Security News
Latest Updates

Stay informed with the latest security trends and insights...

Latest Articles

Explore the most recent articles on security topics.

1. Security News – 2026-03-04

Wed Mar 04 2026 00:00:00 GMT+0000 (Coordinated Universal Time)

SecurityWeek

Latest cybersecurity news

Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters - March 03, 2026

Two AWS data centers in the United Arab Emirates were “directly struck” and another facility in Bahrain was also damaged after a drone landed nearby.

The post Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters appeared first on SecurityWeek.

The Hacker News

Cybersecurity news and insights

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations - March 03, 2026

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from

SecurityWeek

Latest cybersecurity news

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability - March 03, 2026

The researcher says he has identified thousands of internet-exposed IQ4 building management controllers.

The post Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability appeared first on SecurityWeek.

The Hacker News

Cybersecurity news and insights

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries - March 03, 2026

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected its use following an analysis of the IP address (“212.11.64[.]250”) that was used by the suspected

SecurityWeek

Latest cybersecurity news

New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security - March 03, 2026

Researchers have uncovered a Wi-Fi vulnerability that allows nearby attackers to intercept sensitive data and execute machine-in-the-middle attacks against connected devices.

The post New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security appeared first on SecurityWeek.

1.2 Million Affected by University of Hawaii Cancer Center Data Breach - March 03, 2026

Hackers stole names, Social Security numbers, driver’s license information, voter registration records, and health-related information.

The post 1.2 Million Affected by University of Hawaii Cancer Center Data Breach appeared first on SecurityWeek.

Android Update Patches Exploited Qualcomm Zero-Day - March 03, 2026

An integer overflow or wraparound in the Qualcomm graphics component, the bug leads to memory corruption.

The post Android Update Patches Exploited Qualcomm Zero-Day appeared first on SecurityWeek.

Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low - March 03, 2026

The cybersecurity industry is monitoring the landscape and says many of the big claims made by hacktivist groups remain unverified.

The post Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low appeared first on SecurityWeek.

Schneier on Security

Security news and analysis by Bruce Schneier

On Moltbook - March 03, 2026

The MIT Technology Review has a good article on Moltbook, the supposed AI-only social network:

Many people have pointed out that a lot of the viral comments were in fact posted by people posing as bots. But even the bot-written posts are ultimately the result of people pulling the strings, more puppetry than autonomy.

“Despite some of the hype, Moltbook is not the Facebook for AI agents, nor is it a place where humans are excluded,” says Cobus Greyling at Kore.ai, a firm developing agent-based systems for business customers. “Humans are involved at every step of the process. From setup to prompting to publishing, nothing happens without explicit human direction.”...

The Hacker News

Cybersecurity news and insights

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged - March 03, 2026

The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This is already showing up in production

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication - March 03, 2026

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It’s advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand’s real URL. It also lets

SecurityWeek

Latest cybersecurity news

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise - March 03, 2026

Improper input sanitization in the framework can be exploited through the Shell tool, allowing attackers to modify system files and steal data.

The post Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise appeared first on SecurityWeek.

The Hacker News

Cybersecurity news and insights

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets - March 03, 2026

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited - March 03, 2026

Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component. “Memory corruption when adding user-supplied data without checking available buffer space,” Qualcomm said in an advisory,

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains - March 03, 2026

The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as BurrowShell and a Rust-based

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel - March 02, 2026

Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of insufficient policy enforcement in the WebView tag. It was patched by Google in early January 2026

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome - March 02, 2026

Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers. “To ensure the scalability and efficiency of the ecosystem, Chrome has no immediate plan to add traditional X.509 certificates containing post-quantum cryptography to the Chrome Root Store,” the Chrome Secure Web and Networking Team said. “

Schneier on Security

Security news and analysis by Bruce Schneier

LLM-Assisted Deanonymization - March 02, 2026

Turns out that LLMs are good at de-anonymization:

We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Reddit, LinkedIn, and anonymized interview transcripts, our method identifies users with high precision ­ and scales to tens of thousands of candidates.

While it has been known that individuals can be uniquely identified by surprisingly few attributes, this was often practically limited. Data is often only available in unstructured form and deanonymization used to require human investigators to search and reason based on clues. We show that from a handful of comments, LLMs can infer where you live, what you do, and your interests—then search for you on the web. In our new research, we show that this is not only possible but increasingly practical...

View All Security News

Upcoming Events

Check out the upcoming security conferences and webinars.

Security Tools

Discover the latest tools and resources for enhancing security.