CSO Online
Dark Reading
Dark Web Informer
Europol
Krebs on Security
NSA
Reuters
Security Affairs
The Hacker News
Wired
ZDNET
U.S. CISA adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog
Fri Mar 13 2026
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two Google Chrome flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: This week, Google released security updates to address two high-severity vulnerabilities, […]
Security Affairs
Hackers targeted Poland’s National Centre for Nuclear Research
Fri Mar 13 2026
Hackers targeted Poland’s National Centre for Nuclear Research, but security systems detected and blocked the attack before any damage. The National Centre for Nuclear Research in Poland reported a cyberattack on its IT infrastructure. The intrusion attempt was quickly detected by security systems, allowing staff to secure the targeted systems and prevent any operational impact. […]
Security Affairs

Google warns of two actively exploited Chrome zero days
Fri Mar 13 2026
Threat actors are exploiting two high severity zero day vulnerabilities in the Chrome browser that experts say IT teams must patch immediately.
CSO Online

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
Fri Mar 13 2026
A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42 is tracking the threat activity under the moniker CL-STA-1087, where CL refers to cluster, and STA stands for state-backed motivation. "The activity demonstrated strategic operational patience and...
The Hacker News

Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
Fri Mar 13 2026
Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. "If you have chats that are impacted by this change, you will see instructions on how you can download any media or messages you may want to keep," the social media giant said in a help document. "If you're on an older version of Instagram, you may also need to update the...
The Hacker News
US and European authorities disrupt socksEscort proxy service tied to AVrecon botnet
Fri Mar 13 2026
Authorities in the US and Europe disrupted the SocksEscort proxy service, which used the AVrecon botnet and infected about 360,000 devices since 2020. Law enforcement agencies in the US and Europe have disrupted SocksEscort, a malicious proxy service powered by the AVrecon botnet. Active since 2020, the service hijacked roughly 360,000 devices and allowed cybercriminals […]
Security Affairs

Cyber criminals too are working from home… your home
Fri Mar 13 2026
The FBI is so concerned about the threat of residential proxy attacks and the dangers posed by cyber criminals using the technique that it has posted guidance on its website.
CSO Online

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
Fri Mar 13 2026
INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency's ongoing efforts to dismantle criminal networks, disrupt emerging threats, and safeguard victims from scams. The effort is part of an international law enforcement operation that involved 72 countries and territories....
The Hacker News

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
Fri Mar 13 2026
Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques. "The campaign redirects users searching for legitimate enterprise software to malicious ZIP files on attacker-controlled websites to deploy digitally signed trojans that masquerade as trusted VPN clients...
The Hacker News
AI-assisted Slopoly malware powers Hive0163’s ransomware campaigns
Fri Mar 13 2026
The Hive0163 group used AI-assisted malware called Slopoly to maintain persistent access in ransomware attacks. IBM X-Force researchers report that the financially motivated group Hive0163 is using AI-assisted malware named Slopoly to maintain persistent access during ransomware attacks, showing how threat actors can quickly build new malware frameworks using AI. Hive0163 is a threat actor […]
Security Affairs
Google fixed two new actively exploited flaws in the Chrome browser
Fri Mar 13 2026
Google addressed two high-severity vulnerabilities in the Chrome browser that have been exploited in attacks in the wild. Google has released security updates to address two high-severity vulnerabilities, tracked as CVE-2026-3909 and CVE-2026-3910, in the Chrome browser. The company is aware of attacks in the wild exploiting both flaws. “Google is aware that exploits for […]
Security Affairs

Investigating a New Click-Fix Variant
Fri Mar 13 2026
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on independent research and observations of the current threat landscape available at the time of publication. The content is intended for informational and preparedness purposes only. Read more blogs around threat...
The Hacker News

Veeam warns admins to patch now as critical RCE flaws hit Backup & Replication
Fri Mar 13 2026
Backup vendor Veeam has released security updates to patch multiple vulnerabilities in its widely used Backup and Replication platform, including three critical flaws that could allow authenticated us
CSO Online

