2026-03-11
DarkRelay
Performing DLL Hijacking
Dark Reading
Microsoft Patches 83 CVEs in March Update
Krebs on Security
Microsoft Patch Tuesday, March 2026 Edition
2026-03-10
Talos Intelligence
Microsoft Patch Tuesday for March 2026 — Snort rules and prominent vulnerabilities
Offensive Security
The AI Security Skills Gap: What It Is, Where It Exists, and How to Close It
Rapid7
Patch Tuesday - March 2026
Amazon Security
AWS European Sovereign Cloud achieves first compliance milestone: SOC 2 and C5 reports plus seven ISO certifications
Black Lantern Security
red-run
Amazon Security
Security is a team sport: AWS at RSAC 2026 Conference
Zero Day Initiative
The March 2026 Security Update Review
Amazon Security
AWS Security Hub is expanding to unify security operations across multicloud environments
Dark Reading
'BlackSanta' EDR Killer Targets HR Workflows
SentinelOne
FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise
Schneier on Security
Jailbreaking the F-35 Fighter Jet
ISC SANS
ISC Stormcast For Tuesday, March 10th, 2026 https://isc.sans.edu/podcastdetail/9842, (Tue, Mar 10th)
Troy Hunt
Weekly Update 494
2026-03-09
Dark Reading
White House Cyber Strategy Prioritizes Offense
Dark Reading
'InstallFix' Attacks Spread Fake Claude Code Sites
Dark Reading
Are We Ready for Auto Remediation With Agentic AI?
Searchlight Cyber
How to Choose the Right ASM Solution
Meta Security
How Advanced Browsing Protection Works in Messenger
Bishop Fox Security
Pre-Authentication SQL Injection in FortiClient EMS 7.4.4 - CVE-2026-21643
Microsoft Security
Secure agentic AI for your Frontier Transformation
Schneier on Security
New Attack Against Wi-Fi
Searchlight Cyber
How Do You Build An Attack Surface Management Program?
Malwarebytes
A week in security (March 2 – March 8)
ISC SANS
ISC Stormcast For Monday, March 9th, 2026 https://isc.sans.edu/podcastdetail/9840, (Mon, Mar 9th)
Rosecurify
Seclog - #168
2026-03-07
Okta Security
Datadog and Okta Combine for New Customer Detections
Ars Technica Security
From Iran to Ukraine, everyone's trying to hack security cameras
2026-03-06
Schneier on Security
Friday Squid Blogging: Squid in Byzantine Monk Cooking
Github Security Blog
How to scan for vulnerabilities with GitHub Security Lab’s open source AI-powered framework
Palo Alto Networks
How the National Cyber Strategy Secures Our Digital Way of Life
Ars Technica Security
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
Dark Reading
North Korean APTs Use AI to Enhance IT Worker Scams
Schneier on Security
Anthropic and the Pentagon
Microsoft Security
AI as tradecraft: How threat actors operationalize AI
Dark Reading
EU Auto Rules Shift Gears on Cybersecurity Standards
Dark Reading
Iran's Cyber-Kinetic War Doctrine Takes Shape
Schneier on Security
Claude Used to Hack Mexican Government
ISC SANS
ISC Stormcast For Friday, March 6th, 2026 https://isc.sans.edu/podcastdetail/9838, (Fri, Mar 6th)
Elastic Security Labs
Patch diff to SYSTEM
2026-03-05
Dark Reading
Nation-State Actor Embraces AI Malware Assembly Line
Talos Intelligence
Patch, track, repeat: The 2025 CVE retrospective
The Citizen Lab
Intellexa Founder, Three Others Sentenced to 8 Years in Prison Over Greek Spyware Scandal
Amazon Security
AWS completes the 2026 annual Dubai Electronic Security Centre (DESC) certification audit
Schneier on Security
Israel Hacked Traffic Cameras in Iran
Google Safety & Security
The latest AI news we announced in February
Microsoft Security
Malicious AI Assistant Extensions Harvest LLM Chat Histories
Dark Reading
LatAm Now Faces 2x More Cyberattacks Than US
ISC SANS
ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)
Schneier on Security
Hacked App Part of US/Israeli Propaganda Campaign Against Iran
Talos Intelligence
UAT-9244 targets South American telecommunication providers with three new malware implants
Amazon Security
2025 ISO and CSA STAR certificates are now available with one additional service and one new region
Elastic Security Labs
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft
Fastly
Europe Under Pressure
2026-03-04
Doyensec
The MCP AuthN/Z Nightmare
The Citizen Lab
From Harm to Justice: Ending Violence Against Women in the Public Sphere in the OSCE Region
Amazon Security
Enhanced access denied error messages with policy ARNs
Microsoft Security
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
Dark Reading
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
Searchlight Cyber
How to Stop Ransomware Attacks Before They Happen
Black Hills Info Sec
The “P” in PAM is for Persistence: Linux Persistence Technique
Searchlight Cyber
March 4th – This Week’s Top Cybersecurity and Dark Web Stories
Schneier on Security
Manipulating AI Summarization Features