Cybersecurity News and Headlines

Trump’s CISA Nominee Said He Left Coast Guard to Address GOP Hold
NewsMar 5, 2026

Trump’s CISA Nominee Said He Left Coast Guard to Address GOP Hold

President Trump’s nominee for CISA, Sean Plankey, resigned from his advisory role at the U.S. Coast Guard to allay concerns about his prior shipbuilding contracts that prompted Sen. Rick Scott’s hold. Plankey emphasized his focus on leading CISA and highlighted his turnaround of...

By FCW (GovExec Technology)
MCP Security: Implementing Robust Authentication and Authorization
NewsMar 5, 2026

MCP Security: Implementing Robust Authentication and Authorization

The Model Context Protocol (MCP) is becoming a core interface for AI agents to invoke tools and access enterprise data. To mitigate rising security threats, the latest guidance recommends treating MCP servers as OAuth 2.1 resource servers and adopting modern authentication...

By Red Hat – DevOps
Codific Highlights Five Key Cyber Risks to Power Grids
NewsMar 4, 2026

Codific Highlights Five Key Cyber Risks to Power Grids

Codific’s new analysis outlines five recurring cyber‑attack pathways that threaten power‑grid operations, from spear‑phishing and credential theft to remote‑access exploitation, ransomware, and the misuse of legitimate industrial commands. The report stresses that most disruptive incidents follow familiar patterns rather than...

By SC Media
Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy
NewsMar 4, 2026

Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy

Evgenii Ptitsyn, the administrator of the Phobos ransomware platform, pleaded guilty to wire‑fraud conspiracy in a Maryland federal court. Phobos ransomware was used by affiliates to compromise more than 1,000 public and private entities worldwide, extracting over $39 million in ransom...

By DataBreaches.net
Bitwarden Adds Support for Passkey Login on Windows 11
NewsMar 4, 2026

Bitwarden Adds Support for Passkey Login on Windows 11

Bitwarden announced native support for Windows 11 passkey login, letting users authenticate with credentials stored in their encrypted vault. The feature works across all plans, including the free tier, and uses a QR‑code flow to confirm the passkey on a mobile...

By BleepingComputer
How to Avoid Confidentiality Gaps in Early-Stage Startups
NewsMar 4, 2026

How to Avoid Confidentiality Gaps in Early-Stage Startups

Early‑stage startups often sacrifice confidentiality for speed, leaving critical data exposed during pitches, hiring, and partnership talks. Two recurring gaps—lack of security protocols and delayed legal safeguards—lead to breaches that cost billions annually. A lightweight, repeatable NDA workflow—dual pitch decks,...

By HackRead
Mail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers
NewsMar 4, 2026

Mail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers

Researchers at OX Security disclosed a maximum‑severity zero‑click vulnerability (CVE‑2026‑28289) in the open‑source FreeScout help‑desk platform. By embedding a zero‑width space before a malicious filename, attackers can bypass recent upload filters and achieve remote code execution through a single crafted...

By BleepingComputer
AWS Launches DDos Protection for Games Running on Amazon GameLift Servers
NewsMar 4, 2026

AWS Launches DDos Protection for Games Running on Amazon GameLift Servers

Amazon Web Services announced a new DDoS protection service tightly integrated with its GameLift managed server platform. The solution leverages AWS Shield to automatically detect and mitigate volumetric attacks targeting multiplayer titles. By embedding security directly into GameLift, developers can...

By GamesBeat
Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware
NewsMar 4, 2026

Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware

Researchers at Microsoft Defender uncovered a new phishing campaign that disguises malicious updates for Zoom, Microsoft Teams and Adobe Reader as legitimate meeting invites. The attackers leverage stolen Extended Validation certificates from TrustConnect Software to make the payloads appear trusted,...

By HackRead
Windows 10 KB5075039 Update Fixes Broken Recovery Environment
NewsMar 4, 2026

Windows 10 KB5075039 Update Fixes Broken Recovery Environment

Microsoft released KB5075039, a Windows 10 update that restores the Windows Recovery Environment (WinRE) after the October 2025 KB5068164 patch broke it. WinRE is essential for offline system repair, malware removal, and OS restoration. The fix requires a hidden WinRE partition of...

