Categories Breaking News

Breaking News – Cyber Threats – 2026-03-20 08:00 PDT

Breaking News – Cyber Threats (last 6h)

Generated: 2026-03-20 08:00 PDT

  • How CISOs Can Survive the Era of Geopolitical Cyberattacks
    BleepingComputer • 2026-03-20 07:01 • www.bleepingcomputer.com
    Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campaigns. […]
    https://www.bleepingcomputer.com/news/security/how-cisos-can-survive-the-era-of-geopolitical-cyberattacks/
  • Proton Mail Shared User Information with the Police
    Schneier on Security • 2026-03-20 04:02 • www.schneier.com

    404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI.

    It’s metadata—payment information related to a particular account—but still important knowledge. This sort of thing happens, even to privacy-centric companies like Proton Mail.

    https://www.schneier.com/blog/archives/2026/03/proton-mail-shared-user-information-with-the-police.html

  • Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
    The Hacker News • 2026-03-20 03:57 • thehackernews.com
    Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety.
    The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to
    https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html
  • LeakNet ransomware: what you need to know
    Graham Cluley • 2026-03-20 03:18 • www.fortra.com
    A ransomware gang that claims to be a group of “investigative journalists”? Meet LeakNet – the group using fake CAPTCHA pages to trick employees into hacking themselves.

    Read more in my article on the Fortra blog.
    https://www.fortra.com/blog/leaknet-ransomware-what-you-need-know

  • The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
    The Hacker News • 2026-03-20 03:00 • thehackernews.com
    Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result,
    https://thehackernews.com/2026/03/the-importance-of-behavioral-analytics.html
  • Musician admits to $10M streaming royalty fraud using AI bots
    BleepingComputer • 2026-03-20 02:33 • www.bleepingcomputer.com
    North Carolina musician Michael Smith has pleaded guilty to collecting over $10 million in royalty payments through a massive streaming royalty fraud scheme on Spotify, Apple Music, Amazon Music, and YouTube Music. […]
    https://www.bleepingcomputer.com/news/security/musician-pleads-guilty-to-10m-streaming-fraud-powered-by-ai-bots/
  • Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
    The Hacker News • 2026-03-20 02:30 • thehackernews.com
    Sansec is warning of a critical security flaw in Magento’s REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover.
    The vulnerability has been codenamed PolyShell by Sansec owing to the fact that the attack hinges on disguising malicious code as an image. There is no evidence that the shortcoming has been exploited in
    https://thehackernews.com/2026/03/magento-polyshell-flaw-enables.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like