RADAR / 보안/개인정보 레이더

보안/개인정보 레이더

A fast, reusable HTML report for lightweight Radar projects: entity distribution, article velocity, and source mix, alongside a clean reading list.

articles169 entities8 errors2 Generated at2026-03-16 06:05 UTC

Visuals

Chart.js dark editorial responsive

Entity Distribution

Top entities by frequency

Article Timeline

Daily volume inferred from article dates

Source Distribution

Share of articles by source

Data Freshness

Collection lag distribution

Entity Extraction Rate

Percentage with matched entities

Source Health

Article count by source (sorted)

Entities

clickable pills top 24 shown
Threat 41 Vulnerability 32 DataBreach 24 Malware 23 ConsumerTrust 15 Compliance 14 CorporateTrust 12 Privacy 5

Articles

cards source + date fast scan

Reading List

Click through to the original source

What smart factories keep getting wrong about cybersecurity

In this Help Net Security interview, Packsize CSO Troy Rydman breaks down the biggest vulnerabilities in smart factory environments today, from IoT devices and legacy systems to human error. He explains how unmanaged dev...

source Help Net Security date 2026-03-15

VulHunt: Open-source vulnerability detection framework

Binarly has published VulHunt Community Edition, making the core scanning engine from Binarly’s commercial Transparency Platform available to independent researchers and practitioners. What VulHunt does VulHunt Community...

source Help Net Security date 2026-03-15 entities 2

Fake scandal clips on Facebook bait victims into investment scams

Bitdefender researchers uncovered hundreds of scam campaigns promoted through Facebook ads that use fake news stories, celebrity impersonation, and redirect chains to funnel victims into investment fraud schemes. The act...

source Help Net Security date 2026-03-15 entities 2

The billionaires made a promise — now some want out

In 2010, Warren Buffett and Bill Gates launched a disarmingly simple campaign they called the Giving Pledge: a public commitment, open to the world’s wealthiest people, to give away more than half their fortune during th...

source TechCrunch date 2026-03-15 entities 1

Netflix’s ‘Frankenstein’ wins three Oscars, ‘KPop Demon Hunters’ wins two

“Frankenstein” won for Best Production Design, Best Costume Design, and Best Makeup and Hairstyling, while “KPop Demon Hunters” won for Best Animated Feature and Best Original Song.

source TechCrunch date 2026-03-15

ISC Stormcast For Monday, March 16th, 2026 https://isc.sans.edu/podcastdetail/9850, (Mon, Mar 16th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

source SANS Internet Storm Center date 2026-03-15

Google, Accel India accelerator chooses 5 startups and none are ‘AI wrappers’

Google and Accel say about 70% of AI startup pitches tied to India were "wrappers" as they reviewed more than 4,000 applications for their Atoms cohort.

source TechCrunch date 2026-03-15

OpenAI says ChatGPT ads are not rolling out globally for now

OpenAI told BleepingComputer that ChatGPT ads on Free and Go plans are not yet rolling out outside the United States, even though some users noticed references to ads in the updated privacy policy. [...]

source Bleeping Computer date 2026-03-15 entities 2

ByteDance reportedly pauses global launch of its Seedance 2.0 video generator

The company is reportedly delaying the launch as its engineers and lawyers work to avert further legal issues.

source TechCrunch date 2026-03-15

Aether OS is a computer in a browser built for the AT Protocol

Aether OS puts a full-fledged desktop in your browser that ties directly into the AT Protocol. That means it connects to your Bluesky account and other public records. It offers a pretty full suite of apps, 42 in total, ...

source The Verge date 2026-03-15

Lawyer behind AI psychosis cases warns of mass casualty risks

AI chatbots have been linked to suicides for years. Now one lawyer says they are showing up in mass casualty cases too, and the technology is moving faster than the safeguards.

source TechCrunch date 2026-03-15

Unacademy to be acquired by upGrad in share-swap deal as India’s edtech sector consolidates

The deal comes after Unacademy’s valuation plunged from $3.5B to under $500M, as India’s once-booming edtech sector struggles.

source TechCrunch date 2026-03-15

Sotomayor’s Wabi Sabi is the funnest record of 2026

Shout out to subscriber N_Gorski for today's pick. They popped into the comments on last week's recommendation to ask what I thought of the new Sotomayor record. Well, I hadn't actually heard it yet, but now I'm obsessed...

