Cybersecurity News and Headlines

New GSA Guidance on Protecting CUI in Contractor Systems, Plus a Look Ahead at Pending FAR Changes
NewsMar 10, 2026

New GSA Guidance on Protecting CUI in Contractor Systems, Plus a Look Ahead at Pending FAR Changes

The General Services Administration issued a five‑phase procedural guide to protect Controlled Unclassified Information (CUI) in contractor‑owned systems, outlining concrete deliverables from preparation through continuous monitoring. A parallel FAR Council proposal would embed a standardized CUI clause, a new form,...

By JD Supra (Labor & Employment)
TikTok Gets Green Light to Stay in Canada, Reversing Earlier Ban
NewsMar 10, 2026

TikTok Gets Green Light to Stay in Canada, Reversing Earlier Ban

Canada has overturned its 2024 order to wind down TikTok’s Canadian subsidiary, allowing the platform to continue operating nationwide. The decision follows a fresh security review and new legally binding commitments requiring TikTok to install security gateways, privacy‑enhancing technologies, and...

By The Business Times (Singapore) – Companies & Markets
Eros Innovation and enQase Launch Sovereign Quantum-Safe Trust Layer
NewsMar 10, 2026

Eros Innovation and enQase Launch Sovereign Quantum-Safe Trust Layer

Eros Innovation and enQase have launched a strategic joint venture to build the Eros Sovereign Trust Layer, a quantum‑safe security architecture for cultural data, digital identity, and AI assets. The platform merges enQase’s full‑stack quantum‑resilient hardware and software with Eros’s...

By Quantum Computing Report
AI Quickstart: Protecting Inference with F5 Distributed Cloud and Red Hat AI
NewsMar 10, 2026

AI Quickstart: Protecting Inference with F5 Distributed Cloud and Red Hat AI

F5 Distributed Cloud and Red Hat AI have released a joint AI quickstart that secures LLM inference endpoints. The modular blueprint integrates F5’s API security services with Red Hat’s AI platform and can be deployed in under 90 minutes. It adds schema...

By Red Hat – DevOps
Insider Threats: Malicious and Negligent Incidents on the Rise
NewsMar 9, 2026

Insider Threats: Malicious and Negligent Incidents on the Rise

Recent research highlighted by Tech Radar shows insider threats are climbing sharply. A Mimecast survey of 2,500 IT leaders found 42% of firms reported more malicious insider incidents, matching the same rise in negligent events. Companies now endure an average...

By SC Media
Ericsson US Unit Reports Data Breach Tied To Third-Party Service Provider
NewsMar 9, 2026

Ericsson US Unit Reports Data Breach Tied To Third-Party Service Provider

Ericsson’s U.S. subsidiary reported a data breach that originated from an unnamed third‑party service provider, affecting a limited set of employee and customer files between April 17‑22 2025. The compromised data includes names, addresses, Social Security numbers, driver’s licenses, financial and medical...

By CRN (US)
Trump Administration Will Test Infrastructure Cybersecurity Approaches in Pilot Program
NewsMar 9, 2026

Trump Administration Will Test Infrastructure Cybersecurity Approaches in Pilot Program

The Trump administration announced a pilot program to test cybersecurity technologies with specific critical‑infrastructure sectors, including Texas water utilities, South Dakota beef processors, and rural hospitals. National Cyber Director Sean Cairncross emphasized rapid deployment and the rejection of a universal,...

By Cybersecurity Dive (Industry Dive)
AVideo Zero-Click Flaw Lets Attackers Hijack Live Streams
NewsMar 9, 2026

AVideo Zero-Click Flaw Lets Attackers Hijack Live Streams

A zero‑click command injection flaw (CVE‑2026‑29058) was found in the open‑source AVideo streaming platform’s objects/getImage.php endpoint. The vulnerability decodes a Base64‑encoded parameter and injects it directly into an ffmpeg shell command, allowing unauthenticated attackers to execute arbitrary code. Exploitation can...

By eSecurity Planet
Are We Ready for Auto Remediation With Agentic AI?
NewsMar 9, 2026

Are We Ready for Auto Remediation With Agentic AI?

Organizations are rapidly adopting AI‑driven auto remediation, with 88% using some form of AI and 44% deploying it for most exposure types. The most common automated actions target cloud configuration, network access controls, identity permissions, patch deployment, and infrastructure‑as‑code changes....

By Dark Reading
CleanMyMac Imposter Site Installs SHub Stealer on Macs
NewsMar 9, 2026

CleanMyMac Imposter Site Installs SHub Stealer on Macs

A counterfeit CleanMyMac website (cleanmymacos.org) lures macOS users into pasting a malicious Terminal command, which installs the SHub Stealer infostealer. The script bypasses Gatekeeper, notarization and XProtect by executing directly in the user’s shell. Once installed, the loader checks for...

