Cybersecurity News and Headlines

Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea
NewsMar 12, 2026

Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea

Security firm Hudson Rock has linked the 2024 Polyfill supply chain attack, which infected over 100,000 websites, to North Korean threat actors, overturning earlier attributions to China. The attack stemmed from the acquisition of Polyfill.io by Chinese CDN Funnull, which...

By SecurityWeek
DNSSEC Validation for SSL Certificates: CA/B Forum Ballot SC-085 Changes in March 2026
NewsMar 12, 2026

DNSSEC Validation for SSL Certificates: CA/B Forum Ballot SC-085 Changes in March 2026

Beginning March 2026, the CA/Browser Forum will require Certificate Authorities to validate DNSSEC signatures during CAA checks and Domain Control Validation when DNSSEC is enabled. DigiCert has already implemented this rule, meaning any misconfigured DNSSEC will cause certificate issuance or renewal...

By Security Boulevard
Lloyds Banking App ‘Glitch’ Shows Transactions of Strangers
NewsMar 12, 2026

Lloyds Banking App ‘Glitch’ Shows Transactions of Strangers

Lloyds Banking Group’s mobile apps briefly displayed other customers’ transaction histories on the morning of 12 March 2026. The glitch affected users of Lloyds, Halifax and Bank of Scotland apps before being resolved within minutes. The incident has reignited parliamentary...

By Computer Weekly – Latest IT news
Southeast Asia Faces Spillover Cyber Risk From Iran War as ‘Blast Radius’ Widens
NewsMar 12, 2026

Southeast Asia Faces Spillover Cyber Risk From Iran War as ‘Blast Radius’ Widens

Southeast Asia is increasingly exposed to cyber spillover from the US‑Israel‑Iran conflict, as state‑linked hackers target energy, shipping and banking networks beyond the Middle East. Iran has pledged attacks on regional economic interests, while the UAE reported up to 200,000...

By South China Morning Post – Asia
Codoxo’s Deepfake Detection Identifies AI-Generated Medical Records for Health Plans
NewsMar 12, 2026

Codoxo’s Deepfake Detection Identifies AI-Generated Medical Records for Health Plans

Codoxo has launched Deepfake Detection, an AI‑driven solution that scans medical documentation, diagnostic images and claim context in seconds to flag synthetic or manipulated records. The tool embeds explainable risk scores into payer fraud‑prevention workflows, enabling health plans to intercept...

By Help Net Security
Vulnerability Reports: Increase in Quantity, Decrease in Quality?
NewsMar 12, 2026

Vulnerability Reports: Increase in Quantity, Decrease in Quality?

cURL founder Daniel Stenberg has shut down his HackerOne bug bounty program after a sharp rise in low‑quality, AI‑generated vulnerability reports. In early 2026 his team reviewed 20 submissions, seven arriving within 16 hours, none of which were genuine flaws....

By ComputerWeekly
Unified Real-Time Anomaly Detection Across Retail Fraud and Network Intrusion Streams Using Dependency-Aware Feature Extraction
NewsMar 12, 2026

Unified Real-Time Anomaly Detection Across Retail Fraud and Network Intrusion Streams Using Dependency-Aware Feature Extraction

A unified, domain‑aware anomaly detection pipeline maps retail transaction and network traffic streams to a common event schema, enabling real‑time monitoring of rare, high‑impact events. The approach extracts temporal features (e.g., time‑since‑last‑event) and contextual typicality without data leakage, then trains...

By Research Square – News/Updates
India Introduces Bug Bounty Program to Target Gaps in Aadhaar Ecosystem
NewsMar 12, 2026

India Introduces Bug Bounty Program to Target Gaps in Aadhaar Ecosystem

India’s Unique Identification Authority (UIDAI) launched a formal bug bounty program to harden the Aadhaar ecosystem. A panel of 20 vetted security researchers will probe the official website, myAadhaar portal, and the Secure QR Code app for vulnerabilities. Rewards are...

By The Cyber Express
India Outlines Legal Framework to Protect Children From AI and Online Harm
NewsMar 12, 2026

India Outlines Legal Framework to Protect Children From AI and Online Harm

India’s government announced a comprehensive legal framework to shield children from AI‑driven online harms. Existing statutes such as the Information Technology Act, 2000 and the Digital Personal Data Protection Act, 2023 are being leveraged to mandate rapid removal of illegal...

