A novel attack technique that exploits a fundamental blind spot in AI web assistants the gap between what a browser renders for a user and what an AI tool actually reads from the underlying HTML. Using nothing more than a…
Glassworm Hits Popular React Native Packages With Credential-Stealing npm Malware
A coordinated supply chain attack struck the developer community on March 16, 2026, when a threat actor known as Glassworm backdoored two widely used React Native npm packages, turning them into silent credential and cryptocurrency stealers. The affected packages — react-native-country-select@0.3.91 and react-native-international-phone-number@0.11.8 —…
Google Warns Ransomware Actors Are Shifting Tactics as Profits Fall and Data Theft Rises
The ransomware threat landscape entered a new phase in 2025. Once a highly reliable criminal business model built on encrypting victim files and collecting ransom payments, it is now under significant financial pressure. Ransom payment rates have hit historic lows,…
ColorTokens Once Again Named a Leader and Outperformer in the 2026 GigaOm Radar for Microsegmentation
Microsegmentation has moved well beyond a narrow infrastructure conversation. Today, teams need to enforce policy across cloud workloads, data centers, user endpoints, containers, and OT and IoT environments without creating more operational friction than security value. That broader requirement is…
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
Cybersecurity firm Huntress has rolled out a pair of new products aimed at helping businesses shore up security weaknesses before attackers can exploit them, a shift from the reactive, detect-and-respond model that has long defined the industry. The company announced…
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries. In a report published Monday, BeyondTrust revealed that Amazon Bedrock AgentCore Code Interpreter’s sandbox…
From SAST to “Shift Everywhere”: Rethinking Code Security in 2026
Several structural shifts have changed how source code security is approached. Software teams now deploy continuously, build on cloud-native architectures, and often depend on third-party and open-source components. As a result, security vulnerabilities propagate faster and across wider blast radii. Security expectations…
6 Open-Source Vulnerability Scanners That Actually Work in 2026
Compare top open-source vulnerability scanners and their key features. The post 6 Open-Source Vulnerability Scanners That Actually Work in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: 6 Open-Source Vulnerability…
Surfshark vs NordVPN (2026): Which VPN Wins? Full Breakdown
NordVPN or Surfshark? Compare speed, security, price, streaming, unique features, and more in our detailed 2026 VPN review. Find your match. The post Surfshark vs NordVPN (2026): Which VPN Wins? Full Breakdown appeared first on eSecurity Planet. This article has…
CODESYS in Festo Automation Suite
View CSAF Summary 3. TECHNICAL DETAILS The following versions of CODESYS in Festo Automation Suite are affected: FESTO Software Festo Automation Suite (versions prior to 2.8.0.138) installed with CODESYS Software CODESYS Development System (3.0) vers:all/* FESTO Software Festo Automation Suite…
Schneider Electric SCADAPack and RemoteConnect
View CSAF Summary Schneider Electric is aware of a vulnerability in its SCADAPack™ x70 RTU products. The SCADAPack™ 47xi, SCADAPack™ 47x and SCADAPack™ 57x product are Remote Terminal Units that provide communication capabilities for remote monitoring and control. Failure to…
Schneider Electric EcoStruxure Data Center Expert
View CSAF Summary Schneider Electric is aware of a hard-coded credentials vulnerability in its EcoStruxure IT Data Center Expert (DCE) product that requires administrator credentials and enabling a feature (SOCKS Proxy) that is off by default. The EcoStruxure IT Data…
Siemens SICAM SIAPP SDK
View CSAF Summary The SICAM SIAPP SDK contains multiple vulnerabilities that could allow an attacker to disrupt the customer-developed SIAPP or its simulation environment. Potential impacts include denial of service within the SIAPP, corruption of SIAPP data, or exploit the…
Attackers Use SEO Poisoning and Signed Trojans to Steal VPN Credentials
A financially motivated threat actor known as Storm-2561 has been running a credential theft campaign since May 2025, manipulating search engine rankings to push fake VPN software toward enterprise users. The campaign targets employees searching for tools such as Pulse…
To Beat Alert Overload, Stop Wasting Time on False Positives
At first glance, false positives in cybersecurity seem almost comforting. An alert fires. A SOC analyst investigates. It turns out to be nothing malicious. Case closed. Systems are safe, detection works, and the organization moves on. In theory, this looks like a healthy process. Better safe than sorry, right? But every false…
AWS Bedrock AgentCore Sandbox Bypass Allows Covert C2 Channels and Data Exfiltration
A significant security flaw in AWS Bedrock AgentCore Code Interpreter’s “Sandbox” network mode, a feature advertised by AWS as providing complete network isolation that allows outbound DNS queries, enabling threat actors to establish covert command-and-control (C2) channels and exfiltrate sensitive…
How to Shop Online Safely While Finding Better Deals
With the rapid growth of e-commerce and mobile payments, online shopping has become an essential part of everyday life for many people. Consumers now purchase everything from electronics and household products to digital services through online platforms. While this convenience…
IT Security News Hourly Summary 2026-03-17 18h : 13 posts
13 posts were published in the last hour 16:34 : China Probe: How a Fake Fitness Tracker Became an AI ‘Top Pick’ 16:34 : Fake Pudgy World site steals your crypto passwords 16:34 : EU sanctions Iranian cyber front over…
China Probe: How a Fake Fitness Tracker Became an AI ‘Top Pick’
A fake fitness tracker fooled AI chatbots in China, exposing risks of AI poisoning and prompting calls for regulation. The post China Probe: How a Fake Fitness Tracker Became an AI ‘Top Pick’ appeared first on TechRepublic. This article has…
Fake Pudgy World site steals your crypto passwords
The phishing site it is not affiliated with Igloo Inc or Pudgy Penguins, but is designed to lure fans and steal their crypto passwords. This article has been indexed from Malwarebytes Read the original article: Fake Pudgy World site steals…
EU sanctions Iranian cyber front over election meddling, Charlie Hebdo breach
State-sponsored attackers joined by Chinese snoops and hackers-for-hire in latest round of economic penalties The Council of the European Union sanctioned Emennet Pasargad on Monday, a company used as a front for a series of Iranian cyberattacks.… This article has…
Best Cloud Firewall Vendors for 2026
Cloud adoption didn’t simplify network security. It multiplied it. Today’s enterprises operate across data centers, hybrid environments, and multiple public clouds. Security teams now manage AWS security groups, Azure Firewall… The post Best Cloud Firewall Vendors for 2026 appeared first…
Android OS-Level Attack Bypasses Mobile Payment Security
Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass This article has been indexed from www.infosecurity-magazine.com Read the original article: Android OS-Level Attack Bypasses Mobile Payment Security
National cyber director expands on Trump administration’s vision for AI security, industry collaboration
The government wants AI firms to embrace security, not see it as a barrier. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: National cyber director expands on Trump administration’s vision for AI security,…