By eSecurity Planet
ShinyHunters Claims More High-Profile Victims in Latest Salesforce Customers Data Heist
NewsMar 9, 2026

ShinyHunters Claims More High-Profile Victims in Latest Salesforce Customers Data Heist

ShinyHunters claims to have exfiltrated data from roughly 100 high‑profile companies in a new Salesforce Experience Cloud breach, including Salesforce itself, Snowflake, Okta, LastPass, Sony and AMD. The group leveraged a modified version of Mandiant’s open‑source AuraInspector tool to scan...

By The Register — Networks
CISA Delays Cyber Incident Reporting Town Halls Due to Shutdown
NewsMar 9, 2026

CISA Delays Cyber Incident Reporting Town Halls Due to Shutdown

The Cybersecurity and Infrastructure Security Agency (CISA) has postponed its scheduled town‑hall meetings on the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) because the Department of Homeland Security remains shut down. The agency also warned that the shutdown will...

By Federal News Network
Configure Org-Wide MFA with Zoho Directory + OneAuth
NewsMar 9, 2026

Configure Org-Wide MFA with Zoho Directory + OneAuth

Zoho Directory now lets administrators enforce multi‑factor authentication across an entire organization. The platform supports a range of factors—including biometrics, security keys, authenticator apps, and password‑less OneAuth Smart Sign‑In—while allowing conditional policies by role, location, or device. According to CISA,...

By Zoho CRM Blog
PQShield Releases 5KB RAM Post-Quantum Cryptography Implementation
NewsMar 9, 2026

PQShield Releases 5KB RAM Post-Quantum Cryptography Implementation

PQShield unveiled its PQMicroLib‑Core library, delivering post‑quantum cryptography within a sub‑5 KB RAM footprint suitable for embedded devices. The implementation supports NIST‑standard ML‑KEM and ML‑DSA, integrates side‑channel countermeasures, and offers a drop‑in TLS solution via the PSA Crypto API. Targeting the...

By Quantum Computing Report
How EU CRA and IEC 62443 Impact CANopen Device Manufacturers
NewsMar 9, 2026

How EU CRA and IEC 62443 Impact CANopen Device Manufacturers

The EU Cyber Resilience Act (CRA) now mandates that all non‑exempt CAN‑connectable products meet cybersecurity requirements by December 11 2027. Because CAN protocols lack built‑in security, manufacturers must perform system‑level risk assessments and adopt IEC 62443 security levels, ranging from physical‑access controls for...

By Control Design
HSCC, Health-ISAC Launch National Cyber Exercise to Test Healthcare Incident Response
NewsMar 9, 2026

HSCC, Health-ISAC Launch National Cyber Exercise to Test Healthcare Incident Response

Operation Vital Signs, a national cyber‑security stress test, will be co‑hosted by the Health Sector Coordinating Council’s Cybersecurity Working Group and Health‑ISAC on July 21‑22. The virtual two‑day exercise simulates a cyber incident that threatens critical functions and patient safety across...

By healthsystemCIO
EV Charger Biz ELECQ Zapped by Ransomware Crooks, Customer Contact Data Stolen
NewsMar 9, 2026

EV Charger Biz ELECQ Zapped by Ransomware Crooks, Customer Contact Data Stolen

ELECQ, a maker of smart EV chargers, disclosed a ransomware attack on its AWS cloud platform on March 7 that encrypted and exfiltrated customer contact data. The breach exposed names, email addresses, phone numbers and home addresses, but no payment information...

By The Register
From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222
NewsMar 9, 2026

From Alerts to Action: Making Public–Private Threat Intel Actually Useful - Ian Washburn - CSP #222

In the March 9 2026 CSP #222 episode, Deputy CISO Ian Washburn critiques the flood of generic threat alerts from public‑sector feeds such as CISA, MS‑ISAC and CIS. He argues that funding realignments and revised distribution models could transform raw alerts into timely,...

By SC Media
Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data
NewsMar 9, 2026

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Researchers at Huntress uncovered a campaign where a threat actor exploited vulnerabilities in enterprise software, including SolarWinds Web Help Desk, to harvest system data and funnel it into a free‑trial Elastic Cloud SIEM instance. The attacker used an encoded PowerShell...

