Cybersecurity News and Headlines

75% of Firms Skip Regular Identity Recovery Tests: Survey
NewsMar 10, 2026

75% of Firms Skip Regular Identity Recovery Tests: Survey

The Quest Software State of ITDR survey of 650 senior IT and security executives reveals a striking gap in disaster‑recovery hygiene. More than three‑quarters of respondents admit they do not rehearse identity‑focused recovery within the recommended six‑month window, and nearly...

By AI-TechPark
Data Center Security Compliance Checklist
NewsMar 10, 2026

Data Center Security Compliance Checklist

The March 2026 update of the Data Center Security Compliance Checklist expands the traditional security framework to include AI‑governance and sustainability mandates. It outlines cross‑team alignment, the shift to PCI DSS 4.0, and the relevance of standards such as SOC 2, ISO 27001, GDPR, FedRAMP...

By TechTarget SearchERP
Fake Gemini AI Chatbot Promotes ‘Google Coin’ in New Crypto Scam
NewsMar 10, 2026

Fake Gemini AI Chatbot Promotes ‘Google Coin’ in New Crypto Scam

Cybersecurity researchers discovered a fraudulent website that pretends to be Google’s Gemini AI chatbot, promoting a non‑existent cryptocurrency called “Google Coin.” The site mimics Google branding, displays fake industry logos, and pitches a presale price of $3.95 per token with a...

By TechRepublic – Articles
Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds
NewsMar 10, 2026

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds

Google Cloud’s H1 2026 Threat Horizons Report reveals a marked shift in attacker tactics, with software‑vulnerability exploits overtaking credential‑based attacks as the primary entry method into cloud environments. Third‑party vulnerabilities accounted for 44.5% of initial accesses in H2 2025, up from 2.9%...

By Infosecurity Magazine
IRONSCALES Unveils 3 Targeted AI Agents to Boost Preemptive Email Security
NewsMar 10, 2026

IRONSCALES Unveils 3 Targeted AI Agents to Boost Preemptive Email Security

IRONSCALES’ Winter 2026 release adds three specialized AI agents—Red Teaming, Phishing SOC, and Phishing Simulation—to shift its email security platform from reactive to proactive protection. The agents follow an anticipate‑investigate‑educate framework, scanning external assets, automating Level‑2 forensic analysis, and delivering OSINT‑driven...

By ChannelE2E
GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps
NewsMar 10, 2026

GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps

Electronic warfare near Iran is jamming and spoofing GPS signals, causing delivery and navigation apps to misplace drivers and inflate travel times. The interference stems from low‑cost jammers and sophisticated spoofers that either drown out satellite signals or broadcast false...

By WIRED
Fortinet Enhances SecOps with Cloud SOC, AI Automation, and Managed Services
NewsMar 10, 2026

Fortinet Enhances SecOps with Cloud SOC, AI Automation, and Managed Services

Fortinet unveiled a suite of SecOps upgrades, highlighted by the preview of FortiSOC—a cloud‑delivered service that fuses analytics, SIEM, SOAR and threat intel into a single platform. The company also expanded its FortiAI engine to deliver agentic automation that can...

By Help Net Security
New KadNap Botnet Hijacks ASUS Routers to Fuel Cybercrime Proxy Network
NewsMar 10, 2026

New KadNap Botnet Hijacks ASUS Routers to Fuel Cybercrime Proxy Network

A new botnet named KadNap has infected roughly 14,000 ASUS routers and other edge devices since August 2025, forming a peer‑to‑peer network that communicates via a custom Kademlia Distributed Hash Table protocol. The decentralized architecture makes its command‑and‑control infrastructure harder...

