Conduent, a business that offers printing, payment, and document processing services to some of the biggest health insurance companies in the nation, has had at least 25 million people’s personal information stolen. Addresses, social security numbers, and health information were…
Apple Rolls Out Global Age-Verification System to Protect Kids Online
Apple has rolled out a new global age-verification system across its platforms, aimed at keeping kids safer online while helping developers comply with tightening child safety laws worldwide. The move targets both app downloads and in‑app experiences, with a…
IT Security News Hourly Summary 2026-03-10 18h : 11 posts
11 posts were published in the last hour 16:32 : An iPhone-hacking toolkit used by Russian spies likely came from US military contractor 16:32 : When your DDoS mitigation provider goes down: Why traffic control can’t be outsourced 16:32 :…
An iPhone-hacking toolkit used by Russian spies likely came from US military contractor
Google found a series of hacking tools they said were used by a Russian espionage group and a cybercriminal group in China. Sources from a U.S. government defense contractor said some of those hacking tools were theirs. This article has…
When your DDoS mitigation provider goes down: Why traffic control can’t be outsourced
Since the headline-grabbing outages of 2021, we’ve had recurring conversations with large enterprises asking some version of the same question. Do we really want our CDN, security, and routing control to live in the same place? This issue of control…
Crooks compromise WordPress sites to push infostealers via fake CAPTCHA prompts
Rapid7 says crims compromised more than 250 sites globally, including a US Senate candidate’s campaign page Cyber baddies quietly compromised legitimate WordPress websites, including the campaign site of a US Senate candidate, turning them into launchpads for a global infostealer…
Zero Trust for B2B SaaS: What Every Founder and CTO Needs to Know
For B2B SaaS companies, Zero Trust isn’t an optional enterprise security concept. It’s what enterprise buyers are demanding, what audit frameworks require, and increasingly what separates companies that close deals from those that don’t. The post Zero Trust for B2B…
KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
Cybersecurity researchers have discovered a new malware called KadNap that’s primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic. The malware, first detected in the wild in August 2025, has expanded to over 14,000 infected…
Fake Claude Code Spreads Malware to Windows, macOS Users
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows and macOS systems. The post Fake Claude Code Spreads Malware to Windows, macOS Users appeared first on TechRepublic. This article has been…
Fake Gemini AI Chatbot Promotes ‘Google Coin’ in New Crypto Scam
A fake Gemini-style chatbot is pushing a bogus Google Coin presale, using Google branding and scripted AI replies to lure victims into crypto payments. The post Fake Gemini AI Chatbot Promotes ‘Google Coin’ in New Crypto Scam appeared first on…
APT28 conducts long-term espionage on Ukrainian forces using custom malware
APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) has used BEARDSHELL and COVENANT malware to conduct long-term surveillance of…
Forescout Introduces Automated Security Controls Assessment to Bring Continuous Compliance Visibility
Forescout has introduced Automated Security Controls Assessment, a new capability within the Forescout 4D Platform that is designed to help security and compliance teams continuously evaluate the effectiveness of their security controls across the entire attack surface. The new feature…
OpenAI Acquires Security Startup Promptfoo to Fortify AI Agents
OpenAI has snapped up Promptfoo, a specialized artificial intelligence (AI) security startup, to bolster the safety of autonomous digital workers and convince enterprise clients that AI co-workers are ready for high-stakes business environments. OpenAI did not disclose financial terms of…
Only 24% Of organizations Test Identity Recovery Every Six Months
Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said This article has been indexed from www.infosecurity-magazine.com Read the original article: Only 24% Of organizations Test Identity Recovery Every Six Months
GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps
Delivery apps are glitching and navigation routes are changing abruptly thanks to electronic warfare disrupting the satellite signals that power everything from missiles to your ride home. This article has been indexed from Security Latest Read the original article: GPS…
CISA Warns of Ivanti Endpoint Manager Authentication Bypass Vulnerability Exploited in Attacks
A serious security flaw in Ivanti Endpoint Manager has caught federal attention after the Cybersecurity and Infrastructure Security Agency (CISA) added it to the Known Exploited Vulnerabilities (KEV) catalog on March 9, 2026. Tracked as CVE-2026-1603, this authentication bypass vulnerability…
Kali Linux Enhances AI-driven Penetration Testing with Local Ollama, 5ire, and MCP Kali Server
The Kali Linux team has published a new entry in its growing LLM-driven security series, this time eliminating all reliance on third-party cloud services by running large language models entirely on local hardware. The guide demonstrates how security professionals can…
Webinar Today: Securing Fragile OT in an Exposed World
Join the webinar as we examine the current OT threat landscape and move past the “doom and gloom” to discuss the mechanics of modern OT exposure. The post Webinar Today: Securing Fragile OT in an Exposed World appeared first on…
Kai Emerges From Stealth With $125M in Funding for AI Platform Bridging IT and OT Security
The company was created by a Claroty founder and is backed by Evolution Equity Partners, N47, and other investors. The post Kai Emerges From Stealth With $125M in Funding for AI Platform Bridging IT and OT Security appeared first on…
USENIX Security ’25 (Enigma Track) – Security Theater Is Canceled: Time For A Real Show
Author, Creator & Presenter: Lea Kissner, LinkedIn Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and Presenter’s tremendous USENIX Security ’25 (Enigma Track) content on the Organizations’ YouTube Channel. Permalink The post USENIX…
Fortinet enhances SecOps with cloud SOC, AI automation, and managed services
Fortinet has announced major innovations across the Fortinet Security Operations (SecOps) Platform. The updates feature next-generation SecOps advancements, including expanded agentic AI capabilities, a preview of FortiSOC, managed services, and endpoint security enhancements delivered through FortiEndpoint. “As attackers weaponize AI…
Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds
Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell This article has been indexed from www.infosecurity-magazine.com Read the original article: Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds
US entities face heightened cyber risk related to Iran war
The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: US entities face…
Huntress Widens Partner Programme to Reach Small Businesses Worldwide
Cybersecurity firm Huntress is expanding its partner programme to include resellers, a move the company says will extend enterprise-grade protection to small and mid-sized businesses that are increasingly in the crosshairs of cybercriminals. The expansion builds on a decade of…