
Proofpoint Unifies Email, Data, and AI Security to Reduce Enterprise Blind Spots
Proofpoint introduced a unified security platform that merges its Secure Email Gateway with API‑based protection, adds AI‑driven data access governance, and extends AI‑native DSPM to on‑premises environments. The integrated architecture shares threat intelligence and behavioral signals across inbound, outbound, and internal email, providing a single workbench for policy management and incident response. By correlating identity, data sensitivity, and usage patterns, the solution uncovers stale entitlements, over‑permissions, and hybrid blind spots. Proofpoint claims the platform delivers 99.999% email detection efficacy while reducing analyst fatigue.

Zero Networks Kubernetes Access Matrix Exposes Hidden Access Paths and Blast Radius
Zero Networks introduced the Kubernetes Access Matrix, a real‑time visual map that displays every allowed and denied network rule inside Kubernetes clusters. The tool automatically discovers existing network policies and presents namespace‑to‑namespace, application‑to‑application, and workload‑to‑workload connections in a single matrix....

Booz Allen’s Vellox Brings AI Vs. AI Defense to Protect Critical Infrastructure and National Security
Booz Allen Hamilton unveiled Vellox, an AI‑native cyber‑defense suite designed to counter AI‑driven attacks that now breach enterprises in minutes. The company’s threat report shows breach dwell time fell below 30 minutes in 2025, with some incidents resolved in seconds....

Your AI Agents Are Moving Sensitive Data. Do You Know Where?
In a Help Net Security interview, Bonfy.AI CEO Gidi Cohen warns that the greatest threat from autonomous AI agents is data‑layer risk, not traditional prompt‑injection attacks. He outlines Bonfy's three‑pronged approach: controlling grounding data, monitoring content across tool calls and...

Plumber: Open-Source Scanner of GitLab CI/CD Pipelines for Compliance Gaps
Plumber is an open‑source Go tool that scans GitLab CI/CD pipelines for compliance gaps such as mutable container tags, unprotected branches, and outdated templates. It reads the .gitlab-ci.yml file and queries the GitLab API, offering eight configurable controls via a...

NIST Updates Its DNS Security Guidance for the First Time in over a Decade
NIST released SP 800‑81r3, the first major update to its Secure Domain Name System Deployment Guide in over twelve years. The revision emphasizes protective DNS, encrypted DNS protocols (DoT, DoH, DoQ), and modern DNSSEC algorithms such as ECDSA and Ed25519. It...

Rapid7 Enhances Exposure Command with Runtime Validation and DSPM for Risk Analysis
Rapid7 has added runtime validation and Data Security Posture Management (DSPM) to its Exposure Command platform, turning continuous assessment into continuous validation. The new features use eBPF‑based sensors and AI to identify which cloud vulnerabilities and misconfigurations are actively exploitable...

Semgrep Multimodal Brings AI Reasoning and Rule-Based Analysis to Code Security
Semgrep unveiled Multimodal, a hybrid system that merges its deterministic Pro engine with large‑language‑model reasoning to boost code‑security detection. The solution claims up to eight times more true positives and a 50% reduction in noise compared with LLM‑only scans, already...
ConductorOne Unveils AI Access Management to Accelerate Secure, Compliant AI Adoption
ConductorOne launched AI Access Management, a unified control plane that governs access to AI tools, agents, and managed connectivity points across enterprises. The solution lets employees request AI services and be provisioned in under 60 seconds while IT retains full...

Bonfy ACS 2.0 Helps Organizations Control Data Use in AI Environments
Bonfy.AI unveiled Bonfy Adaptive Content Security (ACS) 2.0, a platform that extends enterprise data protection to AI agents, copilots, and generative applications across cloud, SaaS, and on‑premises environments. The solution adds real‑time, context‑aware controls—including a data‑in‑use guardrail, browser extension for...
Dropzone AI Releases Autonomous Threat Hunting Agent for Continuous SOC Detection
Dropzone AI unveiled its AI Threat Hunter, an autonomous agent that conducts continuous threat‑hunting across an organization’s security stack. The tool offers one‑click access to 250+ pre‑built hunt packs or custom objectives, completing federated searches in 60‑90 minutes that would...

Backslash Adds Cross-Product Support to Secure AI Skills in Developer Environments
Backslash Security announced cross‑product support for agentic AI Skills, giving organizations the ability to discover, assess, and govern Skills across AI‑native development environments. The new capability adds centralized visibility of Skills, Model Context Protocol servers, plug‑ins and prompt rules, allowing...

