‑enhanced software generation, dubbed “vibe coding,” must be secured before it becomes mainstream. He argued that while insecure AI‑generated code could spread vulnerabilities, well‑trained models could produce secure‑by‑design software, reshaping development....

By ComputerWeekly – DevOps
Internet-Exposed EoL Microsoft IIS Servers Remain Prevalent
NewsMar 24, 2026

Internet-Exposed EoL Microsoft IIS Servers Remain Prevalent

More than 511,000 Microsoft Internet Information Services (IIS) servers that have reached end‑of‑life remain exposed on the public internet, according to the Shadowserver Foundation. Nearly half of these servers have outlived Microsoft’s Extended Security Updates window, leaving them unpatched and...

By SC Media
Attack Handoff Times Plummet, Exploits Remain Leading Attack Vector
NewsMar 24, 2026

Attack Handoff Times Plummet, Exploits Remain Leading Attack Vector

The median time for attackers to hand off compromised networks fell dramatically to just 22 seconds in 2025, down from over eight hours in 2022, driven by tighter coordination and automation. Exploits continued to dominate initial infection, with CVE‑2025‑31324, CVE‑2025‑61882...

By SC Media
AT&T, Ericsson Call for 5G Network Security Rethink
NewsMar 24, 2026

AT&T, Ericsson Call for 5G Network Security Rethink

AT&T and Ericsson have released a joint security blueprint that outlines how 5G networks—and the forthcoming 6G era—should be protected against AI‑driven threats, open‑architecture risks, and future quantum attacks. The paper advocates a collective, ecosystem‑wide approach, urging vendors, operators and...

By Light Reading
Azure APIM Signup Bypass: 97.9% of Developer Portals Still Exploitable Anonymously and From the Internet
NewsMar 24, 2026

Azure APIM Signup Bypass: 97.9% of Developer Portals Still Exploitable Anonymously and From the Internet

A critical Azure API Management (APIM) flaw lets attackers bypass the "disable signup" toggle and create accounts anonymously. Praetorian’s research shows 97.9% of internet‑facing Developer Portals still accept signup requests, exposing valid API keys and backend data. The vulnerability stems...

By Security Boulevard – DevOps
Credit Card Fraud Surging: Why You Should Freeze Your Credit
NewsMar 24, 2026

Credit Card Fraud Surging: Why You Should Freeze Your Credit

Credit card and identity fraud are accelerating, with the FTC reporting 503,450 credit‑card fraud cases and 379,898 other identity‑theft incidents in the first three quarters of 2025. A Pew Research Center survey finds 73% of U.S. adults have encountered an...

By The Points Guy (TPG)
Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage
NewsMar 24, 2026

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

Silver Fox, a cyber intrusion group, shifted its tactics from 2025 to early 2026, blending espionage with financially motivated crime. The campaigns targeted finance staff across Taiwan, Japan, and eight South Asian nations using tax‑authority phishing lures. Attack vectors progressed...

By Infosecurity Magazine
Google Brings AI-Powered Dark Web Analysis to Enterprise Security Teams
NewsMar 24, 2026

Google Brings AI-Powered Dark Web Analysis to Enterprise Security Teams

Google Cloud announced at RSA 2026 an AI‑driven agent called “Triage and Investigation” within its Security Operations platform, automating alert review and reducing false positives for SOC analysts. The same rollout includes an AI‑powered dark‑web analysis tool that sifts through...

By THE DECODER
Strengthen Cyber Resilience by Shifting to a Modern DR Model
NewsMar 24, 2026

Strengthen Cyber Resilience by Shifting to a Modern DR Model

Enterprises are moving away from the legacy Share tier disaster‑recovery model toward a workload‑first framework that groups applications into three recovery classes—basic, prioritized, and assured cyber recovery. The new approach emphasizes rapid restoration to a trusted state after ransomware, AI‑driven...

By TechTarget SearchERP
Risk-Based Security Is Reshaping the Channel Playbook
NewsMar 24, 2026

Risk-Based Security Is Reshaping the Channel Playbook

The managed services industry is moving from reactive ticket‑based support to proactive, risk‑based security models. Clients now demand continuous risk assessments, governance programs aligned with NIST CSF 2.0, ISO 27001 and SOC 2, and measurable outcomes that tie cyber risk to business performance....

