2026-03-28
watchTowr Labs
The Sequels Are Never As Good, But We're Still In Pain (Citrix NetScaler CVE-2026-3055 Memory Overread)
2026-03-27
Google Safety & Security
How Google Does It: An inside look at cybersecurity
Schneier on Security
Friday Squid Blogging: Bioluminescent Bacteria in Squid
ISC SANS
ISC Stormcast For Friday, March 27th, 2026 https://isc.sans.edu/podcastdetail/9868, (Fri, Mar 27th)
Elastic Security Labs
Elastic Security Labs uncovers BRUSHWORM and BRUSHLOGGER
Datadog HQ
Analyzing round trip query latency
2026-03-26
Amazon Security
Preparing for agentic AI: A financial services approach
Ars Technica Security
Internet Yiff Machine: We hacked 93GB of "anonymous" crime tips
Black Lantern Security
Amelia Booking Pro ≤ 9.1.2: Authenticated Customer-to-Admin Password Reset via IDOR
Dark Reading
Is the FCC's Router Ban the Wrong Fix?
Dark Reading
Critical Flaw in Langflow AI Platform Under Attack
Talos Intelligence
TP-Link, Canva, HikVision vulnerabilities
Talos Intelligence
A puppet made me cry and all I got was this t-shirt
Github Security Blog
A year of open source vulnerability trends: CVEs, advisories, and malware
Bishop Fox Security
strongSwan CVE-2026-25075: Integer Underflow in VPN Authentication
Talos Intelligence
Talos Takes: 2025 insights from Talos and Splunk
Schneier on Security
As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters
Searchlight Cyber
The Warning Signs Were There: How Credential Leaks and Dark Web Activity Foreshadowed the Stryker Breach
Elastic Security Labs
Illuminating VoidLink: Technical analysis of the VoidLink rootkit framework
2026-03-25
Microsoft Security
Identity security is the new pressure point for modern cyberattacks
Ars Technica Security
Google bumps up Q Day deadline to 2029, far sooner than previously thought
Dark Reading
AI Dominates RSAC Innovation Sandbox
Black Hills Info Sec
Lessons From A Chatbot Incident
Google Security Blog
Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
Google Safety & Security
Quantum frontiers may be closer than they appear
Schneier on Security
Sen. Wyden Warns of Another Section 702 Abuse
Trail of Bits
Try our new dimensional analysis Claude plugin
Searchlight Cyber
You Don’t Have to Be Attacked to Be a Ransomware Victim
RME-DisCo Research Group
Uncovering Threats In The Wwindow NT Heap With Volatility 3
Microsoft Security
Guidance for detecting, investigating, and defending against the Trivy supply chain compromise
Datadog HQ
Monitor Juniper Mist in Datadog
Datadog HQ
A new Host Map for modern infrastructure
2026-03-24
Dark Reading
CSA Launches CSAI Foundation for AI Security
Microsoft Security
Governing AI agent behavior: Aligning user, developer, role, and organizational intent
Searchlight Cyber
March 24th – This Week’s Top Cybersecurity and Dark Web Stories
ISC SANS
Detecting IP KVMs, (Tue, Mar 24th)
Cloudflare
Sandboxing AI agents, 100x faster
Ars Technica Security
Self-propagating malware poisons open source software and wipes Iran-based machines
Schneier on Security
Team Mirai and Democracy
Trail of Bits
Spotting issues in DeFi with dimensional analysis
Compass Security Blog
Common Entra ID Security Assessment Findings – Part 1: Foreign Enterprise Applications With Privileged API Permissions
Troy Hunt
Weekly Update 496
ISC SANS
ISC Stormcast For Tuesday, March 24th, 2026 https://isc.sans.edu/podcastdetail/9862, (Tue, Mar 24th)
Elastic Security Labs
Supercharge Your SOC
Elastic Security Labs
Streamlining the Security Analyst Experience
Elastic Security Labs
Security Automation with Elastic Workflows: From Alert to Response
Sansec Threat Research
Novel WebRTC skimmer bypasses security controls at $100+ billion car maker
Elastic Security Labs
Investigating from the Endpoint Across Your Environment with Elastic Security XDR
2026-03-23
Dark Reading
AI in the SOC: What Could Go Wrong?
Dark Reading
Trivy Supply Chain Attack Targets CI/CD Secrets
Dark Reading
Ransomware's New Era: Moving at AI Speed
Palo Alto Networks
Securing the Era of Agentic AI with Prisma SASE
Palo Alto Networks
The Cryptographic Reset Has Begun
Palo Alto Networks
Securing the AI Enterprise — Introducing Prisma AIRS 3.0
Ars Technica Security
After hackers hit an Iowa company, cars around the country failed to start
Dark Reading
CISOs Debate Human Role in AI-Powered Security
Amazon Security
IAM policy types: How and when to use them
Github Security Blog
GitHub expands application security coverage with AI‑powered detections
Microsoft Security
Case study: How predictive shielding in Defender stopped GPO-based ransomware before it started
Krebs on Security
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
Malwarebytes
The March Madness scam playbook
Cloudflare
Launching Cloudflare’s Gen 13 servers: trading cache for cores for 2x edge compute performance
Talos Intelligence
Beers with Talos breaks down the 2025 Talos Year in Review
Palo Alto Networks
Prisma Browser for Business — A Secure Workspace for Small Business
Malwarebytes
Advanced Flow will make Android sideloading safer
Talos Intelligence
2025 Talos Year in Review: Speed, scale, and staying power
Schneier on Security
Microsoft Xbox One Hacked
Malwarebytes
A week in security (March 16 – March 22)
Rosecurify
Seclog - #170
GMO Flatt Security Research
Remote Command Execution in Google Cloud with Single Directory Deletion
Flatt Security Research
Remote Command Execution in Google Cloud with Single Directory Deletion