Cybersecurity News and Headlines

Why Enterprises Are Still Bad at Multicloud
NewsMar 6, 2026

Why Enterprises Are Still Bad at Multicloud

In 2026 enterprises are spread across AWS, Azure and Google Cloud largely due to mergers, product deadlines and lock‑in avoidance, not a deliberate strategy. Multicloud adoption has outpaced the development of a unified operating model, leaving companies with three separate...

By InfoWorld
LexisNexis Brings Deepfake and Fraud Defense to Epic MyChart
NewsMar 6, 2026

LexisNexis Brings Deepfake and Fraud Defense to Epic MyChart

LexisNexis Risk Solutions is expanding its identity‑verification suite within Epic’s Connection Hub, enabling U.S. hospitals to embed advanced security tools directly into MyChart. The integration adds AI‑driven behavioral analytics, OTP authenticators, and other modular components to protect patient health data...

By HIT Consultant
March 2026 Patch Tuesday Forecast: Is AI Security an Oxymoron?
NewsMar 6, 2026

March 2026 Patch Tuesday Forecast: Is AI Security an Oxymoron?

Developers are increasingly embedding AI into software, but the tools themselves are proving vulnerable, highlighted by Google’s Gemini AI flaw in Chrome (CVE‑2026‑0628) with an 8.8 CVSS score. Malicious AI‑powered browser extensions are also surfacing, harvesting data from unsuspecting users....

By Help Net Security
Challenges and Projects for the CISO in 2026
NewsMar 6, 2026

Challenges and Projects for the CISO in 2026

CISOs face a 2026 threat landscape where AI‑driven attacks are faster, cheaper, and more credible, forcing a shift from prevention to rapid response. Experts warn that a growing internet monoculture and quantum decryption threats will magnify breach impact. Identity verification...

By CSO Online
Tidal Cyber Featured in SageTap H2 2025 Cybersecurity Report
NewsMar 6, 2026

Tidal Cyber Featured in SageTap H2 2025 Cybersecurity Report

Tidal Cyber, a pioneer of Threat‑Led Defense, has been featured in SageTap’s H2 2025 Cybersecurity Report, which examines verified security buying decisions from 264 leaders. The report highlights growing enterprise investment in AI‑enabled platforms that turn threat intelligence into measurable actions....

By AI-TechPark
Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft
NewsMar 6, 2026

Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft

Business email compromise (BEC) and funds transfer fraud (FTF) accounted for 58% of cyber‑insurance claims in 2025, with BEC alone representing 31% of all claims. Average BEC loss fell 28% to $27,000 and FTF loss dropped 14% to $141,000, while...

By Help Net Security
Why Phishing Still Works Today
NewsMar 6, 2026

Why Phishing Still Works Today

Gal Livschitz, senior penetration tester at Terra Security, explains how phishing has become harder to detect by leveraging HTTPS, branded look‑alike domains, and sophisticated delivery methods. He highlights the rise of QR‑based phishing in PDFs, MFA‑fatigue attacks that pressure users...

By Help Net Security
Secure Mesh Radio Technology & C2 Capabilities for UAVs & Unmanned Systems
NewsMar 6, 2026

Secure Mesh Radio Technology & C2 Capabilities for UAVs & Unmanned Systems

Beechat Network Systems joins Unmanned Systems Technology as a Gold Partner, showcasing its Kaonic™ mesh radio platform for UAVs, UGVs and autonomous platforms. The solution delivers infrastructure‑free, multi‑hop networking with up to 128 encrypted hops, dual‑band SDR operation and cryptographic...

By Unmanned Systems Technology – News
What Happens when AI Teams Compete Against Human Hackers
NewsMar 6, 2026

What Happens when AI Teams Compete Against Human Hackers

The NeuroGrid competition, hosted on Hack The Box, pitted 120 AI‑augmented teams against 958 human‑only teams across 36 security challenges. AI‑augmented participants completed 73% of challenges, far outpacing the 46% completion rate of human‑only teams. The advantage was strongest on...

By Help Net Security
Why CPE Security Is Now a Strategic Imperative for Telcos
NewsMar 6, 2026

Why CPE Security Is Now a Strategic Imperative for Telcos

Telecom operators moving to all‑IP, software‑defined networks have pushed the security perimeter to the customer premises, turning CPE devices into exposed, internet‑facing nodes. Legacy firmware, slow patch cycles and overlooked set‑top boxes create easy entry points for attackers, exposing core...

