Breaking News – Cyber Threats (last 6h)
Generated: 2026-03-20 08:00 PDT
- How CISOs Can Survive the Era of Geopolitical Cyberattacks
BleepingComputer • 2026-03-20 07:01 • www.bleepingcomputer.com
Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campaigns. […]
https://www.bleepingcomputer.com/news/security/how-cisos-can-survive-the-era-of-geopolitical-cyberattacks/ - Proton Mail Shared User Information with the Police
Schneier on Security • 2026-03-20 04:02 • www.schneier.com404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI.
It’s metadata—payment information related to a particular account—but still important knowledge. This sort of thing happens, even to privacy-centric companies like Proton Mail.
- Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
The Hacker News • 2026-03-20 03:57 • thehackernews.com
Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness with safety.
The new changes come against the backdrop of a developer verification mandate the tech giant announced last year that requires all Android apps to be registered by verified developers to
https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html - LeakNet ransomware: what you need to know
Graham Cluley • 2026-03-20 03:18 • www.fortra.com
A ransomware gang that claims to be a group of “investigative journalists”? Meet LeakNet – the group using fake CAPTCHA pages to trick employees into hacking themselves.Read more in my article on the Fortra blog.
https://www.fortra.com/blog/leaknet-ransomware-what-you-need-know - The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
The Hacker News • 2026-03-20 03:00 • thehackernews.com
Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepfakes and malware that evade traditional detection by impersonating normal user activity and bypassing legacy security models. As a result,
https://thehackernews.com/2026/03/the-importance-of-behavioral-analytics.html - Musician admits to $10M streaming royalty fraud using AI bots
BleepingComputer • 2026-03-20 02:33 • www.bleepingcomputer.com
North Carolina musician Michael Smith has pleaded guilty to collecting over $10 million in royalty payments through a massive streaming royalty fraud scheme on Spotify, Apple Music, Amazon Music, and YouTube Music. […]
https://www.bleepingcomputer.com/news/security/musician-pleads-guilty-to-10m-streaming-fraud-powered-by-ai-bots/ - Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
The Hacker News • 2026-03-20 02:30 • thehackernews.com
Sansec is warning of a critical security flaw in Magento’s REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover.
The vulnerability has been codenamed PolyShell by Sansec owing to the fact that the attack hinges on disguising malicious code as an image. There is no evidence that the shortcoming has been exploited in
https://thehackernews.com/2026/03/magento-polyshell-flaw-enables.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