By The Cyber Express
ISACA to Build a Skilled Cyber Security Workforce in the Age of AI
NewsMar 12, 2026

ISACA to Build a Skilled Cyber Security Workforce in the Age of AI

ISACA has been named the Department of Defense’s official CMMC Assessors and Instructors Certification Organisation, giving it authority to deliver the full suite of CMMC credentials worldwide. The CMMC framework blends NIST standards with a maturity model, becoming a global...

By ARN (Australia)
Domains.co.za Introduces Complete Domain Protection Service
NewsMar 12, 2026

Domains.co.za Introduces Complete Domain Protection Service

Domains.co.za has launched a Domain Protection add‑on priced at R69 per year, bundling two‑factor authentication, a transfer lock, WHOIS privacy and Anycast DNS in 62 global locations. The package promises a 1 000 % uptime guarantee and discounts on redemption fees for...

By TechCentral (South Africa)
Stryker Breach Puts IT Leaders On Alert. Here’s How To Stay Safe
NewsMar 12, 2026

Stryker Breach Puts IT Leaders On Alert. Here’s How To Stay Safe

Medical‑technology giant Stryker disclosed an Iran‑linked cyberattack that compromised its Microsoft Intune mobile device management (MDM) platform, forcing remote wipes of thousands of laptops and smartphones worldwide. The breach, claimed by the Handala collective, showed no ransomware but highlighted the...

By Forbes – Healthcare
Proofpoint Expands AI-Driven Security Strategy While Strengthening Partner Ecosystem
NewsMar 12, 2026

Proofpoint Expands AI-Driven Security Strategy While Strengthening Partner Ecosystem

Proofpoint is expanding its AI‑driven security platform to protect the emerging human‑AI workspace, adding intent‑based detection for AI‑generated phishing and modernising threat investigation tools. The company now processes roughly six trillion messages daily, covering about 45 % of global enterprise email...

By ARN (Australia)
Meta Disables 150,000 Accounts in Global Sting on Southeast Asian Scam Centres
NewsMar 12, 2026

Meta Disables 150,000 Accounts in Global Sting on Southeast Asian Scam Centres

Meta disabled over 150,000 accounts linked to Southeast Asian scam centres after a joint operation led by Thailand’s Royal Thai Police, the FBI and the U.S. Justice Department. The crackdown resulted in 21 arrests and highlighted the sophisticated, multilingual fraud...

By South China Morning Post — Economy
IBM, Signal, and Threema Partner to Fortify Messaging Against Quantum Threats
NewsMar 12, 2026

IBM, Signal, and Threema Partner to Fortify Messaging Against Quantum Threats

IBM researchers have teamed up with Signal and Threema to embed post‑quantum cryptography into their messaging platforms. The partnership pivots from classical elliptic‑curve schemes to NIST‑2024 PQC standards, tackling both content and metadata protection. IBM proposes a decentralized gatekeeper model...

By Quantum Computing Report
How to Use GitLab Container Virtual Registry with Docker Hardened Images
NewsMar 12, 2026

How to Use GitLab Container Virtual Registry with Docker Hardened Images

GitLab’s Container Virtual Registry acts as a pull‑through cache for Docker Hub, Docker Hardened Images (dhi.io), Microsoft Container Registry, Quay and internal registries. It consolidates authentication to GitLab, caches images on the first pull and serves subsequent pulls locally, cutting...

By GitLab Blog
Development of Coruna iOS Exploit Kit Pinned on US Military Contractor
NewsMar 11, 2026

Development of Coruna iOS Exploit Kit Pinned on US Military Contractor

U.S. defense contractor L3Harris, through its Trenchant surveillance‑tech division, was identified as a developer of the Coruna iOS exploit kit. Former employees disclosed that the kit, comprising roughly two dozen components originally built for a government surveillance client, has been...

By SC Media
Iran War to Escalate US Organizations' Cyber Risk
NewsMar 11, 2026

Iran War to Escalate US Organizations' Cyber Risk

The escalating U.S.–Israel conflict with Iran is expected to heighten cyber threats against U.S. public finance issuers, according to Fitch Ratings. Hacktivist and state‑backed actors may increase DDoS, ransomware, and data‑wiping attacks targeting critical infrastructure. Municipalities, which traditionally lag in...

By SC Media
NZ Businesses Report Surge in AI-Related Security Incidents
NewsMar 11, 2026

NZ Businesses Report Surge in AI-Related Security Incidents

A Kordia survey of nearly 250 New Zealand firms with 50+ employees shows a sharp rise in AI‑related security incidents. Shadow AI now ranks among the top three cyber risks for 24% of respondents, up from 16% a year earlier. Attacks...

