Archive for March, 2026

By Ionut Arghire

Improper input sanitization in the framework can be exploited through the Shell tool, allowing attackers to modify system files and steal data.

The post Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise appeared first on SecurityWeek.

…read more

Source:: securityweek

A wave of cyber operations targeted Iran.

…read more

Source:: Security magazin

By Eduard Kovacs

The company is one of the many victims of the 2025 Oracle E-Business Suite (EBS) hacking campaign.

The post Madison Square Garden Data Breach Confirmed Months After Hacker Attack appeared first on SecurityWeek.

…read more

Source:: securityweek

By Eduard Kovacs

Madhu Gottumukkala has been assigned to a new role within the Department of Homeland Security.

The post Nick Andersen Appointed Acting Director of CISA appeared first on SecurityWeek.

…read more

Source:: securityweek

By Kevin Townsend

The AWS Security Hub Extended plan aims to reduce security tool sprawl by correlating findings across multiple security domains.

The post AWS Expands Security Hub Into a Cross-Domain Security Platform appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

Using Windows shortcut files, the APT deployed a new implant, a loader, a propagation tool, and two backdoors.

The post North Korean APT Targets Air-Gapped Systems in Recent Campaign appeared first on SecurityWeek.

…read more

Source:: securityweek

By Ionut Arghire

The internet giant is developing an evolution of the certificates based on Merkle Tree Certificates (MTCs).

The post Google Working Towards Quantum-Safe Chrome HTTPS Certificates appeared first on SecurityWeek.

…read more

Source:: securityweek

By Eduard Kovacs

Both sides conduct hacking and other attacks, including the deployment of wiper malware, DDoS, and disruptions to critical infrastructure.

The post US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates appeared first on SecurityWeek.

…read more

Source:: securityweek

Recruitment sits at the intersection of brand, identity, and external engagement, yet it has historically lived outside formal security ownership.

…read more

Source:: Security magazin

Security magazine reviews four data security events, some of which had a widespread impact.

…read more

Source:: Security magazin