Feeds last updated @: UTC - 18:45 - 10/03/2026
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Read more of this story at Slashdot.
Cyber baddies quietly compromised legitimate WordPress websites, including the campaign site of a US Senate candidate, turning them into launchpads for a global infostealer operation....
https://go.theregister.com/feed/www.theregister.com/2026/03/10/crooks_hijack_wordpress_sites/
A Russian-speaking cyber criminal is targeting corporate HR teams with fake CVs that quietly install malware which can disable security tools before stealing data from infected machines....
https://go.theregister.com/feed/www.theregister.com/2026/03/10/malware_targeting_hr/
A voice-phishing scam targeting one of Ericsson's service providers has exposed the personal data of more than 15,000 individuals after attackers sweet-talked an employee into handing over access....
Opinion The hacker mind is a curious way to be. To have it means to embody endless analytical curiosity, an awareness of any given rule set as just one system among many, and an ability to see any system in ways that its creators never expected. Combine this with a drive to find the bad and make things better, and you become one of the fundamental forces of the technological universe....
https://go.theregister.com/feed/www.theregister.com/2026/03/10/democratizing_security_opinion/
Polish police have referred seven suspected juvenile cybercriminals to family court over an alleged scheme to flog DDoS kits online....
https://go.theregister.com/feed/www.theregister.com/2026/03/10/poland_ddos_teens_bust/
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 15
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 14
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 11
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://hackread.com/china-hackers-qatar-backdoor-fake-war-news/
https://hackread.com/rome-ai-agent-cryptomining-without-instructions/
https://hackread.com/fake-linkedin-interview-lazarus-hackers-allsecure-ceo/
https://hackread.com/dutch-intel-russia-hackers-hijack-signal-whatsapp-attacks/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23660
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23664
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23667
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23668
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0615
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0427
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0654
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0653
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0652
https://thehackernews.com/2026/03/how-to-stop-ai-data-leaks-webinar-guide.html
https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html
https://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.html
https://thehackernews.com/2026/03/new-leakylooker-flaws-in-google-looker.html
https://thehackernews.com/2026/03/the-zero-day-scramble-is-avoidable.html
A fake Gemini-style chatbot is pushing a bogus Google Coin presale, using Google branding and scripted AI replies to lure victims into crypto payments.
The post Fake Gemini AI Chatbot Promotes ‘Google Coin’ in New Crypto Scam appeared first on TechRepublic.
https://www.techrepublic.com/article/news-fake-google-coin-scam-ai-chatbot-gemini/
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows and macOS systems.
The post Fake Claude Code Spreads Malware to Windows, macOS Users appeared first on TechRepublic.
https://www.techrepublic.com/article/news-fake-claude-code-install-pages-malware-windows-macos/
Veeam’s Agent Commander turns backup into an AI-era command center, giving enterprises the guardrails, visibility, and precision “undo” they need to safely scale autonomous agents.
The post Veeam’s ‘Agent Commander’: Bringing Guardrails and Resilience to the Wild West of AI appeared first on TechRepublic.
https://www.techrepublic.com/article/news-veeam-agent-commander-ai-resilience/
The FBI is investigating suspicious cyber activity in a system used to process surveillance and wiretap warrants, raising concerns about security risks to sensitive data.
The post FBI Investigates Suspicious Activity in Surveillance Platform appeared first on TechRepublic.
LexisNexis confirmed a data breach after hackers leaked stolen files, with attackers claiming they exploited the React2Shell vulnerability.
The post LexisNexis Hack Exposes 3.9M Records Through Unpatched React Vulnerability appeared first on TechRepublic.
https://www.techrepublic.com/article/news-lexisnexis-breach-3-9m-records-react-vulnerability/
For B2B SaaS companies, Zero Trust isn't an optional enterprise security concept. It's what enterprise buyers are demanding, what audit frameworks require, and increasingly what separates companies that close deals from those that don't.
The post Zero Trust for B2B SaaS: What Every Founder and CTO Needs to Know appeared first on Security Boulevard.
OpenAI has snapped up Promptfoo, a specialized artificial intelligence (AI) security startup, to bolster the safety of autonomous digital workers and convince enterprise clients that AI co-workers are ready for high-stakes business environments. OpenAI did not disclose financial terms of the transaction. PitchBook data indicates Promptfoo was valued at $119 million following a $22 million..
The post OpenAI Acquires Security Startup Promptfoo to Fortify AI Agents appeared first on Security Boulevard.
Managed service providers (MSPs) bridge the gap between what the cloud makes possible and what most organizations can realistically run, secure, and scale with their current teams. MSPs turn AWS capabilities into reliable services that drive customer value instead of sitting unused on a roadmap.
The post How MSPs Bridge the Gap Between Cloud Potential and Day‐to‐Day Reality appeared first on Security Boulevard.
Author, Creator & Presenter: Lea Kissner, LinkedIn
Our thanks to USENIX Security '25 (Enigma Track) (USENIX '25 for publishing their Creators, Authors and Presenter’s tremendous USENIX Security '25 (Enigma Track) content on the Organizations' YouTube Channel.
