MeitY Awaiting Industry Inputs on Plans to Slash Timeline for Data Protection Compliance: S Krishnan
The Ministry of Electronics and Information Technology (MeitY) is considering shortening the Digital Personal Data Protection (DPDP) compliance window for significant data fiduciaries from 18 months to 12 months. The proposal is still under review, with the government awaiting detailed inputs from industry stakeholders before making a final decision. MeitY also noted it has not yet examined Karnataka’s draft law to ban social‑media use for children under 16, emphasizing that such matters fall under national jurisdiction. The secretary highlighted India’s growing internet user base—now over a billion—and the importance of active participation in global internet‑governance forums like ICANN 85.

New GSA Guidance on Protecting CUI in Contractor Systems, Plus a Look Ahead at Pending FAR Changes
The General Services Administration issued a five‑phase procedural guide to protect Controlled Unclassified Information (CUI) in contractor‑owned systems, outlining concrete deliverables from preparation through continuous monitoring. A parallel FAR Council proposal would embed a standardized CUI clause, a new form,...
TikTok Gets Green Light to Stay in Canada, Reversing Earlier Ban
Canada has overturned its 2024 order to wind down TikTok’s Canadian subsidiary, allowing the platform to continue operating nationwide. The decision follows a fresh security review and new legally binding commitments requiring TikTok to install security gateways, privacy‑enhancing technologies, and...
Eros Innovation and enQase Launch Sovereign Quantum-Safe Trust Layer
Eros Innovation and enQase have launched a strategic joint venture to build the Eros Sovereign Trust Layer, a quantum‑safe security architecture for cultural data, digital identity, and AI assets. The platform merges enQase’s full‑stack quantum‑resilient hardware and software with Eros’s...
AI Quickstart: Protecting Inference with F5 Distributed Cloud and Red Hat AI
F5 Distributed Cloud and Red Hat AI have released a joint AI quickstart that secures LLM inference endpoints. The modular blueprint integrates F5’s API security services with Red Hat’s AI platform and can be deployed in under 90 minutes. It adds schema...

Insider Threats: Malicious and Negligent Incidents on the Rise
Recent research highlighted by Tech Radar shows insider threats are climbing sharply. A Mimecast survey of 2,500 IT leaders found 42% of firms reported more malicious insider incidents, matching the same rise in negligent events. Companies now endure an average...

Ericsson US Unit Reports Data Breach Tied To Third-Party Service Provider
Ericsson’s U.S. subsidiary reported a data breach that originated from an unnamed third‑party service provider, affecting a limited set of employee and customer files between April 17‑22 2025. The compromised data includes names, addresses, Social Security numbers, driver’s licenses, financial and medical...
Trump Administration Will Test Infrastructure Cybersecurity Approaches in Pilot Program
The Trump administration announced a pilot program to test cybersecurity technologies with specific critical‑infrastructure sectors, including Texas water utilities, South Dakota beef processors, and rural hospitals. National Cyber Director Sean Cairncross emphasized rapid deployment and the rejection of a universal,...

AVideo Zero-Click Flaw Lets Attackers Hijack Live Streams
A zero‑click command injection flaw (CVE‑2026‑29058) was found in the open‑source AVideo streaming platform’s objects/getImage.php endpoint. The vulnerability decodes a Base64‑encoded parameter and injects it directly into an ffmpeg shell command, allowing unauthenticated attackers to execute arbitrary code. Exploitation can...

Are We Ready for Auto Remediation With Agentic AI?
Organizations are rapidly adopting AI‑driven auto remediation, with 88% using some form of AI and 44% deploying it for most exposure types. The most common automated actions target cloud configuration, network access controls, identity permissions, patch deployment, and infrastructure‑as‑code changes....

CleanMyMac Imposter Site Installs SHub Stealer on Macs
A counterfeit CleanMyMac website (cleanmymacos.org) lures macOS users into pasting a malicious Terminal command, which installs the SHub Stealer infostealer. The script bypasses Gatekeeper, notarization and XProtect by executing directly in the user’s shell. Once installed, the loader checks for...
ShinyHunters Claims More High-Profile Victims in Latest Salesforce Customers Data Heist
ShinyHunters claims to have exfiltrated data from roughly 100 high‑profile companies in a new Salesforce Experience Cloud breach, including Salesforce itself, Snowflake, Okta, LastPass, Sony and AMD. The group leveraged a modified version of Mandiant’s open‑source AuraInspector tool to scan...