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
Fri Mar 13 2026
Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in the wild. The list of vulnerabilities is as follows - CVE-2026-3909 (CVSS score: 8.8) - An out-of-bounds write vulnerability in the Skia 2D graphics library that allows a remote attacker to perform out-of-bounds memory access via a crafted HTML...
The Hacker News
Beyond File Servers: Securing Unstructured Data in the Era of AI
Fri Mar 13 2026
File servers still exist for legacy storage and governance, but most modern workflows now happen in collaboration tools, code platforms, chats, and AI systems. File servers remain, but they are no longer central to operations. They still appear important on paper: legacy project shares with strict permissions, legal drives with structured folders, and network areas […]
Security Affairs

Hybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mind
Fri Mar 13 2026
I used to think hybrid incidents would get easier once we standardized on “one tool”: one monitoring platform, one ticketing system, one on-call process.
CSO Online

Storm-2561 targets enterprise VPN users with SEO poisoning, fake clients
Fri Mar 13 2026
Microsoft has warned enterprises that cybercriminal group Storm-2561 is hijacking search engine results to serve trojanized VPN clients, stealing corporate credentials, and then covering its tracks be
CSO Online

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
Fri Mar 13 2026
Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited by unprivileged users to circumvent kernel protections, escalate to root, and undermine container isolation guarantees. The nine confused deputy vulnerabilities have been collectively codenamed CrackArmor by the Qualys Threat Research Unit (TRU). The...
The Hacker News

The cyber perimeter was never dead. We just abandoned it.
Fri Mar 13 2026
Industry has comforted itself with the idea that the perimeter is dead.
CSO Online

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
Fri Mar 13 2026
A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential routers worldwide into a botnet for committing large-scale fraud. "SocksEscort infected home and small business internet routers with malware," the U.S. Department of Justice (DoJ) said. "The malware allowed SocksEscort to direct internet...
The Hacker News

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
Fri Mar 13 2026
Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if successfully exploited, could result in remote code execution. The vulnerabilities are as follows - CVE-2026-21666 (CVSS score: 9.9) - A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server. CVE-2026-21667 (...
The Hacker News

10 Kennzahlen, die CISOs weiterbringen
Fri Mar 13 2026
Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren.
CSO Online

Telus Digital hit with massive data breach
Fri Mar 13 2026
Telus Digital, which provides business process outsourcing (BPO) services to a range of organizations worldwide, has been hit with a massive cyberattack conducted by extortion group ShinyHunters The g
CSO Online

Medical giant Stryker crippled after Iranian hackers remotely wipe computers
Thu Mar 12 2026
A major cyberattack on US medical supplies giant Stryker has resulted in thousands of devices being remotely wiped, after a pro-Iranian hacking group may have compromised the company’s Microsoft Intun
CSO Online

US Lawmakers Move to Kill the FBI’s Warrantless Wiretap Access
Thu Mar 12 2026
A bipartisan bill would force the FBI to get a warrant to read Americans’ messages and ban the federal purchase of commercial data on US residents ahead of a critical April deadline.
Wired

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
Thu Mar 12 2026
Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that's written in Rust, marking a significant departure from other known Delphi-based malware families associated with the Latin American cybercrime ecosystem. The malware, which is designed to infect Windows systems and was first discovered last month, has been codenamed VENON by Brazilian...
The Hacker News

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
Thu Mar 12 2026
Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a financially motivated threat actor named Hive0163. "Although still relatively unspectacular, AI-generated malware such as Slopoly shows how easily threat actors can weaponize AI to develop new malware frameworks in a fraction of the time it used to take...
The Hacker News
Apple issues emergency fixes for Coruna flaws in older iOS versions
Thu Mar 12 2026
Apple released iOS 16.7.15 and 15.8.7 updates for older iPhones and iPads to patch vulnerabilities linked to the Coruna exploits. Apple has released security updates for legacy devices, rolling out iOS and iPadOS 16.7.15 and 15.8.7 to address vulnerabilities tied to the recently disclosed Coruna exploits. The patches aim to protect older iPhone and iPad […]
Security Affairs
Critical SQL Injection bug in Ally plugin threatens 400,000+ WordPress sites
Thu Mar 12 2026
An unauthenticated SQL injection flaw (CVE-2026-2413) in the Ally WordPress plugin, used on 400K+ sites, could allow attackers to steal sensitive data. An unauthenticated SQL injection flaw, tracked as CVE-2026-2413 (CVSS score 7.5), in Ally plugin could allow attackers to steal sensitive data. The offensive security engineer Drew Webber at Acquia discovered the vulnerability on […]
Security Affairs

How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks
Thu Mar 12 2026
Amid a paralyzing breach of medical tech firm Stryker, the group has come to represent Iran's use of “hacktivism” as cover for chaotic, retaliatory state-sponsored cyberattacks.
Wired

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
Thu Mar 12 2026
Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted infrastructure, legitimate-looking authentication flows, and encrypted traffic that conceals malicious behavior from traditional detection layers. For CISOs, the priority is now clear: scale phishing detection in a way that helps...
The Hacker News

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
Thu Mar 12 2026
Another Thursday, another pile of weird security stuff that somehow happened in just seven days. Some of it is clever. Some of it is lazy. A few bits fall into that uncomfortable category of “yeah… this is probably going to show up in real incidents sooner than we’d like.” The pattern this week feels familiar in a slightly annoying way. Old tricks are getting polished. New research shows how...
The Hacker News

PhantomRaven returns to npm with 88 bad packages
Thu Mar 12 2026
Last year’s “PhantomRaven” supply-chain campaign is back, with security researchers uncovering 88 new malicious packages in what they describe as the second, third, and fourth waves of the operation.
CSO Online

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload
Thu Mar 12 2026
The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of five minutes, the outcome can shift from a contained incident to a breach. For years, the cybersecurity industry has focused on the front door of phishing defense: employee training, email gateways that...
The Hacker News

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
Thu Mar 12 2026
Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit. The vulnerability, tracked as CVE-2023-43010, relates to an unspecified vulnerability in WebKit that could result in memory corruption when processing maliciously crafted web content. The iPhone maker said the issue was...
The Hacker News
ENISA Technical Advisory on Secure Package Managers: Essential DevSecOps Guidance
Thu Mar 12 2026
ENISA’s first Technical Advisory on Secure Package Managers helps developers safely use third-party packages. ENISA has released its first Technical Advisory on Package Managers, focusing on how developers can safely consume third-party packages. The document (March 2026, v1.1) follows public feedback incorporating 15 contributions from stakeholders, experts, and the open-source community. “This document focuses on […]
Security Affairs
U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog
Thu Mar 12 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in n8n to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an n8n flaw, tracked as CVE-2025-68613 (CVSS score of 10.0), to its Known Exploited Vulnerabilities (KEV) catalog. n8n is a workflow automation platform designed for technical teams that combines the […]
Security Affairs

North Korean fake IT worker tradecraft exposed
Thu Mar 12 2026
Research from GitLab has exposed the latest tradecraft behind North Korean fake IT worker scams.
CSO Online

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
Thu Mar 12 2026
Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud. The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT to full-fledged remote administration tools such as SURXRAT. PixRevolution, according to...
The Hacker News

AI use is changing how much companies pay for cyber insurance
Thu Mar 12 2026
In July 2025, McDonald’s had an unexpected problem on the menu, one involving McHire, its AI-powered platform used to recruit and screen job applicants.
CSO Online
Bell Ambulance data breach impacted over 238,000 people
Thu Mar 12 2026
Bell Ambulance confirms a February 2025 breach affecting 238,000 people, exposing personal, financial, and health information. Nearly 238,000 individuals are impacted by a February 2025 Bell Ambulance data breach. Bell Ambulance is a U.S.-based emergency medical services provider offering ambulance transport, paramedic care, and patient support. It serves communities with urgent medical response, interfacility transfers, […]
Security Affairs