Menlo Security Delivers Unified Governance and Threat Prevention for AI Agents and Humans
Menlo Security introduced a Browser Security Platform designed to protect both human users and autonomous AI agents that operate within the browser, now treated as the enterprise operating system. The solution embeds a unified control plane that enforces machine‑speed governance,...

Graylog Advances Explainable AI and Automated Workflows for Faster Threat Detection
Graylog announced AI‑driven security automation at RSA, introducing explainable AI threat prioritization, agentic workflows via its open MCP Server, and a Spring 2026 release that auto‑launches investigations when asset risk exceeds thresholds. The threat prioritization engine aggregates alerts using entity context,...

Firefox Is Getting a Free Built-In VPN
Mozilla announced that Firefox 149, releasing on March 24, will embed a free built‑in VPN. The service will route browser traffic through a proxy, masking users' IP addresses, and initially provides 50 GB of data per month to users in the United States,...

Corelight’s Agentic Triage Turns SOC Alerts Into Evidence-Backed Investigations
Corelight unveiled Agentic AI capabilities for security operations centers, highlighted by Agentic Triage—a GenAI‑driven workflow that consolidates alerts into entity‑centric investigations and delivers evidence‑backed verdicts up to ten times faster. The solution exposes every playbook step, query, and data point,...

TrojAI Unveils New Capabilities to Secure Agentic AI Beyond the Prompt Layer
TrojAI introduced three major capabilities to protect enterprise‑grade agentic AI, extending security beyond the prompt layer. The new Agent‑Led AI Red Teaming automates multi‑turn attacks using coordinated autonomous agents and maps findings to OWASP, MITRE and NIST frameworks. Agent Runtime...

Polygraf AI Launches Desktop Overlay for Real-Time AI Behavior Control in Enterprise Operations
Polygraf AI unveiled Desktop Overlay, a real‑time compliance assistant that monitors user input at the desktop level. The edge‑deployed overlay flags sensitive information within 100 ms using on‑premise small language models, requiring only modest CPU and memory resources. Pilot results showed...

Stellar Cyber 6.4.0 Reduces Alert Noise and Speeds Investigations with Autonomous SOC Capabilities
Stellar Cyber has released version 6.4.0, adding autonomous SOC capabilities that automate alert triage and generate AI‑driven case summaries. The platform promises 60‑80% analyst time savings and up to 70% reduction in alert noise through its Agentic AI and Verdict...

Fingerprint’s MCP Server Turns Device Intelligence Into Real-Time AI-Powered Fraud Insights
Fingerprint has launched an open‑source Model Context Protocol (MCP) Server that lets any AI assistant or chatbot query its device‑intelligence platform in real time. The server uses the open MCP standard, enabling fraud analysts to ask natural‑language questions—such as device...

Microsoft Edge 146 Adds IP Privacy and Local Network Access Controls
Microsoft released Edge 146 stable on March 13, 2026, adding tracking protection changes, IP privacy via Private IP routing, and new enterprise network security policies. InPrivate windows now inherit the standard tracking prevention level, removing the separate setting. The update...

KEEQuant Advances Chip-Scale QKD for Telecom, Data Centers, and Critical Infrastructure
KEEQuant unveiled a commercial chip‑scale quantum key distribution (QKD) system that replaces traditional bulk optics with photonic integrated circuits. The miniaturized solution lowers hardware costs and simplifies deployment, making quantum‑safe key exchange viable for telecom operators, data‑center providers, and critical‑infrastructure...

45,000 Malicious IP Addresses Taken Down, 94 Suspects Arrested
Operation Synergia III, an INTERPOL‑led international effort running from July 2025 to January 2026, dismantled more than 45,000 malicious IP addresses and servers used for phishing, malware, and ransomware. The crackdown resulted in 94 arrests, with another 110 suspects under investigation, and the seizure...

JSOC IT’s AUTOPSY Platform Puts Security Stacks Under Live API Verification
JSOC IT launched AUTOPSY, a security verification platform that uses live API integrations to assess an organization’s security stack before a breach occurs. Its flagship product, READY, replaces self‑reported questionnaires with telemetry‑based scores across more than 24 security tools, revealing...