CISA Delays Cyber Incident Reporting Town Halls Due to Shutdown
The Cybersecurity and Infrastructure Security Agency (CISA) has postponed its scheduled town‑hall meetings on the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) because the Department of Homeland Security remains shut down. The agency also warned that the shutdown will...

Configure Org-Wide MFA with Zoho Directory + OneAuth
Zoho Directory now lets administrators enforce multi‑factor authentication across an entire organization. The platform supports a range of factors—including biometrics, security keys, authenticator apps, and password‑less OneAuth Smart Sign‑In—while allowing conditional policies by role, location, or device. According to CISA,...
PQShield Releases 5KB RAM Post-Quantum Cryptography Implementation
PQShield unveiled its PQMicroLib‑Core library, delivering post‑quantum cryptography within a sub‑5 KB RAM footprint suitable for embedded devices. The implementation supports NIST‑standard ML‑KEM and ML‑DSA, integrates side‑channel countermeasures, and offers a drop‑in TLS solution via the PSA Crypto API. Targeting the...

How EU CRA and IEC 62443 Impact CANopen Device Manufacturers
The EU Cyber Resilience Act (CRA) now mandates that all non‑exempt CAN‑connectable products meet cybersecurity requirements by December 11 2027. Because CAN protocols lack built‑in security, manufacturers must perform system‑level risk assessments and adopt IEC 62443 security levels, ranging from physical‑access controls for...
HSCC, Health-ISAC Launch National Cyber Exercise to Test Healthcare Incident Response
Operation Vital Signs, a national cyber‑security stress test, will be co‑hosted by the Health Sector Coordinating Council’s Cybersecurity Working Group and Health‑ISAC on July 21‑22. The virtual two‑day exercise simulates a cyber incident that threatens critical functions and patient safety across...

EV Charger Biz ELECQ Zapped by Ransomware Crooks, Customer Contact Data Stolen
ELECQ, a maker of smart EV chargers, disclosed a ransomware attack on its AWS cloud platform on March 7 that encrypted and exfiltrated customer contact data. The breach exposed names, email addresses, phone numbers and home addresses, but no payment information...

From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222
In the March 9 2026 CSP #222 episode, Deputy CISO Ian Washburn critiques the flood of generic threat alerts from public‑sector feeds such as CISA, MS‑ISAC and CIS. He argues that funding realignments and revised distribution models could transform raw alerts into timely,...

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data
Researchers at Huntress uncovered a campaign where a threat actor exploited vulnerabilities in enterprise software, including SolarWinds Web Help Desk, to harvest system data and funnel it into a free‑trial Elastic Cloud SIEM instance. The attacker used an encoded PowerShell...
I've Used Tor Browser for Years, but Now I'm Using It on My Android Phone - Here's Why
Elyse Betters Picaro reports that she now uses Tor Browser as her default web browser on Android, highlighting its strong privacy and anonymity features. The app is freely available from the Google Play Store and connects users to the Tor...

FBI Warns of Phishing Attacks Impersonating US City, County Officials
The FBI has issued a public service announcement warning that cybercriminals are impersonating city and county planning and zoning officials to defraud businesses and individuals applying for land‑use permits. Attackers harvest publicly available permit data, craft emails from non‑government domains,...
GAO: Panel Highlights Overlapping Cyber Regulations and Need for Harmonization
The Government Accountability Office released a second report highlighting how overlapping federal cybersecurity regulations are creating redundant work for owners of critical infrastructure. Industry participants cited duplicated requirements, conflicting definitions, and inconsistent incident‑reporting mandates as major pain points. While agencies...

Security Risk Advisors Releases “The Purple Perspective 2026” Report
Security Risk Advisors (SRA) unveiled its inaugural “Purple Perspective 2026” report, drawing on more than 160 purple‑team exercises that tested over 8,300 MITRE ATT&CK techniques. The study reveals that organizations conducting two to four exercises annually achieve markedly better detection and...
'No Major Vulnerabilities' — Mullvad’s WireGuard Implementation Gets Thumbs up From Independent Security Audit
Mullvad VPN’s Rust‑based WireGuard client, GotaTun, has cleared an independent security audit with no major vulnerabilities identified. The audit, performed by Assured Security Consultants, confirmed the implementation’s correctness while noting two low‑severity issues that Mullvad fixed before the review concluded....