By BleepingComputer
JetStream Security Inks $34M Seed Funding
NewsMar 4, 2026

JetStream Security Inks $34M Seed Funding

JetStream Security announced a $34 million seed round, marking one of the largest early‑stage financings in the cybersecurity sector this year. The round was led by Redpoint Ventures and featured strategic participation from the CrowdStrike Falcon Fund. Angel investors included George Kurtz...

By VC News Daily
Iran’s Authorities Using NtechLab’s Live Facial Recognition to Crush Dissent
NewsMar 4, 2026

Iran’s Authorities Using NtechLab’s Live Facial Recognition to Crush Dissent

Iranian authorities have integrated Russia’s NtechLab FindFace facial‑recognition system into a live surveillance network, accessed through local partners Rasad, Kama and BPO. The technology is deployed in Tehran’s university entrances, Mashhad’s subway, and other public venues to identify and detain...

By Biometric Update
Dragon Sword Bill: New Korean Game Industry Law Targets User Data Protection
NewsMar 4, 2026

Dragon Sword Bill: New Korean Game Industry Law Targets User Data Protection

South Korea’s People Power Party introduced a partial amendment to the Game Industry Promotion Act, creating Article 14‑2 to obligate game operators to protect and, with user consent, transfer gameplay records and payment data when services end. The measure directly responds...

By Inven Global
These 2 Recent Cases Confirm DOJ Is Escalating Cyber Enforcement
NewsMar 4, 2026

These 2 Recent Cases Confirm DOJ Is Escalating Cyber Enforcement

At the close of 2025 the Department of Justice announced two high‑profile cyber enforcement actions that spotlighted deficient cybersecurity practices among DoD contractors. The first settlement involved Swiss Automation’s breach of the DFARS 7012 clause, which mandates NIST 800‑171 compliance. The second...

By Federal News Network
Idemia Public Security, Proof Partner on Single Portable Digital Credential
NewsMar 4, 2026

Idemia Public Security, Proof Partner on Single Portable Digital Credential

Idemia Public Security and Proof have announced a strategic partnership to launch a verifiable digital credential (VDC) that merges biometric verification with PKI‑based digital signatures. The solution delivers a single, portable credential that is user‑controlled, privacy‑preserving, and revocable, leveraging selective...

By Biometric Update
HID Debuts Cloud‑based Visitor Verification System for Healthcare
NewsMar 4, 2026

HID Debuts Cloud‑based Visitor Verification System for Healthcare

HID Global unveiled a cloud‑based visitor verification platform at HIMSS 2026, designed for hospitals to authenticate and track visitors in real time. The solution integrates directly with major electronic health record systems such as Epic and Oracle Health, enabling photo capture,...

By Biometric Update
NDSS 2025 – On The Realism Of LiDAR Spoofing Attacks Against Autonomous Driving Vehicle
NewsMar 4, 2026

NDSS 2025 – On The Realism Of LiDAR Spoofing Attacks Against Autonomous Driving Vehicle

The NDSS 2025 paper presents the first large‑scale measurement of physical‑world adversarial attacks on commercial traffic‑sign recognition (TSR) systems used in autonomous vehicles. While academic attack techniques can achieve 100% success against specific commercial TSR functions, overall success rates are...

By Security Boulevard
The Verification Imperative: How One Framework Is Reshaping Trust in Financial Code
NewsMar 4, 2026

The Verification Imperative: How One Framework Is Reshaping Trust in Financial Code

Financial institutions are tightening code integrity after supply‑chain attacks. Mitsubishi UFJ VP Jamshir Qureshi introduced the Hybrid Chain of Trust (HCoT), a framework that cryptographically signs and continuously validates software and container artifacts within CI/CD pipelines. The model enables compliance‑ready...

By Security Boulevard
Unique Capabilities of Edge Computing in IoT
NewsMar 4, 2026

Unique Capabilities of Edge Computing in IoT

The article outlines how edge computing transforms IoT by enabling federated learning, real‑time analytics, and stronger data sovereignty. By processing data locally, edge nodes cut latency, lower bandwidth demands, and keep sensitive information compliant with regulations such as GDPR and...

By SmartData Collective
The 10-Hour Problem: How Visibility Gaps Are Burning Out the SOC
NewsMar 4, 2026

The 10-Hour Problem: How Visibility Gaps Are Burning Out the SOC

According to a Forrester Consulting study commissioned by NETSCOUT, 61% of SOC analysts spend more than ten hours each week in the analysis phase due to fragmented visibility. Inadequate network analysis and visibility (NAV) forces analysts to manually stitch logs...