source The Verge date 2026-03-15

TechCrunch Mobility: Travis Kalanick’s return proves it really is 2016 again

Welcome back to TechCrunch Mobility — your central hub for news and insights on the future of transportation.

source TechCrunch date 2026-03-15

Wiz investor unpacks Google’s $32B acquisition

Shardul Shah of Index Ventures walks us through Google's biggest acquisition ever.

source TechCrunch date 2026-03-15

Rivian’s RJ Scaringe thinks we’re doing robots all wrong

Rivian CEO RJ Scaringe shares his thoughts and plans for his newest startup, Mind Robotics.

source TechCrunch date 2026-03-15

Betterleaks, a new open-source secrets scanner to replace Gitleaks

A new open-source tool called Betterleaks can scan directories, files, and git repositories and identify valid secrets using default or customized rules. [...]

source Bleeping Computer date 2026-03-15

AI Czar David Sacks wants Trump to ‘get out’ of Iran

David Sacks, the White House's AI and crypto czar, has warned that a continued war in Iran could be catastrophic. On the All In podcast, Sacks said that "we should try to find the off-ramp." He expressed concern that Ira...

source The Verge date 2026-03-15

AI companies want to harvest improv actors’ skills to train AI on human emotion

If you've got strong creative instincts, the ability to authentically portray emotion, and are capable of staying true to a character's voice throughout a scene, there's a job listing calling for your experience. The cat...

source The Verge date 2026-03-15

Samsung’s Galaxy Buds 4 Pro are the choice — if you have a Galaxy phone

Samsung promised "more than a design refresh" for its new top-end Galaxy Buds - it added upgraded woofers for improved, dual-amped hi-fi sound, a new blade design, clearer call performance, and better noise cancellation....

source The Verge date 2026-03-15

The fast rise and epic fall of Clubhouse

In 2020 and 2021, the social media world seemed to be on the verge of complete change. A new app called TikTok was ascendant, bringing a whole new kind of vertical video to phones everywhere. And another app - not as pop...

source The Verge date 2026-03-15

Live-service games are a mess

This is The Stepback, a weekly newsletter breaking down one essential story from the tech world. For more on the slow-motion disaster of live-service games, follow Andrew Webster. The Stepback arrives in our subscribers'...

source The Verge date 2026-03-15

The $100,000 fee for H-1Bs is causing all sorts of problems

Last fall, President Donald Trump's executive order raising the fee for H-1B visas to $100,000 - like many of his immigration policies - led to near-immediate chaos. Thousands of workers who had flown overseas to renew t...

source The Verge date 2026-03-15

Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Turning expertise into opportunity for women in cybersecurity Speaker diversity in cybersecurity has been a talking point ...

source Help Net Security date 2026-03-15 entities 3

Trump administration is allegedly collecting $10 billion on the TikTok deal

In September, Donald Trump claimed that "the United States is getting a tremendous fee" for brokering the TikTok deal. Now sources tell the Wall Street Journal and the New York Times that fee is expected to be in the ran...

source The Verge date 2026-03-14

Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw

Microsoft has released an out-of-band (OOB) update to fix a security vulnerabilities affecting Windows 11 Enterprise devices that receive hotpatch updates instead of the regular Patch Tuesday cumulative updates. [...]

source Bleeping Computer date 2026-03-14 entities 1

The MacBook Neo is ‘the most repairable MacBook’ in years, according to iFixit

Apple’s new MacBook Neo isn’t just the most affordable MacBook — it’s also the company's most repairable laptop in “about fourteen years."

source TechCrunch date 2026-03-14

US Army announces contract with Anduril worth up to $20B

The Army described this as a single enterprise contract consolidating more than 120 separate "procurement actions."

source TechCrunch date 2026-03-14

Meta is reportedly laying off up to 20 percent of its staff

According to Reuters, Meta is looking to offset spending on AI and data centers with a massive round of layoffs. Sources familiar with the matter say the company could lay off as much as 20 percent of its staff, eliminat...

source The Verge date 2026-03-14

Honda is killing its EVs — and any chance of competing in the future

Honda's decision to kill its three EVs for the U.S. market will reverberate far beyond North America.