By SC Media
Report: APAC Second Most Targeted Region as Attackers Exploit Basic Gaps
NewsMar 11, 2026

Report: APAC Second Most Targeted Region as Attackers Exploit Basic Gaps

The 2026 IBM X‑Force Threat Intelligence Index shows Asia‑Pacific as the world’s second‑most targeted region, responsible for 27% of tracked cyber incidents. Attackers are leveraging basic security gaps, with AI tools speeding vulnerability discovery and automation. Malware accounts for 45%...

By SC Media
Organizations Track Response, Not Prevention, Survey Finds
NewsMar 11, 2026

Organizations Track Response, Not Prevention, Survey Finds

A new Malanta survey of 100 security professionals shows enterprises are still focused on response rather than prevention despite investing heavily in threat intelligence. Companies typically run five to eight feeds—some up to 53—with 71% reporting overlapping data and 100%...

By SC Media
Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone
NewsMar 11, 2026

Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone

Iran‑linked Handala Hack Team announced cyberattacks on medical‑device maker Stryker and payment‑technology firm Verifone on March 11. Stryker confirmed a network disruption in its Microsoft‑based environment but reported no ransomware or data loss, while Verifone said it found no evidence of...

By HackRead
Seven Essential Security Strategies For Law Firms And Legal Departments
NewsMar 11, 2026

Seven Essential Security Strategies For Law Firms And Legal Departments

Law firms and corporate legal departments face escalating cyber threats, with one‑third expected to experience a breach this year and average losses exceeding $5 million. The article outlines seven essential security strategies: building a vigilance culture, turning compliance into a market...

By Above the Law
Foreign Hacker in 2023 Compromised Epstein Files Held by FBI
NewsMar 11, 2026

Foreign Hacker in 2023 Compromised Epstein Files Held by FBI

In February 2023 a foreign hacker infiltrated the FBI’s New York Field Office server that housed files from the Jeffrey Epstein investigation. The breach was discovered when a special agent found a warning file, and the hacker later engaged in a...

By iTnews (Australia) – Government
Xygeni GitHub Action Compromised Via Tag Poison
NewsMar 11, 2026

Xygeni GitHub Action Compromised Via Tag Poison

Xygeni’s official GitHub Action was compromised through a tag‑poisoning attack that redirected the mutable v5 tag to a malicious commit containing a command‑and‑control implant. The attacker leveraged a stolen maintainer personal access token and a compromised GitHub App private key...

By Dark Reading
Iran-Linked Hackers Reportedly Targeted Albanian Parliament Email System
NewsMar 11, 2026

Iran-Linked Hackers Reportedly Targeted Albanian Parliament Email System

Albanian parliament email system was targeted by the Iran‑linked hacking group Homeland Justice. The attackers sought to access or leak emails of senior political figures, and some content later appeared on Telegram. Albania’s National Cyber Security Authority launched an investigation,...

By bne IntelliNews
Bell Cyber Launches Fully Managed Cybersecurity Solution for SMEs
NewsMar 11, 2026

Bell Cyber Launches Fully Managed Cybersecurity Solution for SMEs

Bell Cyber has launched CyberShield Connect, a fully managed cybersecurity service tailored for Canadian small and medium-sized enterprises. Powered by WatchGuard’s Unified Security Platform, the solution combines cloud‑managed security, automated deployment, and Security Operations Centre monitoring into a single offering....

By Cartt.ca (Canada)
Swiss E-Voting Pilot Can't Count 2,048 Ballots After USB Keys Fail To Decrypt Them
NewsMar 11, 2026

Swiss E-Voting Pilot Can't Count 2,048 Ballots After USB Keys Fail To Decrypt Them

Swiss authorities suspended Basel‑Stadt's e‑voting pilot after 2,048 ballots could not be decrypted, despite three USB sticks containing the correct codes. The pilot, which served roughly 10,300 expatriates and 30 voters with disabilities, collected votes amounting to less than 4%...

By Slashdot
SQLi Flaw in Elementor Ally Plugin Impacts 250k+ WordPress Sites
NewsMar 11, 2026

SQLi Flaw in Elementor Ally Plugin Impacts 250k+ WordPress Sites

A critical SQL injection flaw (CVE‑2026‑2413) was found in Elementor's Ally plugin, affecting all versions up to 4.0.3 and potentially exposing data on more than 250,000 WordPress sites. The vulnerability allows unauthenticated attackers to inject malicious SQL via a URL...

By BleepingComputer
F5 Brings New Visibility and AI Controls to Big-IP, NGINX
NewsMar 11, 2026

F5 Brings New Visibility and AI Controls to Big-IP, NGINX

At its AppWorld conference, F5 unveiled a suite of AI‑enhanced updates to its Application Delivery and Security Platform, including the new observability product F5 Insight, AI‑powered risk scoring for its Distributed Cloud WAF, and post‑quantum TLS support in Big‑IP v21.1....