By BleepingComputer
An AI Agent Broke Into McKinsey’s Internal Chatbot and Accessed Millions of Records in Just 2 Hours
NewsMar 10, 2026

An AI Agent Broke Into McKinsey’s Internal Chatbot and Accessed Millions of Records in Just 2 Hours

Security startup CodeWall demonstrated that an autonomous AI agent could infiltrate McKinsey's internal generative‑AI platform, Lilli, in roughly two hours. The breach gave the agent read‑and‑write access to 46.5 million chatbot messages and 728 000 confidential client files. The exploit leveraged unauthenticated...

By Inc. — Leadership
SentientX Launches Human Identity Bank (HIB), a Global Platform to Protect Human Identity in the Age of AI
NewsMar 10, 2026

SentientX Launches Human Identity Bank (HIB), a Global Platform to Protect Human Identity in the Age of AI

SentientX unveiled the Human Identity Bank (HIB), a global platform that lets individuals, agents, and law firms register and govern digital identity assets such as voice, video, and likeness. The service employs cryptographic fingerprinting, digital watermarking, and continuous monitoring to...

By AiThority » Sales Enablement
Finnish Intelligence Warns of Persistent Cyber Espionage From Russia, China
NewsMar 10, 2026

Finnish Intelligence Warns of Persistent Cyber Espionage From Russia, China

Finland’s Security and Intelligence Service (SUPO) warned that Russian and Chinese agencies continue extensive cyber‑espionage and influence campaigns targeting the country’s technology sector, research institutions and government. The assessment, released after SUPO’s 2023 reorganization, cites ongoing intrusions, theft of R&D...

By The Record by Recorded Future
The New Turing Test: How Threats Use Geometry to Prove 'Humanness'
NewsMar 10, 2026

The New Turing Test: How Threats Use Geometry to Prove 'Humanness'

Picus Security’s Red Report 2026, which examined over 1.1 million malicious files, reveals a decisive move toward stealthy, evasion‑centric malware. Virtualization and sandbox‑evasion (ATT&CK T1497) now appear in 20 % of samples, ranking as the fourth most‑used technique in 2025. Modern payloads perform system...

By BleepingComputer
Firewalla Orange Review: This Router Gave My Home Network a Meaningful Security Upgrade
NewsMar 10, 2026

Firewalla Orange Review: This Router Gave My Home Network a Meaningful Security Upgrade

The ZDNET review spotlights Firewalla’s new Orange device, a palm‑sized smart router and firewall that bundles Wi‑Fi 7, dual 2.5 G Ethernet ports, a quad‑core ARM CPU, 2 GB RAM and a built‑in VPN server. Priced at $379.20, it offers app‑driven setup, content‑filtering,...

By ZDNet – Enterprise IT
Microsoft Flips Windows Autopatch to Default Hotpatch Security Updates
NewsMar 10, 2026

Microsoft Flips Windows Autopatch to Default Hotpatch Security Updates

Microsoft will automatically enable hotpatch security updates in Windows Autopatch for eligible devices managed via Intune or the Microsoft Graph API, beginning with the May 2026 security release. Hotpatch, introduced a year ago, lets critical fixes install without a reboot, accelerating...

By Help Net Security
Insightin Health Discloses Its Second Data Security Incident in Two Years (1)
NewsMar 10, 2026

Insightin Health Discloses Its Second Data Security Incident in Two Years (1)

Insightin Health disclosed a March 4 2026 breach that stemmed from a zero‑day flaw in the GoAnywhere file‑transfer tool, allowing an unauthorized actor to access health‑plan data between September 17‑23 2025. The compromised files contained member names, dates of birth, insurance IDs and, in...

By DataBreaches.net
'BlackSanta' EDR Killer Targets HR Workflows
NewsMar 10, 2026

'BlackSanta' EDR Killer Targets HR Workflows

Russian‑speaking actors have launched the BlackSanta campaign targeting HR recruitment workflows. The malware is delivered via résumé‑themed ISO files that embed a malicious payload in steganographic images, then uses a shortcut and obfuscated PowerShell to load signed kernel drivers. Once...