source TechCrunch date 2026-03-14

Meta reportedly considering layoffs that could affect 20% of the company

These layoffs could help Facebook's parent company offset its aggressive spending on AI infrastructure, as well as AI-related acquisitions and hiring.

source TechCrunch date 2026-03-14

OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw (formerly Clawdbot and Moltbot), an open-source and self-hosted auton...

source The Hacker News date 2026-03-14

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5:30 PM GMT on Thursday, March 19, 2026. I’m speaking at RSAC 2...

source Schneier on Security date 2026-03-14 entities 1

As people look for ways to make new friends, here are the apps promising to help

We've compiled a list of friendship apps, from friend discovery platforms like BFF to event-focused ones like Timeleft.

source TechCrunch date 2026-03-14

Hulu, Disney Plus, and the Pixel Watch 4 are among this week’s best deals

Happy Saturday, all! This week, we found a number of deals that should help you unwind and relax over the next few days (and beyond). If you’re planning to stream the Oscars on Sunday, there’s still time to take advantag...

source The Verge date 2026-03-14

Prediction markets want the Oscars to be your gateway drug to betting on everything

Though it was weird to see the Golden Globes partner with Polymarket for its most recent awards show, the collaboration wasn't shocking given the way that people have begun using prediction markets to gamble on basically...

source The Verge date 2026-03-14

MacBook Air M5 review: a small update for the ‘just right’ Mac

Not much has changed in the new MacBook Air for 2026: It now has the M5 chip, Wi-Fi 7, and faster storage starting at 512GB instead of 256GB. It's just as outstanding a computer as last year's model, even if it's a shame...

source The Verge date 2026-03-14 entities 1

AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code

The AppsFlyer Web SDK was temporarily hijacked this week with malicious code used to steal cryptocurrency in a supply-chain attack. [...]

source Bleeping Computer date 2026-03-14 entities 1

A Scavengers Reign artist explores contemplative sci-fi in new comics

You may recognize Jonathan Djob Nkondo's work from animated projects like the surreal sci-fi series Scavengers Reign or the recent Gorillaz short film The Mountain, The Moon Cave and The Sad God. But before that the Fren...

source The Verge date 2026-03-14

How to use the new ChatGPT app integrations, including DoorDash, Spotify, Uber, and others

Learn how to use Spotify, Canva, Figma, Expedia, and other apps directly in ChatGPT.

source TechCrunch date 2026-03-14

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it propagates through the Open VSX registry. "Instead of requiring every malicio...

source The Hacker News date 2026-03-14 entities 1

SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)

Introduction

source SANS Internet Storm Center date 2026-03-13

‘Not built right the first time’ — Musk’s xAI is starting over again, again

The AI lab is revamping its effort to build an AI coding tool, with two new executives joining from Cursor.

source TechCrunch date 2026-03-13

Lawyer behind AI psychosis cases warns of mass casualty risks

AI chatbots have been linked to suicides for years. Now one lawyer says they are showing up in mass casualty cases too, and the technology is moving faster than the safeguards.

source TechCrunch date 2026-03-13

Microsoft: Windows 11 users can't access C: drive on some Samsung PCs

Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are unable to launch applica...

source Bleeping Computer date 2026-03-13

Digg lays off staff and shuts down app as company retools

Digg laid off a significant number of staff and shut down its app, but says it's not giving up on the startup.

source TechCrunch date 2026-03-13

Nyne, founded by a father-son duo, gives AI agents the human context they’re missing

The data infrastructure startup raised $5.3 million in seed funding led by Wischoff Ventures and South Park Commons.

source TechCrunch date 2026-03-13

Friday Squid Blogging: Increased Squid Population in the Falklands

Some good news : squid stocks seem to be recovering in the waters off the Falkland Islands. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderatio...

source Schneier on Security date 2026-03-13 entities 1

FBI seeks victims of Steam games used to spread malware

The FBI is asking gamers who installed Steam titles containing malware to provide information as part of an ongoing investigation into eight malicious games uploaded to the gaming platform. [...]

source Bleeping Computer date 2026-03-13 entities 2

Facebook makes it easier for creators to report impersonators

Facebook is making it easier for creators to report impersonators while tightening rules around reposts and other unoriginal content.