By Infosecurity Magazine
I've Used Tor Browser for Years, but Now I'm Using It on My Android Phone - Here's Why
NewsMar 9, 2026

I've Used Tor Browser for Years, but Now I'm Using It on My Android Phone - Here's Why

Elyse Betters Picaro reports that she now uses Tor Browser as her default web browser on Android, highlighting its strong privacy and anonymity features. The app is freely available from the Google Play Store and connects users to the Tor...

By ZDNet
FBI Warns of Phishing Attacks Impersonating US City, County Officials
NewsMar 9, 2026

FBI Warns of Phishing Attacks Impersonating US City, County Officials

The FBI has issued a public service announcement warning that cybercriminals are impersonating city and county planning and zoning officials to defraud businesses and individuals applying for land‑use permits. Attackers harvest publicly available permit data, craft emails from non‑government domains,...

By BleepingComputer
GAO: Panel Highlights Overlapping Cyber Regulations and Need for Harmonization
NewsMar 9, 2026

GAO: Panel Highlights Overlapping Cyber Regulations and Need for Harmonization

The Government Accountability Office released a second report highlighting how overlapping federal cybersecurity regulations are creating redundant work for owners of critical infrastructure. Industry participants cited duplicated requirements, conflicting definitions, and inconsistent incident‑reporting mandates as major pain points. While agencies...

By Homeland Security Today (HSToday)
Security Risk Advisors Releases “The Purple Perspective 2026” Report
NewsMar 9, 2026

Security Risk Advisors Releases “The Purple Perspective 2026” Report

Security Risk Advisors (SRA) unveiled its inaugural “Purple Perspective 2026” report, drawing on more than 160 purple‑team exercises that tested over 8,300 MITRE ATT&CK techniques. The study reveals that organizations conducting two to four exercises annually achieve markedly better detection and...

By HackRead
'No Major Vulnerabilities' — Mullvad’s WireGuard Implementation Gets Thumbs up From Independent Security Audit
NewsMar 9, 2026

'No Major Vulnerabilities' — Mullvad’s WireGuard Implementation Gets Thumbs up From Independent Security Audit

Mullvad VPN’s Rust‑based WireGuard client, GotaTun, has cleared an independent security audit with no major vulnerabilities identified. The audit, performed by Assured Security Consultants, confirmed the implementation’s correctness while noting two low‑severity issues that Mullvad fixed before the review concluded....

By TechRadar
Apono Integration for Grafana: Enabling Just-in-Time Access for Data Sources
NewsMar 9, 2026

Apono Integration for Grafana: Enabling Just-in-Time Access for Data Sources

Apono has launched an integration with Grafana that provides Just-in-Time, policy-driven access to the platform’s underlying data sources. The solution continuously discovers data sources such as Elasticsearch, PostgreSQL, and CloudWatch, and grants engineers short-lived permissions based on predefined policies, on-call...

By Grafana Labs – Blog
IBM and Cobalt Iron Are Introducing Secure Automated Backup with Compass
NewsMar 9, 2026

IBM and Cobalt Iron Are Introducing Secure Automated Backup with Compass

IBM and Cobalt Iron have launched Secure Automated Backup with Compass, a Backup‑as‑a‑Service (BaaS) solution for IBM Cloud customers. The offering extends the proven protection model from IBM Power Virtual Server to a broader set of workloads across hybrid and...

By Database Trends & Applications (DBTA)
UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
NewsMar 9, 2026

UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source

The UK Home Office and National Crime Agency announced the creation of an Online Crime Centre, set to begin operations in April. The unit will pool expertise from police, intelligence, banks, mobile networks and major tech firms to identify and...

By Infosecurity Magazine
Fixing Request Smuggling Vulnerabilities in Pingora OSS Deployments
NewsMar 9, 2026

Fixing Request Smuggling Vulnerabilities in Pingora OSS Deployments

In December 2025 Cloudflare was alerted to three HTTP/1.x request smuggling flaws (CVE‑2026‑2833, ‑2835, ‑2836) in the open‑source Pingora framework when used as an ingress proxy. The issues allowed attackers to bypass proxy security, desynchronize request handling, and poison caches...

By Cloudflare Blog
AI-Based Cybersecurity Monitoring
NewsMar 9, 2026

AI-Based Cybersecurity Monitoring

AI‑based cybersecurity monitoring leverages machine learning and behavioral analytics to analyze massive streams of telemetry across networks, endpoints, cloud services, and identities. By learning normal activity patterns, these platforms flag anomalies, correlate events, and prioritize alerts, dramatically reducing false positives...