Accertify’s Attack State Targets Credential Stuffing and ATO Attacks
Accertify introduced Attack State, a new module within its Account Protection suite that continuously monitors login activity to spot coordinated credential‑stuffing and account‑takeover attacks. By benchmarking real‑time behavior against an organization’s typical traffic patterns, the tool flags anomalies across web,...

Red Access Firewall-Native SSE Adds GenAI Security and Browser Protection to Existing Firewalls
Red Access unveiled a firewall‑native Security Service Edge (SSE) that sits atop any existing firewall without agents, instantly delivering GenAI‑driven security, data loss prevention, CASB, and browser isolation. The solution is vendor‑agnostic, supporting Palo Alto Networks, Fortinet, Cisco and Check...

AI Coding Agents Keep Repeating Decade-Old Security Mistakes
Researchers evaluated three leading AI coding agents—Claude Code, OpenAI Codex, and Google Gemini—by tasking them with building two real‑world applications from scratch. Across 30 pull requests and 38 security scans, 143 vulnerabilities were found, with 87 % of PRs containing at...

Passwords, MFA, and Why neither Is Enough
The article argues that traditional passwords and even multi‑factor authentication (MFA) no longer provide sufficient protection against modern credential attacks. It highlights how SMS codes can be intercepted via SIM swapping, authenticator apps are prone to replay and push‑bombing attacks,...

€1 Million Online Fraud Scheme Uncovered, Three Suspects Arrested
German and French authorities dismantled a cross‑border fraud ring that stole roughly €1 million. Coordinated by Eurojust, the operation on 10 March led to the arrest of three suspects, with the alleged mastermind detained in France pending extradition. Investigators seized cryptocurrencies, jewellery...

Mimecast Adds AI Investigation and Adaptive Controls to Manage Human Risk
Mimecast unveiled a suite of AI‑driven platform enhancements aimed at curbing human‑related security risk. The rollout adds adaptive security policies that auto‑adjust based on individual risk scores, an AI‑powered Mihra Investigation Agent that accelerates incident analysis, and open‑gateway integrations for...

Socure Launch Enables Startups to Deploy Identity Verification and Fraud Controls
Socure introduced Socure Launch, a plug‑and‑play identity verification and fraud‑prevention suite built on its RiskOS platform. The service lets developers activate enterprise‑grade risk controls within minutes, bypassing weeks of custom development. It targets early‑stage fintech, crypto, gaming, marketplace and e‑commerce...

Zscaler Enhances Data Sovereignty Controls with Regional Processing and Logging
Zscaler announced a global expansion of its data‑sovereignty controls, adding dedicated control and logging planes in six regions and preparing a deployment in Canada. The Zero Trust Exchange now performs in‑region SSL inspection, malware analysis and offers Private Service Edge...

SOC Prime’s DetectFlow Enterprise Moves Threat Detection to the Data Ingestion Layer
SOC Prime unveiled DetectFlow Enterprise, a platform that embeds real‑time threat detection directly into the data ingestion layer. By running tens of thousands of Sigma detections on live Kafka streams with Apache Flink, the solution achieves millisecond mean‑time‑to‑detect (MTTD). It...

Binary Defense’s NightBeacon Brings AI-Driven Analysis to SOCs
Binary Defense unveiled NightBeacon, an AI‑powered security operations platform embedded directly in its SOC. The system cuts mean time to resolution by roughly 30%, accelerates incident summarization 46%, and boosts the number of incidents analysts can handle per shift by...

Codoxo’s Deepfake Detection Identifies AI-Generated Medical Records for Health Plans
Codoxo has launched Deepfake Detection, an AI‑driven solution that scans medical documentation, diagnostic images and claim context in seconds to flag synthetic or manipulated records. The tool embeds explainable risk scores into payer fraud‑prevention workflows, enabling health plans to intercept...

Fortinet Enhances SecOps with Cloud SOC, AI Automation, and Managed Services
Fortinet unveiled a suite of SecOps upgrades, highlighted by the preview of FortiSOC—a cloud‑delivered service that fuses analytics, SIEM, SOAR and threat intel into a single platform. The company also expanded its FortiAI engine to deliver agentic automation that can...

Microsoft Flips Windows Autopatch to Default Hotpatch Security Updates
Microsoft will automatically enable hotpatch security updates in Windows Autopatch for eligible devices managed via Intune or the Microsoft Graph API, beginning with the May 2026 security release. Hotpatch, introduced a year ago, lets critical fixes install without a reboot, accelerating...