source TechCrunch date 2026-03-13

Steven Spielberg says he’s ‘never used AI’ in any of his films

At SXSW, Steven Spielberg said AI has uses in many fields, but not when it comes to replacing creative people in film and TV writing.

source TechCrunch date 2026-03-13

The biggest AI stories of the year (so far)

The AI industry is constantly churning out news, like major acquisitions, indie developer successes, public outcry, and existentially dangerous contract negotiations.

source TechCrunch date 2026-03-13

Travis Kalanick launches a new company called Atoms focused on robotics

Kalanick's existing ghost kitchen company CloudKitchens will be rolled into Atoms, which also wants to get into mining and transport.

source TechCrunch date 2026-03-13

Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos

The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks.

source Dark Reading date 2026-03-13 entities 1

The Data Gap: Why Nonprofit Cyber Incidents Go Underreported

Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of sufficient data makes it difficult to grasp the entire picture.

source Dark Reading date 2026-03-13 entities 1

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42 is tracking the thr...

source The Hacker News date 2026-03-13 entities 3

Cyberattackers Don't Care About Good Causes

Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help.

source Dark Reading date 2026-03-13

Poland's nuclear research centre targeted by cyberattack

Poland's National Centre for Nuclear Research (NCBJ) says hackers targeted its IT infrastructure, but the attack was detected and blocked before causing any impact. [...]

source Bleeping Computer date 2026-03-13 entities 1

The wild six weeks for NanoClaw’s creator that led to a deal with Docker

Gavriel Cohen is living an open source developer's dream as his project has achieved acclaim and a partnership with Docker in a matter of weeks.

source TechCrunch date 2026-03-13

Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026

Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. "If you have chats that are impacted by this change, you will see instructions on how you can dow...

source The Hacker News date 2026-03-13 entities 1

Spotify will let you edit your Taste Profile to control your recommendations

When you edit your Taste Profile, you'll impact your personalized playlists like Discover Weekly, recommendations, and Wrapped.

source TechCrunch date 2026-03-13

Microsoft investigates classic Outlook sync and connection issues

​Microsoft is investigating several issues causing email synchronization and connection problems when using the classic Outlook desktop client. [...]

source Bleeping Computer date 2026-03-13

The $32B acquisition that one VC is calling the ‘Deal of the Decade’

According to Index Ventures Partner Shardul Shah, cybersecurity startup Wiz sits “at the center of three tailwinds: AI, cloud, and security spend.” Those tailwinds powered what just became the largest venture-backed acqu...

source TechCrunch date 2026-03-13 entities 2

Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep

A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses

source Infosecurity Magazine date 2026-03-13 entities 3

Will AI Save Consumers From Smartphone-Based Phishing Attacks?

Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.

source Dark Reading date 2026-03-13 entities 1

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency's ongoing efforts to dismantle criminal ne...

source The Hacker News date 2026-03-13 entities 4

Apple drops commission rates in China without a fuss

Apple dropped its App Store commission rates to 25% in China, and commissions on auto-renewed subscriptions down to 12%.

source TechCrunch date 2026-03-13

The FBI is investigating malware hidden inside games hosted on Steam

The FBI believes a series of video games published on Steam in the last two years were embedded with malware by the same hacker.

source TechCrunch date 2026-03-13 entities 1

From VMware to what’s next: Protecting data during hypervisor migration

Hypervisor migrations can introduce hidden risks that threaten data availability and recovery. Acronis explains why verified backups and cross-platform recovery are essential during VMware transitions. [...]

source Bleeping Computer date 2026-03-13

Peacock expands into AI-driven video, mobile-first live sports, and gaming

Peacock is betting on new AI-powered video experiences, vertical clips, and mobile games to help its growth.

source TechCrunch date 2026-03-13

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques. "The campaign redirects us...

source The Hacker News date 2026-03-13 entities 1

Police sinkholes 45,000 IP addresses in cybercrime crackdown

An international law enforcement action codenamed "Operation Synergia III" has sinkholed tens of thousands of IP addresses and seized servers linked to cybercrime operations worldwide. [...]

source Bleeping Computer date 2026-03-13 entities 1

Investigating a New Click-Fix Variant

Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on independent research and observations of th...