By ChannelE2E
Sumo Logic Extends SOC Analyst Agents to Enhance Threat Detection, Investigation, and Response
NewsMar 24, 2026

Sumo Logic Extends SOC Analyst Agents to Enhance Threat Detection, Investigation, and Response

Sumo Logic announced an expanded suite of AI‑driven SOC Analyst Agents designed to move security operations from pure detection to actionable recommendation. The Dojo AI platform now offers a preview SOC Analyst Agent that suggests next‑best actions with explainable reasoning,...

By Database Trends & Applications (DBTA)
This Microsoft Security Team Stress-Tests AI for Its Worst-Case Scenarios
NewsMar 24, 2026

This Microsoft Security Team Stress-Tests AI for Its Worst-Case Scenarios

Microsoft’s AI Red Team, operating since 2018, rigorously stress‑tests new artificial‑intelligence models before they reach customers. The group simulates attacks ranging from prompt‑jamming to code generation, probing whether systems can be coaxed into producing malicious outputs or aiding cyber‑crime. In...

By Fast Company AI
Treasury Asks Whether Terrorism Risk Insurance Program Should Bolster Cyber Coverage
NewsMar 24, 2026

Treasury Asks Whether Terrorism Risk Insurance Program Should Bolster Cyber Coverage

The U.S. Treasury Department has opened a public comment period to consider expanding the Terrorism Risk Insurance Program (TRIP) to cover cyber‑related losses stemming from acts of terrorism. The agency will incorporate feedback into a mandatory report to Congress due...

By CyberScoop
The AI Safety Conversation Is Focused on the Wrong Layer
NewsMar 24, 2026

The AI Safety Conversation Is Focused on the Wrong Layer

Enterprises are grappling with fragmented identity systems that were designed for human users, but AI agents operate at machine speed, exposing critical security gaps. Ev Kontsevoy, CEO of Teleport, argues that the real problem is the lack of a unified...

By Help Net Security
Why a Secure Industrial Supply Chain Depends on Layered AI
NewsMar 24, 2026

Why a Secure Industrial Supply Chain Depends on Layered AI

Industrial supply chains are increasingly exposed to AI‑driven cyber threats that bypass traditional perimeter defenses. Vendors, OT devices, and cloud services now intersect, creating a unified attack surface where a single compromised credential can cascade across production, logistics, and revenue...

By Supply Chain Management Review (SCMR)
News: AI-Native Security Assurance Leads the GRC Transformation
NewsMar 24, 2026

News: AI-Native Security Assurance Leads the GRC Transformation

TrustCloud unveiled an AI‑native Security Assurance Platform that replaces legacy GRC tools with continuous, automated risk monitoring. The solution delivers live control signals, connected data and AI‑driven automation, giving CISOs real‑time visibility and credible reporting. Early adopters report up to...

By Security Boulevard
KnowBe4 Expands AIDA to Eight AI Agents at RSAC 2026, Targeting Fully Autonomous Human Risk Management
NewsMar 24, 2026

KnowBe4 Expands AIDA to Eight AI Agents at RSAC 2026, Targeting Fully Autonomous Human Risk Management

KnowBe4 unveiled an expanded AIDA suite with eight AI agents at RSAC 2026, including the fully autonomous AIDA Orchestration Agent that creates and manages personalized training and phishing simulations. The Orchestration Agent reportedly cuts users’ risk scores by nearly threefold versus...

By Security Boulevard
Utimaco Survey: 78% of US Companies Say Data Breaches Are the Top GenAI Risk, But Most Haven’t Acted
NewsMar 24, 2026

Utimaco Survey: 78% of US Companies Say Data Breaches Are the Top GenAI Risk, But Most Haven’t Acted

Utimaco’s 2026 Digital Trust Report, based on a 250‑company survey, finds that 78% of U.S. enterprises view data breaches as the greatest generative AI risk, while 57% have yet to deploy any safeguards. Intellectual‑property theft ranks a close second, and...

By Security Boulevard
SVG New Sponsor Spotlight: Verimatrix’s Juan Martinez on Safeguarding Live Sports Content
NewsMar 24, 2026

SVG New Sponsor Spotlight: Verimatrix’s Juan Martinez on Safeguarding Live Sports Content

Verimatrix, a security firm with over 400 customers and 200 engineers, is positioning itself as a global leader in anti‑piracy technology for live sports. In a new SVG Sponsor Spotlight, VP of Product Management Juan Martinez explains that the time‑sensitive...

