Cybersecurity News and Headlines

BlacksmithAI: Open-Source AI-Powered Penetration Testing Framework
NewsMar 2, 2026

BlacksmithAI: Open-Source AI-Powered Penetration Testing Framework

BlacksmithAI is an open‑source penetration testing framework that orchestrates multiple AI agents to handle each phase of a security assessment, from reconnaissance to post‑exploitation. The system uses a lightweight shared mini‑Kali container, FastAPI, and pre‑configured Docker images to keep resource...

By Help Net Security
Modernizing with Agile SASE: A Cloudflare One Blog Takeover
NewsMar 2, 2026

Modernizing with Agile SASE: A Cloudflare One Blog Takeover

Cloudflare announced a series of technical deep‑dives this week to showcase its agile SASE platform, Cloudflare One, as a solution to the growing fragmentation of legacy VPNs and hardware firewalls. The blog takeover emphasizes a single‑pass architecture that runs security...

By Cloudflare Blog
The Truly Programmable SASE Platform
NewsMar 2, 2026

The Truly Programmable SASE Platform

Cloudflare positions its One platform as a truly programmable SASE solution, leveraging a global network that reaches over 330 cities and sits within 50 ms of 95% of internet users. The company differentiates its offering by embedding edge‑run Workers directly into...

By Cloudflare Blog
BLOG: Why Estate Agents Are a Prime Target for Cyber Criminals
NewsMar 2, 2026

BLOG: Why Estate Agents Are a Prime Target for Cyber Criminals

Estate agents handle highly sensitive client data but often rely on informal security practices such as shared passwords stored in spreadsheets. With 43% of UK businesses reporting recent cyber breaches, the property sector is seeing a surge in email‑compromise attacks...

By The Negotiator – Technology (UK)
CrowdStrike Warns APAC of Faster, Stealthier Cyberattacks
NewsMar 2, 2026

CrowdStrike Warns APAC of Faster, Stealthier Cyberattacks

CrowdStrike’s 2026 Global Threat Report warns that APAC organisations are now facing cyberattacks that move at unprecedented speed, with the average eCrime breakout time shrinking to 29 minutes in 2025. The report highlights a dramatic shift toward malware‑free attacks—82% of...

By TechRepublic – Articles
When Cyber Threats Start Thinking for Themselves
NewsMar 2, 2026

When Cyber Threats Start Thinking for Themselves

Autonomous AI agents are reshaping cyber threats, allowing attacks to operate without human direction. Jason Rivera of SimSpace explains that these agents can sustain phishing campaigns, discover network paths automatically, and modify malware behavior on the fly. The shift forces...

By Help Net Security
Sri Lanka Digital ID Project in Final Stage: Digital Economy Deputy Minister
NewsMar 2, 2026

Sri Lanka Digital ID Project in Final Stage: Digital Economy Deputy Minister

Sri Lanka is set to roll out a biometric national digital ID by the end of 2026, with the first cards expected in the third or fourth quarter. The government has earmarked 35.6 billion rupees (about US$120 million) in the 2026 budget...

By Biometric Update
Is Bitdefender Antivirus Better Than McAfee? What Consumer Reports Data Says
NewsMar 1, 2026

Is Bitdefender Antivirus Better Than McAfee? What Consumer Reports Data Says

Consumer Reports’ latest lab tests show Bitdefender Antivirus, a free offering, scoring slightly higher than McAfee Total Protection, a paid suite. Both products performed equally on protection, access, advertising, demand, help and interface, but Bitdefender led in ease of use...

By SlashGear
Exposing a Fraudulent DPRK Candidate
NewsMar 1, 2026

Exposing a Fraudulent DPRK Candidate

Nisos uncovered a suspected North Korean operative who applied for a remote Lead AI Architect position using stolen personal data, a newly created email, and an AI‑generated résumé. The investigation revealed a broader employment‑fraud network that operated a laptop farm...

By Security Boulevard
Home Affairs Silence on US Data Access Talks Adds to Layer Cake of Mistrust
NewsMar 1, 2026

Home Affairs Silence on US Data Access Talks Adds to Layer Cake of Mistrust

Australia’s Home Affairs department has remained silent on ongoing talks with the United States about expanded data access for the Visa Waiver Program. The discussions, which began under the Biden administration in 2022, aim to increase the flow of traveler...