The post USENIX Security ’25 (Enigma Track) – Security Theater Is Canceled: Time For A Real Show appeared first on Security Boulevard.
Scammers are impersonating local municipal officials around the country with seemingly legitimate phishing messages demanding payment for permits. The bad actors grab publicly available information and use them in their emails to fool their targets.
The post Phishing Scammers Impersonating City, County Officials, Demanding Payment: FBI appeared first on Security Boulevard.
https://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/
https://krebsonsecurity.com/2026/02/who-is-the-kimwolf-botmaster-dort/
https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/
https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/
https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition/
Since starting HIBP a dozen and a bit years ago, I've loaded an average of one breach every 4.7 days. That's 959 of them to date, but last week it was five in only two days. That's a few weeks' worth of
The Odido breach leaks were towards the beginning during this week's update. I recorded it the day after the second dump of data had hit, with a third dump coming a few hours later, and a final dump of everything the day after that. From what I hear,
The recurring theme this week seems to be around the gap between breaches happening and individual victims finding out about them. It's tempting to blame this on the corporate victim of the breach (the hacked company), but they're simultaneously dealing with a criminal intrusion, a ransom
Well, the ESP32 Bluetooth bridge experiment was a complete failure. Not the radios themselves, they're actually pretty cool, but there's just no way I could get the Yale locks to be reliably operated by them. At a guess, BLE is a bit too passive to detect
A big "thank you" to everyone who helped me troubleshoot the problem with my "Print Screen" button on the new PC. Try as we all might, none of us could figure out why it refused to bind to SnagIt and instead insisted on dumping the entire
Countries around the world are becoming increasingly concerned about their dependencies on the US. If you’ve purchase US-made F-35 fighter jets, you are dependent on the US for software maintenance.
The Dutch Defense Secretary recently said that he could jailbreak the planes to accept third-party software.
https://www.schneier.com/blog/archives/2026/03/jailbreaking-the-f-35-fighter-jet.html
It’s called AirSnitch:
Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service Set Identifiers). This cross-layer identity desynchronization is the key driver of AirSnitch attacks.
The most powerful such attack is a full, bidirectional machine-in-the-middle (MitM) attack, meaning the attacker can view and modify data before it makes its way to the intended recipient. The attacker can be on the same SSID, a separate one, or even a separate network segment tied to the same AP. It works against small Wi-Fi networks in both homes and offices and large networks in enterprises...
https://www.schneier.com/blog/archives/2026/03/new-attack-against-wi-fi.html
This is a very weird story about how squid stayed on the menu of Byzantine monks by falling between the cracks of dietary rules.
At Constantinople’s Monastery of Stoudios, the kitchen didn’t answer to appetite.
It answered to the “typikon”: a manual for ensuring that nothing unexpected happened at mealtimes. Meat: forbidden. Dairy: forbidden. Eggs: forbidden. Fish: feast-day only. Oil: regulated. But squid?
Squid had eight arms, no bones, and a gift for changing color. Nobody had bothered writing a regulation for that. This wasn’t a loophole born of legal creativity but an oversight rooted in taxonomic confusion. Medieval monks, confronted with a creature that was neither fish nor fowl, gave up and let it pass...
OpenAI is in and Anthropic is out as a supplier of AI technology for the US defense department. This news caps a week of bluster by the highest officials in the US government towards some of the wealthiest titans of the big tech industry, and the overhanging specter of the existential risks posed by a new technology powerful enough that the Pentagon claims it is essential to national security. At issue is Anthropic’s insistence that the US Department of Defense (DoD) could not use its models to facilitate “mass surveillance” or “fully autonomous weapons,” provisions the defense secretary Pete Hegseth ...
https://www.schneier.com/blog/archives/2026/03/anthropic-and-the-pentagon.html
An unknown hacker used Anthropic’s LLM to hack the Mexican government:
The unknown Claude user wrote Spanish-language prompts for the chatbot to act as an elite hacker, finding vulnerabilities in government networks, writing computer scripts to exploit them and determining ways to automate data theft, Israeli cybersecurity startup Gambit Security said in research published Wednesday.
[...]
Claude initially warned the unknown user of malicious intent during their conversation about the Mexican government, but eventually complied with the attacker’s requests and executed thousands of commands on government computer networks, the researchers said...
https://www.schneier.com/blog/archives/2026/03/claude-used-to-hack-mexican-government.html
Upgrade to Sophos Firewall v22 today.
Categories: Products & Services
Tags: Firewall, v22, network
https://www.sophos.com/en-us/blog/optimize-your-sophos-firewall-security
Rising tensions have sparked an increase in regional hacktivist activity, but impact has been minimal
Categories: Threat Research
Tags: hacktivism, Iran, israel, Operation Epic Fury
Insights and recommended defensive measures from Sophos X-Ops Counter Threat Unit
Categories: Security Operations
Tags: Sophos CTU, Iran, Operation Epic Fury
Categories: Threat Research
Tags: advisory, vulnerability, SD-WAN
We’re excited to announce the highly anticipated release of Sophos Workspace Protection has arrived.
Categories: Products & Services
Tags: Workspace
https://www.sophos.com/en-us/blog/sophos-workspace-protection-is-now-available