News
Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)
1+ day, 20+ min ago (345+ words) Cisco has fixed ten vulnerabilities affecting its Integrated Management Controller (IMC), the most critical of which (CVE-2026-20093) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin. Cisco Integrated Management Controller is a built-in…...
Claude Code source leak exploited to spread malware
1+ day, 2+ hour ago (411+ words) A source code leak involving Anthropic's Claude Code tool quickly escalated into a cybersecurity threat, as attackers seized on the exposed files to lure developers into downloading malware disguised as "unlocked" versions of the software. On March 31, 2026, Anthropic accidentally exposed…...
Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches
1+ day, 1+ hour ago (412+ words) Microsoft's Secure Boot certificates, issued in 2011, are approaching expiration in 2026. To help IT administrators track whether devices have received replacement certificates, Microsoft has added new status indicators to the Windows Security app, under Device security > Secure Boot. Updated 2023 certificates are…...
APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance
1+ day, 6+ hour ago (324+ words) APERION launched SmartFlow SDK, providing a secure, on-premises path for enterprises migrating away from compromised cloud-based AI gateways. The launch coincides with a 200% increase in web traffic since the March 24 LiteLLM supply chain attack that compromised an estimated 36% of all…...
Trivy supply chain attack enabled European Commission cloud breach
1+ day, 6+ hour ago (468+ words) CERT-EU confirmed that ShinyHunters are behind the recent breach of the cloud infrastructure underpinning websites of the European Commission, and that they stole and subsequently leaked approximately 340 GB of data. "Analysis of the published dataset has so far confirmed the…...
Microsoft releases open-source toolkit to govern autonomous AI agents
1+ day, 7+ hour ago (353+ words) The Agent Governance Toolkit is a seven-package system available in Python, TypeScript, Rust, Go, and .NET. Each package addresses a distinct layer of agent governance: "A governance toolkit is only useful if it works with the frameworks people actually use....
Which messaging app takes the most limited approach to permissions on Android?
1+ day, 8+ hour ago (443+ words) Messaging apps handle sensitive conversations, contacts, and media, and their behavior on a device varies in ways that affect privacy. An analysis of Android versions of Messenger, Signal, and Telegram shows that differences in permissions, background activity, and system exposure…...
Click, wait, repeat: Digital trust erodes one login at a time
1+ day, 8+ hour ago (773+ words) Sign-up forms that drag on, login steps that repeat, and access requests that take longer than expected have become a normal part of using digital services. These moments rarely stand out on their own, and over time they influence how…...
New infosec products of the month: March 2026
1+ day, 9+ hour ago (368+ words) Here's a look at the most interesting products from the past month, featuring releases from Beazley, Bonfy.AI, Mend.io, Mimecast, NinjaOne, Novee, Intel 471, Singulr AI, Stellar Cyber, Teleport, and Vicarius. Singulr AI has announced the launch of Agent Pulse,…...
AWS, Wasabi, Cloudflare, and Backblaze go head-to-head in new cloud storage test
1+ day, 15+ hour ago (562+ words) Cloud storage buyers rarely get vendor-provided performance data that includes the vendor's own weak spots. Backblaze's Q1 2026 Performance Stats report, attempts to do exactly that, sharing benchmark results for Backblaze B2, AWS S3, Cloudflare R2, and Wasabi Object Storage across US-East and EU-Central regions,…...