March 10, 2026
Categories
No, it’s not ‘unnecessarily burdensome’ to control your own data
Skip to main content The State Department frames data sovereignty…
Sean Cairncross lays out what’s coming next for Trump’s cyber strategy
Skip to main content The national cyber director is pitching…
Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys
Microsoft is rolling out passkey support for Microsoft Entra on…
New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
A newly discovered botnet malware called KadNap is targeting ASUS routers and…
The New Turing Test: How Threats Use Geometry to Prove ‘Humanness’
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security.…
CISA: Recently patched Ivanti EPM flaw now actively exploited
CISA flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as…
Microsoft to enable Windows hotpatch security updates by default
Microsoft will turn on hotpatch security updates by default for…
APT28 hackers deploy customized variant of Covenant open-source tool
The Russian state-sponsored APT28 threat group is using a custom…
Microsoft Teams phishing targets employees with A0Backdoor malware
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams…
Google: Cloud attacks exploit flaws more than weak credentials
Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software…