By Security Boulevard
MITRE ATT&CK as a Governance Tool
NewsMar 9, 2026

MITRE ATT&CK as a Governance Tool

MITRE ATT&CK is being promoted as a governance tool for accounting and finance professionals to meet SEC cyber‑disclosure requirements. Unlike traditional control‑centric frameworks, ATT&CK provides a threat‑intelligence view of adversary tactics and techniques. The framework is endorsed by CISA and...

By The CPA Journal
Emma Pickering, Head Of Technology-Facilitated Abuse And Economic Empowerment, Refuge
NewsMar 9, 2026

Emma Pickering, Head Of Technology-Facilitated Abuse And Economic Empowerment, Refuge

Refuge reports a 62% jump in referrals for technology‑facilitated and economic abuse in 2025, with the final quarter setting a new record. Younger victims are increasingly targeted, as referrals involving survivors under 30 rose 24%. Perpetrators are exploiting wearables, hidden...

By Forensic Focus
FreeBSD Capsicum Vs. Linux Seccomp Process Sandboxing
NewsMar 9, 2026

FreeBSD Capsicum Vs. Linux Seccomp Process Sandboxing

FreeBSD’s Capsicum and Linux’s seccomp‑bpf both aim to curb the ambient authority of compromised processes, but they take opposite approaches. Capsicum adopts a subtraction model: a single irreversible cap_enter() call strips the process of all global namespaces, leaving only explicitly granted...

By Hacker News
An AI-Powered Poly-Crisis Is Here, and It Is Rewriting Cyber Postures. Are You Breach Ready Yet?
NewsMar 9, 2026

An AI-Powered Poly-Crisis Is Here, and It Is Rewriting Cyber Postures. Are You Breach Ready Yet?

AI‑powered attacks are reshaping cyber risk, highlighted by the recent breach of Mexican government data using Anthropic’s Claude. The incident, involving theft of ~150 GB of tax and voter records, demonstrates how compromised AI assistants can act as “confused deputies,” enabling...

By Security Boulevard
Internet Infrastructure TLD .arpa Abused in Phishing Attacks
NewsMar 9, 2026

Internet Infrastructure TLD .arpa Abused in Phishing Attacks

A threat actor is exploiting the .arpa top‑level domain, which is intended solely for reverse DNS, to host phishing sites. By creating A records for IPv6 reverse‑DNS zones through providers such as Cloudflare and Hurricane Electric, the attacker serves malicious...

By SecurityWeek
WinMagic Reveals What Comes After Passkeys: Identity Assurance That Lives Beyond Login
NewsMar 9, 2026

WinMagic Reveals What Comes After Passkeys: Identity Assurance That Lives Beyond Login

WinMagic announced Live Key and Live Identity in Transaction (LIT), technologies that extend cryptographic verification beyond the initial login to protect entire sessions and transactions. The company argues that passkeys, while securing authentication, leave a gap once a session is...

By Yahoo Finance – Top Financial News
Largest Shopping Center in the Netherlands Affected by Data Breach
NewsMar 9, 2026

Largest Shopping Center in the Netherlands Affected by Data Breach

Westfield Mall of the Netherlands, the country’s largest indoor shopping centre, disclosed a data breach that exposed personal information of loyalty‑program members and newsletter subscribers. The compromised database contained names, email addresses, phone numbers, postal codes and dates of birth,...

By Retail Detail (EU)
IT Governance as a Prerequisite for Zero-Trust Identity Architecture
NewsMar 9, 2026

IT Governance as a Prerequisite for Zero-Trust Identity Architecture

Organizations are increasingly turning to zero‑trust identity architecture to counter sophisticated cyber threats, but the model’s success hinges on strong IT governance. A recent study shows firms with mature governance are 32% more likely to prevent identity‑related breaches, while 74%...

By Security Boulevard
Fake Claude Code Install Pages Highlight Rise of “InstallFix” Attacks
NewsMar 9, 2026

Fake Claude Code Install Pages Highlight Rise of “InstallFix” Attacks

Security researchers at Push Security discovered that attackers are publishing counterfeit Anthropic Claude Code installation pages. These look‑alike sites, promoted through paid Google ads, replace legitimate install commands with malicious scripts that download the Amatera stealer on Windows and comparable malware...

By Help Net Security
West Asia Conflict: Nasscom Urges Member Firms to Step up Vigilence, Cyber Resilience
NewsMar 9, 2026

West Asia Conflict: Nasscom Urges Member Firms to Step up Vigilence, Cyber Resilience

NASSCOM has issued a fresh advisory urging Indian technology firms to heighten vigilance and cyber‑resilience as the West Asia conflict escalates following US and Israeli strikes on Iran. The body recommends activating business‑continuity plans, enabling remote work for staff in...