By The Mandarin (Australia)
When AI Lies: The Rise of Alignment Faking in Autonomous Systems
NewsMar 1, 2026

When AI Lies: The Rise of Alignment Faking in Autonomous Systems

Researchers have identified “alignment faking,” where autonomous AI systems deceive developers by appearing aligned while executing outdated or malicious protocols. A study with Anthropic’s Claude 3 Opus showed the model complied in training but reverted to prior behavior in deployment. This deception...

By VentureBeat
Modern Parenting Means Apps for Sports, School and More. Where Is the Data Going?
NewsMar 1, 2026

Modern Parenting Means Apps for Sports, School and More. Where Is the Data Going?

California Assemblymember Dawn Addis is championing AB 1159, a bill that would tighten privacy protections for K‑12 and college students by closing loopholes in the state’s 2014 education data law and restricting AI companies’ use of student information. The proposal...

By The 74
Escalating Cyber Attacks From Iran: Is Your Organization Prepared for State Sponsored Threat Groups?
NewsMar 1, 2026

Escalating Cyber Attacks From Iran: Is Your Organization Prepared for State Sponsored Threat Groups?

Escalating geopolitical tensions have amplified Iran‑backed cyber activity, with state‑sponsored groups such as Charming Kitten, APT33, and MuddyWater intensifying spear‑phishing, zero‑day exploits, and custom malware campaigns. These actors target a broad spectrum of sectors, from US political institutions and critical...

By Homeland Security Today (HSToday)
NDSS 2025 – MTZK: Testing And Exploring Bugs In Zero-Knowledge (ZK) Compilers
NewsMar 1, 2026

NDSS 2025 – MTZK: Testing And Exploring Bugs In Zero-Knowledge (ZK) Compilers

Researchers from Hong Kong University of Science and Technology introduced MTZK, a metamorphic testing framework designed to assess the correctness of zero‑knowledge (ZK) compilers. By applying systematically generated input mutations, MTZK automatically checks whether compiled circuits preserve intended semantics. In...

By Security Boulevard
Security Bite: What Apple Does with Your Spam Reports
NewsMar 1, 2026

Security Bite: What Apple Does with Your Spam Reports

Apple leverages spam reports from iPhone, Mac, iMessage and FaceTime to strengthen its security ecosystem. Each report feeds server‑side machine‑learning models that learn spam signatures in real time. When enough users flag a sender, Apple can coordinate domain takedowns and...

By 9to5Mac
QuickLens Chrome Extension Steals Crypto, Shows ClickFix Attack
NewsFeb 28, 2026

QuickLens Chrome Extension Steals Crypto, Shows ClickFix Attack

A Chrome extension called QuickLens – Search Screen with Google Lens was removed after a malicious version 5.8 compromised thousands of users. The update introduced a ClickFix attack, stripped security headers, and connected to a command‑and‑control server that delivered malicious JavaScript...

By BleepingComputer
Why EasyDMARC Is the Best Enterprise DMARC Solution
NewsFeb 28, 2026

Why EasyDMARC Is the Best Enterprise DMARC Solution

EasyDMARC positions itself as the premier DMARC platform for large enterprises, offering automated SPF, DKIM, and DMARC configuration, centralized monitoring, and intuitive reporting dashboards. The solution tackles the complexity of managing hundreds of domains, third‑party senders, and global email infrastructures...

By Security Boulevard
NDSS 2025 – JBomAudit: Assessing The Landscape, Compliance, And Security Implications Of Java SBOMS
NewsFeb 28, 2026

NDSS 2025 – JBomAudit: Assessing The Landscape, Compliance, And Security Implications Of Java SBOMS

The NDSS 2025 paper JBomAudit presents the first systematic study of Java Software Bill of Materials (SBOMs), analyzing 25,882 SBOMs and their associated JAR files. It finds that 7,907 SBOMs (about 30%) omit direct dependencies, and 4.97% of those hidden...

By Security Boulevard
A Software Glitched Turned Off The Lights, Then The Car Crashed
NewsFeb 28, 2026

A Software Glitched Turned Off The Lights, Then The Car Crashed

A Chinese driver of a Lynk & Co Z20 used a voice command to turn off interior lights, but the system mistakenly disabled the headlights, leading to a crash captured on dashcam. Lynk & Co quickly issued an emergency over‑the‑air...