By Telecom Review
How the Iran War Could Impact States and Localities
NewsMar 6, 2026

How the Iran War Could Impact States and Localities

Pro‑Iranian hacktivists have begun targeting U.S. entities after the U.S.–Israeli strikes on Iran, including a Pennsylvania township and Amazon Web Services data centers in the Middle East. The attacks are largely low‑level—website defacements, DDoS and SQL injections—but could cascade into...

By Governing — Finance
Solv Protocol Offers 10% Bounty After Hacker Snatches $2.7M
NewsMar 6, 2026

Solv Protocol Offers 10% Bounty After Hacker Snatches $2.7M

Solv Protocol disclosed that a token vault was exploited, resulting in a $2.7 million loss after a hacker leveraged a smart‑contract bug to mint tokens and swap them for SolvBTC. The breach affected fewer than ten users, with 38.05 SolvBTC taken,...

By Cointelegraph
Audit Readiness Assessments Demystified: Importance and Relevance for Your Business
NewsMar 6, 2026

Audit Readiness Assessments Demystified: Importance and Relevance for Your Business

Audit readiness assessments are proactive reviews that verify an organization’s controls, policies, and evidence before an official audit. By mapping controls to frameworks such as SOC 2, ISO 27001, HIPAA, or PCI DSS, firms can pinpoint gaps, assign ownership, and remediate issues early....

By Security Boulevard
Chinese State Hackers Target Telcos with New Malware Toolkit
NewsMar 5, 2026

Chinese State Hackers Target Telcos with New Malware Toolkit

Chinese state‑linked APT group UAT‑9244 has been compromising telecom service providers across South America since 2024. The campaign deploys three previously undocumented malware families—TernDoor, a Windows backdoor using DLL side‑loading; PeerTime, a multi‑architecture Linux ELF backdoor that leverages BitTorrent for...

By BleepingComputer
The SOC Analyst Role Is Going Up (And It Was Never Going Away)
NewsMar 5, 2026

The SOC Analyst Role Is Going Up (And It Was Never Going Away)

Enterprise Security Operations Centers face overwhelming alert volumes—averaging 4,484 alerts daily, with 67% never investigated. Autonomous triage platforms such as D3 Security's Morpheus use AI to ingest, investigate, and respond to 100% of alerts, cutting false‑positive handling by 99% and...

By Security Boulevard
HAT Bolsters A/NZ Enterprise Security Distie Portfolio with Tufin
NewsMar 5, 2026

HAT Bolsters A/NZ Enterprise Security Distie Portfolio with Tufin

Tufin has appointed HAT Distribution as its official distributor for Australia and New Zealand, expanding the vendor's footprint in the region. The partnership stresses technical enablement and architectural alignment rather than a purely transactional sales model. HAT will embed Tufin’s policy‑management...

By ARN (Australia)
High-Performance Envelope Encryption at Ariso.ai with Vault
NewsMar 5, 2026

High-Performance Envelope Encryption at Ariso.ai with Vault

Ariso.ai integrated HashiCorp Vault’s Transit engine to secure its multi‑tenant AI assistant, Ari, using envelope encryption across 21 database tables. A single master key with context‑based derivation provides organization, user, and session isolation while eliminating key sprawl. DEK caching yields...

By HashiCorp Blog
Arc Raiders Rushes Out Emergency Fix After Its Discord Accidentally Spied On Players
NewsMar 5, 2026

Arc Raiders Rushes Out Emergency Fix After Its Discord Accidentally Spied On Players

Embark Studios released an emergency hotfix for Arc Raiders after its Discord SDK unintentionally logged all Discord activity, including private direct messages, on players' machines. The SDK created a full Discord gateway connection and stored events locally, prompting privacy concerns....

By Kotaku
The Hidden Cyber Risks of Remote Work Infrastructure
NewsMar 5, 2026

The Hidden Cyber Risks of Remote Work Infrastructure

Remote work’s productivity gains are shadowed by rising cyber threats, especially weak home Wi‑Fi, sophisticated phishing, and data exposure through BYOD practices. Employees lack security expertise, making self‑policing impossible and corporate controls hard to enforce outside the office. The article...

By HackRead
CyberPeace Foundation and Synergy Quantum Launch the Global Quantum Threat Alliance
NewsMar 5, 2026

CyberPeace Foundation and Synergy Quantum Launch the Global Quantum Threat Alliance

CyberPeace Foundation and Synergy Quantum announced the Global Quantum Threat Alliance (GQTA) at the CyberPeace Summit 2.0 in New Delhi on February 10, 2026. The alliance brings together governments, industry players, and academic researchers to confront the emerging risk that...

