Proton is stepping into the future of cybersecurity with the introduction of post-quantum encryption in Proton Mail. The new feature helps users safeguard their emails today against the potential threats of tomorrow’s quantum computing era.

Read More: https://www.security.land/proton-mail-post-quantum-encryption/

#SecurityLand #Proton #News #ProtonMail #PostQuantum #Encryption #EmailSecurity

Proton Mail Introduces Post-Quantum Encryption

Proton Mail now offers post-quantum encryption as an optional feature, helping users protect emails against future quantum computing threats.

Security Land | Decoding the Cyber Threat Landscape

Westcon-Comstor is set to strengthen cybersecurity collaboration across the Balkans through its participation in the RISK Conference 2026, a major regional event bringing together industry leaders and experts. The move follows its acquisition of REAL security and highlights a growing focus on knowledge sharing, AI-era threats, and regional cooperation in tackling evolving cyber risks.

Read More: https://www.security.land/westcon-comstor-to-strengthen-balkans-cybersecurity-ties-at-risk-conference-2026/

#SecurityLand #Cybersecurity #WestconComstor #REALsecurity #Slovenia #RISK

Westcon-Comstor at RISK Conference 2026 | Balkans Cybersecurity

Participation in region’s leading cybersecurity event follows the distributor’s recent acquisition of REAL Security

Security Land | Decoding the Cyber Threat Landscape

Belgium and the UK signed a defense MoU last week that doesn't involve new aircraft or satellites — but it matters.

QinetiQ has been handed a mandate to help Belgium build a sovereign Joint Electromagnetic Warfare Support Center, modeled on the UK's SOCIETAS program.

Read More: https://www.security.land/belgium-takes-control-of-its-electronic-warfare-future-with-uk-partnership/

#SecurityLand #GeoSphere #EU #UK #Belgium #ElectronicWarfare #Military #Government

Belgium Gets Sovereign EW Capability With UK Help

A quietly significant defense deal signed last week between Brussels and London puts QinetiQ in charge of building Belgium's first sovereign electromagnetic warfare support center — modeled directly on the UK's own SOCIETAS program.

Security Land | Decoding the Cyber Threat Landscape

🚨 Over the past two weeks, two massive, overlapping campaigns—TeamPCP’s "blitzkrieg" on security tools like Trivy and Checkmarx, and UNC1069's devastating RAT deployment via the Axios library—have compromised thousands of CI/CD pipelines.

Read the full deep-dive and get the immediate mitigation steps here: https://www.security.land/2026-supply-chain-attacks-teampcp-trivy-axios/

#SecurityLand #BreachBreakdown #SupplyChainAttack #NPM #Cybersecurity #Axios #Trivy #TeamPCP #UNC1069

March 2026 Supply Chain Attacks: TeamPCP & Axios Analyzed

A technical breakdown of the March 2026 supply chain attacks, examining how threat actors like TeamPCP and UNC1069 compromised Trivy, LiteLLM, and Axios—and how to stop them.

Security Land | Decoding the Cyber Threat Landscape

After years of delays and political wrangling, Poland's NIS2-implementing cybersecurity law is finally live. Here's what changed on April 3, and what comes next for tens of thousands of Polish businesses.

Read More: https://www.security.land/polands-new-cybersecurity-law-what-the-ksc-amendment-means-for-business/

#SecurityLand #GeoSphere #Cybersecurity #EU #NIS2 #Poland #SME #Government

Poland's New Cybersecurity Law: What the KSC Amendment Means

After years of delays and political wrangling, Poland's NIS2-implementing cybersecurity law is finally live. Here's what is going to change on April 3, and what comes next for tens of thousands of Polish businesses.

Security Land | Decoding the Cyber Threat Landscape

The Stryker outage confirms a shift in Handala’s tactics: moving from regional hacktivism to destructive global operations. By abusing Microsoft Intune, they bypassed traditional EDR to wipe 200k devices. Identity, not malware, was the vector.

Read More: https://www.security.land/stryker-cyberattack-handala-wiper/

#SecurityLand #News #Stryker #Handala #Wiper #MicrosoftIntune #Cybersecurity

Stryker Cyberattack: 200,000 Devices Wiped by Handala Group

On March 11, Stryker employees in 79 countries watched their laptops and phones factory-reset in real-time. This wasn't a ransom demand—it was a message.

Security Land | Decoding the Cyber Threat Landscape

Spain is becoming a European cyber powerhouse. With a projected €3 billion market valuation by year-end, the surge is fueled by mandatory EU compliance—and a desperate race to find qualified professionals.

Read More: https://www.security.land/spain-cybersecurity-market-3-billion-2026/

#SecurityLand #News #Cybersecurity #Spain #Market #EU #NIS2 #Europe

Spain Cybersecurity Market to Surpass €3 Billion by 2026

Spain is becoming a European cyber powerhouse. With a projected €3 billion market valuation by year-end, the surge is fueled by mandatory EU compliance—and a desperate race to find qualified professionals.

Security Land | Decoding the Cyber Threat Landscape

Forbidden Hyena is now using AI-generated code to deploy the BlackReaperRAT against Russian energy & retail sectors. By leveraging AI-generated PowerShell scripts and a new custom Trojan—BlackReaperRAT—this group has transitioned from ideological protests to sophisticated corporate extortion.

Read More: https://www.security.land/ai-crafted-chaos-the-rise-of-forbidden-hyena-and-the-blackreaperrat/

#SecurityLand #CyberSecurity #Russia #ForbiddenHyena #AI #Ransomware #CriticalInfrastructure

Hacktivists Use AI Scripts to Launch BlackReaperRAT Attacks

The line between hacktivism and extortion is blurring. The "Forbidden Hyena" group is now using AI-generated PowerShell scripts to deploy the BlackReaperRAT, a stealthy new Trojan capable of total system takeover.

Security Land | Decoding the Cyber Threat Landscape

South Korea's cybersecurity "Gold Standard" is getting a major technical upgrade. Following a string of high-profile breaches at recently certified firms—including Lotte Card and Under Armour—regulators are pivoting away from document-heavy audits.

A vital lesson for global compliance: Paperwork doesn't stop hackers; technical hygiene does.

Read More: https://www.security.land/south-korea-isms-p-certification-overhaul-2026/

#SecurityLand #Cybersecurity #GeoSphere #SouthKorea #ISMSP #InfoSec #PenetrationTesting #DataBreach

South Korea's ISMS-P Security Certification Under Fire

The "Gold Standard" of South Korean cybersecurity is being questioned. After several ISMS-P certified firms suffered massive data leaks, the Ministry of Science and ICT has announced a shift to a "Technology-Centered" audit model to restore public trust.

Security Land | Decoding the Cyber Threat Landscape

The OpenClaw autonomous AI agent has achieved explosive growth, but its rapid rise has triggered a major security crisis. China's MIIT and CNCERT have issued urgent warnings following the discovery of over 40,000 exposed instances of the software online. The highest density of these exposed instances was located in China, followed by the US and Singapore.

Read More: https://www.security.land/china-openclaw-ai-security-alert-cve-2025-11251/

#SecurityLand #GeoSphere #China #OpenClaw #AI #SecurityVulnerability #CVE

China Issues Security Alert on OpenClaw AI Agent

The Ministry of Industry and Information Technology (MIIT) has issued an urgent warning against the open-source AI agent OpenClaw. Due to severe "default configuration" risks and hijacking flaws, government agencies and major banks have been ordered to restrict its use.

Security Land | Decoding the Cyber Threat Landscape