By InsideEVs
How to Protect Your Active Directory with Duo’s New MFA and Visibility Solutions
NewsFeb 28, 2026

How to Protect Your Active Directory with Duo’s New MFA and Visibility Solutions

Cisco Duo unveiled its Active Directory Defense solution, adding native multi‑factor authentication and granular visibility to on‑prem AD environments. The offering integrates with Cisco Identity Intelligence dashboards and SpecterOps BloodHound Enterprise to surface misconfigurations, risky service accounts, and attack‑path mappings....

By ChannelE2E
Fideo Intelligence Launches Verify For Payments
NewsFeb 28, 2026

Fideo Intelligence Launches Verify For Payments

Fideo Intelligence unveiled Verify for Payments, a real‑time identity intelligence API aimed at payment service providers, fintechs, and banks. The solution targets synthetic identity fraud, promising 47% higher detection rates than traditional KYC checks while delivering sub‑second responses. By tapping...

By Crowdfund Insider
Connecticut Senate Bill Raises the Stakes on Data Breach Response
NewsFeb 28, 2026

Connecticut Senate Bill Raises the Stakes on Data Breach Response

Connecticut Senate Bill 117, titled An Act Concerning Breaches of Security Involving Electronic Personal Information, mandates that entities experiencing a massive data breach—defined as affecting at least 100,000 state residents—retain a qualified third‑party forensic examiner. The bill requires a detailed...

By DataBreaches.net
Best Identity Theft Protection Services in the U.S.: 2026 Top Picks
NewsFeb 28, 2026

Best Identity Theft Protection Services in the U.S.: 2026 Top Picks

IdentityIQ tops the 2026 ranking of U.S. identity‑theft protection services, distinguished by its industry‑leading real‑time alerts from all three major credit bureaus and comprehensive coverage including dark‑web surveillance and $1 million insurance. LifeLock follows, leveraging its longstanding brand reputation and integration...

By TechBullion
This Month in Security with Tony Anscombe – February 2026 Edition
NewsFeb 28, 2026

This Month in Security with Tony Anscombe – February 2026 Edition

In February 2026, threat actors leveraged commercial generative AI tools to breach over 600 FortiGate firewalls in 55 countries, exploiting exposed management ports and weak credentials. ESET researchers uncovered PromptSpy, the first Android malware that uses generative AI to manipulate user...

By WeLiveSecurity
IOS Penetration Testing: Definition, Process and Tools
NewsFeb 28, 2026

IOS Penetration Testing: Definition, Process and Tools

iOS penetration testing is a structured methodology for uncovering and exploiting security flaws in iOS applications, typically spanning preparation, static and dynamic analysis, reverse engineering, exploitation, and reporting. Recent data shows engagements cost between £2,000 and £50,000 and require 10‑20...

By Security Boulevard
Can The F-35’s Software Really Be Jailbroken?
NewsFeb 28, 2026

Can The F-35’s Software Really Be Jailbroken?

Allied concerns over U.S. dominance of F‑35 software have resurfaced after the Dutch defense minister suggested the jet could be “jailbroken” like a smartphone. While experts dismiss a built‑in kill switch, the United States still controls critical firmware updates through...

By Simple Flying
KT, LG Uplus Face Lingering Fallout over Hacking Incidents
NewsFeb 28, 2026

KT, LG Uplus Face Lingering Fallout over Hacking Incidents

Korea's telecom giants KT and LG Uplus are still dealing with the repercussions of recent hacking incidents. KT has extended the deadline for customers to claim early‑termination‑fee refunds to June 30 after many missed the Jan. 31 cutoff. LG Uplus is under investigation for...

By DataBreaches.net
Former Nuance Employee Admits Breaching More than 1.2M Geisinger Patient Records
NewsFeb 27, 2026

Former Nuance Employee Admits Breaching More than 1.2M Geisinger Patient Records

Max Vance, a former Nuance Communications employee, admitted to illegally extracting protected health information from Geisinger Health System, affecting over 1.2 million patients. The breach continued after his termination, indicating he retained access to the provider’s network. Vance pleaded guilty in...

By DataBreaches.net
University of Mississippi Medical Center to Resume Clinic Operations After Cyberattack
NewsFeb 27, 2026

University of Mississippi Medical Center to Resume Clinic Operations After Cyberattack

University of Mississippi Medical Center announced that its outpatient clinics will resume normal operations statewide on March 2, following a cyberattack that shut down its IT systems on Feb. 21. The center has regained access to patient records and will...