By Dark Reading
Attackers Use AiTM Phishing Kit, Typosquatted Domains to Hijack AWS Accounts
NewsMar 10, 2026

Attackers Use AiTM Phishing Kit, Typosquatted Domains to Hijack AWS Accounts

Datadog researchers uncovered an AiTM phishing campaign that uses spoofed AWS security alerts and typosquatted domains to harvest AWS console credentials. The attackers operate a live proxy, relaying authentication requests to AWS while stealing usernames, passwords, and MFA codes in...

By Help Net Security
New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
NewsMar 10, 2026

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

Researchers at Tenable disclosed nine cross‑tenant vulnerabilities in Google Looker Studio, dubbed “LeakyLooker,” that could let attackers execute arbitrary SQL queries against BigQuery, Spanner, PostgreSQL, MySQL and other GCP data sources. The flaws, ranging from zero‑click SQL injection to data‑source...

By The Hacker News
Cisco Blends Splunk Analytics, Security with Core Data Center Management
NewsMar 10, 2026

Cisco Blends Splunk Analytics, Security with Core Data Center Management

Cisco has embedded Splunk IT Service Intelligence directly into its Nexus Dashboard, the core management platform for Nexus 9000 and 8000 series data‑center switches. The native integration streams high‑fidelity telemetry, enabling faster fault detection, automated root‑cause analysis and remediation without...

By Network World
Skyhigh Security Achieves FedRAMP High Authorization for Skyhigh DSPM
NewsMar 10, 2026

Skyhigh Security Achieves FedRAMP High Authorization for Skyhigh DSPM

Skyhigh Security announced that its Data Security Posture Management (DSPM) solution has earned FedRAMP High authorization, the most rigorous cloud security certification for U.S. federal agencies. The DSPM now joins Skyhigh’s CASB and Secure Web Gateway as FedRAMP‑certified offerings, meeting...

By AiThority » Sales Enablement
Mend.io Launches AI System Prompt Hardening Solution to Secure LLM Instructions
NewsMar 10, 2026

Mend.io Launches AI System Prompt Hardening Solution to Secure LLM Instructions

White Source Ltd., operating as Mend.io, introduced System Prompt Hardening, a solution that automatically detects and mitigates vulnerabilities in the hidden system prompts that guide large language models. The tool assigns a 1‑100 severity score, offers remediation recommendations, and integrates...

By SiliconANGLE
ColorTokens Launches Xshield AI Agent to Automate Microsegmentation Policy Enforcement
NewsMar 10, 2026

ColorTokens Launches Xshield AI Agent to Automate Microsegmentation Policy Enforcement

ColorTokens introduced Xshield AI Agent, an AI‑driven engine that automates microsegmentation policy design and enforcement. The solution claims to shrink policy rollout from days to minutes, enabling rapid isolation of critical assets during breaches. In pre‑release tests, customers reported up...

By SiliconANGLE
Darwinium Launches Agent Intent Intelligence to Tackle Fraud in AI-Driven Commerce
NewsMar 10, 2026

Darwinium Launches Agent Intent Intelligence to Tackle Fraud in AI-Driven Commerce

Darwinium UK Ltd. unveiled an intent‑based authentication and orchestration platform aimed at securing AI‑driven commerce. The solution identifies whether a request originates from a verified AI agent, a human, or malicious automation and applies one of four adaptive responses—permit, verify,...

By SiliconANGLE
Secureframe Unveils New Platform to Cut Defense Cyber Certification Timelines to Weeks
NewsMar 10, 2026

Secureframe Unveils New Platform to Cut Defense Cyber Certification Timelines to Weeks

Secureframe Inc. launched Secureframe Defense, an AI‑powered platform that automates CMMC Level 2 compliance for defense industrial base contractors. The solution deploys a compliant CUI enclave in under 30 minutes, generates system security plans, policies, and continuous monitoring, and compiles audit...

By SiliconANGLE
What Is a Transparent Proxy?
NewsMar 10, 2026

What Is a Transparent Proxy?