Attackers Use AiTM Phishing Kit, Typosquatted Domains to Hijack AWS Accounts
Datadog researchers uncovered an AiTM phishing campaign that uses spoofed AWS security alerts and typosquatted domains to harvest AWS console credentials. The attackers operate a live proxy, relaying authentication requests to AWS while stealing usernames, passwords, and MFA codes in...

Terra Portal Adds Human-Governed AI to Live Production Pentesting
Terra Security unveiled Terra Portal, a desktop app that places human‑governed AI at the core of live‑production penetration testing. The tool combines autonomous agents for routine tasks with a Copilot layer for controlled exploitation, shrinking the discovery‑to‑fix timeline from months to...

Armadin Secures $189.9 Million to Counter AI-Driven Cyber Threats
Armadin announced a $189.9 million seed and Series A round, the largest combined funding ever in cybersecurity, led by Accel with participation from Google Ventures, Kleiner Perkins, Menlo Ventures, In‑Q‑Tel, 8VC and Ballistic Ventures. The capital will accelerate its AI‑driven platform that...

Teen Crew Caught Selling DDoS Attack Tools
Poland’s Central Bureau for Combating Cybercrime identified seven minors, aged 12 to 16, who sold software that enables distributed denial‑of‑service (DDoS) attacks. The teenagers targeted high‑traffic sites such as auction platforms, hosting services and booking portals, generating profit from the...

This Spy Tool Has Been Quietly Stealing Data for Years
ESET researchers have uncovered a renewed Sednit campaign that relies on a dual‑implant architecture—BeardShell and the open‑source framework Covenant—each hosted on separate cloud providers for redundancy. The toolkit has been used to conduct long‑term surveillance of Ukrainian military personnel since...

Fake Claude Code Install Pages Highlight Rise of “InstallFix” Attacks
Security researchers at Push Security discovered that attackers are publishing counterfeit Anthropic Claude Code installation pages. These look‑alike sites, promoted through paid Google ads, replace legitimate install commands with malicious scripts that download the Amatera stealer on Windows and comparable malware...

Turning Expertise Into Opportunity for Women in Cybersecurity
SheSpeaksCyber, a free directory launched by the Women4Cyber Foundation, connects event organizers with thousands of qualified women in cybersecurity. The platform targets 1,000 published speaker profiles by 2027 and aims for 50 percent female representation on conference stages by 2030. By...

Microsoft Working on Teams Feature to Keep Unauthorized Bots at Bay
Microsoft announced a new Teams feature that will let meeting admins identify and control third‑party bots before they join meetings, rolling out in May 2026 across desktop, macOS, Linux, iOS, and Android. The tool displays external bots waiting in the lobby...

Hexnode IdP Brings Device-Aware Authentication and Zero Trust to Enterprise Access
Hexnode has launched Hexnode IdP, a native identity provider embedded within its unified endpoint management (UEM) platform. The solution combines authentication, single sign‑on, MFA and role‑based access with real‑time device posture checks, allowing only compliant devices to access corporate applications....

Cyolo PRO 7.0 Expands OT-First Secure Remote Access with AI Session Intelligence
Cyolo has launched Cyolo PRO 7.0, an upgrade that extends its OT‑first secure remote access platform with AI‑driven session intelligence, passive asset and traffic discovery, and a consolidated operational dashboard. The AI engine automatically transcribes session video, categorizing user actions to speed...

March 2026 Patch Tuesday Forecast: Is AI Security an Oxymoron?
Developers are increasingly embedding AI into software, but the tools themselves are proving vulnerable, highlighted by Google’s Gemini AI flaw in Chrome (CVE‑2026‑0628) with an 8.8 CVSS score. Malicious AI‑powered browser extensions are also surfacing, harvesting data from unsuspecting users....

Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft
Business email compromise (BEC) and funds transfer fraud (FTF) accounted for 58% of cyber‑insurance claims in 2025, with BEC alone representing 31% of all claims. Average BEC loss fell 28% to $27,000 and FTF loss dropped 14% to $141,000, while...

Why Phishing Still Works Today
Gal Livschitz, senior penetration tester at Terra Security, explains how phishing has become harder to detect by leveraging HTTPS, branded look‑alike domains, and sophisticated delivery methods. He highlights the rise of QR‑based phishing in PDFs, MFA‑fatigue attacks that pressure users...