Cybersecurity News and Headlines

The Hidden Price Tag: Uncovering Hidden Costs in Cloud Architectures with the AWS Well-Architected Framework
NewsMar 3, 2026

The Hidden Price Tag: Uncovering Hidden Costs in Cloud Architectures with the AWS Well-Architected Framework

Organizations adopting AWS often overlook hidden costs tied to security breaches, downtime, and over‑provisioned resources. The AWS Well‑Architected Framework, together with the Cloud Adoption Framework, offers a structured set of best practices across six pillars to identify and remediate high‑risk...

By AWS Architecture Blog
APTs and Industrial Cybersecurity in the Wake of the Attack on Iran
NewsMar 3, 2026

APTs and Industrial Cybersecurity in the Wake of the Attack on Iran

Advanced Persistent Threat (APT) groups, often backed by nation‑states, are intensifying attacks on industrial control systems worldwide. Dragos reports that only about 10 % of critical infrastructure facilities have continuous monitoring, leaving most OT environments exposed. Iranian‑backed actors such as IRGC‑affiliated...

By Logistics Viewpoints
NDSS 2025 – Be Careful Of What You Embed: Demystifying OLE Vulnerabilities
NewsMar 3, 2026

NDSS 2025 – Be Careful Of What You Embed: Demystifying OLE Vulnerabilities

Researchers from Huazhong University, Waterloo and Sangfor presented a paper at NDSS 2025 exposing critical weaknesses in Microsoft Office’s Object Linking & Embedding (OLE) framework. Their tool, OLExplore, performed dynamic analysis of historic OLE flaws and uncovered 26 confirmed vulnerabilities,...

By Security Boulevard
LexisNexis Confirms Data Breach as Hackers Leak Stolen Files
NewsMar 3, 2026

LexisNexis Confirms Data Breach as Hackers Leak Stolen Files

LexisNexis Legal & Professional confirmed a breach after hackers exploited an unpatched React frontend, using the React2Shell vulnerability to access its AWS environment. The threat actor FulcrumSec leaked over 2 GB of data, including 21,042 customer accounts, 45 attorney password hashes,...

By BleepingComputer
Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability
NewsMar 3, 2026

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability

Security researcher Gjoko Krstic disclosed a high‑risk flaw in Honeywell's IQ4 building‑management controller, claiming the web‑based HMI is unauthenticated by default and can be exploited to create admin accounts. He identified roughly 7,500 internet‑exposed devices, with about 20% lacking authentication,...

By SecurityWeek
Zero Trust Implementation Roadmap: 5 Stages From Legacy to Modern Security
NewsMar 3, 2026

Zero Trust Implementation Roadmap: 5 Stages From Legacy to Modern Security

The article outlines a five‑stage roadmap for Zero Trust adoption, beginning with a thorough identity assessment and progressing through identity foundation, device trust, application access modernization, network segmentation, and continuous validation. Each stage includes concrete milestones such as 100% MFA enforcement,...

By Security Boulevard
Western Allies Form 6G Security Coalition Amid Tech Rivalry with China
NewsMar 3, 2026

Western Allies Form 6G Security Coalition Amid Tech Rivalry with China

Western and Indo‑Pacific allies launched the Global Coalition on Telecoms (GCOT) at Mobile World Congress, uniting the United States, United Kingdom, Canada, Japan, Australia, Sweden and Finland. The coalition released a set of voluntary security and resilience principles designed to...

By The Record by Recorded Future
Josys Centralizes Identity Data to Replace Manual IT Oversight with Automated Governance
NewsMar 3, 2026

Josys Centralizes Identity Data to Replace Manual IT Oversight with Automated Governance

Josys has evolved into an autonomous identity governance platform that centralizes identity data from any source into a single AI‑driven system. The solution automates access reviews, lifecycle updates, and over‑permissioned user remediation, eliminating manual IT oversight. Its AI Integration Builder...

By Help Net Security
Tonic Structural vs Informatica: Which Is Better for Test Data Management?
NewsMar 3, 2026

Tonic Structural vs Informatica: Which Is Better for Test Data Management?

The article compares Tonic Structural and Informatica for test data management, highlighting that both generate privacy‑safe data but differ in deployment models and feature focus. Informatica is shifting to a cloud‑first strategy after its Salesforce acquisition, limiting on‑premises options, while...