By CSO Online
Cisco Warns of Max Severity Secure FMC Flaws Giving Root Access
NewsMar 4, 2026

Cisco Warns of Max Severity Secure FMC Flaws Giving Root Access

Cisco has issued emergency patches for two maximum‑severity flaws in its Secure Firewall Management Center (FMC) software. The authentication‑bypass vulnerability (CVE‑2026‑20079) lets unauthenticated attackers gain root access, while the remote code execution bug (CVE‑2026‑20131) permits arbitrary Java code execution as...

By BleepingComputer
Emails To Outlook.com Rejected By Faulty Or Overzealous Blocking Rules
NewsMar 4, 2026

Emails To Outlook.com Rejected By Faulty Or Overzealous Blocking Rules

Microsoft’s outbound email filters mistakenly rejected legitimate messages sent to Outlook.com, Live, Hotmail and MSN accounts last week. The over‑aggressive IP reputation checks generated 550 errors, blocking invoices, notifications and authentication emails despite senders having clean SNDS scores and being...

By Slashdot
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
NewsMar 4, 2026

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

Senators Ron Wyden and Rep. Shontel Brown have asked the GAO to study how vulnerable modern computers are to TEMPER​ST‑style side‑channel attacks, which capture data from electromagnetic, acoustic or vibrational emissions. The request follows a new Congressional Research Service report...

By WIRED
The Instagram API Scraping Crisis: When ‘Public’ Data Becomes a 17.5 Million User Breach
NewsMar 4, 2026

The Instagram API Scraping Crisis: When ‘Public’ Data Becomes a 17.5 Million User Breach

On January 7, 2026 a dataset of 17.5 million Instagram user profiles was posted for free on BreachForums, exposing usernames, emails, phone numbers and partial location data. Meta responded that no breach occurred because the data was scraped from its public APIs rather...

By Security Boulevard
Hacker Mass-Mails HungerRush Extortion Emails to Restaurant Patrons
NewsMar 4, 2026

Hacker Mass-Mails HungerRush Extortion Emails to Restaurant Patrons

Customers of restaurants using the HungerRush point‑of‑sale platform received extortion emails claiming the attacker possessed millions of customer records, including credit‑card details. The messages were sent through Twilio SendGrid, passing SPF, DKIM and DMARC checks, making them appear authentic from...

By BleepingComputer
Tycoon 2FA Phishing Platform Dismantled in Global Takedown
NewsMar 4, 2026

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

A coordinated operation by Europol, Microsoft and dozens of security firms dismantled the Tycoon 2FA phishing‑as‑a‑service platform. The service, responsible for roughly 62% of Microsoft‑blocked phishing attempts, sent tens of millions of phishing emails to 500,000 organizations each month and...

By SecurityWeek
Lawmakers Question Intel’s Use of Tools From Blacklisted Chinese Firm
NewsMar 4, 2026

Lawmakers Question Intel’s Use of Tools From Blacklisted Chinese Firm

A bipartisan group of U.S. senators sent a letter to Intel CEO Lip‑Bu Tan questioning the chipmaker’s use of semiconductor tools from ACM Research, a Chinese subsidiary on the U.S. blacklist. The inquiry underscores national‑security concerns, especially after the U.S....

By The New York Times – Technology
Modernizing Federal Risk Management
NewsMar 4, 2026

Modernizing Federal Risk Management

Federal agencies are overhauling risk management as artificial intelligence moves from pilot projects to core missions. The AI Risk Management Framework has been refreshed, and NIST introduced the ARIA 0.1 framework to quantify real‑world AI behavior. Simultaneously, quantum‑computing challenges and tight...

By GovernmentCIO Media & Research
Stranger Things Meets Cybersecurity: Lessons From the Hive Mind
NewsMar 4, 2026

Stranger Things Meets Cybersecurity: Lessons From the Hive Mind

The commentary likens modern cyber threats to the "hive mind" of Stranger Things, highlighting how botnets and APTs such as Salt Typhoon exploit default IoT credentials to create sprawling, often unseen attack surfaces. It stresses that telemetry—network traffic, logs, and user‑behavior data—combined...

By Dark Reading
Europol-Coordinated Action Disrupts Tycoon2FA Phishing Platform
NewsMar 4, 2026

Europol-Coordinated Action Disrupts Tycoon2FA Phishing Platform

Europol coordinated an international operation that dismantled the Tycoon2FA phishing‑as‑a‑service platform. Law enforcement seized 330 domains supporting the service’s infrastructure across six European countries. The platform, active since August 2023, had been delivering tens of millions of phishing emails each month,...

