Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected…
IT Security News Hourly Summary 2026-03-30 12h : 12 posts
12 posts were published in the last hour 9:32 : Stored XSS Vulnerability in Jira Work Management Could Enable Full Organization Takeover 9:32 : LiteLLM supply chain attack exposes millions to credential theft 9:32 : World Back Up Day 2026 –…
Stored XSS Vulnerability in Jira Work Management Could Enable Full Organization Takeover
Security researchers recently uncovered a critical stored Cross-Site Scripting (XSS) vulnerability within Atlassian’s Jira Work Management platform. This flaw allows an attacker with limited administrative permissions to execute a full organization takeover. Jira Work Management is heavily relied upon by…
LiteLLM supply chain attack exposes millions to credential theft
Researchers at Endor Labs, have discovered a supply chain attack on the popular Python package LiteLLM on PyPI, with malicious code injected into versions 1.82.7 and 1.82.8, which have been withdrawn. The package is used in AI environments and developer tools, with an estimated 95…
World Back Up Day 2026 – What are the takeaways?
World Backup Day is often seen as a simple reminder to save your data, but this year, security leaders say backup strategies must evolve into fully tested, secure, and recovery-focused resilience plans. Here’s what organisations should take away from World…
New “Prompt Poaching” Attack Steals Users’ AI Conversations via Malicious Browser Extensions
For many users, engaging with an AI assistant requires opening a dedicated browser tab, which inherently isolates the AI from other browsing activities. While this separation improves privacy, it reduces usefulness and context. To bridge this gap, AI-powered browser extensions…
India Set to Ban Sale of Hikvision, TP-Link, CCTV Products From April
Starting April 1, 2026, the Indian government will effectively ban Chinese video surveillance giants, including Hikvision, Dahua, and TP-Link, from selling internet-connected CCTV cameras in the country. This decisive market restriction stems from new mandatory certification rules driven by national…
Exploitation of Fresh Citrix NetScaler Vulnerability Begins
The critical-severity flaw leaks application memory and can be exploited to obtain authenticated administrative session IDs. The post Exploitation of Fresh Citrix NetScaler Vulnerability Begins appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
6 trends redefining organizations’ future with IAM
With the right preparation, you can stay ahead of the most common IAM risks. Let’s explore the emerging IAM trends and what you can do to address them proactively. This article has been indexed from Cybersecurity Dive – Latest News…
How OpenClaw’s agent skills become an attack surface
OpenClaw and similar AI agent ecosystems, present pressing security risks. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: How OpenClaw’s agent skills become an attack surface
Why user behavior is the primary entry point for cyberattacks
Human error still drives 60% of breaches — here’s why attackers keep targeting users. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Why user behavior is the primary entry point for cyberattacks
$650B and Counting: How AI Infrastructure Spending Is Reshaping U.S. Tech Strategy
As U.S. tech giants pour hundreds of billions into AI infrastructure, enterprises face a defining question: how to convert unprecedented spend into measurable business value. This article has been indexed from Silicon UK Read the original article: $650B and Counting:…
New macOS Infinity Stealer uses Nuitka Python payload and ClickFix
Infinity Stealer targets macOS via fake Cloudflare CAPTCHA, using Nuitka; first such campaign per Malwarebytes. Researchers at Malwarebytes spotted a new macOS infostealer, named Infinity Stealer, using a Python payload compiled with Nuitka. It spreads via ClickFix, tricking users with…
Making stolen data worthless: why security must start with the data
Organisations have spent years investing heavily in cybersecurity solutions. Firewalls have been strengthened, identity systems refined, and monitoring tools deployed across increasingly complex environments. Yet despite this, data breaches continue to expose vast amounts of sensitive information, often with severe…
Meta Ramps Spending On El Paso Data Centre To $10bn
From initial plans for $1.5bn spending on data centre, Meta expands plans to $10bn, with 1 GW of capacity planned by 2028 This article has been indexed from Silicon UK Read the original article: Meta Ramps Spending On El Paso…
FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers
The agency said Iranian hackers targeted the director’s personal email account and noted that the compromised information is old. The post FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers appeared first on SecurityWeek. This article…
European Commission Confirms Cloud Data Breach
The European Commission has revealed details of a data breach impacting its AWS infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: European Commission Confirms Cloud Data Breach
DJI Launches First 360-Degree Drone
DJI’s first drone with panoramic camera, Avata 360, arrives as direct competitor to Insta360’s Antigravity A1, released last year This article has been indexed from Silicon UK Read the original article: DJI Launches First 360-Degree Drone
Critical Grafana Flaws Allow Attackers to Achieve Remote Code Execution
Grafana Labs has rolled out critical security updates to address two severe vulnerabilities impacting its widely used analytics and interactive visualization platform. The most severe flaw could allow threat actors to achieve full Remote Code Execution (RCE) and establish an…
10 Best Data Loss Prevention Software in 2026
Data loss prevention (DLP) refers to technology and techniques for detecting and preventing unauthorized access, use, disclosure, or destruction of sensitive data. DLP solutions are designed to monitor and control access to sensitive information by identifying, classifying, and protecting sensitive…
Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave
Russia-linked TA446 is using the DarkSword iOS exploit kit in targeted phishing campaigns to compromise iPhone users. Russia-linked APT group TA446 (aka SEABORGIUM, ColdRiver, Callisto, and Star Blizzard) is using the DarkSword exploit kit in targeted spear-phishing campaigns against iOS…
Southampton School Closed For Days Following Hack
School in Southampton closes for four days after ransomware disables systems, amid rise in damaging hacks on organisations This article has been indexed from Silicon UK Read the original article: Southampton School Closed For Days Following Hack
Microsoft Releases Key WinRE and Setup Updates to Prepare for 2026 Secure Boot Changes
Microsoft has rolled out a critical Setup Dynamic Update, designated as KB5081494, for Windows 11 versions 24H2 and 25H2. Released on March 26, 2026, this patch introduces essential improvements to Windows setup binaries. The core objective of this release is…
Security contractor blew the whistle on support crew’s viral indifference
Career-limiting stupidity and rudeness exposed, with terminal consequences Who, Me? The week before Easter may be a short one for many in the Reg-reading world, but that won’t stop us from opening it with a fresh installment of Who, Me?…