Cybersecurity News and Headlines

Deepfakes Force Enterprises to Rethink Cybersecurity
NewsMar 12, 2026

Deepfakes Force Enterprises to Rethink Cybersecurity

Enterprises face rising deepfake threats as generative AI matures, prompting a shift from simple detection tools to layered security strategies. Current detection systems achieve only about 80% accuracy and lack explainability, limiting legal and public trust. Vendors such as GetReal...

By Biometric Update
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
NewsMar 12, 2026

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Brazilian security firm ZenoX has uncovered VENON, a Rust‑based banking trojan that targets 33 banks and digital‑asset platforms. The malware uses DLL side‑loading, shortcut hijacking, and nine evasion techniques before delivering credential‑stealing overlays. Distribution relies on a PowerShell‑driven ZIP chain,...

By The Hacker News
Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages
NewsMar 12, 2026

Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages

Security researchers have uncovered a new phishing technique that leverages Cloudflare's Turnstile human‑verification widget to conceal fraudulent Microsoft 365 login pages. The malicious sites present a Turnstile challenge, then use the visitor's IP to identify security professionals or bots and serve...

By HackRead
Active Directory Flaw Enables SYSTEM Privilege Escalation
NewsMar 12, 2026

Active Directory Flaw Enables SYSTEM Privilege Escalation

Microsoft disclosed CVE-2026-25177, an Active Directory Domain Services flaw with an 8.8 CVSS rating that lets attackers manipulate Service Principal Names using hidden Unicode characters. The vulnerability enables privilege escalation to SYSTEM level across the domain, even with minimal initial...

By eSecurity Planet
Telus Digital Confirms Breach After ShinyHunters Claims 1 Petabyte Data Theft
NewsMar 12, 2026

Telus Digital Confirms Breach After ShinyHunters Claims 1 Petabyte Data Theft

Canadian BPO provider Telus Digital has confirmed a security incident after the hacker group ShinyHunters alleged stealing nearly one petabyte of data in a breach that spanned several months. The claim, made public in early March 2026, follows a prolonged...

By DataBreaches.net
Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict
NewsMar 12, 2026

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

On 28 February 2026, coordinated cyber operations drove Iran’s internet traffic to just 1‑4 % of normal levels, coinciding with US‑Israeli air strikes that killed the Supreme Leader. Analysts attribute the blackout to a hybrid mix of regime‑imposed whitelisting, large‑scale DDoS attacks,...

By CircleID — Telecom Topic
BioCatch’s DeviceIQ Brings Pre-Login Mobile Device Intelligence to Digital Banking
NewsMar 12, 2026

BioCatch’s DeviceIQ Brings Pre-Login Mobile Device Intelligence to Digital Banking

BioCatch introduced DeviceIQ, a pre‑login device identification platform for digital banking that evaluates device trustworthiness before users reach authentication screens. The solution tackles sophisticated fraud tactics such as emulators, spoofed devices, cloaked browsers, and jailbroken handsets, while maintaining a persistent...

By Mobile ID World
AuthID and Section 2 Tie Biometric Authentication to Financial Crime Intelligence Workflows
NewsMar 12, 2026

AuthID and Section 2 Tie Biometric Authentication to Financial Crime Intelligence Workflows

authID has partnered with Section 2 to embed biometric verification and its Mandate AI governance framework into Section 2’s TENet and TRACC financial crime intelligence platforms. The integration creates an auditable chain of custody, linking every AML or threat‑finance output to a...

By Mobile ID World
Cyberattack on Stryker Highlights Geopolitical Tensions and Security Risks
NewsMar 12, 2026

Cyberattack on Stryker Highlights Geopolitical Tensions and Security Risks

On March 11, Stryker reported a global outage that wiped devices for its 5,500 employees across Ireland, the US, Australia and India. The breach displayed an Iran‑affiliated logo and was claimed by the hacktivist group Handala, though no ransomware was...

By Healthcare Innovation
OCR Director Defends HIPAA Updates: "The Cost of Doing Nothing Is Very High"
NewsMar 12, 2026

OCR Director Defends HIPAA Updates: "The Cost of Doing Nothing Is Very High"

OCR director Paula Stannard told HIMSS attendees that the HHS Office for Civil Rights is still reviewing 4,700 public comments on the Biden‑era HIPAA Security Rule proposal, which would impose stricter controls and longer implementation timelines. She warned that the...

By TechTarget SearchERP
Operating Lightning Takes Down SocksEscort Proxy Network Blamed for Tens of Millions in Fraud
NewsMar 12, 2026

Operating Lightning Takes Down SocksEscort Proxy Network Blamed for Tens of Millions in Fraud

Operation Lightning, a coordinated effort by the FBI and law‑enforcement agencies in Austria, France, the Netherlands and six other nations, dismantled the SocksEscort residential proxy network. The operation seized 23 servers, 34 domains across seven countries and froze roughly $3.5 million...

By The Register — Networks
HHS Launches New Cyber Assessment Tool to Secure Health Systems
NewsMar 12, 2026

HHS Launches New Cyber Assessment Tool to Secure Health Systems

The U.S. Department of Health and Human Services has added a cybersecurity assessment module to its Risk Identification and Site Criticality (RISC) toolkit, responding to more than 2,200 cyber incidents reported in 2025. The free, online tool guides hospitals, health...

By GovernmentCIO Media & Research
Bank Regulators Warn of Increased Cyber Risk From Iran War
NewsMar 12, 2026

Bank Regulators Warn of Increased Cyber Risk From Iran War

Regulators in California and New York have issued urgent cyber‑risk bulletins as the Iran‑Israel war heightens threats to the financial sector. The DFPI and NYDFS urge banks to strengthen defenses, review incident‑response plans, and monitor supply‑chain traffic. Major institutions such as...

By Banking Dive
Officials Worry Salt Typhoon Apathy Is Killing Momentum for Tougher Telecom Security Rules
NewsMar 12, 2026

Officials Worry Salt Typhoon Apathy Is Killing Momentum for Tougher Telecom Security Rules

Two years after Chinese‑state linked group Salt Typhoon breached at least ten U.S. telecoms, officials say the public remains largely indifferent. The hack gave attackers access to call‑detail records for millions of Americans, yet most citizens cannot see a direct impact...

By CyberScoop
Vibhor Kumar: Transparent Column Encryption in PostgreSQL: Security Without Changing Your SQL
NewsMar 12, 2026

Vibhor Kumar: Transparent Column Encryption in PostgreSQL: Security Without Changing Your SQL

Vibhor Kumar released the first public version of column_encrypt, a PostgreSQL extension that provides transparent column‑level encryption via custom data types. The extension introduces ENCRYPTED_TEXT and ENCRYPTED_BYTEA types that automatically encrypt on INSERT/UPDATE and decrypt on SELECT, requiring no changes...

By Planet PostgreSQL
Social Media Blasted over Fraud
NewsMar 12, 2026

Social Media Blasted over Fraud

The Consumer Federation of America estimates U.S. consumers lose roughly $119 billion each year to online fraud, a figure derived from FBI and Bureau of Justice Statistics data. California, Texas, New York and Florida bear the heaviest losses, with California alone accounting...

By Payments Dive
I Evaluated 7 Best Endpoint Management Software for 2026
NewsMar 12, 2026

I Evaluated 7 Best Endpoint Management Software for 2026

Darshayita Thakur evaluated over 20 tools and identified the seven best endpoint management platforms for 2026—NinjaOne, ManageEngine Endpoint Central, Datto RMM, Iru, Action 1, Atera and ThreatDown—plus three bonus options. The review highlights each solution’s pricing, core strengths such as automation,...

By G2 Learn
€1 Million Online Fraud Scheme Uncovered, Three Suspects Arrested
NewsMar 12, 2026

€1 Million Online Fraud Scheme Uncovered, Three Suspects Arrested

German and French authorities dismantled a cross‑border fraud ring that stole roughly €1 million. Coordinated by Eurojust, the operation on 10 March led to the arrest of three suspects, with the alleged mastermind detained in France pending extradition. Investigators seized cryptocurrencies, jewellery...

By Help Net Security
Fraud Battle Calls for Cross-Sector Effort
NewsMar 12, 2026

Fraud Battle Calls for Cross-Sector Effort

Financial institutions are urging federal rule changes and cross‑sector data sharing to combat AI‑enabled fraud. Panelists highlighted the need for banks, telecoms and social‑media platforms to exchange real‑time signals, creating a unified view of fraud networks. Current safe‑harbor protections under...

By Payments Dive
Infrastructure Resilience in an Era of Escalation: Why Cross-Sector Coordination Is the Critical Path
NewsMar 12, 2026

Infrastructure Resilience in an Era of Escalation: Why Cross-Sector Coordination Is the Critical Path

U.S. intelligence warns foreign adversaries, especially Iran, are intensifying cyber attacks on critical infrastructure. The 2025 Threat Assessment highlights coordinated efforts by Russia, China, Iran, and North Korea across energy, transport, water, and manufacturing sectors. CISA reports Iranian actors using...

By Homeland Security Today (HSToday)
This $30 Smart Router with a Built-In VPN Is the Travel Gadget I Didn't Know I Needed
NewsMar 12, 2026

This $30 Smart Router with a Built-In VPN Is the Travel Gadget I Didn't Know I Needed

The GL.iNet Mango (GL‑MT300N‑V2) is a $29.99 mini smart router that packs VPN support, repeater, WAN, and smartphone‑tethering capabilities into a USB‑powered box. It lets travelers extend free Wi‑Fi, plug in a wired connection, or use a 4G dongle with...

By ZDNet – Big Data
Instagram-Powered Iranian Influence Operation Against US Dismantled
NewsMar 12, 2026

Instagram-Powered Iranian Influence Operation Against US Dismantled

Meta announced the removal of nearly 300 Instagram and Facebook accounts linked to an Iranian influence operation that masqueraded as journalists and commentators. The fake personas collectively attracted about 41,000 followers before disseminating anti‑U.S. and anti‑Israel political messages. Engagement on...

By SC Media
Mimecast Adds AI Investigation and Adaptive Controls to Manage Human Risk
NewsMar 12, 2026

Mimecast Adds AI Investigation and Adaptive Controls to Manage Human Risk

Mimecast unveiled a suite of AI‑driven platform enhancements aimed at curbing human‑related security risk. The rollout adds adaptive security policies that auto‑adjust based on individual risk scores, an AI‑powered Mihra Investigation Agent that accelerates incident analysis, and open‑gateway integrations for...

By Help Net Security
Coalition of Information-Sharing Groups Warns of Cyber, Physical Attacks
NewsMar 12, 2026

Coalition of Information-Sharing Groups Warns of Cyber, Physical Attacks

A coalition of ten information‑sharing groups issued a joint advisory warning that Iran‑linked state actors, hacktivists and criminal gangs are escalating cyber attacks against U.S. critical‑infrastructure sites. The advisory cites spear‑phishing, DDoS, wiper malware and backdoor implants as primary tactics,...

By Cybersecurity Dive (Industry Dive)
Socure Launch Enables Startups to Deploy Identity Verification and Fraud Controls
NewsMar 12, 2026

Socure Launch Enables Startups to Deploy Identity Verification and Fraud Controls

Socure introduced Socure Launch, a plug‑and‑play identity verification and fraud‑prevention suite built on its RiskOS platform. The service lets developers activate enterprise‑grade risk controls within minutes, bypassing weeks of custom development. It targets early‑stage fintech, crypto, gaming, marketplace and e‑commerce...

By Help Net Security
Zscaler Enhances Data Sovereignty Controls with Regional Processing and Logging
NewsMar 12, 2026

Zscaler Enhances Data Sovereignty Controls with Regional Processing and Logging

Zscaler announced a global expansion of its data‑sovereignty controls, adding dedicated control and logging planes in six regions and preparing a deployment in Canada. The Zero Trust Exchange now performs in‑region SSL inspection, malware analysis and offers Private Service Edge...

By Help Net Security
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
NewsMar 12, 2026

CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 26‑03, warning that attackers are exploiting a critical authentication‑bypass flaw (CVE‑2026‑20127) in Cisco Catalyst SD‑WAN devices used across federal networks. The vulnerability carries a CVSS score of 10, potentially granting...

By Infosecurity Magazine
China’s CERT Warns OpenClaw Can Inflict Nasty Wounds
NewsMar 12, 2026

China’s CERT Warns OpenClaw Can Inflict Nasty Wounds

China’s National Computer Network Emergency Response Technical Team (CERT) issued a warning that the OpenClaw agentic AI tool suffers from extremely weak default security configurations. The agency posted on WeChat that the tool can be easily exploited, urging users to...

By DataBreaches.net
SOC Prime’s DetectFlow Enterprise Moves Threat Detection to the Data Ingestion Layer
NewsMar 12, 2026

SOC Prime’s DetectFlow Enterprise Moves Threat Detection to the Data Ingestion Layer

SOC Prime unveiled DetectFlow Enterprise, a platform that embeds real‑time threat detection directly into the data ingestion layer. By running tens of thousands of Sigma detections on live Kafka streams with Apache Flink, the solution achieves millisecond mean‑time‑to‑detect (MTTD). It...

By Help Net Security
Binary Defense’s NightBeacon Brings AI-Driven Analysis to SOCs
NewsMar 12, 2026

Binary Defense’s NightBeacon Brings AI-Driven Analysis to SOCs

Binary Defense unveiled NightBeacon, an AI‑powered security operations platform embedded directly in its SOC. The system cuts mean time to resolution by roughly 30%, accelerates incident summarization 46%, and boosts the number of incidents analysts can handle per shift by...

By Help Net Security
AI Scams Drove UK Reports of Fraud to Record 444,000 Last Year
NewsMar 12, 2026

AI Scams Drove UK Reports of Fraud to Record 444,000 Last Year

UK anti‑fraud body Cifas reported a record 444,000 fraud cases in 2025, a 6% rise driven largely by AI‑powered scams. Criminals are using synthetic media and fraud‑as‑a‑service kits to execute large‑scale account takeovers on mobile, online shopping and credit‑card platforms....

By The Guardian AI
Splunk, Zoom Patch Severe Vulnerabilities
NewsMar 12, 2026

Splunk, Zoom Patch Severe Vulnerabilities

Security vendors Splunk and Zoom released emergency patches this week to remediate multiple critical and high‑severity vulnerabilities across their product lines. Zoom fixed a critical privilege‑escalation flaw in Workplace for Windows and three high‑severity defects in its Windows client software....

By SecurityWeek
The CISO’s Dilemma: How To Scale AI Securely
NewsMar 12, 2026

The CISO’s Dilemma: How To Scale AI Securely

CISOs are caught between board‑driven AI ambitions and mounting security risks, as AI projects essentially flood enterprises with new API endpoints. In 2025, Wallarm found that 17% of all vulnerabilities were API‑related and 97% could be triggered by a single,...

By Security Boulevard
Lotte Card Fined 9.6 Billion Won for Leaking Users’ Social Registration Numbers
NewsMar 12, 2026

Lotte Card Fined 9.6 Billion Won for Leaking Users’ Social Registration Numbers

South Korea’s Personal Information Protection Commission fined Lotte Card 9.62 billion won after a hacking attack exposed the resident registration numbers of about 450,000 customers. The breach stemmed from unauthorized access to log files in the card’s online simple‑payment system, affecting data...

By DataBreaches.net
Maintaining Security and Protecting Smart Home Devices From Hackers
NewsMar 12, 2026

Maintaining Security and Protecting Smart Home Devices From Hackers

Smart home devices boost convenience and energy savings but are increasingly targeted by cybercriminals. Common flaws include weak default passwords, lack of updates, and unsegmented Wi‑Fi networks that let attackers move laterally. Recent incidents, such as a robot vacuum breach...

By HackRead
US Charges Another Ransomware Negotiator Linked to BlackCat Attacks
NewsMar 12, 2026

US Charges Another Ransomware Negotiator Linked to BlackCat Attacks

The U.S. Department of Justice has charged former DigitalMint ransomware negotiator Angelo Martino with conspiracy to interfere with interstate commerce by extortion. Martino allegedly supplied BlackCat (ALPHV) operators with confidential negotiation details and received a 20% cut of ransom payments...

By BleepingComputer
Phosphorus Sweeps SC Awards Finalist Spots for Innovation and Leadership
NewsMar 12, 2026

Phosphorus Sweeps SC Awards Finalist Spots for Innovation and Leadership

Phosphorus, a leader in proactive security for the extended Internet of Things, has been named a finalist in the 2026 SC Awards for Best Vulnerability Management Solution. Its CEO, Chris Rouland, also earned a finalist spot for Security Executive of...

By AI-TechPark
Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload
NewsMar 12, 2026

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

Attackers are weaponizing phishing campaigns to overload Security Operations Center (SOC) analysts, turning the investigation process into an informational denial‑of‑service (IDoS) attack. By flooding the SOC with thousands of low‑sophistication emails, they force analysts to triage quickly, allowing a few...

By The Hacker News
The Growing Cyber Risk to Supply Chains
NewsMar 12, 2026

The Growing Cyber Risk to Supply Chains

Corporate leaders are shifting view of cybersecurity from an internal IT issue to an operational capability essential for supply‑chain continuity. AI and automation have expanded the digital footprint of vendors, increasing exposure to cyber threats. Simultaneously, the intensifying Middle East...

By Project Syndicate — Economics
What Is an SPF Softfail vs Hardfail: Key Differences, Use Cases, and Best Practices
NewsMar 12, 2026

What Is an SPF Softfail vs Hardfail: Key Differences, Use Cases, and Best Practices

The article explains the technical distinction between SPF softfail (~all) and hardfail (-all) and how each qualifier influences mail handling. Softfail signals probable unauthorized mail and typically results in spam‑folder placement, while hardfail denotes definite unauthorized sources and can trigger...