By Security Boulevard
CertSIGN and Lissi Partner to Accelerate EUDI Wallet Rollout in Romania
NewsMar 3, 2026

CertSIGN and Lissi Partner to Accelerate EUDI Wallet Rollout in Romania

Romanian qualified trust services provider certSIGN has partnered with German digital‑identity specialist Lissi to bring the European Digital Identity (EUDI) Wallet to Romania. The deal combines certSIGN’s PKI‑based trust services with Lissi’s EUDI Wallet Connector API, offering eIDAS‑compliant integration for...

By Identity Week
Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion
NewsMar 3, 2026

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

A leaked database from Iranian exchange Ariomex shows the platform may have facilitated sanctions evasion and large capital transfers between 2022 and 2025. The data, analyzed by Resecurity, identified 27 users with potential sanctions matches and revealed that 70% of...

By Infosecurity Magazine
DeepKeep Launches AI Agent Attack Surface Scanner to Map Enterprise Risk
NewsMar 3, 2026

DeepKeep Launches AI Agent Attack Surface Scanner to Map Enterprise Risk

DeepKeep Ltd. unveiled its AI Agent Scanner, a tool that maps the attack surface of generative AI agents within enterprise workflows. The solution provides instant visibility into agents' tool and data access, visual risk maps, and identifies potential vulnerabilities. It...

By SiliconANGLE
Secure by Design: Building Security in at the Beginning
NewsMar 3, 2026

Secure by Design: Building Security in at the Beginning

Secure by Design is a holistic methodology that embeds security from the earliest stages of system and software conception, shifting protection from a reactive afterthought to a proactive design principle. CIS and SAFECode collaborate to provide measurable guidance, translating standards...

By Help Net Security
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM
NewsMar 3, 2026

Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM

Archipelo and Checkmarx announced a technical partnership that links application vulnerability findings with development‑origin context. The integration combines Archipelo’s Developer Security Posture Management (DevSPM) with Checkmarx’s Application Security Posture Management (ASPM) to surface who, how, and whether AI tools contributed...

By HackRead
'The Attack Requires No Exploit, No User Clicks, and No Explicit Request Forsensitive Actions': Experts Say Perplexity's AI Comet Browser...
NewsMar 3, 2026

'The Attack Requires No Exploit, No User Clicks, and No Explicit Request Forsensitive Actions': Experts Say Perplexity's AI Comet Browser...

Security researchers at Zenity have disclosed a zero‑click prompt‑injection vulnerability, dubbed “PleaseFix,” in Perplexity AI’s Comet browser. The flaw lets attackers embed malicious prompts in seemingly benign calendar invites, causing the AI to read local files and exfiltrate passwords without...

By TechRadar Pro
Evolving Cloudflare’s Threat Intelligence Platform: Actionable, Scalable, and ETL-Less
NewsMar 3, 2026

Evolving Cloudflare’s Threat Intelligence Platform: Actionable, Scalable, and ETL-Less

Cloudflare has launched a cloud‑first Threat Intelligence Platform (TIP) that eliminates traditional ETL pipelines using a sharded, SQLite‑backed architecture running on the edge. Threat events are distributed across thousands of Durable Objects, delivering sub‑second GraphQL queries and real‑time visualizations. The...

By Cloudflare Blog
DataDome Launches Enhanced Partner Program Built for Depth
NewsMar 3, 2026

DataDome Launches Enhanced Partner Program Built for Depth

DataDome unveiled an enhanced Partner Program that unites resellers, technology alliances, and cloud partners to deliver comprehensive bot‑mitigation solutions. The program introduces three reseller tiers—Authorized, Growth, and Strategic—each with specific margins, enablement milestones, and co‑selling benefits, plus a new partner...

By Security Boulevard
Finally, CTEM and MITRE INFORM Without the Jargon
NewsMar 3, 2026

Finally, CTEM and MITRE INFORM Without the Jargon

The new "CTEM + MITRE INFORM Guide for Dummies" offers a jargon‑light introduction to Continuous Threat Exposure Management (CTEM) and its integration with MITRE’s INFORM maturity model. It explains how CTEM shifts security from point‑in‑time assessments to continuous validation of...

By Security Boulevard
Cato Networks Unveils Dynamic Prevention to Stop Stealthy, Long-Running Cyberattacks
NewsMar 3, 2026

Cato Networks Unveils Dynamic Prevention to Stop Stealthy, Long-Running Cyberattacks

Cato Networks has introduced Dynamic Prevention, an auto‑adaptive threat prevention engine built into its SASE platform. The service continuously correlates months of networking and security sensor data to spot low‑signal malicious behavior that blends with legitimate activity. When a threat...

