A high-severity Remote Command Execution (RCE) vulnerability has been discovered in Splunk Enterprise and Splunk Cloud Platform, exposing systems to severe security risks. Tracked officially as CVE-2026-20163 with a CVSS score of 8.0, this critical flaw allows malicious actors to…
Chrome Security Update – Patch for 29 Vulnerabilities that Allow Remote Code Execution
Google has officially released Chrome version 146 to the stable channel, delivering crucial security updates for Windows, Mac, and Linux users. Rolling out over the coming days, Chrome 146.0.7680.71 for Linux and 146.0.7680.71/72 for Windows and Mac addresses 29 security…
Meta apps offer new scam protection, Google’s Wiz acquisition finalized, China curbs state-run OpenClaw use
Meta apps offer new scam protection Google’s Wiz acquisition finalized China curbs state-run OpenClaw use Get links to all the stories in our show notes: Huge thanks to our sponsor, Dropzone AI Here is something worth asking any AI security…
February 2026 Cyber Attacks Statistics
After the cyber attacks timelines, it’s time to publish the statistics for February 2026 where I collected and analyzed 176 events. In February 2026, Cyber Crime continued to lead the Motivations chart with 62%. This article has been indexed from…
Stop fixing OT security with IT thinking
In this Help Net Security interview, Ejona Preçi, Group CISO at Lindal Group, discusses the specific cybersecurity challenges in manufacturing environments. The conversation covers why standard IT security practices break down on shop floors, where PLCs and decade-old firmware were…
Iran‑Linked Hackers Tap Criminal Ecosystem to Bolster State Cyber Ops
Iran-linked cyber actors are increasingly working with the broader cybercrime ecosystem, using criminal tools, infrastructure, and business models to support state-backed operations and hide their involvement. For years, Iranian intelligence services have relied on criminal intermediaries in the physical world…
Cisco IOS XR Vulnerability Exposes Systems to Root Command Execution by Attackers
Cisco has issued high-severity software updates to address two high-severity privilege escalation vulnerabilities in its IOS XR Software. Network administrators must take immediate action, as these security flaws could allow an authenticated, local attacker to execute arbitrary commands as the…
Chrome Security Update – Patch for 29 Vulnerabilities that Allows Remote Code Execution
Google has officially released Chrome version 146 to the stable channel, delivering crucial security updates for Windows, Mac, and Linux users. Rolling out over the coming days, Chrome 146.0.7680.71 for Linux and 146.0.7680.71/72 for Windows and Mac addresses 29 security…
Agentic attack chains advance as infostealers flood criminal markets
Cybercriminals spent much of 2025 automating their operations, shifting from one-off attacks to systems that can run entire intrusion cycles with minimal human input. Data collected from criminal forums, illicit marketplaces, and underground chat services shows a threat environment where…
Stryker Faces Cyber Attack as Hackers Report System Breach and Device Destruction
On March 11, 2026, the global medical technology giant Stryker suffered a devastating cyberattack that brought its worldwide IT operations to a sudden halt. Iranian-linked threat actors breached the company’s network. They deployed highly destructive wiper malware designed to permanently…
SafeNet Trusted Access is Now Available on Google Cloud Marketplace
SafeNet Trusted Access is Now Available on Google Cloud Marketplace madhav Thu, 03/12/2026 – 05:10 We’re excited to share that Thales SafeNet Trusted Access, the industry’s leading passwordless authentication and access management solution is now available on Google Cloud Marketplace.…
Google Finalizes $32 Billion Deal to Acquire Wiz, Strengthening Cloud Security
Google Cloud has officially completed its acquisition of cloud security leader Wiz, marking a significant consolidation in the cybersecurity landscape. Operating under its retained brand within Google Cloud, Wiz will integrate its code-to-cloud security platform with Google’s existing enterprise security…
Meta Unveils New Anti-Scam Tools for WhatsApp, Facebook, and Messenger
Meta has rolled out a new wave of anti‑scam protections across WhatsApp, Facebook, and Messenger, combining AI‑driven detection, stricter advertiser controls, and public awareness campaigns to tackle fast‑evolving online fraud at scale. The new tools are designed to warn users…
Chrome Update Addresses 29 Vulnerabilities, Mitigating Remote Code Execution Threats
Google has officially rolled out a crucial update for its Chrome browser, promoting version 146 to the stable channel for Windows, Mac, and Linux users. Many of these flaws involve deep-seated memory corruption issues that, if left unpatched, could allow…
KadNap Malware Compromises Over 14,000 Edge Devices to Operate Hidden Proxy Botnet
Cybersecurity researchers have identified a previously undocumented malware strain called KadNap that is primarily infecting Asus routers and other internet-facing networking devices. The attackers are using these compromised systems to form a botnet that routes malicious traffic through residential…
Wireless vulnerabilities are doubling every few years
Wireless vulnerabilities are being disclosed at a rate that has no precedent in the fifteen-year history of systematic tracking. In 2025, researchers published 937 new wireless-related CVEs, an average of 2.5 per day, according to a threat report from Bastille…
Does Anthropic deserve the trust of the cybersecurity community?
The cybersecurity industry runs on trust. The belief that when a vendor says they will behave a certain way, they will, that critical CVEs are in fact critical, or when companies say they’re GDPR compliant, they really are. But earning…
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a…
Bell Ambulance data breach impacted over 238,000 people
Bell Ambulance confirms a February 2025 breach affecting 238,000 people, exposing personal, financial, and health information. Nearly 238,000 individuals are impacted by a February 2025 Bell Ambulance data breach. Bell Ambulance is a U.S.-based emergency medical services provider offering ambulance…
IT Security News Hourly Summary 2026-03-12 06h : 1 posts
1 posts were published in the last hour 4:34 : Iranian Hackers Attack U.S. Company Stryker in Escalation of Cyber War
Iranian Hackers Attack U.S. Company Stryker in Escalation of Cyber War
Iranian nation-state group Handala claims it attacked U.S. medical tech giant Stryker, erasing the data from 200,000 corporate servers and mobile devices and stealing 50 TB of data in retaliation for a missile strike on the first day of the…
Google Completes Acquisition of Wiz in Historic $32 Billion Deal
Google has officially closed its $32 billion all-cash acquisition of Wiz, the Israeli cloud and AI security platform, marking the largest deal in Google’s history and a landmark moment for the global cybersecurity industry. The Wiz team will join Google…
IT Security News Hourly Summary 2026-03-12 03h : 4 posts
4 posts were published in the last hour 2:4 : ISC Stormcast For Thursday, March 12th, 2026 https://isc.sans.edu/podcastdetail/9846, (Thu, Mar 12th) 2:4 : China’s CERT warns OpenClaw can inflict nasty wounds 1:34 : When your IoT Device Logs in as…
ISC Stormcast For Thursday, March 12th, 2026 https://isc.sans.edu/podcastdetail/9846, (Thu, Mar 12th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Thursday, March 12th, 2026…