By The Qubit Report
ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security
NewsMar 5, 2026

ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security

ShinyHunters claims to have breached Woflow, a SaaS vendor serving large enterprises such as Uber, DoorDash, and Walmart, highlighting a shift toward upstream supply‑chain attacks. The alleged breach, though unconfirmed, follows a pattern of targeting integration‑heavy providers to gain downstream...

By Security Boulevard
What Is Continuous Threat Exposure Management? A Risk-Driven Approach for State and Local Agencies
NewsMar 5, 2026

What Is Continuous Threat Exposure Management? A Risk-Driven Approach for State and Local Agencies

Continuous Threat Exposure Management (CTEM) is emerging as a risk‑driven framework for state and local governments, shifting focus from sheer vulnerability counts to business‑impact exposure. CDW outlines a five‑stage process—scoping, discovery, prioritization, validation, and mobilization—that integrates asset inventory, threat data,...

By StateTech Magazine
Why Your Data Protection Program Should Be Policy-Based
NewsMar 5, 2026

Why Your Data Protection Program Should Be Policy-Based

Traditional data protection programs are fragmented, leading to gaps and compliance risk. PKWARE advocates a policy‑based approach that centralizes discovery, classification, encryption, masking, and redaction across all environments. By automating controls with customizable policies, organizations can scale protection, maintain productivity,...

By Security Boulevard
New Jersey County Says Malware Attack Took Down Phone Lines, IT Systems
NewsMar 5, 2026

New Jersey County Says Malware Attack Took Down Phone Lines, IT Systems

Passaic County, New Jersey, confirmed a malware attack that knocked out its phone lines and crippled county IT systems on March 5, 2026. The county is collaborating with federal and state authorities to contain and investigate the breach. This incident...

By The Record by Recorded Future
Wikipedia Hit by Self-Propagating JavaScript Worm that Vandalized Pages
NewsMar 5, 2026

Wikipedia Hit by Self-Propagating JavaScript Worm that Vandalized Pages

The Wikimedia Foundation experienced a self‑propagating JavaScript worm that briefly hijacked both user‑level and site‑wide scripts, injecting malicious loaders into MediaWiki:Common.js and dozens of user common.js files. The worm originated from a test script on Russian Wikipedia and was triggered...

By BleepingComputer
Insurtech CyberCube Warns of Surging Iranian Cyber Risks to Businesses
NewsMar 5, 2026

Insurtech CyberCube Warns of Surging Iranian Cyber Risks to Businesses

CyberCube warned that Iranian-linked hacker groups pose a rising cyber risk to U.S. firms, especially in critical sectors, after recent U.S.-Israel military actions. Its AI-driven assessment found 12% of U.S. companies with over $1 billion in revenue at elevated risk, flagging...

By Crowdfund Insider
What Are The Security Risks of CI/CD Plugin Architectures?
NewsMar 5, 2026

What Are The Security Risks of CI/CD Plugin Architectures?

Plugin‑centric CI/CD platforms such as Jenkins rely on thousands of community‑maintained extensions, exposing pipelines to inconsistent security practices, abandoned code, and broad permission grants. In 2025 Jenkins alone recorded over seventy plugin‑related CVEs, including remote‑code‑execution flaws that lingered on exposed...

By JetBrains TeamCity – Blog
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
NewsMar 5, 2026

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Cisco disclosed 48 vulnerabilities across its ASA, Secure FTD and Secure FMC firewall portfolio, including two CVE‑2026‑20079 and CVE‑2026‑20131 that received a perfect 10‑out‑of‑10 CVSS rating. The critical flaws affect the FMC web interface, enabling authentication bypass and remote code execution with...

By Dark Reading
HHS’ Office for Civil Rights Settles HIPAA Investigation of MMG Fusion, LLC Breach Affecting 15 Million Individuals
NewsMar 5, 2026

HHS’ Office for Civil Rights Settles HIPAA Investigation of MMG Fusion, LLC Breach Affecting 15 Million Individuals

The U.S. Department of Health and Human Services Office for Civil Rights settled a HIPAA investigation with Maryland‑based software firm MMG Fusion, LLC. The settlement stems from a December 2020 cyber‑attack that exposed protected health information of roughly 15 million individuals...

By DataBreaches.net
FBI Arrests Suspect Linked to $46M Crypto Theft From US Marshals
NewsMar 5, 2026

FBI Arrests Suspect Linked to $46M Crypto Theft From US Marshals

The FBI, in coordination with France's elite Gendarmerie unit, arrested John Daghita on Saint Martin for allegedly stealing more than $46 million in cryptocurrency seized by the U.S. Marshals Service. Daghita, the son of a government‑contractor CEO, is accused of abusing his...