By SiliconANGLE
New Starkiller Phishing Framework Uses Real Login Pages to Bypass MFA Security
NewsMar 3, 2026

New Starkiller Phishing Framework Uses Real Login Pages to Bypass MFA Security

A new phishing‑as‑a‑service framework called Starkiller proxies real login pages of major brands, delivering authentic HTML, CSS, and JavaScript to victims. By running a headless Chrome instance inside Docker, it captures credentials and, crucially, steals MFA session cookies after users...

By GBHackers On Security
Brian Harrell — Top Cybersecurity Leaders 2026
NewsMar 3, 2026

Brian Harrell — Top Cybersecurity Leaders 2026

Brian Harrell, former DHS Assistant Secretary and current Chief Security Officer at Avangrid Energy, is highlighted as a top cybersecurity leader for 2026. He oversees a converged security portfolio that includes IT/OT cyber, physical security, privacy, fire protection, and business...

By Security Magazine (Cybersecurity)
Dr. Bryan Stoker — Top Cybersecurity Leaders 2026
NewsMar 3, 2026

Dr. Bryan Stoker — Top Cybersecurity Leaders 2026

Dr. Bryan Stoker, a third‑degree Taekwondo black belt and former NSA senior leader, has become Chief Technology Officer at Dispersive Holdings. He spent over 40 years at the NSA and three years as USCYBERCOM J2 technical director, where he built...

By Security Magazine (Cybersecurity)
AI Agent Overload: How to Solve the Workload Identity Crisis
NewsMar 3, 2026

AI Agent Overload: How to Solve the Workload Identity Crisis

Zscaler will address the growing workload identity crisis at RSAC 2026, focusing on AI agents and other non‑human identities that span multi‑cloud and on‑prem environments. The session will expose prevalent insecure practices such as static IP mapping and unrotated keys, and...

By Dark Reading
Malvertising Actor ‘D-Shortiez’ Exploits WebKit Back-Button Hijack in Forced-Redirect Campaign
NewsMar 3, 2026

Malvertising Actor ‘D-Shortiez’ Exploits WebKit Back-Button Hijack in Forced-Redirect Campaign

A threat group known as D‑Shortiez has launched a malvertising campaign that exploits a WebKit flaw to hijack the back button in Safari and other iOS browsers. The malicious JavaScript injects a fake history entry and binds a redirect to...

By GBHackers On Security
AI Doubled Auto Industry Cyberattacks: Upstream
NewsMar 3, 2026

AI Doubled Auto Industry Cyberattacks: Upstream

Upstream’s 2026 Global Automotive and Smart Mobility Cybersecurity Report shows that cyberattacks on the auto sector more than doubled in 2025, driven by AI‑enabled vehicle architectures and expanding API exposure. Ransomware accounted for 44% of incidents, the fastest‑growing threat, while...

By WardsAuto
Bybit Claims New Fraud System Stopped $300M of Risky Withdrawals in Q4 2025
NewsMar 3, 2026

Bybit Claims New Fraud System Stopped $300M of Risky Withdrawals in Q4 2025

Bybit rolled out an AI‑assisted risk monitoring system that flagged about $500 million in withdrawal requests during Q4 2025, ultimately blocking $300 million in suspected scam‑related withdrawals. The platform protected more than 4,000 users with real‑time alerts and identified 350 high‑risk fraud addresses,...

By Cointelegraph
Zerobot Malware Exploits Tenda Command Injection Vulnerabilities to Deploy Malicious Payloads
NewsMar 3, 2026

Zerobot Malware Exploits Tenda Command Injection Vulnerabilities to Deploy Malicious Payloads

A new Zerobot campaign is weaponizing two critical flaws – CVE‑2025‑7544 in Tenda AC1206 routers and CVE‑2025‑68613 in the n8n workflow‑automation platform – to deliver a Mirai‑derived payload called Zerobotv9. The exploit chain uses simple HTTP requests or malicious workflow...

By GBHackers On Security
Huge “Shadow Layer” Of Organizations Hit by Supply Chain Attacks
NewsMar 3, 2026

Huge “Shadow Layer” Of Organizations Hit by Supply Chain Attacks

Black Kite’s 2025 Third‑Party Breach Report reveals a massive "shadow layer" of supply‑chain attacks, with 136 verified breaches exposing 719 downstream companies and 433 million individuals. Vendors reported an additional 26,000 unnamed corporate victims, suggesting even higher impact. Software‑services providers accounted...