A transparent proxy is an intermediary server that intercepts internet traffic without requiring any user configuration, making the process appear direct to the end‑user. It operates at the network layer, typically via router or firewall rules that redirect traffic to...

By Robotics & Automation News
DeKalb County Officials Release Data Breach Notice to Residents
NewsMar 10, 2026

DeKalb County Officials Release Data Breach Notice to Residents

DeKalb County, Indiana, announced that personal data of residents was accessed by an unauthorized individual between August 21 and September 25, 2025. The compromised information may include names combined with Social Security numbers, driver’s license or ID numbers, and financial...

By DataBreaches.net
Fake LinkedIn Interview Used by Lazarus Hackers to Target AllSecure CEO
NewsMar 10, 2026

Fake LinkedIn Interview Used by Lazarus Hackers to Target AllSecure CEO

North Korean Lazarus Group attempted a high‑profile theft by posing as a recruiter on LinkedIn and conducting a fake interview with AllSecure CEO Chris Papathanasiou. The scammers used a deep‑fake avatar and delivered a malicious code package containing the BeaverTail...

By HackRead
Cyber Security Model Question Sets
NewsMar 10, 2026

Cyber Security Model Question Sets

The UK Ministry of Defence (MoD) has published a set of Supplier Assurance Questionnaires (SAQs) and a Flow‑Down Risk Assessment as part of its Cyber Security Model. Four SAQ templates cover cyber risk profiles from Level 0 (minimal) to Level 3 (most...

By UK Ministry of Defence (GOV.UK)
A New Paradigm for Identity and Access Management: Why Extended IAM (XIAM) Matters
NewsMar 10, 2026

A New Paradigm for Identity and Access Management: Why Extended IAM (XIAM) Matters

Enterprises are grappling with a fragmented identity landscape as cloud, hybrid, and API‑driven architectures proliferate. The article introduces Extended Identity and Access Management (XIAM) as a unified control plane that manages all user, machine, device, and application identities across any...

By Identity Week
Terra Portal Adds Human-Governed AI to Live Production Pentesting
NewsMar 10, 2026

Terra Portal Adds Human-Governed AI to Live Production Pentesting

Terra Security unveiled Terra Portal, a desktop app that places human‑governed AI at the core of live‑production penetration testing. The tool combines autonomous agents for routine tasks with a Copilot layer for controlled exploitation, shrinking the discovery‑to‑fix timeline from months to...

By Help Net Security
Nigeria’s Prembly Launches Open-Source Database to Fight African Fraud
NewsMar 10, 2026

Nigeria’s Prembly Launches Open-Source Database to Fight African Fraud

Prembly, a Nigerian digital‑security firm, has unveiled FraudLens, an open‑source fraud‑intelligence bank built on millions of identity‑verification checks. The platform aggregates fraud events from banks, fintechs and other partners, offering a publicly accessible repository that starts with Nigeria and aims...

By TechCabal
CISA: Recently Patched Ivanti EPM Flaw Now Actively Exploited
NewsMar 10, 2026

CISA: Recently Patched Ivanti EPM Flaw Now Actively Exploited

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has classified the high‑severity Ivanti Endpoint Manager vulnerability CVE‑2026‑1603 as actively exploited and placed it in the Known Exploited Vulnerabilities catalog. The flaw, which allows unauthenticated cross‑site scripting to bypass authentication and steal...

By BleepingComputer
Armadin Secures  $189.9 Million to Counter AI-Driven Cyber Threats
NewsMar 10, 2026

Armadin Secures $189.9 Million to Counter AI-Driven Cyber Threats

Armadin announced a $189.9 million seed and Series A round, the largest combined funding ever in cybersecurity, led by Accel with participation from Google Ventures, Kleiner Perkins, Menlo Ventures, In‑Q‑Tel, 8VC and Ballistic Ventures. The capital will accelerate its AI‑driven platform that...

