Florida woman gets 2 year sentence for trafficking Microsoft software labels

According to court documents, the defendant purchased millions of dollars of labels but did not sell them with the corresponding software.

The Record from Recorded Future News – ​Read More

Need a microSD? I trust this 1TB card with all my footage – and that says a lot

This Lexar 1TB microSD card is fast, durable, and worth every cent. Here’s why

Latest news – ​Read More

1.2 Million Affected by University of Hawaii Cancer Center Data Breach

Hackers stole names, Social Security numbers, driver’s license information, voter registration records, and health-related information.

The post 1.2 Million Affected by University of Hawaii Cancer Center Data Breach appeared first on SecurityWeek.

SecurityWeek – ​Read More

Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM

San Francisco, CA, United States, 3rd March 2026, CyberNewswire

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security

Researchers have uncovered a Wi-Fi vulnerability that allows nearby attackers to intercept sensitive data and execute machine-in-the-middle attacks against connected devices.

The post New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security appeared first on SecurityWeek.

SecurityWeek – ​Read More

AI Agent Overload: How to Solve the Workload Identity Crisis

Workloads keep getting more complicated and organizations are struggling to keep up. So what’s the play?

darkreading – ​Read More

Android Update Patches Exploited Qualcomm Zero-Day

An integer overflow or wraparound in the Qualcomm graphics component, the bug leads to memory corruption.

The post Android Update Patches Exploited Qualcomm Zero-Day appeared first on SecurityWeek.

SecurityWeek – ​Read More

Project Compass Targets 764 Network as 30 Arrested and Victims Rescued

Europol’s Project Compass targets The Com (aka 764 network), an online group exploiting minors. After 30 arrests, officials say the hunt for those involved is far from over.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.
It’s advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand’s real URL. It also lets

The Hacker News – ​Read More

AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged

The Rise of MCPs in the Enterprise
The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This is already showing up in production

The Hacker News – ​Read More