OpenAI has announced the launch of a public Safety Bug Bounty program to identify AI abuse and safety risks across its products. Hosted on Bugcrowd, the new initiative marks a significant step in the company’s efforts to address vulnerabilities that…
Microsoft Entra ID New Feature Removes MFA Limitations for Users
Multifactor authentication operates as a critical defense mechanism for securing user identities against targeted cyber attacks. Microsoft reports that implementing MFA effectively reduces the risk of account compromise by more than 99%. To expand these protections, Microsoft has announced the…
Reddit declares war on bad bot activity
Reddit is introducing changes to support interactions between people. The company is taking a bottom-up approach to help users understand when they are engaging with another person unless an account is labeled otherwise. Reddit plans to verify that users are…
Iran-Linked Pay2Key Ransomware Group Re-Emerges
Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key This article has been indexed from www.infosecurity-magazine.com Read the original article: Iran-Linked Pay2Key Ransomware Group Re-Emerges
IT Security News Hourly Summary 2026-03-26 12h : 9 posts
9 posts were published in the last hour 10:34 : Meta Lays Off Hundreds In Latest Cuts 10:34 : Anduril’s Real War Is With Itself 10:34 : Alleged RedLine Malware Administrator Extradited to US 10:34 : Google races to secure…
Meta Lays Off Hundreds In Latest Cuts
Meta reportedly laying off hundreds of staff across multiple divisions, as it shifts focus to artificial intelligence projects This article has been indexed from Silicon UK Read the original article: Meta Lays Off Hundreds In Latest Cuts
Anduril’s Real War Is With Itself
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned. This article has been indexed from Security Latest Read the original article: Anduril’s…
Alleged RedLine Malware Administrator Extradited to US
Hambardzum Minasyan of Armenia has been accused of being involved in the development and administration of the infostealer malware. The post Alleged RedLine Malware Administrator Extradited to US appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Google races to secure encryption before quantum threats arrive
Google is preparing for the quantum era, a turning point in digital security, with a 2029 timeline for post-quantum cryptography (PQC) migration. Security professionals warn that current encryption could be broken by large-scale quantum computers in the coming years. This…
Invoice Fraud Costs UK Construction Sector Millions, NCA Warns
The National Crime Agency has warned construction firms about surging invoice fraud This article has been indexed from www.infosecurity-magazine.com Read the original article: Invoice Fraud Costs UK Construction Sector Millions, NCA Warns
Los Angeles Jury Finds Meta, Google Liable Over Youth Harms
Jury in bellwether trial orders Meta, Google to pay $6m in damages after deciding addictive design features contributed to harm This article has been indexed from Silicon UK Read the original article: Los Angeles Jury Finds Meta, Google Liable Over…
Torg Grabber Malware Shifts from Telegram Exfiltration to Encrypted REST API for C2
A fast-evolving information‑stealing malware dubbed “Torg Grabber” that has shifted from simple Telegram‑based exfiltration to a hardened, encrypted REST API command‑and‑control (C2) channel fronted by Cloudflare. The operation surfaced when a 747 KB 64‑bit sample initially tagged as Vidar was…
Russian authorities arrest alleged LeakBase admin behind stolen data marketplace
Russian authorities arrested the alleged LeakBase admin for running a marketplace selling stolen data since 2021. Russian law enforcement has arrested the suspected administrator of LeakBase, a cybercrime forum used to trade stolen personal data. The suspect, from Taganrog, is…
Expert panel: Cyber conflict in a fractured world
No longer are geopolitical standoffs settled on the traditional battlefields of diplomacy and arms; now, the digital realm has emerged as the arena for these conflicts. In this article, we bring together industry experts to discuss the dynamics of the development of…
House Of Lords Approves Social Media Ban For Second Time
Lords defies government with second vote in favour of amendment banning social platforms for under-16s, as government defends its approach This article has been indexed from Silicon UK Read the original article: House Of Lords Approves Social Media Ban For…
Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack
Fake screenshot links are being used to quietly deploy a multi‑stage backdoor against Web3 customer support teams, in a campaign assessed to be linked to the Chinese financially motivated group APT‑Q‑27 (GoldenEyeDog). The operation abuses live chat workflows, signed .NET…
UK wants to know if banning under-16s from social media does anything useful
300 families undergo 6-week trial to test impact on sleep, school, and home life The UK government will trial different levels of restrictions on social media for under-16s with the help of 300 families, alongside a public consultation that has…
Fake npm Install Messages Hide RAT Malware in New Open Source Supply Chain Campaign
A new and carefully crafted software supply chain campaign is targeting developers through the npm package registry, using fake installation messages to hide malicious activity. The campaign, which security researchers have named the “Ghost campaign,” began in early February 2026…
What is Runtime Identity? Securing Every Action Beyond Login
Runtime Identity secures every action beyond login. Learn how to implement continuous identity verification for modern SaaS and APIs. The post What is Runtime Identity? Securing Every Action Beyond Login appeared first on Security Boulevard. This article has been indexed…
New Mexico Jury Orders Meta To Pay $375m Over Child Safety
Meta ordered to pay $375m in damages after jury finds it willfully violated law by misleading public about child safety on Facebook, Instagram This article has been indexed from Silicon UK Read the original article: New Mexico Jury Orders Meta…
IDrive for Windows Vulnerability Allows Attackers to Escalate Privileges and Gain Unauthorized Access
A critical security flaw has been identified in the IDrive Cloud Backup Client for Windows, exposing users to local privilege escalation attacks. Tracked as CVE-2026-1995, this vulnerability allows authenticated, low-privilege attackers to execute arbitrary code with the highest system permissions,…
Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience
The computer giants have announced new security capabilities for PCs and printers. The post Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
UK To Ban Political Donations In Cryptocurrency
Political parties in UK to be barred from accepting donations in cryptocurrency, amid foreign influence threat This article has been indexed from Silicon UK Read the original article: UK To Ban Political Donations In Cryptocurrency
Preventing Account Takeovers: A Practical Guide to Detection and Response
Yesterday’s password leak can become tomorrow’s identity crisis. According to research firm Gitnux, account-takeover attacks jumped 354 percent in 2023, driven by bots that replay stolen credentials and infostealer malware that sidesteps multi-factor prompts. The fallout, billions in fraud losses,…