source The Hacker News date 2026-03-13 entities 1

Fake enterprise VPN sites used to steal company credentials

A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal VPN credentials from unsuspecting users. [...]

source Bleeping Computer date 2026-03-13 entities 1

Most Google Cloud Attacks Start With Bug Exploitation

Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.

source Dark Reading date 2026-03-13 entities 1

Real-Time Banking Trojan Strikes Brazil's Pix Users

The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.

source Dark Reading date 2026-03-13 entities 1

Accertify’s Attack State targets credential stuffing and ATO attacks

Accertify has announced the launch of Attack State, a new capability in its Account Protection solution designed to help organizations detect and respond to coordinated login attacks and other automated threats targeting...

source Help Net Security date 2026-03-13 entities 2

EU Parliament backs extension of CSAM detection rules until 2027

The European Parliament has voted to extend a temporary exemption to EU privacy legislation that allows online platforms to voluntarily detect child sexual abuse material (CSAM). The extension prolongs a derogation from ...

source Help Net Security date 2026-03-13 entities 2

Academia and the “AI Brain Drain”

In 2025, Google, Amazon, Microsoft and Meta collectively spent US$380 billion on building artificial-intelligence tools. That number is expected to surge still higher this year, to $650 billion, to fund the building of p...

source Schneier on Security date 2026-03-13

Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning

Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide

source Infosecurity Magazine date 2026-03-13 entities 1

Authorities dismantle SocksEscort proxy network behind millions in fraud

SocksEscort, a residential proxy network used to exploit thousands of compromised home routers worldwide and facilitate large-scale fraud that cost victims millions of dollars, has been disrupted in an international law ...

source Help Net Security date 2026-03-13 entities 4

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8

Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in the wild. The list of vulnerabilities is as follows - CVE-2026-390...

source The Hacker News date 2026-03-13 entities 1

BioCatch DeviceIQ helps banks spot risky devices before login

BioCatch has announced the launch of DeviceIQ, a comprehensive new device identification and intelligence product that transforms how financial institutions evaluate the trustworthiness of devices used for digital bankin...

source Help Net Security date 2026-03-12 entities 2

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited by unprivileged users to circumvent kernel protections, escalate to root, and u...

source The Hacker News date 2026-03-12 entities 1

Starbucks discloses data breach affecting hundreds of employees

Starbucks has disclosed a data breach affecting hundreds of employees after threat actors gained access to their Starbucks Partner Central accounts. [...]

source Bleeping Computer date 2026-03-12 entities 2

A React-based phishing page with credential exfiltration via EmailJS, (Fri, Mar 13th)

On Wednesday, a phishing message made its way into our handler inbox that contained a fairly typical low-quality lure, but turned out to be quite interesting in the end nonetheless. That is because the accompanying crede...

source SANS Internet Storm Center date 2026-03-12 entities 1

Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls

Red Access has announced firewall-native SSE, an agentless cloud layer that instantly upgrades any existing firewall with Security Service Edge (SSE), GenAI security, and browser-agnostic protection. Deployed directly on...

source Help Net Security date 2026-03-12 entities 1

Google fixes two new Chrome zero-days exploited in attacks

Google has released emergency security updates to patch two high-severity Chrome vulnerabilities exploited in zero-day attacks. [...]

source Bleeping Computer date 2026-03-12 entities 2

AI coding agents keep repeating decade-old security mistakes

Coding agents are now writing production features on real development teams, and a new report from DryRun Security shows that those agents introduce security vulnerabilities at a high rate across nearly every type of app...

source Help Net Security date 2026-03-12

Passwords, MFA, and why neither is enough

<p>Passwords weren’t enough, so we added MFA. Now MFA isn’t enough either. In this Help Net Security video, Karlo Zatylny, CTO/CISO at Portnox, walks through why each layer of identity security has failed and what comes ...

source Help Net Security date 2026-03-12 entities 1

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential routers worldwide into a botnet for committing large-scale fraud...

source The Hacker News date 2026-03-12 entities 3

New infosec products of the week: March 13, 2026

<p>Here’s a look at the most interesting products from the past week, featuring releases from Binary Defense, Mend.io, OPSWAT, Singulr AI, SOC Prime, Terra Security, and Vicarius. Singulr AI’s Agent Pulse delivers enforc...