By TechBullion
New PixRevolution Malware Steals Brazil’s PIX Transfers in Real Time
NewsMar 12, 2026

New PixRevolution Malware Steals Brazil’s PIX Transfers in Real Time

Brazil’s instant payment platform PIX, handling billions of transactions monthly, is being targeted by a new Android malware called PixRevolution. The threat uses an agent‑in‑the‑loop model, displaying a fake loading screen while a human or AI operator swaps the recipient’s...

By HackRead
Why Event Log Archiving Is Critical For Timeline Reconstruction
NewsMar 12, 2026

Why Event Log Archiving Is Critical For Timeline Reconstruction

Event log archiving is essential for accurate timeline reconstruction in digital forensics because operating systems routinely rotate and overwrite logs. Relying solely on selective SIEM collection leaves gaps that can cripple investigations. An automated batch script using Windows tools like...

By Forensic Focus
Nordic Semiconductor Adds Lifetime Flat-Rate FOTA Licensing to nRF Cloud as CRA Compliance Looms
NewsMar 12, 2026

Nordic Semiconductor Adds Lifetime Flat-Rate FOTA Licensing to nRF Cloud as CRA Compliance Looms

Nordic Semiconductor introduced a lifetime, flat‑rate firmware‑over‑the‑air (FOTA) and device‑management license within its nRF Cloud platform to help IoT makers meet the EU Cyber Resilience Act (CRA) requirements. The CRA, effective in 2027, mandates continuous security updates and auditability for...

By IoT Business News – Smart Buildings
Regulatory Compliance for Enterprise Email
NewsMar 12, 2026

Regulatory Compliance for Enterprise Email

Enterprise email is now a security perimeter, and regulatory compliance has shifted from a checkbox to a strategic imperative. Certifications such as SOC 1, SOC 2, ISO 27001 and ISO 27701 provide the architectural blueprints that turn email into a trust asset rather than...

By Zoho CRM Blog
Cisco Patches High-Severity IOS XR Vulnerabilities
NewsMar 12, 2026

Cisco Patches High-Severity IOS XR Vulnerabilities

Cisco issued its semiannual IOS XR security advisory, addressing four high‑severity vulnerabilities. Two CVEs (CVE‑2026‑20040 and CVE‑2026‑20046) each score 8.8 and enable privilege escalation to root via crafted CLI commands. A third flaw (CVE‑2026‑20074) can cause an IS‑IS process restart,...

By SecurityWeek
Microsoft Authenticator Could Leak Login Codes—Update Your App Now
NewsMar 12, 2026

Microsoft Authenticator Could Leak Login Codes—Update Your App Now

A critical vulnerability (CVE‑2026‑26123) in Microsoft Authenticator for iOS and Android can expose one‑time passwords or deep‑link data to a malicious app on the same device. The exploit requires a user‑installed malicious application and the user inadvertently selecting it to...

By Security Boulevard
Healthcare Under Attack? Why Is Cybersecurity Now Critical?
NewsMar 12, 2026

Healthcare Under Attack? Why Is Cybersecurity Now Critical?

African hospitals, labs and digital health platforms are experiencing a surge in cyberattacks as they digitise services. In 2025 the continent saw an average of 3,575 weekly attacks—a 38% rise—affecting institutions like Mediclinic, the National Health Laboratory Service and Kenya’s...

By IT News Africa
New Simulation Platform Lets Energy Operators Train Against Realistic Cyberattacks
NewsMar 12, 2026

New Simulation Platform Lets Energy Operators Train Against Realistic Cyberattacks

German Fraunhofer FKIE researchers unveiled PowerRange, a virtual cyber‑range that lets power‑grid operators test defenses against realistic attacks. The platform models both traditional centralized networks and renewable‑heavy, decentralized grids, integrating IT, OT and control‑room environments. It supports multi‑stage scenarios—reconnaissance, lateral...

By pv magazine
1B Identity Records Exposed in ID Verification Data Leak
NewsMar 12, 2026

1B Identity Records Exposed in ID Verification Data Leak

Researchers uncovered an unprotected MongoDB database belonging to IDMerit that exposed roughly 1 billion identity records across 26 countries, including more than 203 million records in the United States. The data set contained full names, addresses, dates of birth, national ID numbers...

By Hacker News