“Zombie ZIP”: Neue Angriffstechnik täuscht Virenscanner
Thu Mar 12 2026
Mithilfe sogenannter Zombie-ZIPs lassen sich fast alle Virenscanner austricksen.
CSO Online

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
Thu Mar 12 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched...
The Hacker News

Wie CISOs schlechte Angebote enttarnen
Thu Mar 12 2026
Drum prüfe…Ground Picture | shutterstock.
CSO Online
Pro-Palestinian hacktivist group Handala targets Stryker in global disruption
Wed Mar 11 2026
Pro-Palestinian hacktivist group Handala claims a cyberattack on Stryker, alleging it wiped 200,000 systems and disrupted global operations. Pro-Palestinian hacktivist group Handala claims responsibility for a disruptive cyberattack against medical technology firm Stryker. “Medical technology giant Stryker is experiencing a global outage across its systems after a cyberattack early Wednesday. Staff and contractors report that […]
Security Affairs
BeatBanker malware targets Android users with banking Trojan and crypto miner
Wed Mar 11 2026
BeatBanker Android malware spreads through fake Starlink apps on websites imitating Google Play Store, hijacking devices, stealing credentials, and mining crypto. A new Android malware called BeatBanker spreads through fake Starlink apps distributed on websites posing as the Google Play Store. Once installed, it hijacks devices, steals login credentials, tampers with cryptocurrency transactions, and secretly […]
Security Affairs

Resumés with malicious ISO attachments are circulating, says Aryaka
Wed Mar 11 2026
Threat actors are still having success tricking human resources staff into opening malware-infected phishing emails.
CSO Online

CISA warns of actively exploited Ivanti EPM and Cisco SD-WAN flaws
Wed Mar 11 2026
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that an authentication bypass vulnerability patched in Ivanti Endpoint Manager (EPM) last month is now being exploited in the
CSO Online

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes
Wed Mar 11 2026
Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling prey to phishing and scam traps. The attack, at its core, takes advantage of AI browsers' tendency to reason their actions and use it against the model itself to lower their security guardrails, Guardio...
The Hacker News
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
Wed Mar 11 2026
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.
Krebs on Security

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
Wed Mar 11 2026
Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command execution. The vulnerabilities are listed below - CVE-2026-27577 (CVSS score: 9.4) - Expression sandbox escape leading to remote code execution (RCE) CVE-2026-27493 (CVSS score: 9.5) - Unauthenticated...
The Hacker News

Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
Wed Mar 11 2026
Meta on Wednesday said it disabled over 150,000 accounts associated with scam centers in Southeast Asia as part of a coordinated effort in partnership with authorities from Thailand, the U.S., the U.K., Canada, Korea, Japan, Singapore, the Philippines, Australia, New Zealand, and Indonesia. The effort also led to 21 arrests made by the Royal Thai Police, the company said. The action builds upon...
The Hacker News

AWS expands Security Hub for multicloud security operations
Wed Mar 11 2026
Amazon Web Services is expanding AWS Security Hub to function as a centralized security operations solution capable of aggregating risk signals across multicloud environments.
CSO Online

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
Wed Mar 11 2026
SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on affected systems. The vulnerabilities in question listed below - CVE-2019-17571 (CVSS score: 9.8) - A code injection vulnerability in SAP Quotation Management Insurance application (FS-QUO) CVE-2026-27685 (CVSS score: 9.1) - An insecure deserialization...
The Hacker News

Meta Ramps Up Efforts to Disrupt Industrialized Scamming
Wed Mar 11 2026
Meta removed 10.9 million Facebook and Instagram accounts linked to “criminal scam centers” last year, the company announced on Wednesday.
Wired