By Network World
Iran Warns US Tech Firms Could Become Targets as War Expands
NewsMar 11, 2026

Iran Warns US Tech Firms Could Become Targets as War Expands

Iranian state‑linked media released a list naming Google, Microsoft, Palantir, IBM, Nvidia and Oracle as legitimate targets in the expanding regional war. The warning follows recent Iranian drone attacks that damaged Amazon Web Services data centers in the UAE and...

By WIRED
ChatGPT Edu Feature Reveals Researchers’ Project Metadata Across Universities (Exclusive)
NewsMar 11, 2026

ChatGPT Edu Feature Reveals Researchers’ Project Metadata Across Universities (Exclusive)

A flaw in OpenAI's ChatGPT Edu Codex Cloud Environments allows anyone within a university to view the names and interaction counts of GitHub repositories linked to student and staff accounts. Oxford researcher Luc Rocher discovered that project metadata—including how often...

By Fast Company
SAP Security Patch Day March 2026 Highlights FS-QUO and Enterprise Portal Risks
NewsMar 11, 2026

SAP Security Patch Day March 2026 Highlights FS-QUO and Enterprise Portal Risks

SAP’s March 2026 Security Patch Day released 15 security notes, including two critical CVSS 9+ vulnerabilities and one high‑priority denial‑of‑service issue. The critical flaws affect SAP Quotation Management Insurance (FS‑QUO) via an outdated Log4j library, SAP NetWeaver Enterprise Portal Administration through insecure...

By ERP Today
This Security Flaw Could Affect 1 in 4 Android Phones - How to Check Yours
NewsMar 11, 2026

This Security Flaw Could Affect 1 in 4 Android Phones - How to Check Yours

Researchers at Ledger’s Donjon team discovered a hardware flaw in MediaTek’s trusted execution environment that affects roughly 25 % of Android smartphones. The vulnerability lets an attacker connect a phone to a laptop via USB and extract cryptographic keys in under...

By ZDNet – Business
Hackers Leak Customer Data After Telco Refuses to Pay Ransom
NewsMar 11, 2026

Hackers Leak Customer Data After Telco Refuses to Pay Ransom

Hackers from the ShinyHunters collective stole personal data of over six million Odido customers and demanded a €1 million ransom. Odido refused to pay, following police advice, prompting the attackers to leak a million lines of data daily and eventually publish...

By Finextra
The Game-Changing Technology Helping Businesses Prevent Catastrophic Data Loss
NewsMar 11, 2026

The Game-Changing Technology Helping Businesses Prevent Catastrophic Data Loss

The article highlights how combining Continuous Data Protection (CDP) with artificial‑intelligence creates near‑zero Recovery Point Objectives (RPO) and dramatically lower Recovery Time Objectives (RTO). AI layers such as predictive failure analysis, anomaly detection and automated recovery orchestration boost CDP’s real‑time...

By Entrepreneur » Sales
Microsoft .NET Vulnerability Enables Remote DoS Attacks
NewsMar 11, 2026

Microsoft .NET Vulnerability Enables Remote DoS Attacks

Microsoft disclosed CVE‑2026‑26127, an out‑of‑bounds read flaw in the .NET framework that enables unauthenticated attackers to trigger remote denial‑of‑service conditions. The vulnerability affects multiple .NET versions and carries a CVSS rating of 7.5, indicating high severity. Microsoft has released a...

By eSecurity Planet
WordPress Security Release 6.9.4 Fixes Issues 6.9.2 Failed To Address via @Sejournal, @Martinibuster
NewsMar 11, 2026

WordPress Security Release 6.9.4 Fixes Issues 6.9.2 Failed To Address via @Sejournal, @Martinibuster

WordPress issued version 6.9.4 after the rushed 6.9.2 security release caused site crashes and left some vulnerabilities unpatched. The 6.9.2 update addressed ten flaws but introduced a template‑loading bug that broke sites using non‑standard themes, prompting a fast‑follow 6.9.3 fix. 6.9.4...

By Search Engine Journal
European Groups Form Cybersecurity Initiative for Industrial Automation
NewsMar 11, 2026

European Groups Form Cybersecurity Initiative for Industrial Automation

A European consortium has launched the three‑year ENFORCERS initiative to secure software supply chains, coordinate incident response, and enhance lifecycle resilience for industrial automation. Backed by EU funding, the project brings together manufacturers, cybersecurity vendors, and research institutes to build...