source Help Net Security date 2026-03-12

Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if successfully exploited, could result in remote code execution. The vulnerabilities are as fol...

source The Hacker News date 2026-03-12 entities 2

ISC Stormcast For Friday, March 13th, 2026 https://isc.sans.edu/podcastdetail/9848, (Fri, Mar 13th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

source SANS Internet Storm Center date 2026-03-12

Why Post-Quantum Cryptography Can't Wait

Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.

source Dark Reading date 2026-03-12

Canadian retail giant Loblaw notifies customers of data breach

Still, out of an abundance of caution, Loblaw says it has automatically logged out all customers from their accounts. Account holders who need to access the company's digital services will have to log in again. [...]

source Bleeping Computer date 2026-03-12 entities 1

Iran MOIS Colludes With Criminals to Boost Cyberattacks

Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups.

source Dark Reading date 2026-03-12

England Hockey investigating ransomware data breach

England Hockey, the governing body for field hockey in England, is investigating a potential data breach after the AiLock ransomware gang listed it as a victim on its data leak site. [...]

source Bleeping Computer date 2026-03-12 entities 1

Commercial Spyware Opponents Fear US Policy Shifting

Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.

source Dark Reading date 2026-03-12 entities 1

AI-generated Slopoly malware used in Interlock ransomware attack

A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware attack. [...]

source Bleeping Computer date 2026-03-12 entities 3

iPhones and iPads Approved for NATO Classified Data

Apple announcement : …iPhone and iPad are the first and only consumer devices in compliance with the information assurance requirements of NATO nations. This enables iPhone and iPad to be used with classified information...

source Schneier on Security date 2026-03-12 entities 2

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that's written in Rust, marking a significant departure from other known Delphi-based malware families associated with t...

source The Hacker News date 2026-03-12 entities 1

Delinea's StrongDM Acquisition Highlights the Changing Role of PAM

StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments.

source Dark Reading date 2026-03-12

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a financially motivated threat actor named Hive0163. "Although still relative...

source The Hacker News date 2026-03-12 entities 3

Veeam warns of critical flaws exposing backup servers to RCE attacks

Data protection company Veeam Software has patched multiple flaws in its Backup & Replication solution, including four critical remote code execution (RCE) vulnerabilities. [...]

source Bleeping Computer date 2026-03-12 entities 1

Why Stryker's Outage Is a Disaster Recovery Wake-Up Call

The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for.

source Dark Reading date 2026-03-12

PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time

PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse

source Infosecurity Magazine date 2026-03-12 entities 1

Critical Zero-Click Flaw in n8n Allows Full Server Compromise

The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited

source Infosecurity Magazine date 2026-03-12 entities 1

€1 million online fraud scheme uncovered, three suspects arrested

<p>A criminal group suspected of running an online fraud scheme in Germany, which defrauded victims of around €1 million, has been dismantled through judicial cooperation coordinated by Eurojust. On 10 March, German and ...

source Help Net Security date 2026-03-12 entities 2

What Orgs Can Learn From Olympics, World Cup IR Plans

In this edition of "Reporters' Notebook," we discuss cyberattackers targeting the Milan-Cortina Winter Games, adding them to a long list of global sporting events in the crosshairs. Though the attack surface is grander, ...

source Dark Reading date 2026-03-12 entities 1

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted infrastructure, legitimate-looking authentication flow...

source The Hacker News date 2026-03-12 entities 1

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

Another Thursday, another pile of weird security stuff that somehow happened in just seven days. Some of it is clever. Some of it is lazy. A few bits fall into that uncomfortable category of “yeah… this is probably going...

source The Hacker News date 2026-03-12 entities 1

CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws

CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks

source Infosecurity Magazine date 2026-03-12 entities 1

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of five minutes, the outcom...

source The Hacker News date 2026-03-12 entities 3

Police Scotland Fined After Sharing Victim’s Phone Data

The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker

source Infosecurity Magazine date 2026-03-12

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit. The vulnerability, tracked as CVE-2023-43010, re...

source The Hacker News date 2026-03-12 entities 2

Iran Claims Massive Cyber-Attack on MedTech Firm Stryker

The pro-Iran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker

source Infosecurity Magazine date 2026-03-12 entities 2

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud. The Android malware range from tradition...