By Help Net Security
Teen Crew Caught Selling DDoS Attack Tools
NewsMar 10, 2026

Teen Crew Caught Selling DDoS Attack Tools

Poland’s Central Bureau for Combating Cybercrime identified seven minors, aged 12 to 16, who sold software that enables distributed denial‑of‑service (DDoS) attacks. The teenagers targeted high‑traffic sites such as auction platforms, hosting services and booking portals, generating profit from the...

By Help Net Security
This Spy Tool Has Been Quietly Stealing Data for Years
NewsMar 10, 2026

This Spy Tool Has Been Quietly Stealing Data for Years

ESET researchers have uncovered a renewed Sednit campaign that relies on a dual‑implant architecture—BeardShell and the open‑source framework Covenant—each hosted on separate cloud providers for redundancy. The toolkit has been used to conduct long‑term surveillance of Ukrainian military personnel since...

By Help Net Security
OpenClaw Advisory Surge Highlights Blind Spot Between GitHub and CVE Vulnerability Tracking
NewsMar 10, 2026

OpenClaw Advisory Surge Highlights Blind Spot Between GitHub and CVE Vulnerability Tracking

OpenClaw’s AI‑agent platform released roughly 255 GitHub Security Advisories (GHSAs) within three weeks, yet only a fraction received CVE identifiers, exposing a visibility gap between GitHub’s advisory stream and traditional CVE feeds. Vulnerability‑intelligence firm VulnCheck asked the CVE Project to...

By GBHackers On Security
The OT Security Time Bomb: Why Legacy Industrial Systems Are the Biggest Cyber Risk Nobody Wants to Fix
NewsMar 10, 2026

The OT Security Time Bomb: Why Legacy Industrial Systems Are the Biggest Cyber Risk Nobody Wants to Fix

Legacy operational technology (OT) in energy and pharma plants still relies on outdated operating systems like Windows XP and insecure protocols such as Modbus, creating a hidden cyber‑risk. While IT teams adopt zero‑trust and AI‑driven defenses, OT environments remain unpatched...

By CSO Online
OpenAI to Acquire Promptfoo to Strengthen AI Agent Security Testing
NewsMar 10, 2026

OpenAI to Acquire Promptfoo to Strengthen AI Agent Security Testing

OpenAI announced it will acquire Promptfoo, an AI testing startup whose tools detect adversarial prompts, jailbreak attempts, and safety violations in large language model applications. Promptfoo’s technology, already deployed by more than a quarter of Fortune 500 firms, will be integrated...

By CSO Online
Eviden KMS Now Available on AWS European Sovereign Cloud
NewsMar 10, 2026

Eviden KMS Now Available on AWS European Sovereign Cloud

Atos’s Eviden brand has made its external key management system (Eviden KMS) available on the newly launched AWS European Sovereign Cloud. The solution leverages a European‑sourced hardware security module that keeps master keys outside the public cloud, delivering sovereign‑by‑design encryption...

By Euronext
Leading Myanmar Fleet Management Company Yoma Fleet Selects AccuKnox SIEM to Replace Legacy Tools
NewsMar 10, 2026

Leading Myanmar Fleet Management Company Yoma Fleet Selects AccuKnox SIEM to Replace Legacy Tools

Yoma Fleet, Myanmar's leading fleet management firm, has selected AccuKnox SIEM to replace its legacy security tools. After a November 2025 evaluation and a successful proof‑of‑concept, the company migrated to the cloud‑native platform via AWS Marketplace in January 2026. AccuKnox...

By HackRead
Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why
NewsMar 10, 2026

Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why

In a recent interview, CISO Hannah Suarez stresses that cyber risk management must begin with a deep understanding of the business, not merely compliance checklists. She highlights how startups often accept risk to accelerate growth, while established firms need structured...