Overly permissive ‘guest’ settings put Salesforce customers at risk
Wed Mar 11 2026
Salesforce is urging its customers to review their Experience Cloud ‘guest’ configurations as cybercrime group ShinyHunters claims a new campaign involving data theft and extortion tied to exposed Sal
CSO Online
Hewlett Packard Enterprise fixes critical authentication bypass in Aruba AOS-CX
Wed Mar 11 2026
Hewlett Packard Enterprise (HPE) fixed several flaws in Aruba AOS-CX, including a critical bug that lets attackers reset admin passwords. Hewlett Packard Enterprise (HPE) patched multiple vulnerabilities in Aruba AOS-CX, the operating system used in Aruba CX switches. The most severe issue, tracked as CVE-2026-23813 (CVSS score of 9.8), allows unprivileged attackers to bypass authentication […]
Security Affairs

What Boards Must Demand in the Age of AI-Automated Exploitation
Wed Mar 11 2026
“You knew, and you could have acted. Why didn’t you?” This is the question you do not want to be asked. And increasingly, it’s the question leaders are forced to answer after an incident. For years, many executive teams and boards have treated a large vulnerability backlog as an uncomfortable but tolerable fact of life: “we’ve accepted the risk.” If you’ve ever seen a report showing...
The Hacker News

Did cybersecurity recently have its Gatling gun moment?
Wed Mar 11 2026
On the James River, Petersburg, VA, June of 1864, during the American Civil War, General Benjamin Butler, of the US Army, deployed a new weapon into the field that effectively altered the nature of ki
CSO Online

Why zero trust breaks down in IoT and OT environments
Wed Mar 11 2026
Zero trust solves the wrong problem in OT Zero trust has become the dominant security narrative of the past decade, and rightly so.
CSO Online
CSO Awards 2026 celebrates world-class security strategies
Wed Mar 11 2026
For more than a decade, the CSO Awards have recognized security projects that demonstrate outstanding thought leadership and business value.
CSO Online
Announcing the 2026 CSO Hall of Fame honorees
Wed Mar 11 2026
Now entering its eighth year, the CSO Hall of Fame spotlights outstanding leaders who have significantly contributed to the practice of information risk management and security.
CSO Online

Critical flaw in HPE Aruba CX switches lets attackers seize admin control without credentials
Wed Mar 11 2026
HPE Aruba Networking has released patches for five vulnerabilities in its AOS-CX switch software, the most severe of which could let a remote attacker take administrative control of enterprise network
CSO Online

A 5-step approach to taming shadow AI
Wed Mar 11 2026
AI is being leveraged across organizations to boost productivity, accelerate innovation and optimize business processes.
CSO Online

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
Wed Mar 11 2026
Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are rated Critical, and 76 are rated Important in severity. Forty-six of the patched vulnerabilities relate to privilege escalation, followed by 18 remote code execution, 10 information disclosure, four...
The Hacker News
KadNap bot compromises 14,000+ devices to route malicious traffic
Wed Mar 11 2026
KadNap malware infects 14,000+ edge devices, mainly Asus routers, turning them into a stealth proxy botnet used to route malicious internet traffic. KadNap malware infects more than 14,000 edge devices, mainly ASUS routers, and turns them into a proxy botnet used to route malicious traffic. First detected in August 2025, the campaign heavily targets the […]
Security Affairs

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
Wed Mar 11 2026
A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm package last year to completely breach a victim's cloud environment within a span of 72 hours. The attack started with the theft of a developer's GitHub token, which the threat actor then used to gain unauthorized access to the cloud and steal data. "The threat actor, UNC6426, then used this...
The Hacker News

12 ways attackers abuse cloud services to hack your enterprise
Wed Mar 11 2026
Attackers are increasingly abusing trusted SaaS platforms, cloud infrastructure, and identity systems to blend malicious activity into legitimate enterprise traffic.
CSO Online

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
Wed Mar 11 2026
Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors. The Rust packages, published to crates.io, are listed below - chrono_anchor dnp3times time_calibrator time_calibrators time-sync The crates, per Socket, impersonate timeapi.io and were published between late February and early March...
The Hacker News
Microsoft Patch Tuesday, March 2026 Edition
Wed Mar 11 2026
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows. Here are a few highlights from this month's Patch Tuesday.
Krebs on Security