source The Hacker News date 2026-03-11 entities 3

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. T...

source The Hacker News date 2026-03-11 entities 1

ISC Stormcast For Thursday, March 12th, 2026 https://isc.sans.edu/podcastdetail/9846, (Thu, Mar 12th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

source SANS Internet Storm Center date 2026-03-11

When your IoT Device Logs in as Admin, It?s too Late! [Guest Diary], (Wed, Mar 11th)

[This is a Guest Diary by Adam Thorman, an ISC intern as part of the SANS.edu BACS program]

source SANS Internet Storm Center date 2026-03-11

A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It

The real frontline of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers.

source Dark Reading date 2026-03-11

INC Ransomware Group Holds Healthcare Hostage in Oceania

Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit.

source Dark Reading date 2026-03-11 entities 1

Xygeni GitHub Action Compromised Via Tag Poison

Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time.

source Dark Reading date 2026-03-11 entities 1

France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025

French small and medium businesses remained the organizations most targeted by ransomware in 2025

source Infosecurity Magazine date 2026-03-11 entities 2

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling prey to phishing and sca...

source The Hacker News date 2026-03-11 entities 2

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryk...

source Krebs on Security date 2026-03-11 entities 1

Infosecurity Europe Announces 2026 Keynote Line Up

Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats

source Infosecurity Magazine date 2026-03-11

Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio

LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data

source Infosecurity Magazine date 2026-03-11

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command execution. The vulnerabilitie...

source The Hacker News date 2026-03-11 entities 1

Chinese Nexus Actors Shift Focus to Qatar Amid Iranian Conflict

Two attacks on Qatari entities signal a shift in focus for China-backed actors and demonstrate how quickly they can pivot in response to geopolitical events.

source Dark Reading date 2026-03-11

Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign

Over 250 legitimate websites, including news outlets and a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers

source Infosecurity Magazine date 2026-03-11 entities 1

BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign

BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data

source Infosecurity Magazine date 2026-03-11 entities 1

Researchers Discover Major Security Gaps in LLM Guardrails

Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools

source Infosecurity Magazine date 2026-03-11 entities 2

Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown

Meta on Wednesday said it disabled over 150,000 accounts associated with scam centers in Southeast Asia as part of a coordinated effort in partnership with authorities from Thailand, the U.S., the U.K., Canada, Korea, Ja...

source The Hacker News date 2026-03-11 entities 1

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on affected systems. The vulnerabilities in question listed below - CVE-2019-17571 (CV...

source The Hacker News date 2026-03-11 entities 1

What Boards Must Demand in the Age of AI-Automated Exploitation

“You knew, and you could have acted. Why didn’t you?”  This is the question you do not want to be asked. And increasingly, it’s the question leaders are forced to answer after an incident. For years, many executive teams...

source The Hacker News date 2026-03-11 entities 1

Canada Needs Nationalized, Public AI

Canada has a choice to make about its artificial intelligence future. The Carney administration is investing $2-billion over five years in its Sovereign AI Compute Strategy . Will any value generated by “sovereign AI” be...

source Schneier on Security date 2026-03-11

Cyber-Attacks on UK Firms Increase at Four Times Global Rate

Check Point data shows attack volumes are growing much faster in the UK than worldwide

source Infosecurity Magazine date 2026-03-11 entities 1

Analyzing "Zombie Zip" Files (CVE-2026-0866), (Wed, Mar 11th)

A new vulnerability (CVE-2026-0866) has been published : Zombie Zip .

source SANS Internet Storm Center date 2026-03-11 entities 1

Microsoft Fixes Two Publicly Disclosed Zero-Days

March Patch Tuesday sees Microsoft release updates for 79 flaws

source Infosecurity Magazine date 2026-03-11 entities 1

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are rated Critical, and 76 ...

source The Hacker News date 2026-03-11 entities 1

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm package last year to completely breach a victim's cloud environment within a span of 72 hours. The attack started ...

source The Hacker News date 2026-03-10 entities 2

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors. The Rust packages, published to crates.io, are listed below ...

source The Hacker News date 2026-03-10 entities 2

Middle East Conflict Highlights Cloud Resilience Gaps

Data centers — used by both governments and militaries for operations — are now fair game, not just for cyberattacks, but for kinetic attacks as well.