By The Cyber Express
Cyberattack Forces Polish Hospital Revert to Paper-Based Operations
NewsMar 10, 2026

Cyberattack Forces Polish Hospital Revert to Paper-Based Operations

The Independent Public Regional Hospital in Szczecin, Poland, was hit by a ransomware‑style cyberattack on the night of March 7‑8, 2026, encrypting key parts of its electronic medical record system. With digital access blocked, the hospital shifted to a fully paper‑based...

By The Cyber Express
When AI Safety Constrains Defenders More than Attackers
NewsMar 10, 2026

When AI Safety Constrains Defenders More than Attackers

Security teams are encountering AI safety guardrails that block legitimate defensive tasks such as threat modeling, phishing simulations, and red‑team code generation. Research shows open‑weight models can be bypassed in multi‑turn attacks with success rates up to 93%, while enterprise‑approved...

By CSO Online
Airbus CSO on Supply Chain Blind Spots, Space Threats, and the Limits of AI Red-Teaming
NewsMar 10, 2026

Airbus CSO on Supply Chain Blind Spots, Space Threats, and the Limits of AI Red-Teaming

Airbus Chief Security Officer Pascal Andrei warns that the aerospace and defense supply chain’s deepest vulnerabilities now reside in sub‑tier suppliers and the digital threads linking them. He highlights Airbus’s shift toward a collaborative, intelligence‑led model, tighter integration of security...

By Help Net Security – Compliance
Mobile Banking Malware Surge and Supply Chain Vulnerabilities Examined in New Report
NewsMar 10, 2026

Mobile Banking Malware Surge and Supply Chain Vulnerabilities Examined in New Report

Cybersecurity firm Kaspersky reported a 56 percent jump in Android banking trojan detections in 2025, accompanied by a 271 percent surge in unique malicious APKs, now exceeding 255,000. The report also found that supply‑chain attacks affected 31 percent of surveyed organizations, rising to...

By Crowdfund Insider
Hotline: Cybersecurity and Privacy | March 2026
NewsMar 10, 2026

Hotline: Cybersecurity and Privacy | March 2026

Higher‑education cyber leaders often focus on incremental fixes rather than transformative strategies. Mike Corn urges institutions to adopt large‑scale initiatives such as full Zero Trust, phishing‑resistant MFA, and enterprise‑wide SASE to boost resilience. He also examines the expanding market for...

By EDUCAUSE Review
Paris-Based Qevlar AI Raises €25.8 Million to Automate Security Operations Centre Investigations with Agentic AI
NewsMar 10, 2026

Paris-Based Qevlar AI Raises €25.8 Million to Automate Security Operations Centre Investigations with Agentic AI

Paris‑based Qevlar AI announced a €25.8 million funding round, co‑led by Partech and Forgepoint Capital with participation from EQT Ventures. The capital will expand its agentic AI platform that autonomously investigates security alerts, delivering full‑depth analysis and actionable insights. Qevlar claims...

By EU-Startups
Translating Risk Insights Into Actionable Protection: Leveling up Security Posture with Cloudflare and Mastercard
NewsMar 10, 2026

Translating Risk Insights Into Actionable Protection: Leveling up Security Posture with Cloudflare and Mastercard

Cloudflare and Mastercard are integrating Mastercard’s RiskRecon attack‑surface intelligence into the Cloudflare dashboard, enabling continuous discovery and remediation of Internet‑facing blind spots. The partnership lets security teams automatically identify shadow IT, forgotten subdomains, and unprotected cloud assets using publicly available...

By Cloudflare Blog
AI Assistants for Kubernetes: Secure Cluster Operations with MCP and Rafay ZTKA
NewsMar 10, 2026

AI Assistants for Kubernetes: Secure Cluster Operations with MCP and Rafay ZTKA

The Model Context Protocol (MCP) lets AI assistants run Kubernetes commands through a local server while Rafay’s Zero Trust Kubectl Access (ZTKA) supplies a secure, token‑less kubeconfig. This architecture places the MCP server on the admin workstation, routes traffic via...

By Rafay – Blog