Apono Integration for Grafana: Enabling Just-in-Time Access for Data Sources
Apono has launched an integration with Grafana that provides Just-in-Time, policy-driven access to the platform’s underlying data sources. The solution continuously discovers data sources such as Elasticsearch, PostgreSQL, and CloudWatch, and grants engineers short-lived permissions based on predefined policies, on-call...

IBM and Cobalt Iron Are Introducing Secure Automated Backup with Compass
IBM and Cobalt Iron have launched Secure Automated Backup with Compass, a Backup‑as‑a‑Service (BaaS) solution for IBM Cloud customers. The offering extends the proven protection model from IBM Power Virtual Server to a broader set of workloads across hybrid and...

UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
The UK Home Office and National Crime Agency announced the creation of an Online Crime Centre, set to begin operations in April. The unit will pool expertise from police, intelligence, banks, mobile networks and major tech firms to identify and...

Fixing Request Smuggling Vulnerabilities in Pingora OSS Deployments
In December 2025 Cloudflare was alerted to three HTTP/1.x request smuggling flaws (CVE‑2026‑2833, ‑2835, ‑2836) in the open‑source Pingora framework when used as an ingress proxy. The issues allowed attackers to bypass proxy security, desynchronize request handling, and poison caches...

AI-Based Cybersecurity Monitoring
AI‑based cybersecurity monitoring leverages machine learning and behavioral analytics to analyze massive streams of telemetry across networks, endpoints, cloud services, and identities. By learning normal activity patterns, these platforms flag anomalies, correlate events, and prioritize alerts, dramatically reducing false positives...

MITRE ATT&CK as a Governance Tool
MITRE ATT&CK is being promoted as a governance tool for accounting and finance professionals to meet SEC cyber‑disclosure requirements. Unlike traditional control‑centric frameworks, ATT&CK provides a threat‑intelligence view of adversary tactics and techniques. The framework is endorsed by CISA and...

Emma Pickering, Head Of Technology-Facilitated Abuse And Economic Empowerment, Refuge
Refuge reports a 62% jump in referrals for technology‑facilitated and economic abuse in 2025, with the final quarter setting a new record. Younger victims are increasingly targeted, as referrals involving survivors under 30 rose 24%. Perpetrators are exploiting wearables, hidden...
FreeBSD Capsicum Vs. Linux Seccomp Process Sandboxing
FreeBSD’s Capsicum and Linux’s seccomp‑bpf both aim to curb the ambient authority of compromised processes, but they take opposite approaches. Capsicum adopts a subtraction model: a single irreversible cap_enter() call strips the process of all global namespaces, leaving only explicitly granted...

An AI-Powered Poly-Crisis Is Here, and It Is Rewriting Cyber Postures. Are You Breach Ready Yet?
AI‑powered attacks are reshaping cyber risk, highlighted by the recent breach of Mexican government data using Anthropic’s Claude. The incident, involving theft of ~150 GB of tax and voter records, demonstrates how compromised AI assistants can act as “confused deputies,” enabling...

Internet Infrastructure TLD .arpa Abused in Phishing Attacks
A threat actor is exploiting the .arpa top‑level domain, which is intended solely for reverse DNS, to host phishing sites. By creating A records for IPv6 reverse‑DNS zones through providers such as Cloudflare and Hurricane Electric, the attacker serves malicious...
WinMagic Reveals What Comes After Passkeys: Identity Assurance That Lives Beyond Login
WinMagic announced Live Key and Live Identity in Transaction (LIT), technologies that extend cryptographic verification beyond the initial login to protect entire sessions and transactions. The company argues that passkeys, while securing authentication, leave a gap once a session is...

Largest Shopping Center in the Netherlands Affected by Data Breach
Westfield Mall of the Netherlands, the country’s largest indoor shopping centre, disclosed a data breach that exposed personal information of loyalty‑program members and newsletter subscribers. The compromised database contained names, email addresses, phone numbers, postal codes and dates of birth,...