By Sports Video Group (SVG)
Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe
NewsMar 24, 2026

Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe

Infosecurity Europe will feature former Ukrainian foreign minister Dmytro Kuleba as the headline keynote at its June 2‑4, 2026 conference in London. Kuleba will discuss “Ukraine’s Hybrid War and the New Cyber Frontline,” sharing lessons from Russia’s coordinated cyber‑attacks and the shift...

By Infosecurity Magazine
Mimecast Expands Incydr with Runtime Data Security for AI and Human Risk
NewsMar 24, 2026

Mimecast Expands Incydr with Runtime Data Security for AI and Human Risk

Mimecast announced a major upgrade to its Incydr platform, adding runtime data security that monitors both human users and AI agents across endpoints, browsers, SaaS apps, and email. The new features provide unified visibility, shadow‑AI detection, adaptive risk scoring and...

By Help Net Security
New Lumu Defender Capabilities Provide Visibility Beyond the Network
NewsMar 24, 2026

New Lumu Defender Capabilities Provide Visibility Beyond the Network

Lumu announced major upgrades to its Lumu Defender NDR platform, extending its Continuous Compromise Assessment beyond the network to endpoints, cloud workloads, and user identities. The enhanced solution now correlates malicious network traffic with specific devices, accounts, and cloud services,...

By AI-TechPark
Vigil: The First Open-Source AI SOC Built with a LLM-Native Architecture
NewsMar 24, 2026

Vigil: The First Open-Source AI SOC Built with a LLM-Native Architecture

Vigil, launched at RSA Conference 2026, is the first open‑source AI‑driven Security Operations Center built on a native LLM architecture. It ships under an Apache 2.0 license with 13 specialized AI agents, more than 30 integrations and over 7,200 detection rules...

By AI-TechPark
Databricks Enters Cybersecurity Market with Lakewatch Launch, Bulking up Ahead of IPO
NewsMar 24, 2026

Databricks Enters Cybersecurity Market with Lakewatch Launch, Bulking up Ahead of IPO

Databricks is entering the cybersecurity arena with Lakewatch, an AI‑powered security‑information‑and‑event‑management (SIEM) platform that leverages large language models to automate threat detection. Early adopters such as Adobe, National Australia Bank and Anthropic are already using the service, which is priced...

By CNBC – US Top News & Analysis
How a Large Bank Uses AI Digital Twins for Threat Hunting
NewsMar 24, 2026

How a Large Bank Uses AI Digital Twins for Threat Hunting

JPMorgan Chase is deploying an AI‑driven system that creates digital fingerprints and digital twins to monitor employee and AI‑agent behavior across its global workforce. The technology flags anomalous actions, rates their malicious potential, and contextualizes them against external events, aiming...

By Dark Reading
CyberProof Unveils Reveal360 Hub for Security and Business Outcomes
NewsMar 24, 2026

CyberProof Unveils Reveal360 Hub for Security and Business Outcomes

CyberProof, a UST company, launched CDC Reveal360, a centralized visibility hub that consolidates threat, exposure, defense, and asset data into role‑specific workspaces. The platform delivers continuous insights into security posture, service performance, and operational outcomes for CISOs, security managers, and...

By AI-TechPark
Novee Introduces Autonomous AI Red Teaming to Hunt LLM Vulnerabilities
NewsMar 24, 2026

Novee Introduces Autonomous AI Red Teaming to Hunt LLM Vulnerabilities

Novee unveiled an autonomous AI red‑team agent designed to probe large language model (LLM) applications for security flaws. The platform continuously simulates sophisticated attack scenarios such as prompt injection, jailbreaks, and data exfiltration, delivering detailed vulnerability assessments and remediation guidance....

By Help Net Security
Barracuda Expands BarracudaONE Platform and Overhauls Partner Success Program
NewsMar 24, 2026

Barracuda Expands BarracudaONE Platform and Overhauls Partner Success Program

Barracuda Networks announced a major upgrade to its BarracudaONE platform, adding enhanced email protection for Google Workspace, a broadened SecureEdge Access solution that bundles SASE, zero‑trust, and AI policy controls, and a new AI Security layer that monitors generative‑AI usage...

By SiliconANGLE
F5 and Forcepoint Partner to Secure AI Across Data and Runtime Lifecycle
NewsMar 24, 2026

F5 and Forcepoint Partner to Secure AI Across Data and Runtime Lifecycle

F5 and Forcepoint announced a partnership to secure AI throughout its data and runtime lifecycle. The joint solution merges Forcepoint’s AI‑native data discovery and classification with F5’s AI Red Team and Guardrails features. It enables real‑time vulnerability detection, policy enforcement,...