6 Mittel gegen Security-Tool-Wildwuchs
Wed Mar 11 2026
loading="lazy" width="400px">Viel hilft nicht immer viel.
CSO Online

Jack & Jill went up the hill — and an AI tried to hack them
Wed Mar 11 2026
What happens when an autonomous AI agent is turned loose on another autonomous AI agent? It chains together bugs that humans would consider benign, easily bypasses authentication controls, and even un
CSO Online

March Patch Tuesday: Three high severity holes in Microsoft Office
Tue Mar 10 2026
Three high severity holes in Microsoft’s Office suite headline the 78 issues listed in the March Patch Tuesday releases, which, grateful CSOs will notice, contain no surprise zero day vulnerabilities.
CSO Online
Microsoft Patch Tuesday security updates for March 2026 fixed 84 bugs
Tue Mar 10 2026
Microsoft Patch Tuesday security updates for March 2026 addressed 84 vulnerabilities in its products. None of the flaws are known to be exploited so far. Microsoft Patch Tuesday security updates for March 2026 addressed 84 vulnerabilities across its products. The IT giant addressed flaws across Windows, Office, Edge, Azure, SQL Server, Hyper-V, and ReFS. Including […]
Security Affairs
Threat intelligence by ESET is a game changer
Tue Mar 10 2026
Cyber threats have gained the upper hand on many global organizations, attacking through a relentless cycle of new phishing scams, malware attacks and deepfake incidents.
CSO Online
The CSO role is evolving fast with AI in Cyber Defense strategy
Tue Mar 10 2026
AI and cybersecurity are proving to be extremely challenging for organisations.
CSO Online
Attackers exploit FortiGate devices to access sensitive network information
Tue Mar 10 2026
Attackers are exploiting FortiGate devices to breach networks and steal configuration data containing service account credentials and network details. SentinelOne researchers warn that attackers are exploiting vulnerabilities or weak credentials in FortiGate devices to gain initial access to corporate networks. Once inside, they extract configuration files that may contain service account credentials and information about […]
Security Affairs

DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal’ Orders
Tue Mar 10 2026
Department of Homeland Security leaders removed top privacy officers who objected to mislabeling government records to block their public release, WIRED has learned.
Wired

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Tue Mar 10 2026
Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology...
The Hacker News

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
Tue Mar 10 2026
Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their own. But there is a problem. While these agents make work faster, they also open a new "back door" for hackers. The Problem: "The Invisible Employee" Think of an AI Agent like a new employee who has...
The Hacker News
APT28 conducts long-term espionage on Ukrainian forces using custom malware
Tue Mar 10 2026
APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) has used BEARDSHELL and COVENANT malware to conduct long-term surveillance of Ukrainian military personnel. According to ESET, the campaign began in April 2024 and relies on […]
Security Affairs

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
Tue Mar 10 2026
Cybersecurity researchers have discovered a new malware called KadNap that's primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic. The malware, first detected in the wild in August 2025, has expanded to over 14,000 infected devices, with more than 60% of victims located in the U.S., according to the Black Lotus Labs team at Lumen. A lesser number of...
The Hacker News

GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps
Tue Mar 10 2026
Delivery apps are glitching and navigation routes are changing abruptly thanks to electronic warfare disrupting the satellite signals that power everything from missiles to your ride home.
Wired

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
Tue Mar 10 2026
Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims' databases and exfiltrate sensitive data within organizations' Google Cloud environments. The shortcomings have been collectively named LeakyLooker by Tenable. There is no evidence that the vulnerabilities were exploited in...
The Hacker News
Threat actors use custom AuraInspector to harvest data from Salesforce systems
Tue Mar 10 2026
Attackers are mass-scanning Salesforce Experience Cloud sites using a modified AuraInspector tool to exploit misconfigurations and access sensitive data. Salesforce CSOC warns that threat actors are mass-scanning publicly accessible Experience Cloud sites using a modified version of the AuraInspector tool. AuraInspector is an open‑source command‑line tool released by Google/Mandiant to audit Salesforce Aura and Experience […]
Security Affairs

