Autonomous AI agents running on developer workstations execute shell commands, fetch URLs, and write files with little or no inspection of what they are doing. Open-source project Sage inserts an interception layer between an AI agent and those operations, checking…
Turning expertise into opportunity for women in cybersecurity
Speaker diversity in cybersecurity has been a talking point for over a decade, with panels, pledges, and dedicated conference tracks failing to produce change. Stages still skew heavily male, even as women represent millions of qualified professionals in the field.…
Transparent Tribe’s ‘Vibeware’ Move Points to AI-Made Malware at Scale
Transparent Tribe (APT36) is moving from traditional, off‑the‑shelf tools to an AI-assisted malware model researchers now call “vibeware,” signaling how large language models are starting to industrialize mediocre but relentless attacks at scale. In its latest campaigns against Indian government…
Critical ExifTool Vulnerability Allows Malicious Images to Execute Code on macOS
Many users believe macOS is inherently resistant to malware, but a newly discovered vulnerability proves otherwise. Kaspersky’s Global Research and Analysis Team (GReAT) recently uncovered a critical flaw, tracked as CVE-2026-3102, within ExifTool. ExifTool is a widely popular open-source application…
Product Showcase: Fing Desktop puts network visibility on your screen
Phones, laptops, smart TVs, cameras, and smart home equipment all use the same network. Knowing what’s connected helps users manage performance and security. Fing Desktop provides tools that identify devices, test connectivity, and analyze network activity. Creating an account is…
WiFi Signals Can Track Human Activity Through Walls by Mapping Body Keypoints
In late February 2026, an open-source project named RuView (formerly WiFi DensePose) surged to the top of GitHub trending lists. This edge AI system proves that everyday WiFi signals can track human movement, estimate body poses, and monitor vital signs…
Submarine cables move to the center of critical infrastructure security debate
The cables running along the ocean floor carry the overwhelming majority of the world’s cross-border data traffic, and for most of their operational history they have attracted little strategic attention. That is changing. A new sector report from Capacity Insights…
CISA Alerts Users to Actively Exploited Vulnerabilities Impacting macOS and iOS
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding three actively exploited vulnerabilities affecting multiple Apple platforms. On March 5, 2026, CISA added these security flaws to its Known Exploited Vulnerabilities (KEV) catalog, requiring immediate attention…
Microsoft: Fake AI Extensions Breached Chat Histories in 20,000+ Enterprise Tenants
Microsoft has issued an alert after uncovering a wave of malicious Chromium-based browser extensions masquerading as legitimate AI assistant tools. The extensions, available on the Chrome Web Store and compatible with both Google Chrome and Microsoft Edge, secretly collected private…
Ring’s Jamie Siminoff has been trying to calm privacy fears since the Super Bowl, but his answers may not help
The facial recognition question is where things get more tangled. This article has been indexed from Security News | TechCrunch Read the original article: Ring’s Jamie Siminoff has been trying to calm privacy fears since the Super Bowl, but his…
Zero Tolerance for Malicious Intrusions—NSFOCUS’s Full-Chain WEB Security Protection System
As regional military conflicts escalate, cyberspace has become a critical battleground, with core WEB application systems frequently targeted by adversaries. Attackers tamper with application content and inject anti-social or anti-government rhetoric, disrupting cyberspace order and inciting public panic, severely damaging…
Coruna iOS Exploit Kit Goes Mass-Market: Cybersecurity Today for March 9, 2026 with David Shipley
Coruna iOS Exploit Kit Goes Mass-Market, FBI Wiretap Platform Breach Probe, Windows Terminal ClickFix, and Iran-War Cyber Escalation This episode covers several major cybersecurity developments: Google’s Threat Intelligence Group details Coruna, a sophisticated iOS exploit kit with 23 exploits and…
IT Security News Hourly Summary 2026-03-09 06h : 2 posts
2 posts were published in the last hour 4:34 : WiFi Signals Reveal Human Activities Through Walls by Mapping Body Keypoints 4:34 : How Chinese Hackers Reached America’s Surveillance Infrastructure
WiFi Signals Reveal Human Activities Through Walls by Mapping Body Keypoints
A new open-source edge AI system called π RuView is turning ordinary WiFi infrastructure into a through-wall human-sensing platform detecting body pose, vital signs, and movement patterns without a single camera, raising urgent security and surveillance concerns. Researchers and developers…
How Chinese Hackers Reached America’s Surveillance Infrastructure
Chinese government-linked hackers have breached a network used by the Federal Bureau of Investigation to manage court-authorized surveillance operations. The intrusion, first detected on February 17, 2026, involved systems supporting the FBI’s Digital Collection System Network (DSCNet), infrastructure used to…
ISC Stormcast For Monday, March 9th, 2026 https://isc.sans.edu/podcastdetail/9840, (Mon, Mar 9th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Monday, March 9th, 2026…
IT Security News Hourly Summary 2026-03-09 03h : 1 posts
1 posts were published in the last hour 1:34 : Iran is the first out-loud cyberwar the US has fought
Iran is the first out-loud cyberwar the US has fought
Cyber is no longer the hush-hush thing it used to be, as team Trump invades Iran with hackers taking the lead Kettle Unlike previous military conflicts, the cyber domain has been front and center since the Trump administration invaded Iran,…
Granular Policy Enforcement in Quantum Secure Discovery Services
Learn how to secure Model Context Protocol deployments with granular policy enforcement and quantum-resistant encryption. Protect ai infrastructure from tool poisoning. The post Granular Policy Enforcement in Quantum Secure Discovery Services appeared first on Security Boulevard. This article has been…
How AI Assistants are Moving the Security Goalposts
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over…
Ring doorbells: Won’t you see my neighbor? (Lock and Code S07E05)
This week on the Lock and Code podcast, we speak with Matthew Guariglia about Ring smart doorbells and the surveillance network they create. This article has been indexed from Malwarebytes Read the original article: Ring doorbells: Won’t you see my…
FBI is investigating breach that may have hit its wiretapping tools
PLUS: Europol takes down two crime gangs; LastPass users phished (again); Crooks increase crypto hauls; And more Infosec In Brief The FBI is investigating a breach of its systems which reportedly affected systems related to wiretapping and surveillance.… This article…
Why proactive AI agents redefine enterprise security
Are Organizations Fully Equipped to Manage Non-Human Identities? The increasing integration of technology across various sectors brings to light the significant role of Non-Human Identities (NHIs) in enterprise security. Unfortunately, the traditional security frameworks that mainly focus on human identities…
How are NHIs driving innovation in cybersecurity
What Are Non-Human Identities in Cybersecurity? Have you ever considered the significance of a “passport” in digital identities? In cybersecurity, Non-Human Identities (NHIs) play a similar role. They are akin to machine passports, ensuring secure interactions in digital environments. But…