By Infosecurity Magazine
Star Citizen Game Dev Discloses Breach Affecting User Data
NewsMar 3, 2026

Star Citizen Game Dev Discloses Breach Affecting User Data

Cloud Imperium Games disclosed a security breach on January 21, 2026 that exposed basic account information of an undisclosed number of Star Citizen users. The compromised data included usernames, email addresses, dates of birth and names, but no passwords, financial...

By BleepingComputer
Detego Global Achieves ISO 27001:2022 Certification, Reinforcing Commitment To Information Security
NewsMar 3, 2026

Detego Global Achieves ISO 27001:2022 Certification, Reinforcing Commitment To Information Security

Detego Global, a developer of digital forensics and endpoint monitoring solutions, has earned ISO 27001:2022 certification after a 12‑month audit. The certification validates the company’s Information Security Management System across its software, hardware, and support services. It provides independent assurance that...

By Forensic Focus
Hackers Exploit Telegram for Initial Access to Corporate VPN, RDP, and Cloud Systems
NewsMar 3, 2026

Hackers Exploit Telegram for Initial Access to Corporate VPN, RDP, and Cloud Systems

Hackers are turning Telegram into a live marketplace for stolen VPN, RDP and cloud credentials, accelerating initial access to corporate networks. Threat actors harvest stealer logs, post searchable credential feeds, and negotiate sales in private chats, cutting the gap between...

By GBHackers On Security
Open Cyber Standards Key to Cross-Platform Integration
NewsMar 3, 2026

Open Cyber Standards Key to Cross-Platform Integration

Enterprises are turning to open cyber standards to break the cycle of vendor lock‑in that has plagued multi‑year managed service contracts and early hyperscale cloud deployments. By adopting protocols such as OAuth, OpenID and RESTful APIs, organizations can achieve true...

By ComputerWeekly
Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign
NewsMar 3, 2026

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Iran‑linked threat actor Dust Specter launched a sophisticated phishing campaign against Iraqi government officials in January 2026, masquerading as the Ministry of Foreign Affairs. The operation deployed previously unseen malware families—including SplitDrop, TwinTask, TwinTalk and GhostForm—some of which were assembled with...

By Infosecurity Magazine
Home Routers in Singapore Must Meet Higher Security Standards by 2027
NewsMar 3, 2026

Home Routers in Singapore Must Meet Higher Security Standards by 2027

Singapore’s Cyber Security Agency and IMDA will raise mandatory security standards for residential routers to Cybersecurity Labelling Scheme (CLS) Level 2 by the end of 2027. The move follows a 2025 cyber‑operation that uncovered over 2,700 compromised devices, including routers, feeding...

By The Cyber Express
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
NewsMar 3, 2026

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft warned that threat actors are exploiting OAuth redirect functionality to deliver malware to government and public‑sector targets. The attackers create malicious applications with rogue redirect URLs, send phishing emails containing crafted OAuth links, and use an invalid scope to...

By The Hacker News
Cloud Architects Earn the Highest Salaries
NewsMar 3, 2026

Cloud Architects Earn the Highest Salaries

Cloud architects remain the most in‑demand cloud role, commanding total compensation often exceeding $200,000. Their core value lies in translating business intent into secure, cost‑controlled designs that scale across dozens of teams. While many organizations can spin up workloads quickly,...

By InfoWorld
What Are Biometric IDs? What Are the Risks?
NewsMar 3, 2026

What Are Biometric IDs? What Are the Risks?

Across Africa, governments are rolling out biometric digital ID systems to streamline access to voting, healthcare, education and social protection. A new report by the African Digital Rights Network, based on ten country case studies, finds millions excluded due to...

By Daily Nation (Kenya) – Business
Secure Agility Sets Sights on AI, Security, IoT and Telco-Led Growth in 2026
NewsMar 3, 2026

Secure Agility Sets Sights on AI, Security, IoT and Telco-Led Growth in 2026

Secure Agility, a Sydney‑based tech services firm with roughly 100 staff and $70 million in annual revenue, is shifting from a low‑profile engineering focus to aggressive customer acquisition and national expansion. The company now offers production‑ready AI, IoT and cybersecurity platforms,...

By ARN (Australia)
GM Is Facing A Lawsuit Over Selling Drivers' Onstar Data
NewsMar 3, 2026

GM Is Facing A Lawsuit Over Selling Drivers' Onstar Data

Iowa Attorney General has filed a lawsuit against General Motors alleging the automaker sold driver location and personal data collected through its OnStar telematics service without consent. The complaint expands on earlier actions, accusing GM of selling the information to...