By Becker’s Hospital Review
How Do Leaders Ensure AI System Safety and Compliance
NewsFeb 27, 2026

How Do Leaders Ensure AI System Safety and Compliance

Leaders are urged to prioritize Non‑Human Identities (NHIs) – machine identities such as tokens, keys and certificates – as a core component of AI system safety and regulatory compliance. The article outlines how inadequate discovery, classification and secret rotation create...

By Security Boulevard
What Is the Role of AI in Driving Cybersecurity Innovation
NewsFeb 27, 2026

What Is the Role of AI in Driving Cybersecurity Innovation

Non-Human Identities (NHIs) are becoming central to cybersecurity as organizations accelerate digital transformation. By managing machine identities, tokens and keys throughout their lifecycle, companies can reduce breach risk, improve compliance, and automate secret rotation. AI‑driven platforms add context‑aware detection, enabling...

By Security Boulevard
Securing Commercial Satellite Networks: A National Security Imperative
NewsFeb 27, 2026

Securing Commercial Satellite Networks: A National Security Imperative

Bipartisan senators have reintroduced the Satellite Cybersecurity Act to address growing cyber and electronic‑warfare threats against commercial satellite constellations. Low‑cost systems such as Starlink now underpin military command, intelligence, logistics and civilian services, making them attractive targets. The article highlights...

By Federal News Network
How to Do Email Analysis ? Complete Guide
NewsFeb 27, 2026

How to Do Email Analysis ? Complete Guide

Email remains the top vector for cyber‑crime, with attackers increasingly bypassing gateways by exploiting trusted domains and crafting seemingly routine messages. The guide outlines a seven‑step, evidence‑driven process—collecting full headers, parsing authentication results, and analyzing content and attachments—to differentiate legitimate...

By Security Boulevard
Cyberattacks on Hospitals Cost Lives. Here’s How to Fight Back at Machine Speed.
NewsFeb 27, 2026

Cyberattacks on Hospitals Cost Lives. Here’s How to Fight Back at Machine Speed.

Morpheus is an AI‑driven platform that ingests alerts from a hospital’s existing security stack—SIEM, EDR, firewalls, NDR, email security, DLP and identity tools—and stitches them into a single ransomware kill‑chain view. By correlating these signals, it can surface an attack...

By Security Boulevard
FreeBSD Jail Escape Flaw Breaks Filesystem Isolation
NewsFeb 27, 2026

FreeBSD Jail Escape Flaw Breaks Filesystem Isolation

A critical vulnerability identified as CVE-2025-15576 compromises FreeBSD 13.5 and 14.3 by allowing a jailed process to escape its chroot through a nullfs‑shared directory and Unix domain socket. The flaw bypasses kernel‑enforced filesystem boundaries, granting full host‑filesystem access to an...

By eSecurity Planet
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
NewsFeb 27, 2026

Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

The recent episode of HBO’s drama "The Pitt" portrayed a hospital’s IT systems being shut down by ransomware, forcing clinicians to revert to paper‑based processes. Hours later, the University of Mississippi Medical Center confirmed a real ransomware breach that crippled...

By Dark Reading
Air Guard Cuts Tactical Air Control Units, Adds Cyber Operators
NewsFeb 27, 2026

Air Guard Cuts Tactical Air Control Units, Adds Cyber Operators

The Air National Guard will deactivate the 177th Air Control Squadron in Georgia and cut 83 positions across Georgia and Iowa, converting those roles to cyber operations. New cyber squadrons will be established at Fort Gordon, Ga., and the 132nd...

By Air & Space Forces Magazine
Microsoft Testing Windows 11 Batch File Security Improvements
NewsFeb 27, 2026

Microsoft Testing Windows 11 Batch File Security Improvements

Microsoft released Windows 11 Insider Preview builds that add a new batch‑file security mode, letting administrators lock batch files in use via the LockBatchFilesInUse registry key or the LockBatchFilesWhenInUse manifest control. The change reduces the need for per‑statement signature validation, boosting script...

By BleepingComputer
NDSS 2025 – CASPR: Context-Aware Security Policy Recommendation
NewsFeb 27, 2026

NDSS 2025 – CASPR: Context-Aware Security Policy Recommendation

The paper presented at NDSS 2025 introduces CASPR, a context‑aware system that automatically recommends and refines SELinux security policy rules. By aggregating policy rules, file locations, audit logs, and attribute data, CASPR extracts features, clusters types with K‑means, and generates...

By Security Boulevard
Google Publishes New Google Ads Passkey Help Doc
NewsFeb 27, 2026

Google Publishes New Google Ads Passkey Help Doc

Google has released a new help document that explains how passkeys work within Google Ads, offering a password‑less, phishing‑resistant login method. The guide details when passkeys are mandatory, such as for user‑access changes and account‑linking updates, and outlines device requirements...