By BleepingComputer
CrowdStrike Falcon to Run on STACKIT Sovereign Cloud
NewsMar 5, 2026

CrowdStrike Falcon to Run on STACKIT Sovereign Cloud

CrowdStrike and Schwarz Digits have teamed up to launch the Falcon cybersecurity platform on STACKIT, the sovereign cloud operated by Schwarz Digits. The integration lets European enterprises run endpoint, cloud, identity and exposure protection while keeping all telemetry and detection...

By ChannelE2E
ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked
NewsMar 5, 2026

ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked

ThreatLocker announced that its deny‑by‑default security model now covers cloud workloads and mobile devices, extending its zero‑trust network and cloud‑access offerings. The new solution binds SaaS access to both user identity and approved devices, eliminating the need for VPNs and...

By CRN (US)
Regulators Are Moving On SBOMs — But Is Your Compliance Program Keeping Pace?
NewsMar 5, 2026

Regulators Are Moving On SBOMs — But Is Your Compliance Program Keeping Pace?

Software bill of materials (SBOM) are moving from best‑practice guidance to regulatory baseline worldwide. In the U.S., Executive Order 14028 and sector‑specific mandates such as the FDA’s medical‑device rule push SBOM adoption, while the White House’s recent shift to a...

By Forrester Blogs
“If You Wanted to Have Civil Disobedience and Start the Process of Unraveling a Society, We're a Pretty Big Target”:...
NewsMar 5, 2026

“If You Wanted to Have Civil Disobedience and Start the Process of Unraveling a Society, We're a Pretty Big Target”:...

National Gas, the operator of the UK’s critical gas transmission network, has partnered with Palo Alto Networks to secure its cloud‑first transformation. The collaboration delivers a full‑stack security stack covering network firewalls, Prisma Cloud, and emerging XDR capabilities while preserving...

By ITPro
Mobile Games Host Three Times More Malicious Ads than Other Apps Says AppHarbr
NewsMar 5, 2026

Mobile Games Host Three Times More Malicious Ads than Other Apps Says AppHarbr

AppHarbr’s in‑app network quality index reveals that mobile games display malicious ads at a rate of 58 per 165 ads, nearly three times the frequency seen in non‑gaming apps. The report links weaker ad‑quality controls and formats such as rewarded...

By PocketGamer.biz
Codenotary Trust Delivers Autonomous AI Security for Linux and Kubernetes
NewsMar 5, 2026

Codenotary Trust Delivers Autonomous AI Security for Linux and Kubernetes

Codenotary unveiled Codenotary Trust, a SaaS platform that leverages artificial intelligence to detect, prioritize, and autonomously remediate security, configuration, and performance issues across Linux, containers, VMs, and applications. The solution is built for junior and mid‑level administrators, addressing the talent gap...

By Help Net Security
Fortanix Showcases Confidential AI Innovation at NVIDIA GTC 2026
NewsMar 5, 2026

Fortanix Showcases Confidential AI Innovation at NVIDIA GTC 2026

Fortanix announced its participation at NVIDIA GTC 2026, where it will showcase the Confidential AI platform that protects AI models, prompts, and sensitive data throughout the training and inference lifecycle. The solution leverages encryption‑in‑use and hardware‑isolated trusted execution environments to...

By AI-TechPark
Push Security Adds Malicious Browser Extension Detection to Block Threats in Employee Browsers
NewsMar 5, 2026

Push Security Adds Malicious Browser Extension Detection to Block Threats in Employee Browsers

Push Security has introduced a malicious browser‑extension detection and blocking feature within its browser‑based security platform. The capability leverages a continuously updated intelligence database to automatically block known‑bad extensions and provide real‑time visibility into all extensions across employee browsers. Administrators...

By Help Net Security
HHS Launches Cybersecurity Module Within RISC 2.0 Toolkit
NewsMar 5, 2026

HHS Launches Cybersecurity Module Within RISC 2.0 Toolkit

The Administration for Strategic Preparedness and Response (ASPR) has added a cybersecurity module to its Risk Identification and Site Criticality (RISC) 2.0 Toolkit, giving health systems a standardized way to assess cyber risk. The module uses a questionnaire scored against the...

By healthsystemCIO
Ending the "Silent Drop": How Dynamic Path MTU Discovery Makes the Cloudflare One Client More Resilient
NewsMar 5, 2026

Ending the "Silent Drop": How Dynamic Path MTU Discovery Makes the Cloudflare One Client More Resilient

Cloudflare One’s client now incorporates Dynamic Path MTU Discovery (PMTUD), allowing it to actively probe and adjust packet sizes instead of waiting for ICMP feedback. By testing packet sizes up to 1281 bytes and beyond, the client automatically selects the optimal...