By BleepingComputer
Enterprise AI Governance for Revenue Teams
NewsMar 4, 2026

Enterprise AI Governance for Revenue Teams

Revenue teams are adopting AI features—email drafting, call summaries, forecasting—without a unified governance layer, leading to data leaks and compliance delays. The article outlines an operational framework: data classification, use‑case policies, platform controls, and regular review cadence. It emphasizes mapping...

By Outreach
ANYbotics Achieves ISO 27001 Certification
NewsMar 4, 2026

ANYbotics Achieves ISO 27001 Certification

ANYbotics earned ISO 27001 certification on its first audit, achieving zero non‑conformities. The independent, third‑party audit validates the company’s world‑class Information Security Management System. Certification directly benefits customers operating robots in hazardous and mission‑critical environments by embedding security into design, build,...

By Robotics & Automation News
Sprawling FBI, European Operation Takes Down Leakbase Cybercriminal Forum
NewsMar 4, 2026

Sprawling FBI, European Operation Takes Down Leakbase Cybercriminal Forum

The FBI, together with European law‑enforcement partners, dismantled Leakbase, a subscription‑based cybercrime forum that sold stolen credentials and exploit tools. The coordinated “Operation Leak” involved 100 actions against 45 targets across more than a dozen nations, resulting in 13 arrests,...

By The Record by Recorded Future
Global Takedown Neutralizes Tycoon2FA Phishing Service
NewsMar 4, 2026

Global Takedown Neutralizes Tycoon2FA Phishing Service

Investigators led by Microsoft and Europol dismantled the Tycoon2FA phishing‑as‑a‑service operation, seizing over 300 associated domains. The service, launched in August 2023, offered subscription‑based MFA bypass using adversary‑in‑the‑middle attacks, attracting roughly 2,000 criminal users and leveraging more than 24,000 domains....

By Infosecurity Magazine
Assured Data Protection Brings BackBox Network Configuration Protection to MSP Partners
NewsMar 4, 2026

Assured Data Protection Brings BackBox Network Configuration Protection to MSP Partners

Assured Data Protection has teamed with BackBox to add automated network‑configuration backup, version control, and rapid restoration to its managed services. The integrated offering supports more than 5,000 firewall, switch, router and security device types, storing encrypted copies off‑site for...

By ChannelE2E
CMS Advances Zero Trust, AI Security in IT Modernization Push
NewsMar 4, 2026

CMS Advances Zero Trust, AI Security in IT Modernization Push

The Centers for Medicare & Medicaid Services (CMS) is accelerating its IT modernization by consolidating platforms, expanding shared services, and adopting a zero‑trust cybersecurity framework. Under Director Wade Zarriello, the agency has already exceeded its FY 2025 savings target, cutting $750 million in...

By GovernmentCIO Media & Research
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
NewsMar 4, 2026

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

Check Point Research has identified a coordinated surge in attempts to compromise internet‑connected surveillance cameras across the Middle East, targeting Hikvision and Dahua devices. The campaign, which intensified on February 28, aligns with Iranian threat actors and exploits CVE‑2021‑33044 and CVE‑2017‑7921....

By Infosecurity Magazine
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
NewsMar 4, 2026

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Will Thomas, senior threat researcher at Team Cymru, partnered with Interpol on Operation Sentinel, a coordinated bust of an African ransomware, business‑email‑compromise and data‑extortion syndicate. The effort spanned 19 countries, resulted in 574 arrests, seized over 6,000 malicious links and...

By Dark Reading
Digital.ai Expands Post-Build Protection for Android and iOS Applications
NewsMar 4, 2026

Digital.ai Expands Post-Build Protection for Android and iOS Applications

Digital.ai unveiled Quick Protect Agent v2, an LLM‑enhanced solution that adds AI‑powered post‑build hardening for Android and iOS apps. The tool automatically applies code‑aware obfuscation and other security controls after the build, requiring no source changes and integrating with Digital.ai...

By Help Net Security
The Most Common Swap Scams in 2026, and How to Avoid Them
NewsMar 4, 2026

The Most Common Swap Scams in 2026, and How to Avoid Them

Crypto swap scams have become more sophisticated in 2026, targeting users across DEXs and centralized exchanges. Scammers use fake interfaces, phishing URLs, unlimited approval requests, and MEV sandwich attacks to drain funds. The guide outlines common vectors—approval and permit scams,...