By The Hindu BusinessLine — Economy/Markets
We’ve Seen Ransomware Cost American Lives. Here’s What It Will Actually Take to Stop It.
NewsMar 9, 2026

We’ve Seen Ransomware Cost American Lives. Here’s What It Will Actually Take to Stop It.

Ransomware attacks surged in 2024, with the Department of Homeland Security reporting over 5,600 publicly disclosed incidents worldwide and nearly half targeting the United States. The FBI notes a nine‑percent year‑over‑year rise, and the average breach now costs $2.73 million, threatening...

By CyberScoop
Land Bank Tightens Security After Ransomware Attack
NewsMar 9, 2026

Land Bank Tightens Security After Ransomware Attack

The Land and Agricultural Development Bank of South Africa confirmed a ransomware attack on 12 January 2026 that encrypted parts of its server environment and several laptops. The breach entered through a vulnerable internet‑facing server, but the bank’s core banking, ERP and...

By ITWeb (South Africa) – Public Sector
Infinite Potential—Insights From the Cyber Surprise Scenario
NewsMar 9, 2026

Infinite Potential—Insights From the Cyber Surprise Scenario

RAND’s “Day After AGI” exercises on the Infinite Potential platform examined a Cyber Surprise scenario in which China rapidly deploys a powerful cyber‑AI capability that outpaces U.S. defenses. Six runs with analysts and former officials revealed a strong preference for...

By RAND Blog/Analysis
4 Best Practices to Get IAM Implementation Right the First Time
NewsMar 9, 2026

4 Best Practices to Get IAM Implementation Right the First Time

Enterprises are finally receiving budget approvals for identity access management, with 82% of financial decision‑makers increasing spend, according to Cisco Duo’s 2025 State of Identity Security. The article outlines four best‑practice pillars—user experience, staged testing, device health verification, and ongoing...

By Cybersecurity Dive (Industry Dive)
RSAC 2026 Conference: Key News and Industry Analysis
NewsMar 9, 2026

RSAC 2026 Conference: Key News and Industry Analysis

RSAC 2026, themed “The Power of Community,” convenes 44,000 security professionals in San Francisco from March 23‑26, featuring over 700 vendors, 500 sessions across 25 tracks, and a focus on collaborative defense. Pre‑conference coverage highlights AI agent overload, breach transparency, IoT vulnerabilities,...

By TechTarget SearchERP
Webinar: Compliance Without Compromise: Test Data Management That Finally Fits
NewsMar 9, 2026

Webinar: Compliance Without Compromise: Test Data Management That Finally Fits

Redgate hosted a webinar titled "Compliance Without Compromise: Test Data Management That Finally Fits," highlighting how modern test data management can meet strict compliance requirements without slowing development. Speakers Kellyn Gorman, Redgate’s Multiplatform Database/AI Advocate, and Product Manager James Hemson...

By SQLServerCentral
Kremlin Hackers Attempting to Compromise Signal, WhatsApp Accounts Globally
NewsMar 9, 2026

Kremlin Hackers Attempting to Compromise Signal, WhatsApp Accounts Globally

Russian state‑linked hackers are conducting a global campaign to hijack Signal and WhatsApp accounts belonging to government officials, military personnel, and journalists, Dutch intelligence warned. The operation relies on social‑engineering tactics—impersonating support staff to obtain verification codes or trick users...

By The Record by Recorded Future
DORA Raises the Bar on Operational Resilience
NewsMar 8, 2026

DORA Raises the Bar on Operational Resilience

The EU Digital Operational Resilience Act (DORA) has been in force since January 2025, obligating financial services firms to retain operational control during severe IT incidents, not merely avoid failures. While many institutions have bolstered continuity and cyber‑response capabilities, a Veeam‑commissioned...

By The European Financial Review
EU Court Adviser Says Banks Must Immediately Refund Phishing Victims
NewsMar 8, 2026

EU Court Adviser Says Banks Must Immediately Refund Phishing Victims

Advocate General Athanasios Rantos of the EU Court of Justice issued an opinion that banks must instantly refund victims of unauthorized phishing transactions under the EU Payment Services Directive (PSD2), unless they have reasonable grounds to suspect fraud. The opinion...

By BleepingComputer
Passkeys Were Supposed to Replace Passwords, but They're Failing for the Most Predictable Reason
NewsMar 8, 2026

Passkeys Were Supposed to Replace Passwords, but They're Failing for the Most Predictable Reason

Passkeys, a public‑private key pair paired with biometric verification, were heralded as the successor to passwords, yet most users remain unaware of how they work. Websites often present the option without clear guidance, and many keep passwords as a fallback,...

By How-To Geek