By Jalopnik
Substantially Reduce Your PCI DSS Control Burden Through Inherited Infrastructure
NewsMar 3, 2026

Substantially Reduce Your PCI DSS Control Burden Through Inherited Infrastructure

Upsun introduces an "Inherited Compliance" model that shifts most PCI DSS infrastructure responsibilities to its secure‑by‑default cloud platform. Automated patch deployment and built‑in change logs keep the environment continuously compliant without manual effort. By defining the entire stack in a...

By Platform.sh – Blog
Forensic IT Takes on Chris Hatfield as Exec General Manager
NewsMar 2, 2026

Forensic IT Takes on Chris Hatfield as Exec General Manager

Infotrust subsidiary Forensic IT has appointed Chris Hatfield as executive general manager. Hatfield, a former managing director at FTI Consulting with 26 years of forensic and service experience, will lead the firm’s national digital forensics and incident response (DFIR) expansion....

By ARN (Australia)
Evoke Wellness at Hilliard Updates Its Breach Notification
NewsMar 2, 2026

Evoke Wellness at Hilliard Updates Its Breach Notification

Evoke Wellness at Hilliard submitted a confusing breach notification to the Maine Attorney General, claiming a July 2024 insider incident was only discovered in August 2025 and affecting 261 patients. Earlier reports documented a former employee stealing data in 2024, with 240‑plus...

By DataBreaches.net
How Healthcare Organizations Can Build Ransomware Resilience
NewsMar 2, 2026

How Healthcare Organizations Can Build Ransomware Resilience

Scott Doerr, virtual CISO at Fortified Health Security, will present a session on ransomware resilience at HIMSS 2026. He outlines a phased approach that moves ransomware from a reactive crisis to a managed operational risk, emphasizing assessment, planning, simulation, execution,...

By Healthcare IT News (HIMSS Media)
The Tug-of-War Over Firewall Backlogs in the AI-Driven Development Era
NewsMar 2, 2026

The Tug-of-War Over Firewall Backlogs in the AI-Driven Development Era

Developers and security teams are clashing over mounting firewall rule backlogs as AI‑driven development accelerates. Aviatrix reports up to 3,000 pending requests with approval cycles of two to four weeks, forcing developers to idle. Cloud adoption has turned static IP‑based...

By Dark Reading
The FBI’s Cyber Chief Is Using Winter SHIELD to Accelerate China Prep, Threat Intelligence Sharing
NewsMar 2, 2026

The FBI’s Cyber Chief Is Using Winter SHIELD to Accelerate China Prep, Threat Intelligence Sharing

The FBI’s cyber division, led by Brett Leatherman, has launched Operation Winter SHIELD to boost preparation for Chinese cyber threats, improve adversary contestation, and accelerate threat‑intelligence sharing with industry. The campaign spotlights ten practical security controls and combines regional events,...

By CyberScoop
Data From Insight Hospital and Medical Center Leaked on Dark Web
NewsMar 2, 2026

Data From Insight Hospital and Medical Center Leaked on Dark Web

Insight Hospital and Medical Center disclosed that an unauthorized actor accessed its network from August 22 to September 11, 2025, compromising extensive personal and health data. The breach involved roughly 360 GB of files—about 900,000 records—including names, Social Security numbers, and medical images. On...

By DataBreaches.net
30 Alleged Members of 'The Com' Arrested in Project Compass
NewsMar 2, 2026

30 Alleged Members of 'The Com' Arrested in Project Compass

Europol’s Project Compass, launched in January 2025, has led to the arrest of 30 alleged members of the cyber‑extremist collective known as “The Com,” while identifying a further 179 participants across 28 partner nations. The operation targets a loosely organized network of...

By Dark Reading
Fake Google Security Site Uses PWA App to Steal Credentials, MFA Codes
NewsMar 2, 2026

Fake Google Security Site Uses PWA App to Steal Credentials, MFA Codes

A phishing campaign masquerading as a Google Account security page deploys a malicious Progressive Web App (PWA) to harvest one‑time passwords, cryptocurrency wallet addresses, and device data. The PWA, hosted on google‑prism.com, requests clipboard, notification, and location permissions, uses the...

By BleepingComputer
Wisconsin K-12 District Hit by Weeklong Outage
NewsMar 2, 2026

Wisconsin K-12 District Hit by Weeklong Outage

The Denmark School District in Wisconsin experienced a five‑day internet outage after a reported cyber incident that appears to be a ransomware attack claimed by the group INC Ransom. The attackers say they encrypted roughly 70.76 GB of district data and posted...

By DataBreaches.net