<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 3/4/2026

SHARE

Top News

Iranian Strikes on Amazon Data Centers Highlight Industry's Vulnerability to Physical Disasters

Damage to three Amazon Web Services facilities in the Middle East from Iranian drone strikes highlights the rapid growth of data centers in the region, as well as the industry's vulnerability to conflict. The company's cloud computing division, Amazon Web Services, said late Monday that two data centers in the United Arab Emirates were "directly struck" and another facility in Bahrain was also damaged after a drone landed nearby. READ MORE...


Pro-Russia actors team with Iran-linked hackers in attacks

Pro-Russia threat actors have formed a loose coalition with Iran-nexus hacking groups in response to the bombing campaign launched by the U.S. and Israel on Iran. The groups began working together Monday under the #OpIsrael campaign, with a focus on targeting critical infrastructure and exfiltration of data, according to researchers at Flashpoint. A group called the Cyber Islamic Resistance targeted an Israeli defense defense contractor along with multiple municipal governments. READ MORE...

Hacking

LastPass Warns of New Phishing Campaign

LastPass is warning users of a new phishing campaign that aims to trick them into handing over their master password. The fake emails purport to come from LastPass, leveraging a spoofed display name. "The attacker relies on the fact that many email clients (especially mobile) show only the display name, hiding the real sender address unless you expand it," LastPass noted. The phishing emails inform recipients of unauthorized access to their account and urge victims to take immediate action READ MORE...

Software Updates

High-severity Qualcomm bug hits Android devices in targeted attacks

Google has patched 129 vulnerabilities in Android in its March 2026 Android Security Bulletin, including a Qualcomm display flaw that is known to be actively exploited. You can check your device's Android version, security update level, and Google Play system update in Settings. You should get a notification when updates are available, but you can also check for them yourself. If your Android phone shows a patch level of 2026-03-05 or later, these issues are fixed. READ MORE...

Information Security

Cloudflare tracked 230 billion daily threats and here is what it found

Cloudflare's network blocks over 230 billion threats per day. The volume indicates how routine and automated the attack cycle has become, and the patterns behind that volume point to a shift in how breaches begin and progress. Cloudflare's threat research unit, Cloudforce One, published its inaugural cyber threat report 2026, covering activity observed through 2025 and projecting into the year ahead. The report draws on telemetry from Cloudflare's network. READ MORE...


Chat at your own risk! Data brokers are selling deeply personal bot transcripts

Your latest chat transcript could be bought and sold. Data brokers are selling access to sensitive personal data captured during chatbot conversations, despite claims that the data is anonymized and obtained with consent. Lee S Dryburgh, an expert in AI visibility for consumer health and longevity brands, explained how this works in a report provided to The Register. People install browser extensions without reading or understanding the extension's privacy policy. READ MORE...


Vehicle Tire Pressure Sensors Enable Silent Tracking

Most people would never imagine that the innocuous tire pressure monitoring system (TPMS) in their vehicles could be used to track their movements. But, as with many things digital, it turns out the feature, designed for vehicle safety and maintenance, can also expose unintended signals that enable precisely that capability. TPMS sensors - mandated in the US since 2007 - transmit tire pressure readings automatically and at regular intervals whenever a vehicle is in motion. READ MORE...

Exploits/Vulnerabilities

Possible U.S.-developed exploits linked to first known 'mass' iOS attack

An exploit kit that may have originated from a leaked U.S. government framework is behind what researchers are calling the first mass-scale attack on iOS, the operating system for Apple's iPhones. Traces of the exploits, found in the work of Chinese cybercriminals, also have been spotted in Russian attacks on Ukraine and used by a customer of a spyware vendor. Those conclusions come from two pieces of research that Google Threat Intelligence Group and iVerify released separately Tuesday. READ MORE...


Researchers discover suite of agentic AI browser vulnerabilities

Researchers have discovered multiple vulnerabilities that let attackers to quietly hijack agentic AI browsers. Researchers at Zenity Labs discovered these flaws, which affected multiple AI browsers. Before being patched, an attacker could exploit them via a legitimate calendar invite, using a prompt injection to force the AI browser to act against its user. "These issues do not target a single application bug," Stav Cohen, senior researcher at Zenity wrote in a blog published Tuesday. READ MORE...


Attackers abuse OAuth's built-in redirects to launch phishing and malware attacks

Attackers are abusing normal OAuth error redirects to send users from a legitimate Microsoft or Google login URL to phishing or malware pages, without ever completing a successful sign-in or stealing tokens from the OAuth flow itself. OAuth (Open Authorization) is an open-standard protocol for delegated authorization. It allows users to grant websites or applications access to their data on another service (for example, Google or Facebook) without sharing their password. READ MORE...

On This Date

  • ...in 1745, Revolutionary War general Casimir Pulaski, recognized as "the father of the American cavalry", is born in Warsaw, Poland.
  • ...in 1789, the first Congress of the United States meets, putting the US Constitution into effect for the first time.
  • ...in 1922, F.W. Murnau's silent horror film "Nosferatu" (an early unauthorized adaptation of Bram Stoker's "Dracula") premieres in Berlin.
  • ...in 1977, the first ever CRAY 1 supercomputer is shipped to Los Alamos Laboratories in New Mexico.