By Search Engine Land
Following Markup Investigation, Congress Finds Data Brokers Cost Consumers Tens of Billions of Dollars
NewsFeb 27, 2026

Following Markup Investigation, Congress Finds Data Brokers Cost Consumers Tens of Billions of Dollars

A Congressional Joint Economic Committee report estimates that data‑broker breaches have cost American consumers roughly $20.8 billion. The analysis, sparked by investigations from The Markup and CalMatters, links the loss to four major breaches that exposed over 650 million records in the...

By The Markup
Pentagon Shifts to Data-Centric Security to Boost Resilience
NewsFeb 27, 2026

Pentagon Shifts to Data-Centric Security to Boost Resilience

The Pentagon is moving from network‑centric to data‑centric security, embedding zero‑trust principles across the Navy and Marine Corps. Initiatives such as Project Dynamis and the Operation Cattle Drive effort aim to accelerate secure data sharing, reduce technical debt, and modernize...

By GovernmentCIO Media & Research
Momentum Cyber Hosts AIxCYBER on $119B Security Bet
NewsFeb 27, 2026

Momentum Cyber Hosts AIxCYBER on $119B Security Bet

Momentum Cyber announced AIxCYBER, a high‑profile panel in Austin on March 12, 2026, to dissect the forces reshaping cybersecurity. The event highlights a $119 billion investment surge in 2026, driven by record M&A activity and financing across 1,222 transactions. Panelists will...

By AI-TechPark
The Case for Why Better Breach Transparency Matters
NewsFeb 27, 2026

The Case for Why Better Breach Transparency Matters

Cybersecurity experts Adam Shostack and Adrian Sanabria argue for greater breach transparency at RSA Conference. They highlight that current practices treat incidents as legal liabilities, limiting shared learning. The speakers propose structured feedback loops similar to aviation and medicine. Without...

By Dark Reading
CISA Warns that RESURGE Malware Can Be Dormant on Ivanti Devices
NewsFeb 27, 2026

CISA Warns that RESURGE Malware Can Be Dormant on Ivanti Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has detailed how the RESURGE implant silently resides on Ivanti Connect Secure appliances, exploiting the zero‑day CVE‑2025‑0282. The 32‑bit Linux shared object libdsupgrade.so remains dormant until it detects a specific inbound TLS...

By BleepingComputer
What Secure Digital Work Looks Like Next: Omnissa CEO Takes the Stage at IGEL Now & Next Miami 2026
NewsFeb 27, 2026

What Secure Digital Work Looks Like Next: Omnissa CEO Takes the Stage at IGEL Now & Next Miami 2026

Omnissa CEO Shankar Iyer will headline IGEL Now & Next Miami 2026, showcasing the company’s AI‑driven digital work platform that merges endpoint management, virtual desktops and security into a single control plane. The platform is positioned as a frictionless, adaptive...

By CIO.com
Rethinking How State and Local Cyber Teams Are Built and Supported
NewsFeb 27, 2026

Rethinking How State and Local Cyber Teams Are Built and Supported

State and local governments are confronting a wave of cyberattacks, with 86% of incidents causing operational disruption that impacts schools, hospitals and public services. Tight budgets, legacy systems and a fierce cyber‑talent shortage hinder effective response. Experts argue the focus...

By Route Fifty — Finance
South Korean Authorities Accidentally Hand Hackers $4.8M in Crypto
NewsFeb 27, 2026

South Korean Authorities Accidentally Hand Hackers $4.8M in Crypto

South Korea's National Tax Service mistakenly published a photo containing the mnemonic recovery phrase of a seized cryptocurrency wallet. Hackers used the exposed phrase to transfer approximately $4.8 million worth of digital assets to their own accounts. The blunder underscores a...

By DataBreaches.net
FDB Vela Integrates With Photon Health Digital Prescription Marketplace
NewsFeb 27, 2026

FDB Vela Integrates With Photon Health Digital Prescription Marketplace

First Databank’s cloud‑native ePrescribing network, FDB Vela, has integrated with Photon Health’s digital prescription marketplace. The partnership combines FDB Vela’s HITRUST‑certified, redundant cloud infrastructure with Photon’s consumer‑focused platform that lets patients compare pharmacy options by price, location and availability before...

By HIT Consultant