The European Commission has revealed details of a data breach impacting its AWS infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: European Commission Confirms Cloud Data Breach
DJI Launches First 360-Degree Drone
DJI’s first drone with panoramic camera, Avata 360, arrives as direct competitor to Insta360’s Antigravity A1, released last year This article has been indexed from Silicon UK Read the original article: DJI Launches First 360-Degree Drone
Critical Grafana Flaws Allow Attackers to Achieve Remote Code Execution
Grafana Labs has rolled out critical security updates to address two severe vulnerabilities impacting its widely used analytics and interactive visualization platform. The most severe flaw could allow threat actors to achieve full Remote Code Execution (RCE) and establish an…
10 Best Data Loss Prevention Software in 2026
Data loss prevention (DLP) refers to technology and techniques for detecting and preventing unauthorized access, use, disclosure, or destruction of sensitive data. DLP solutions are designed to monitor and control access to sensitive information by identifying, classifying, and protecting sensitive…
Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave
Russia-linked TA446 is using the DarkSword iOS exploit kit in targeted phishing campaigns to compromise iPhone users. Russia-linked APT group TA446 (aka SEABORGIUM, ColdRiver, Callisto, and Star Blizzard) is using the DarkSword exploit kit in targeted spear-phishing campaigns against iOS…
Southampton School Closed For Days Following Hack
School in Southampton closes for four days after ransomware disables systems, amid rise in damaging hacks on organisations This article has been indexed from Silicon UK Read the original article: Southampton School Closed For Days Following Hack
Microsoft Releases Key WinRE and Setup Updates to Prepare for 2026 Secure Boot Changes
Microsoft has rolled out a critical Setup Dynamic Update, designated as KB5081494, for Windows 11 versions 24H2 and 25H2. Released on March 26, 2026, this patch introduces essential improvements to Windows setup binaries. The core objective of this release is…
Security contractor blew the whistle on support crew’s viral indifference
Career-limiting stupidity and rudeness exposed, with terminal consequences Who, Me? The week before Easter may be a short one for many in the Reg-reading world, but that won’t stop us from opening it with a fresh installment of Who, Me?…
VoidLink Malware Framework Shows that AI-assisted Malware is Not Experimental Anymore
For years, cybersecurity professionals debated whether AI could truly be weaponized to build dangerous malware at scale. That debate is now settled. VoidLink, a Linux-based malware framework discovered in early 2026, has crossed a threshold the security community long feared…
A week in security (March 23 – March 29)
A list of topics we covered in the week of March 23 to March 29 of 2026 This article has been indexed from Malwarebytes Read the original article: A week in security (March 23 – March 29)
F5 BIG-IP DoS Flaw Upgraded to Critical RCE, Now Exploited in the Wild
Initially disclosed as a high-severity denial-of-service (DoS), the bug was reclassified as a critical RCE issue. The post F5 BIG-IP DoS Flaw Upgraded to Critical RCE, Now Exploited in the Wild appeared first on SecurityWeek. This article has been indexed…
The EU CRA – Treating Cybersecurity as Product Liability
The EU’s Cyber Resilience Act (Regulation 2024/2847) shifts cybersecurity responsibility upstream. Explore the March 2026 guidance on secure-by-design requirements, software bills of materials (SBOM), and the impact on U.S. manufacturers. The post The EU CRA – Treating Cybersecurity as Product…
SystemRescue 13 updates its kernel to Linux 6.18 LTS, adds new recovery tools
Bootable Linux recovery environments occupy a specific niche in the systems administration and incident response toolkit. SystemRescue, an Arch-based live distribution built for repairing unbootable systems and recovering data from damaged drives, has shipped version 13.00 with a new long-term…
Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign
Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a “complex and well-resourced operation.” The campaigns have led to the deployment of various malware families, including…
FBI email theft, Lloyds Bank glitch, API keys running loose
FBI confirms theft of director’s personal emails Lloyds customer data exposed in IT glitch Hundreds of valid API keys discovered on the Web Get the show notes here: https://cisoseries.com/cybersecurity-news-fbi-email-theft-lloyds-bank-glitch-api-keys-running-loose/ Huge thanks to our sponsor, ThreatLocker Most breaches don’t start with…
New widespread EvilTokens kit: device code phishing as-a-service – Part 1
This post was originally distributed as a private FLINT report to our customers on 25 March 2026. Introduction In March 2026, through our monitoring of phishing-focused cybercrime communities, Sekoia’s Threat Detection & Research (TDR) team uncovered EvilTokens, a new turnkey…
Co-Op Chief Steps Down As Hack Leads To £125m Loss
Retail group Co-op sees £125m annual loss after damaging cyber-attack shuts down systems, leads to empty shelves, loss of customer data This article has been indexed from Silicon UK Read the original article: Co-Op Chief Steps Down As Hack Leads…
CanisterWorm Targets Docker, Kubernetes, and Redis to Steal Secrets
A financially motivated cybercrime group known as TeamPCP is actively exploiting poorly secured cloud environments using a self-propagating malware called “CanisterWorm.” The campaign targets exposed Docker APIs, Kubernetes clusters, Redis servers, and known vulnerabilities like React2Shell to gain unauthorized access,…
IT Security News Hourly Summary 2026-03-30 09h : 4 posts
4 posts were published in the last hour 6:7 : Hackers Probe Citrix NetScaler Systems Ahead of Suspected CVE-2026-3055 Exploitation 6:7 : 10 Best Log Monitoring Tools in 2026 6:7 : 10 Best Spam Filter Tools 2026 6:7 : Why risk…
Hackers Probe Citrix NetScaler Systems Ahead of Suspected CVE-2026-3055 Exploitation
Cybersecurity researchers are warning organizations about imminent cyberattacks targeting a newly disclosed critical vulnerability in Citrix NetScaler ADC and Gateway appliances. Threat intelligence firms watchTowr and Defused Cyber have uncovered active reconnaissance campaigns targeting CVE-2026-3055, a severe flaw that allows…
10 Best Log Monitoring Tools in 2026
As enterprises adopt more cloud-native technologies, containers, and microservices-based architectures, log monitoring and management are now critical. According to many market research assessments, the global log management industry is anticipated to increase from $1.9 billion in 2020 to $4.1 billion…
10 Best Spam Filter Tools 2026
Spam filter tools use advanced algorithms and machine learning techniques to detect and block unwanted email messages. They analyze email content, sender reputation, and patterns to effectively identify and filter out spam, ensuring inboxes remain clutter-free. These tools offer customizable…
Why risk alone doesn’t get you to yes
I have been in security rooms for years, from military operations centers to corporate boardrooms. In all those years I can tell you that the hardest mission that most security leaders will face is not identifying a threat, but getting…
Anthropic’s Latest AI Test Pressures Cybersecurity Stocks Lower
Major cybersecurity stocks took a steep dive on Friday after news broke that Anthropic is testing a highly capable new artificial intelligence model. Codenamed “Mythos” under the broader “Capybara” testing tier, this new AI possesses advanced capabilities for discovering complex…