source Dark Reading date 2026-03-10

ISC Stormcast For Wednesday, March 11th, 2026 https://isc.sans.edu/podcastdetail/9844, (Wed, Mar 11th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

source SANS Internet Storm Center date 2026-03-10

Microsoft Patches 83 CVEs in March Update

For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts.

source Dark Reading date 2026-03-10 entities 1

Microsoft Patch Tuesday, March 2026 Edition

Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-da...

source Krebs on Security date 2026-03-10 entities 2

'Overly Permissive' Salesforce Cloud Configs in the Crosshairs

Some customers have mishandled guest user configurations otherwise intended to allow third-party access to important — and sensitive — client data.

source Dark Reading date 2026-03-10 entities 1

Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit

After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools.

source Dark Reading date 2026-03-10 entities 2

Microsoft Patch Tuesday March 2026, (Tue, Mar 10th)

Microsoft today released patches for 93 vulnerabilities, including 9 vulnerabilities in Chromium affecting Microsoft Edge. 8 of the vulnerabilities are rated critical. 2 were disclosed prior to today but have not yet bee...

source SANS Internet Storm Center date 2026-03-10 entities 1

OpenAI's Promptfoo Deal Plugs Agentic AI Testing Gap

OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity

source Infosecurity Magazine date 2026-03-10

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks.  The activity involves the...

source The Hacker News date 2026-03-10 entities 2

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their own. But there is a p...

source The Hacker News date 2026-03-10

Only 24% Of organizations Test Identity Recovery Every Six Months

Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said

source Infosecurity Magazine date 2026-03-10

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

Cybersecurity researchers have discovered a new malware called KadNap that's primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic. The malware, first detected in the wild in August...

source The Hacker News date 2026-03-10 entities 1

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds

Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell

source Infosecurity Magazine date 2026-03-10 entities 1

Ericsson Breach Exposes Data of 15k Employees and Customers

Ericsson data breach affects 15k employees/customers after third-party service provider compromise

source Infosecurity Magazine date 2026-03-10 entities 1

'BlackSanta' EDR Killer Targets HR Workflows

A campaign by Russian-speaking cyberattackers hijacks workflows to deliver security-busting malware, allowing attackers to steal data without detection.

source Dark Reading date 2026-03-10 entities 1

Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials

Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets

source Infosecurity Magazine date 2026-03-10

BeatBanker: A dual‑mode Android Trojan

Kaspersky researchers identified a new Android Trojan dubbed BeatBanker targeting Brazil, posing as government apps and Google Play Store, and capable of both crypto mining and stealing banking data.

source Securelist - Kaspersky date 2026-03-10 entities 1

ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign

Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks

source Infosecurity Magazine date 2026-03-10

Jailbreaking the F-35 Fighter Jet

Countries around the world are becoming increasingly concerned about their dependencies on the US. If you’ve purchase US-made F-35 fighter jets, you are dependent on the US for software maintenance. The Dutch Defense Sec...

source Schneier on Security date 2026-03-10

ISC Stormcast For Tuesday, March 10th, 2026 https://isc.sans.edu/podcastdetail/9842, (Tue, Mar 10th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

source SANS Internet Storm Center date 2026-03-09

Weekly Update 494

Since starting HIBP a dozen and a bit years ago, I've loaded an average of one breach every 4.7 days. That's 959 of them to date, but last week it was five in only two days. That's a few weeks' worth of

source Troy Hunt - Have I Been Pwned date 2026-03-09 entities 1

White House Cyber Strategy Prioritizes Offense

In a seven-page strategy document, the Trump administration signaled a shift to preemption and deterrence to handling cyber threats.

source Dark Reading date 2026-03-09

'InstallFix' Attacks Spread Fake Claude Code Sites

A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.

source Dark Reading date 2026-03-09

Are We Ready for Auto Remediation With Agentic AI?

With the rapid innovations in AI, we are entering an exciting era of automated risk remediation. Learn about security team readiness to leverage agentic AI for threat and exposure management.

source Dark Reading date 2026-03-09 entities 1

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub

source Infosecurity Magazine date 2026-03-09 entities 1