A major cybersecurity breach hit Stryker, the international medical tech company, throwing operations into disarray across continents. Claiming responsibility is a hacktivist faction supportive of Palestine, said to have ties to Iranian networks. Outages spread quickly through digital infrastructure…
AI Actress Tilly Norwood’s Controversial Oscars Music Video Sparks Debate
Tilly Norwood, billed as the world’s first AI-generated actress, has released a new music video titled “Take The Lead” just ahead of the Oscars, promoting AI’s role in entertainment. Created by Particle6 Group’s Xicoia division under CEO Eline van…
IT Security News Hourly Summary 2026-03-22 18h : 2 posts
2 posts were published in the last hour 16:36 : AstraZeneca Data Breach – LAPSUS$ Group Allegedly Claims Access to Internal Data 16:7 : Oracle fixes critical RCE flaw CVE-2026-21992 in Identity Manager
AstraZeneca Data Breach – LAPSUS$ Group Allegedly Claims Access to Internal Data
The notorious hacking collective LAPSUS$ has resurfaced, allegedly claiming responsibility for a significant data breach involving the multinational pharmaceutical and biotechnology company AstraZeneca. The threat actors are currently attempting to sell a compressed 3GB internal data dump, signaling a potential…
Oracle fixes critical RCE flaw CVE-2026-21992 in Identity Manager
Oracle fixed a critical severity flaw, tracked as CVE-2026-21992, enabling unauthenticated remote code execution in Identity Manager. Oracle released security updates to address a critical vulnerability, tracked as CVE-2026-21992 (CVSS score of 9.8), affecting Identity Manager and Web Services Manager.…
U.S. CISA adds Apple, Laravel Livewire and Craft CMS flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple, Laravel Livewire and Craft CMS flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Laravel Livewire and Craft CMS flaws to its Known Exploited…
BSidesSLC 2025 – Faces In The Fog – Seth Law On Unconventional User Enumeration
Author, Creator & Presenter: Seth Law, Founder of Redpoint Security Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. The post BSidesSLC 2025 – Faces In The Fog –…
IT Security News Hourly Summary 2026-03-22 15h : 2 posts
2 posts were published in the last hour 14:4 : Large Scale Data Breach at Conduent Hits 25 Million Users Nationwide 14:4 : Ransomware Attack Hits South Africa’s Land Bank, Hackers Demand Bitcoin Payment
Large Scale Data Breach at Conduent Hits 25 Million Users Nationwide
A central component of public service delivery, Conduent is entrusted with the invisible yet indispensable machinery that keeps the system running from healthcare eligibility systems to benefits administration, and occupies a unique position at the intersection of government operations…
Ransomware Attack Hits South Africa’s Land Bank, Hackers Demand Bitcoin Payment
South Africa’s Finance Minister Enoch Godongwana has disclosed that the Land and Agricultural Development Bank of South Africa was targeted in a ransomware incident earlier this year. The cyberattack took place on January 12, according to official confirmation. Details…
FIRESIDE CHAT: In the AI age, your MFA, authentication apps can be compromised in minutes
The authentication layer that corporate America spent a decade building is now a liability. Listen to the podcast:The day MFA became the problem That’s the blunt assessment of Kevin Surace, chairman of Token, a Rochester, N.Y.-based security company … (more…)…
What Is Physical AI, and What Does It Mean for Government?
From Davos insights to state readiness, let‘s explore how robotics and sensors are moving artificial intelligence into the physical world. The post What Is Physical AI, and What Does It Mean for Government? appeared first on Security Boulevard. This article…
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 89
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter New Payload ransomware – malware analysis DRILLAPP: new backdoor targeting Ukrainian entities with possible links to Laundry Bear When…
Week in review: ScreenConnect servers open to attack, exploited Microsoft SharePoint flaw
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What smart factories keep getting wrong about cybersecurity In this Help Net Security interview, Packsize CSO Troy Rydman breaks down the biggest vulnerabilities in smart…
RSAC 2026 Innovation Sandbox | ZeroPath: From Alarm Accumulation to Executable Fixes
Company Profile ZeroPath is an AI-native application security startup founded in 2024, and its core products also use the eponymous brand ZeroPath. The company focuses on using AI to automatically discover, verify and fix code vulnerabilities, trying to break through…
Security Affairs newsletter Round 568 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. WorldLeaks…
Does your NHI system deliver essential value
Is Your Organization’s Non-Human Identity Strategy Robust Enough? What if the backbone of your organization’s cybersecurity strategy is more susceptible to breaches than you think? Where machine identities increasingly outnumber human ones, focusing on Non-Human Identities (NHIs) is critical. NHIs…
Is your Agentic AI optimized for latest threats
What Are Non-Human Identities (NHIs) and Why Are They Critical in Cybersecurity? How do we ensure the security of these interactions? The concept of Non-Human Identities (NHIs) offers a compelling solution. NHIs, an advanced concept in cybersecurity, are designed to…
How relieved are you with your secrets vaulting strategy
Are You Confident in Your Secrets Vaulting Strategy? The management of machine identities—what the industry terms Non-Human Identities (NHIs)—has become a linchpin in safeguarding cloud environments. When organizations increasingly transition to cloud-based architectures, ensuring the security of NHIs and their…
CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive
On March 20, 2026 at 20:45 UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were receiving unauthorized patch updates, all containing the same hidden malicious code. What they had caught was…
IT Security News Hourly Summary 2026-03-22 00h : 2 posts
2 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-03-21 22:11 : Software engineers, you’re measuring the wrong things. Here’s what actually matters.(Podcast)
IT Security News Daily Summary 2026-03-21
47 posts were published in the last hour 22:11 : Software engineers, you’re measuring the wrong things. Here’s what actually matters.(Podcast) 18:2 : WorldLeaks ransomware group breached the City of Los Angels 17:32 : Hackers Compromise Trivy Scanner to Inject…
Software engineers, you’re measuring the wrong things. Here’s what actually matters.(Podcast)
What are you doing is wrong! Most engineering teams are tracking effort and calling it progress. Story points, commit frequency, PR cycle time, items from a Definitions of Done implemented or respected — these are process metrics dressed up as…
WorldLeaks ransomware group breached the City of Los Angels
WorldLeaks group hit Los Angeles and its Metro system, forcing a shutdown, while two Bay Area cities declared emergencies after ransomware attacks. WorldLeaks group hit Los Angeles and its Metro, forcing a shutdown, while two Bay Area cities declared emergencies…