By Cloudflare Blog
ContextCrush Flaw Exposes AI Development Tools to Attacks
NewsMar 5, 2026

ContextCrush Flaw Exposes AI Development Tools to Attacks

Security researchers at Noma Labs disclosed a critical flaw named ContextCrush affecting the Context7 MCP Server, a popular component that feeds documentation to AI coding assistants. The vulnerability stems from unsanitized custom‑rule entries, allowing attackers to embed malicious instructions that...

By Infosecurity Magazine
LatAm Now Faces 2x More Cyberattacks Than US
NewsMar 5, 2026

LatAm Now Faces 2x More Cyberattacks Than US

Latin America is now the world’s most targeted region for cyber threats, with organizations confronting roughly 3,100 attacks per week—about twice the volume seen in the United States. Check Point’s March 2026 report shows ransomware, infostealers, banking malware and botnets...

By Dark Reading
Exposure Is the New Currency of Risk: Why Cybersecurity Speaks the Language of Business
NewsMar 5, 2026

Exposure Is the New Currency of Risk: Why Cybersecurity Speaks the Language of Business

Cybersecurity is evolving from a patch‑centric practice to Exposure Management (EM), a framework that quantifies an organization’s attack surface in business terms. EM aggregates vulnerability, cloud, identity and attack‑surface data into exposure scores tied to revenue, compliance and brand reputation....

By Silicon UK
Manufacturers Spending More On Cybersecurity Yet Cyberattacks Only Account for 5% of Downtime, Research Reveals
NewsMar 5, 2026

Manufacturers Spending More On Cybersecurity Yet Cyberattacks Only Account for 5% of Downtime, Research Reveals

Manufacturers are boosting cybersecurity budgets, yet a new Macrium‑Newton X study finds cyber incidents account for just 5% of production downtime. The bulk of costly outages stem from internal operational failures—mis‑planned maintenance, configuration errors, and network glitches—creating a widening "recovery gap."...

By Manufacturing Tomorrow
The Security Playbook Every Journalist Should Know
NewsMar 5, 2026

The Security Playbook Every Journalist Should Know

Journalists face escalating digital threats—from commercial spyware to FBI raids—making robust security protocols essential. A recent Nieman‑to‑Nieman seminar featured experts from the EFF, GIJN, and CISI who outlined practical steps such as threat modeling, device hardening, and emergency response planning....

By Nieman Reports
Uptycs and SAP Team up to Bring Verifiable AI Analysts to Enterprise Cybersecurity Operations
NewsMar 5, 2026

Uptycs and SAP Team up to Bring Verifiable AI Analysts to Enterprise Cybersecurity Operations

Uptycs and SAP announced a strategic partnership to integrate Uptycs’ AI analyst platform, Juno, into enterprise cybersecurity operations. Juno functions as a virtual analyst, using a glass‑box approach that links AI‑generated insights to a unified telemetry set of roughly 150,000...

By SiliconANGLE
Irish-Founded Startup Evervault Raises €21 Million to Advance Encrypted Data Orchestration
NewsMar 5, 2026

Irish-Founded Startup Evervault Raises €21 Million to Advance Encrypted Data Orchestration

Irish‑founded Evervault announced a €21 million Series B round, led by Ribbit Capital with Sequoia Capital and Index Ventures participating, bringing its total financing to €39 million. The developer‑first platform encrypts and orchestrates sensitive data, chiefly for card‑payment workflows, and now processes over...

By EU-Startups
Detego Global Launches Artefact_Compare For Rapid Device Integrity Verification
NewsMar 5, 2026

Detego Global Launches Artefact_Compare For Rapid Device Integrity Verification

Detego Global introduced Artefact_Compare, a new feature within its Detego Analyse AI+ suite that automates device integrity verification before and after field deployment. The tool captures pre‑deployment snapshots, re‑captures post‑deployment data, and automatically flags added, removed or modified files across...

By Forensic Focus
Nigerian Communication Commission Orders Telecoms to Report Cyber Threats Within 4 Hours
NewsMar 5, 2026

Nigerian Communication Commission Orders Telecoms to Report Cyber Threats Within 4 Hours

Nigeria’s Communications Commission (NCC) has issued a Cyber Resilience Framework requiring telecom operators to report any cyber‑attack to the regulator within four hours of detection. The rule, effective February 2027, applies to major providers such as MTN Nigeria, Airtel Nigeria, Globacom...

By DataBreaches.net