The European Parliament has voted to extend a temporary exemption to EU privacy legislation that allows online platforms to voluntarily detect child sexual abuse material (CSAM). The extension prolongs a derogation from the EU’s ePrivacy Directive, which was set to…
Authorities Shut Down Proxy Service Linked to Malware Campaign Targeting Thousands of Users
A coordinated international law enforcement operation successfully dismantled SocksEscort, a massive malicious residential proxy network. Led by the U.S. Justice Department alongside several European allies, the operation disrupted a sophisticated infrastructure that compromised thousands of residential and small business routers…
NanoClaw latches onto Docker Sandboxes for safer AI agents
Take your YOLO and box it up exclusive NanoClaw, an open source agent platform, can now run inside Docker Sandboxes, furthering the project’s commitment to security.… This article has been indexed from The Register – Security Read the original article:…
Bold Security Emerges From Stealth With $40 Million in Funding
The startup relies on AI to turn devices into active agents that understand users’ actions and provide protection in real time. The post Bold Security Emerges From Stealth With $40 Million in Funding appeared first on SecurityWeek. This article has…
Threat Modeling with AI: A Developer-Driven Boon for Enterprise Security
For companies running a modern, adaptive and defense-centered security program, threat modeling is not a new concept. In fact, it’s one of the core tenets of preventative cybersecurity best practices. Being able to find vulnerabilities within software or a network,…
US Agencies Face CISA Deadline Over Critical Cisco SD-WAN Flaw
US agencies race to meet a CISA deadline after a critical Cisco SD-WAN Flaw exposed federal networks to long-term intrusion and forced security action. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read…
Storm-2561 Uses SEO Poisoning, Fake Signed VPN Apps to Steal Enterprise Credentials
A financially motivated threat actor tracked as Storm-2561 is running a credential theft campaign that abuses SEO poisoning and fake, signed VPN installers to steal enterprise VPN credentials. Active since May 2025, Storm-2561 continues to exploit user trust in search…
Starbucks Data Breach Exposes Personal Data of Hundreds of Users
Starbucks Corporation recently disclosed a targeted cybersecurity incident that compromised the personal and financial information of 889 individuals. This internal platform is utilized by the company to manage human resources, employee benefits, and payroll details. While the number of impacted…
Starbucks Data Breach – Hundreds of Users’ Personal Data Exposed
Starbucks Corporation has confirmed a data breach affecting an undisclosed number of its employees, exposing highly sensitive personal and financial information after unauthorized actors gained access to internal partner accounts through a sophisticated phishing scheme. On or about February 6,…
Google rushes Chrome update fixing two zero-days already under attack
Skia graphics lib and V8 JavaScript engine brings browser’s tally of actively exploited bugs to three in 2026 Google has pushed out an emergency Chrome update to fix two previously unknown vulnerabilities that attackers were already exploiting before the patches…
Google Paid Out $17 Million in Bug Bounty Rewards in 2025
Google paid over $3.7 million for Chrome vulnerabilities, and more than $3.5 million for cloud security defects. The post Google Paid Out $17 Million in Bug Bounty Rewards in 2025 appeared first on SecurityWeek. This article has been indexed from…
Academia and the “AI Brain Drain”
In 2025, Google, Amazon, Microsoft and Meta collectively spent US$380 billion on building artificial-intelligence tools. That number is expected to surge still higher this year, to $650 billion, to fund the building of physical infrastructure, such as data centers (see…
Stryker Reports Widespread Disruption After Iran Hack
Medical devices maker Stryker says business seeing broad disruption after Iran-linked hackers wipe data from internal systems This article has been indexed from Silicon UK Read the original article: Stryker Reports Widespread Disruption After Iran Hack
Multi-cloud vs. hybrid cloud: The main difference
<p>To this day, there’s no single cloud solution. Cloud technologies have expanded, matured and proliferated to support the most demanding business needs and use cases.</p> <p>The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and…
SIEM isn’t dead, its place in the SOC is just evolving
<p>Predictions about the death of <a href=”https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM”>SIEM</a> platforms have swirled for years, fueled by reports of alert fatigue, sky-high data costs and the shiny promises of extended detection and response (<a href=”https://www.techtarget.com/searchsecurity/definition/extended-detection-and-response-XDR”>XDR</a>), security data lakes and, now, <a href=”https://www.techtarget.com/searchsecurity/tip/What-agentic-AI-means-for-cybersecurity”>agentic AI</a>.…
Google fixed two new actively exploited flaws in the Chrome browser
Google addressed two high-severity vulnerabilities in the Chrome browser that have been exploited in attacks in the wild. Google has released security updates to address two high-severity vulnerabilities, tracked as CVE-2026-3909 and CVE-2026-3910, in the Chrome browser. The company is…
Iran-Linked Hacker Attack on Stryker Disrupted Manufacturing and Shipping
Evidence indicates that the attackers leveraged existing endpoint management software rather than malware to wipe devices. The post Iran-Linked Hacker Attack on Stryker Disrupted Manufacturing and Shipping appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Understanding SOC 2 Controls for SaaS Providers
For SaaS providers, trust is a core part of the offering. Customers rely on software platforms to process data, support business operations, and integrate with wider technology ecosystems. As a result, demonstrating effective security and governance controls using frameworks like…
IT Security News Hourly Summary 2026-03-13 12h : 8 posts
8 posts were published in the last hour 10:32 : Metasploit Pro 5.0.0 Released With Powerful New Modules and Critical Enhancements 10:32 : Veeam Patches Multiple Critical RCE Vulnerabilities on Backup Server 10:32 : How Breach-Focused Microsegmentation Could Have Contained…
Metasploit Pro 5.0.0 Released With Powerful New Modules and Critical Enhancements
As cybercriminals continue to weaponize new vulnerabilities, the demand for continuous red-teaming and proactive security assessments has never been higher. Annual penetration tests are no longer enough to secure modern, complex environments. To help security teams stay ahead of advanced…
Veeam Patches Multiple Critical RCE Vulnerabilities on Backup Server
A critical security update has been released for Backup & Replication software to fix severe vulnerabilities that could allow attackers to execute remote code and escalate privileges. Released on March 12, 2026, the latest security patch (Build 12.3.2.4465) is an…
How Breach-Focused Microsegmentation Could Have Contained AWS’s AI Agent Outages
The AWS AI Agent Incidents This report reviews the breaking news about AWS AI outages, analyzes architectural failure modes, and demonstrates how ColorTokens Xshield microsegmentation, designed to stop breach proliferation, could have changed the outcome. In late 2024 and 2025, Amazon Web…
Decoding the White House Cyber Strategy: Why Resilience Matters Now
America’s new National Cyber Strategy sends a very clear message that cybersecurity is now about resilience, not just defense. The strategy emphasizes modernizing federal networks, protecting critical infrastructure, and deploying AI-enabled cybersecurity capabilities to detect and disrupt threats at scale.…
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
Menlo Park, California, USA, 13th March 2026, CyberNewswire This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP