Application Security Vulnerability3 Min Read March 11, 2026 Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs th…
2 Min Read March 11, 2026 Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown Meta on Wednesday said it disabled over 150,000 accounts associated with… Artificial Intelligence Cybercrime
2 Min Read March 11, 2026 Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices SAP has released security updates to address two critical security flaws… Enterprise Security Vulnerability
4 Min Read March 11, 2026 What Boards Must Demand in the Age of AI-Automated Exploitation “You knew, and you could have acted. Why didn’t… Enterprise Security Regulatory Compliance
Patch Tuesday Vulnerability3 Min Read March 11, 2026 Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that…
Database Security Vulnerability2 Min Read March 10, 2026 New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run…
Artificial Intelligence Threat Detection2 Min Read March 10, 2026 How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can…
Shadow IT Vulnerability Management4 Min Read March 10, 2026 The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction You can't control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The…
Cyber Espionage Threat Intelligence3 Min Read March 10, 2026 APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to…
API Security Cloud Security2 Min Read March 10, 2026 Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool Salesforce has warned of an increase in threat actor activity that's aimed at exploiting misconfigurations in publicly accessible Experience…
DevOps Threat Intelligence3 Min Read March 9, 2026 UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency…
Cybersecurity Hacking20 Min Read March 9, 2026 ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware Another week in cybersecurity. Another week of "you've got to be kidding me." Attackers were busy. Defenders were busy. And somewhere in the…
Endpoint Security Security Operations2 Min Read March 9, 2026 Can the Security Platform Finally Deliver for the Mid-Market? Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of…
Browser Security Threat Intelligence5 Min Read March 9, 2026 Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push…
Artificial Intelligence DevSecOps2 Min Read March 7, 2026 OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues OpenAI on Friday began rolling out Codex Security, an artificial intelligence (AI)-powered security agent that's designed to find, validate,…
Artificial Intelligence Browser Security3 Min Read March 7, 2026 Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with…
Cyber Espionage Threat Intelligence4 Min Read March 6, 2026 Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence…
Threat Intelligence Windows Security3 Min Read March 6, 2026 Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various…
Artificial Intelligence Enterprise Security3 Min Read March 6, 2026 The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale.…
Cloud Security Cyber Warfare5 Min Read March 6, 2026 Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself…
Cyber Espionage Threat Intelligence3 Min Read March 6, 2026 China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since…
Browser Security Endpoint Security2 Min Read March 6, 2026 Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app…
Network Security Vulnerability1 Min Read March 6, 2026 Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell…
Enterprise Security Vulnerability2 Min Read March 5, 2026 Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active…
Cybersecurity Hacking News10 Min Read March 5, 2026 ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how…
Data Protection Encryption2 Min Read March 5, 2026 Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s encryption can be…
Malware Threat Intelligence3 Min Read March 5, 2026 Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's…
Active Directory Windows Security5 Min Read March 5, 2026 Where Multi-Factor Authentication Stops and Credential Abuse Starts Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In…
Mobile Security Threat Intelligence4 Min Read March 4, 2026 Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions…
Artificial Intelligence SaaS Security3 Min Read March 4, 2026 New RFP Template for AI Usage Control and AI Governance As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget…
Application Security Threat Intelligence2 Min Read March 4, 2026 Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a…
Malware Windows Security3 Min Read March 4, 2026 APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to…
Endpoint Security Threat Intelligence3 Min Read March 3, 2026 Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc…
Network Security Regulatory Compliance8 Min Read March 3, 2026 Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time…
Artificial Intelligence Enterprise Security5 Min Read February 28, 2026 ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a…
API Security Generative AI3 Min Read February 28, 2026 Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to…
Artificial Intelligence National Security3 Min Read February 28, 2026 Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI)…
Financial Crime Social Engineering2 Min Read February 27, 2026 DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus…
Network Security Vulnerability2 Min Read February 27, 2026 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that…
Linux Security Malware2 Min Read February 27, 2026 Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…
Malware Surveillance3 Min Read February 27, 2026 ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive…
Endpoint Security Windows Security2 Min Read February 27, 2026 Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to…
Digital Advertising Online Scam5 Min Read February 27, 2026 Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers…
Blockchain Malware4 Min Read February 26, 2026 Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control…
Malware Threat Intelligence2 Min Read February 26, 2026 UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare…
Cybersecurity Hacking News10 Min Read February 26, 2026 ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an…