By HackRead
Tufin’s AI-Powered Tools Simplify Network Security Operations
NewsMar 4, 2026

Tufin’s AI-Powered Tools Simplify Network Security Operations

Tufin unveiled a suite of AI‑powered tools, including four new assistants and an Executive Dashboard, built on its TufinAI engine. The assistants automate rule searches, device discovery, compliance exception analysis, and access‑request handling via natural‑language prompts. Integrated with Tufin’s Unified...

By Help Net Security
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
NewsMar 4, 2026

Multi-Stage "BadPaw" Malware Campaign Targets Ukraine

ClearSky researchers have uncovered a new malware campaign dubbed “BadPaw” that exploits the Ukrainian email provider ukr.net to lend credibility to phishing messages. The attack delivers a ZIP archive that actually contains a hidden HTA application, which checks system age...

By Infosecurity Magazine
Privacy-First IOT: Why Retail and Public Spaces Are Moving Away From Camera-Based Analytics
NewsMar 4, 2026

Privacy-First IOT: Why Retail and Public Spaces Are Moving Away From Camera-Based Analytics

Retailers and public‑space operators are abandoning camera‑based analytics in favor of radar‑based people counting solutions that respect privacy. Traditional video systems capture personally identifiable information, triggering GDPR obligations, costly consent processes, and public distrust. Radar sensors operating at 60 GHz millimetre‑wave...

By IoT Business News – Smart Buildings
Webinar: The True State of Security 2026
NewsMar 4, 2026

Webinar: The True State of Security 2026

Storyblok’s "True State of Security 2026" webinar brings together its VP of Engineering, Information Security Manager, and content marketer to challenge the prevailing AI‑centric security narrative. The presenters argue that AI, while a genuine risk, has become a costly distraction,...

By Help Net Security
Thales Updates and Enhances Naranja X’s Payment Security
NewsMar 4, 2026

Thales Updates and Enhances Naranja X’s Payment Security

Thales announced that Argentina fintech Naranja X has expanded its use of the Thales D1 Platform, adding Entersekt’s authentication suite to secure online payments. The cloud‑native solution enables tokenized Apple Pay and Google Pay wallets and implements 3‑DS protocols for e‑commerce. Naranja X reports over...

By Fintech Futures
Pentagon Vendor Cutoff Exposes the AI Dependency Map Most Enterprises Never Built
NewsMar 4, 2026

Pentagon Vendor Cutoff Exposes the AI Dependency Map Most Enterprises Never Built

The Pentagon’s six‑month ban on Anthropic’s Claude has exposed a blind spot in enterprise AI risk management: most firms cannot map the full chain of AI model dependencies. A Panorays survey shows only 15% of CISOs have complete visibility, while...

By VentureBeat
Zero Trust Vendor Keeper Security Delivering New Partner Program Benefits for MSPs
NewsMar 4, 2026

Zero Trust Vendor Keeper Security Delivering New Partner Program Benefits for MSPs

Keeper Security announced its 2026 MSP partner program, introducing four tiered levels—Authorized, Silver, Gold and Platinum—with revenue‑based discounts and expanded market development funds. The program centers on KeeperPAM, an AI‑enabled, cloud‑native privileged access management solution that delivers zero‑trust encryption across...

By ChannelE2E
Over 1,200 IceWarp Servers Still Vulnerable to Unauthenticated RCE Flaw (CVE-2025-14500)
NewsMar 4, 2026

Over 1,200 IceWarp Servers Still Vulnerable to Unauthenticated RCE Flaw (CVE-2025-14500)

A critical unauthenticated remote code execution flaw (CVE-2025-14500) affects IceWarp's business communication platform, allowing attackers to execute OS commands as root or SYSTEM. The vulnerability, rooted in improper handling of the X‑File‑Operation header, was disclosed in September 2025 and patched...

By Help Net Security
Amex Taps Customers for Fraud Fight
NewsMar 4, 2026

Amex Taps Customers for Fraud Fight

American Express is leveraging direct conversations with cardholders who have faced fraud to gather real‑time intelligence on scam tactics. The data helps the firm refine detection models as U.S. consumers lost $12.5 billion to fraud in 2024, a 25 percent rise. Executives...

By Payments Dive