Devs looking for OpenClaw get served a GhostClaw RAT
Tue Mar 10 2026
A malicious npm package posing as an OpenClaw Installer has been caught deploying a remote access trojan (RAT) on victim machines, according to new JFrog research.
CSO Online

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
Tue Mar 10 2026
You can't control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more internet-facing exposure than they realise. Intruder's Head of Security digs into why this happens and how teams can manage it deliberately. Time-to-exploit is shrinking The larger and less controlled your attack surface is,...
The Hacker News

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
Tue Mar 10 2026
The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long‑term surveillance of Ukrainian military personnel. The two malware families have been put to use since April 2024, ESET said in a new report shared with The Hacker News. APT28, also tracked as Blue Athena, BlueDelta, Fancy Bear, Fighting Ursa,...
The Hacker News
U.S. CISA adds Ivanti EPM, SolarWinds, and Omnissa Workspace One flaws to its Known Exploited Vulnerabilities catalog
Tue Mar 10 2026
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds EPM, SolarWinds, and Omnissa Workspace One flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: The first vulnerability added to the catalog is […]
Security Affairs

The OT security time bomb: Why legacy industrial systems are the biggest cyber risk nobody wants to fix
Tue Mar 10 2026
When I first secured a production line, part of the control system was still running on an unpatched Windows XP machine tucked under a lab table — right next to the state-of-the-art GMP manufacturing
CSO Online

OpenAI to acquire Promptfoo to strengthen AI agent security testing
Tue Mar 10 2026
OpenAI said it plans to acquire AI testing startup Promptfoo, a move aimed at strengthening security checks for AI agents as enterprises move toward deploying autonomous systems in business workflows.
CSO Online

Why access decisions are becoming the weakest link in identity security
Tue Mar 10 2026
In my nearly two decades leading identity and risk programs, I’ve learned a sobering truth that every CISO eventually confronts: hackers don’t hack in — they log in.
CSO Online
Ericsson US confirms breach after third-party provider attack
Tue Mar 10 2026
Ericsson US reports a data breach after attackers hacked a service provider, exposing employee and customer information. Ericsson Inc., the U.S. branch of the Swedish telecom giant, disclosed a data breach after a service provider was hacked. The attack compromised the personal information of an unspecified number of employees and customers. “On April 28, 2025, […]
Security Affairs
Law enforcement disrupted Tycoon 2FA phishing-as-a-service platform
Tue Mar 10 2026
Authorities disrupted the Tycoon 2FA phishing-as-a-service platform used to send millions of phishing emails to over 500,000 orgs worldwide. The joint effort, led by Microsoft, Europol, and industry partners, aimed to target the infrastructure of Tycoon 2FA phishing-as-a-service platform responsible for tens of millions of fraudulent emails reaching over 500,000 organizations each month worldwide. By […]
Security Affairs

I replaced manual pen tests with automation. Here’s what I learned.
Tue Mar 10 2026
More accreditation and compliance requirements have been added in response to cyber incidents.
CSO Online

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
Tue Mar 10 2026
Salesforce has warned of an increase in threat actor activity that's aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an open-source tool called AuraInspector. The activity, per the company, involves the exploitation of customers' overly permissive Experience Cloud guest user configurations to obtain access to sensitive...
The Hacker News

When AI safety constrains defenders more than attackers
Tue Mar 10 2026
Security teams are being urged to adopt AI copilots for threat modeling, phishing simulations, and SOC workflows.
CSO Online
Security-Tools für KI-Infrastrukturen – ein Kaufratgeber
Tue Mar 10 2026
Tools, die die KI-Infrastruktur unter die Lupe nehmen, optimieren und absichern, liegen im Trend.
CSO Online

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
Tue Mar 10 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability list is as follows - CVE-2021-22054 (CVSS score: 7.5) - A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM) that...
The Hacker News

Hacker abusing .arpa domain to evade phishing detection, says Infoblox
Tue Mar 10 2026
A threat actor has found a new way to evade phishing detection defenses: Manipulate the .
CSO Online