By SiliconANGLE
How to Master Multi-Source Intelligence with AI Agents
NewsMar 24, 2026

How to Master Multi-Source Intelligence with AI Agents

Swimlane’s Hero AI Threat Intelligence Agent tackles the long‑standing threat‑intelligence correlation problem by automatically aggregating data from multiple feeds—VirusTotal, Recorded Future, Cisco Umbrella, and others—and synthesizing a single, explainable assessment. The agent applies a reasoning engine that weighs source reliability,...

By Security Boulevard
The Cost of Delaying Password Security for Businesses
NewsMar 24, 2026

The Cost of Delaying Password Security for Businesses

Weak passwords cause 81% of data breaches, exposing businesses to costly fallout. Each password reset averages $70 and consumes 30% of IT staff time, amplifying operational expenses. Zoho Vault, included free with Zoho Workplace, provides centralized password management, strong generation,...

By Zoho CRM Blog
Detectify Uncovers Hidden Assets and Risks Across Entire IP Ranges
NewsMar 24, 2026

Detectify Uncovers Hidden Assets and Risks Across Entire IP Ranges

Detectify has introduced IP Range Scanning, a service that continuously discovers and monitors entire CIDR blocks to surface forgotten assets and hidden risks. The tool goes beyond traditional domain‑focused scanners by detecting services on non‑standard ports and exposing high‑risk databases...

By Help Net Security
LiteLLM Python Package Compromised by Supply-Chain Attack
NewsMar 24, 2026

LiteLLM Python Package Compromised by Supply-Chain Attack

A malicious .pth file was discovered in the LiteLLM 1.82.8 wheel on PyPI, automatically executing a credential‑stealing script whenever the Python interpreter starts, without any import of the library. The payload gathers environment variables, SSH keys, cloud provider credentials, and...

By Hacker News
3.1 Million Impacted by QualDerm Data Breach
NewsMar 24, 2026

3.1 Million Impacted by QualDerm Data Breach

QualDerm Partners disclosed that a December 2025 cyber‑attack compromised the personal, medical, and health‑insurance records of more than 3.1 million individuals. Attackers accessed the network for two days, exfiltrating data from a limited set of systems before the breach was detected...

By SecurityWeek
AiStrike Launches Continuous Detection Engineering at RSA 2026
NewsMar 24, 2026

AiStrike Launches Continuous Detection Engineering at RSA 2026

AiStrike unveiled Continuous Detection Engineering at RSA 2026, a platform that shifts security operations from reactive alert triage to proactive, detection‑as‑code optimization. The solution claims up to a 90% reduction in alert noise by continuously validating and refining detection rules...

By AI-TechPark
Ghost Campaign Uses 7 Npm Packages to Steal Crypto Wallets and Credentials
NewsMar 24, 2026

Ghost Campaign Uses 7 Npm Packages to Steal Crypto Wallets and Credentials

Security researchers have identified a new "Ghost" campaign that distributes seven malicious npm packages under the author name mikilanjillo. The packages masquerade as popular React utilities and AI trading tools, prompting developers to enter their sudo password during a fabricated...

By The Hacker News
Xona Targets Real-Time Threat Response in OT Remote Access
NewsMar 24, 2026

Xona Targets Real-Time Threat Response in OT Remote Access

Xona Systems unveiled an Active Defense capability that automatically reacts to suspicious behavior during OT remote‑access sessions. The feature links detection platforms to session‑level enforcement, enabling actions such as step‑up authentication, access limitation, or session termination in real time. Initially,...

By ChannelE2E
32% of Top-Exploited Vulnerabilities Are over a Decade Old
NewsMar 24, 2026

32% of Top-Exploited Vulnerabilities Are over a Decade Old

Cisco Talos’s 2025 Year in Review shows exploitation timelines are compressing: newly disclosed flaws like React2Shell are weaponized within weeks, while 32% of the top‑targeted vulnerabilities are over a decade old, exemplified by the lingering abuse of Log4Shell. Attackers favor...

By Help Net Security
Coro Expands AI-Driven Security Ops, Automates 92% of Alerts
NewsMar 24, 2026

Coro Expands AI-Driven Security Ops, Automates 92% of Alerts

Coro announced expanded AI‑driven security operations that automate the full detection‑to‑remediation lifecycle. Over the past year the platform automatically handled 92.3% of security tickets worldwide, moving beyond alerting to real‑time response. New features include automated triage, SOC‑level response actions, and...

By AI-TechPark