Anthropic sues to block Pentagon natsec blacklisting
10
Mar
2026

Anthropic sues to block Pentagon natsec blacklisting

Anthropic has filed a lawsuit to block the Pentagon from placing it on a national security blacklist, escalating the ⁠artificial…

Announcing the Latest Report on Huntress Managed SAT: Key Findings and Insights
10
Mar
2026

Announcing the Latest Report on Huntress Managed SAT: Key Findings and Insights

Security awareness training (SAT) is supposed to make companies safer, but too often, it feels like just another box to…

Microsoft Teams phishing targets employees with backdoors
10
Mar
2026

Microsoft Teams phishing targets employees with backdoors

Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist…

Microsoft Launches Copilot Cowork, a New AI Feature in Microsoft 365 to Automate Tasks
10
Mar
2026

Microsoft Launches Copilot Cowork, a New AI Feature in Microsoft 365 to Automate Tasks

Microsoft has introduced Copilot Cowork, a new AI-powered feature embedded within Microsoft 365 that moves beyond conversational assistance to autonomous…

Russia-backed hackers breach Signal, WhatsApp accounts of officials, journalists
10
Mar
2026

Russia-backed hackers breach Signal, WhatsApp accounts of officials, journalists

Russian-backed hackers have launched a ⁠global cyber ⁠campaign to gain access to Signal and WhatsApp accounts used by officials, military…

State of Security Report | Recorded Future
10
Mar
2026

State of Security Report | Recorded Future

Download the full report The 2026 State of Security report provides comprehensive analysis of each threat domain, threat actor profiles,…

Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability
10
Mar
2026

Active Exploitation of Gladinet CentreStack/Triofox Insecure Cryptography Vulnerability

Acknowledgments: Special thanks to John Hammond for his contributions to this investigation and write-up. Update #2: 12/18/25 @ 6pm ET…

Google: Cloud attacks exploit flaws more than weak credentials
10
Mar
2026

Cloud attacks exploit flaws more than weak credentials

Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window…

BoryptGrab Stealer Spreads via Fake GitHub Repositories, Stealing Browser and Crypto Wallet Data
10
Mar
2026

BoryptGrab Stealer Spreads via Fake GitHub Repositories, Stealing Browser and Crypto Wallet Data

A new data-stealing malware called BoryptGrab has been quietly spreading across Windows systems through a network of fake GitHub repositories,…

Age-checking technology comes of age
10
Mar
2026

Age-checking technology comes of age

For years, tech companies successfully resisted pressure from child safety advocates to do more to keep kids off their services, claiming…

scammers target zoning permit applicants
10
Mar
2026

scammers target zoning permit applicants

FBI alert: scammers target zoning permit applicants Pierluigi Paganini March 09, 2026 The FBI warns of phishing attacks where crooks…

Trump administration will test infrastructure cybersecurity approaches in pilot program
10
Mar
2026

Trump administration will test infrastructure cybersecurity approaches in pilot program

Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. WASHINGTON — The…