Cybersecurity News & Advisories

Security advisories and industry news, curated for the small business owner. Practical updates without the noise.

Last updated: 2 March 2026 at 21:52 UTC

Security Advisories

Active advisories for common small business platforms.

Microsoft Security

OAuth redirection abuse enables phishing and malware delivery

2 March 2026

OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure. The…

Microsoft Security

Threat modeling AI applications

26 February 2026

AI threat modeling helps teams identify misuse, emergent risk, and failure modes in probabilistic and agentic AI systems. The post Threat modeling AI applications appeared first on Microsoft Security…

Microsoft SecurityAI THREAT

Scaling security operations with Microsoft Defender autonomous defense and expert-led services

24 February 2026

AI-powered cyberattacks outpace aging SOC tools, and this new guide explains why manual defense fails and how autonomous, expert-led security transforms modern protection. The post Scaling security…

CISA Advisory

Gardyn Home Kit

24 February 2026

View CSAF Summary Successful exploitation of these vulnerabilities could allow unauthenticated users to access and control edge devices, access cloud-based devices and user information without…

Microsoft Security

New e-book: Establishing a proactive defense with Microsoft Security Exposure Management

19 February 2026

Read the new maturity-based guide that helps organizations move from fragmented, reactive security practices to a unified exposure management approach that enables proactive defense. The post New…

Microsoft Security

Unify now or pay later: New research exposes the operational cost of a fragmented SOC

17 February 2026

New research from Microsoft and Omdia reveals how fragmented tools, manual workflows, and alert overload are pushing SOCs to a breaking point. The post Unify now or pay later: New research exposes…

CISA Advisory

CISA Adds Four Known Exploited Vulnerabilities to Catalog

17 February 2026

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2008-0015 Microsoft Windows Video ActiveX Control Remote…

Microsoft Security

Your complete guide to Microsoft experiences at RSAC™ 2026 Conference

12 February 2026

Microsoft Security returns to RSAC Conference to show how Frontier Firms—organizations that are human-led and agent-operated—can stay ahead. The post Your complete guide to Microsoft experiences at…

CISA Advisory

Siemens Solid Edge

12 February 2026

View CSAF Summary Solid Edge uses PS/IGES Parasolid Translator Component that contains an out of bounds read that could be triggered when the application reads files in IGS file formats. If a user is…

Industry News

Security news and developments from across the industry.

Bleeping Computer

Fake Google Security site uses PWA app to steal credentials, MFA codes

2 March 2026

A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker…

Bleeping Computer

Alabama man pleads guilty to hacking, extorting hundreds of women

2 March 2026

A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors). [...]

Bleeping Computer

Florida woman imprisoned for massive Microsoft license fraud scheme

2 March 2026

A Florida woman was sentenced to 22 months in prison for running a massive years-long scheme to traffic thousands of stolen Microsoft Certificate of Authenticity (COA) labels. [...]

The Hacker News

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

2 March 2026

Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the…

The Hacker News

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

2 March 2026

Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers. "To ensure the scalability and efficiency of…

Bleeping Computer

UK warns of Iranian cyberattack risks amid Middle-East conflict

2 March 2026

The United Kingdom's National Cyber Security Centre (NCSC) alerted British organizations to a heightened risk of Iranian cyberattacks amid the ongoing conflict in the Middle East. [...]

Security Week

Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant

2 March 2026

Malicious extensions could hijack the Gemini Live in Chrome feature to spy on users and steal their files. The post Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant appeared…

Bleeping ComputerAI THREAT

How Deepfakes and Injection Attacks Are Breaking Identity Verification

2 March 2026

Deepfakes and injection attacks are targeting identity verification moments, from onboarding to account recovery. Incode explains why enterprises must validate the full session—media, device…

Security Week

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

2 March 2026

Malicious websites could open a WebSocket connection to localhost on the OpenClaw gateway port, brute force passwords, and take control of the agent. The post OpenClaw Vulnerability Allowed Websites…

Security Week

Madison Square Garden Data Breach Confirmed Months After Hacker Attack

2 March 2026

The company is one of the many victims of the 2025 Oracle E-Business Suite (EBS) hacking campaign. The post Madison Square Garden Data Breach Confirmed Months After Hacker Attack appeared first on…

The Hacker News

⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

2 March 2026

This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control,…

Security Week

Nick Andersen Appointed Acting Director of CISA

2 March 2026

Madhu Gottumukkala has been assigned to a new role within the Department of Homeland Security. The post Nick Andersen Appointed Acting Director of CISA appeared first on SecurityWeek.

Security Week

AWS Expands Security Hub Into a Cross-Domain Security Platform

2 March 2026

The AWS Security Hub Extended plan aims to reduce security tool sprawl by correlating findings across multiple security domains. The post AWS Expands Security Hub Into a Cross-Domain Security…

Bleeping Computer

Anthropic confirms Claude is down in a worldwide outage

2 March 2026

Claude appears to be having a major outage right now, with elevated errors reported across all platforms. [...]

The Hacker News

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

2 March 2026

Most SaaS teams remember the day their user traffic started growing fast. Few notice the day bots started targeting them. On paper, everything looks great: more sign-ups, more sessions, more API…

Security Week

North Korean APT Targets Air-Gapped Systems in Recent Campaign

2 March 2026

Using Windows shortcut files, the APT deployed a new implant, a loader, a propagation tool, and two backdoors. The post North Korean APT Targets Air-Gapped Systems in Recent Campaign appeared first…

Security Week

Google Working Towards Quantum-Safe Chrome HTTPS Certificates

2 March 2026

The internet giant is developing an evolution of the certificates based on Merkle Tree Certificates (MTCs). The post Google Working Towards Quantum-Safe Chrome HTTPS Certificates appeared first on…

Security Week

US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates

2 March 2026

Both sides conduct hacking and other attacks, including the deployment of wiper malware, DDoS, and disruptions to critical infrastructure. The post US-Israel and Iran Trade Cyberattacks: Pro-West…

Links point to third-party sources. Phylaxion Security curates but does not control external content. News coverage reflects the reporting of third-party publishers and does not constitute advice or endorsement by Phylaxion Security LLC.

Concerned about a recent threat?

Our team can help you assess relevance to your environment and identify your next step.

Book a Consultation