IT Governance as a Prerequisite for Zero-Trust Identity Architecture
Organizations are increasingly turning to zero‑trust identity architecture to counter sophisticated cyber threats, but the model’s success hinges on strong IT governance. A recent study shows firms with mature governance are 32% more likely to prevent identity‑related breaches, while 74%...

Fake Claude Code Install Pages Highlight Rise of “InstallFix” Attacks
Security researchers at Push Security discovered that attackers are publishing counterfeit Anthropic Claude Code installation pages. These look‑alike sites, promoted through paid Google ads, replace legitimate install commands with malicious scripts that download the Amatera stealer on Windows and comparable malware...

West Asia Conflict: Nasscom Urges Member Firms to Step up Vigilence, Cyber Resilience
NASSCOM has issued a fresh advisory urging Indian technology firms to heighten vigilance and cyber‑resilience as the West Asia conflict escalates following US and Israeli strikes on Iran. The body recommends activating business‑continuity plans, enabling remote work for staff in...

We’ve Seen Ransomware Cost American Lives. Here’s What It Will Actually Take to Stop It.
Ransomware attacks surged in 2024, with the Department of Homeland Security reporting over 5,600 publicly disclosed incidents worldwide and nearly half targeting the United States. The FBI notes a nine‑percent year‑over‑year rise, and the average breach now costs $2.73 million, threatening...
Land Bank Tightens Security After Ransomware Attack
The Land and Agricultural Development Bank of South Africa confirmed a ransomware attack on 12 January 2026 that encrypted parts of its server environment and several laptops. The breach entered through a vulnerable internet‑facing server, but the bank’s core banking, ERP and...
Infinite Potential—Insights From the Cyber Surprise Scenario
RAND’s “Day After AGI” exercises on the Infinite Potential platform examined a Cyber Surprise scenario in which China rapidly deploys a powerful cyber‑AI capability that outpaces U.S. defenses. Six runs with analysts and former officials revealed a strong preference for...
4 Best Practices to Get IAM Implementation Right the First Time
Enterprises are finally receiving budget approvals for identity access management, with 82% of financial decision‑makers increasing spend, according to Cisco Duo’s 2025 State of Identity Security. The article outlines four best‑practice pillars—user experience, staged testing, device health verification, and ongoing...
RSAC 2026 Conference: Key News and Industry Analysis
RSAC 2026, themed “The Power of Community,” convenes 44,000 security professionals in San Francisco from March 23‑26, featuring over 700 vendors, 500 sessions across 25 tracks, and a focus on collaborative defense. Pre‑conference coverage highlights AI agent overload, breach transparency, IoT vulnerabilities,...

Webinar: Compliance Without Compromise: Test Data Management That Finally Fits
Redgate hosted a webinar titled "Compliance Without Compromise: Test Data Management That Finally Fits," highlighting how modern test data management can meet strict compliance requirements without slowing development. Speakers Kellyn Gorman, Redgate’s Multiplatform Database/AI Advocate, and Product Manager James Hemson...
Kremlin Hackers Attempting to Compromise Signal, WhatsApp Accounts Globally
Russian state‑linked hackers are conducting a global campaign to hijack Signal and WhatsApp accounts belonging to government officials, military personnel, and journalists, Dutch intelligence warned. The operation relies on social‑engineering tactics—impersonating support staff to obtain verification codes or trick users...

DORA Raises the Bar on Operational Resilience
The EU Digital Operational Resilience Act (DORA) has been in force since January 2025, obligating financial services firms to retain operational control during severe IT incidents, not merely avoid failures. While many institutions have bolstered continuity and cyber‑response capabilities, a Veeam‑commissioned...

EU Court Adviser Says Banks Must Immediately Refund Phishing Victims
Advocate General Athanasios Rantos of the EU Court of Justice issued an opinion that banks must instantly refund victims of unauthorized phishing transactions under the EU Payment Services Directive (PSD2), unless they have reasonable grounds to suspect fraud. The opinion...

Passkeys Were Supposed to Replace Passwords, but They're Failing for the Most Predictable Reason
Passkeys, a public‑private key pair paired with biometric verification, were heralded as the successor to passwords, yet most users remain unaware of how they work. Websites often present the option without clear guidance, and many keep passwords as a fallback,...