Cybersecurity Hacking News10 Min Read March 5, 2026 ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how quickly the threat…
2 Min Read March 5, 2026 Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders Most organizations assume encrypted data is safe. But many attackers are… Data Protection Encryption
3 Min Read March 5, 2026 Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware A suspected Iran-nexus threat actor has been attributed to a campaign… Malware Threat Intelligence
5 Min Read March 5, 2026 Where Multi-Factor Authentication Stops and Credential Abuse Starts Organizations typically roll out multi-factor authentication (MFA) and… Active Directory Windows Security
Mobile Security Threat Intelligence4 Min Read March 4, 2026 Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions…
Artificial Intelligence SaaS Security3 Min Read March 4, 2026 New RFP Template for AI Usage Control and AI Governance As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget…
Application Security Threat Intelligence2 Min Read March 4, 2026 Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a…
Malware Windows Security3 Min Read March 4, 2026 APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to…
Endpoint Security Threat Intelligence3 Min Read March 3, 2026 Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc…
Network Security Regulatory Compliance8 Min Read March 3, 2026 Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time…
Artificial Intelligence Enterprise Security5 Min Read February 28, 2026 ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a…
API Security Generative AI3 Min Read February 28, 2026 Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to…
Artificial Intelligence National Security3 Min Read February 28, 2026 Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI)…
Financial Crime Social Engineering2 Min Read February 27, 2026 DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus…
Network Security Vulnerability2 Min Read February 27, 2026 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that…
Linux Security Malware2 Min Read February 27, 2026 Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…
Malware Surveillance3 Min Read February 27, 2026 ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive…
Endpoint Security Windows Security2 Min Read February 27, 2026 Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to…
Digital Advertising Online Scam5 Min Read February 27, 2026 Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers…
Blockchain Malware4 Min Read February 26, 2026 Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control…
Malware Threat Intelligence2 Min Read February 26, 2026 UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare…
Cybersecurity Hacking News10 Min Read February 26, 2026 ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an…
Data Protection Encryption8 Min Read February 26, 2026 Expert Recommends: Prepare for PQC Right Now Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into…
Malware Supply Chain Attack5 Min Read February 26, 2026 Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical…
Cloud Security Social Engineering3 Min Read February 25, 2026 SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women…
Malware Analysis Threat Detection5 Min Read February 25, 2026 Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early,…
Enterprise Security Identity Security5 Min Read February 24, 2026 Identity Prioritization isn't a Backlog Problem – It's a Risk Math Problem Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control…
Healthcare Threat Intelligence3 Min Read February 24, 2026 Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an…
Malware Vulnerability3 Min Read February 24, 2026 UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan,…
Cybersecurity Hacking15 Min Read February 23, 2026 ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the…
Artificial Intelligence Zero Trust6 Min Read February 23, 2026 How Exposed Endpoints Increase Risk Across LLM Infrastructure As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming…
AI Security DevOps4 Min Read February 23, 2026 Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster…
Artificial Intelligence Threat Intelligence3 Min Read February 23, 2026 MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and…
Artificial Intelligence Threat Intelligence4 Min Read February 21, 2026 AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence…
Artificial Intelligence DevSecOps2 Min Read February 21, 2026 Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software…
Patch Management Vulnerability1 Min Read February 21, 2026 CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to…
Artificial Intelligence Training3 Min Read February 21, 2026 EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4…
Cyber Attack Vulnerability2 Min Read February 20, 2026 BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and…
Artificial Intelligence Software Security4 Min Read February 20, 2026 Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated to…
Malware Threat Intelligence2 Min Read February 20, 2026 ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised legitimate sites to deliver a previously…
Cyber Insurance Password Security4 Min Read February 20, 2026 Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026 With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on…
Cybercrime Law Enforcement2 Min Read February 20, 2026 Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case A 29-year-old Ukrainian national has been sentenced to five years in prison in the U.S. for his role in facilitating North Korea's fraudulent…
Banking Security Financial Crime2 Min Read February 20, 2026 FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025 The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of…
Corporate Espionage Insider Threat3 Min Read February 20, 2026 Former Google Engineers Indicted Over Trade Secret Transfers to Iran Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing trade secret theft from the…
Malware Mobile Security3 Min Read February 19, 2026 PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google's generative artificial…
Cybercrime Financial Crime2 Min Read February 19, 2026 INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million as part of an effort…