By DC Velocity
New PhantomRaven NPM Attack Wave Steals Dev Data via 88 Packages
NewsMar 11, 2026

New PhantomRaven NPM Attack Wave Steals Dev Data via 88 Packages

Security researchers have identified a new wave of the PhantomRaven supply‑chain campaign targeting the npm registry. Between November 2025 and February 2026, Endor Labs discovered 88 malicious packages distributed through 50 disposable accounts, many employing slopsquatting and Remote Dynamic Dependencies...

By BleepingComputer
Ledger Uncovers Security Vulnerability That Could Affect 25% of Android Phones
NewsMar 11, 2026

Ledger Uncovers Security Vulnerability That Could Affect 25% of Android Phones

Ledger’s in‑house security team disclosed a critical flaw in Android phones powered by MediaTek chips, potentially affecting up to 25% of devices. The vulnerability lets attackers extract root cryptographic keys and decrypt full‑disk storage even when the phone is off,...

By The Defiant
France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025
NewsMar 11, 2026

France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025

The French cybersecurity agency ANSSI reported a modest decline in ransomware incidents in 2025, with 128 attacks versus 141 in 2024. The drop is attributed to proactive cyber‑defense measures and large‑scale law‑enforcement actions such as Operation Endgame. While overall ransomware...

By Infosecurity Magazine
Quectel Leans on Third-Party Security Validation as EU Cyber Resilience Act Deadline Approaches
NewsMar 11, 2026

Quectel Leans on Third-Party Security Validation as EU Cyber Resilience Act Deadline Approaches

Quectel Wireless Solutions announced that its IoT module portfolio is already aligned with the EU Cyber Resilience Act (CRA) ahead of the September 11 2026 deadline. The company relies on a four‑year partnership with Finite State to deliver independent security testing, software‑bill‑of‑materials...

By IoT Business News – Smart Buildings
IO River Launches Multi-CDN Edge Security With Check Point
NewsMar 11, 2026

IO River Launches Multi-CDN Edge Security With Check Point

IO River unveiled a multi‑CDN edge security platform powered by Check Point’s Web Application Firewall. The solution runs security logic directly at the edge of each CDN, eliminating the need to route traffic back to a central inspection point. By decoupling...

By ChannelE2E
DataBahn Expands Microsoft Sentinel Integration
NewsMar 11, 2026

DataBahn Expands Microsoft Sentinel Integration

DataBahn has deepened its partnership with Microsoft, embedding its AI‑driven data pipeline into Microsoft Sentinel via the Content Hub and Azure Marketplace. The joint solution automates ingestion, normalization, and routing of telemetry from hundreds of sources, cutting weeks of manual...

By ChannelE2E
HIMSS Survey: 60% of Health Systems Can’t Protect Unmanaged Medical Devices
NewsMar 11, 2026

HIMSS Survey: 60% of Health Systems Can’t Protect Unmanaged Medical Devices

A new HIMSS‑Elisity survey reveals that 62% of health systems cannot secure unpatchable or agentless IoMT devices, while 56% struggle with basic inventory visibility. The same respondents cite microsegmentation as the preferred defense, yet 40% fear it will disrupt clinical...

By HIT Consultant
Police Scotland Fined £66k for Extracting and Sharing Mobile Phone Data
NewsMar 11, 2026

Police Scotland Fined £66k for Extracting and Sharing Mobile Phone Data

The Information Commissioner’s Office fined Police Scotland £66,000 after it extracted the entire contents of a suspect’s mobile phone following a crime report and shared the unredacted data with an unauthorised third party. The ICO found the force failed to...

By DataBreaches.net
Researchers Discover Major Security Gaps in LLM Guardrails
NewsMar 11, 2026

Researchers Discover Major Security Gaps in LLM Guardrails

Unit 42 researchers revealed that safety guardrails in generative AI, termed “AI Judges,” can be bypassed using a novel prompt‑injection technique. Their custom fuzzer, AdvJudge‑Zero, automatically discovers low‑perplexity token sequences that shrink the logit gap between “allow” and “block,” achieving a...

By Infosecurity Magazine
5 Ways to Protect Manufacturing From Cyberattacks
NewsMar 11, 2026

5 Ways to Protect Manufacturing From Cyberattacks

Manufacturers remained the most targeted sector in 2025, according to IBM X‑Force, driven by high‑value intellectual property and legacy systems that are hard to patch. Experts warn that many firms treat operational technology separately from cybersecurity, lack robust identity controls,...

By Manufacturing Dive