Cyber Espionage Threat Intelligence3 Min Read March 21, 2026 FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like …
1 Min Read March 21, 2026 Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager Oracle has released security updates to address a critical security flaw… Threat Intelligence Vulnerability
4 Min Read March 21, 2026 Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages The threat actors behind the supply chain attack targeting the popular… Malware Threat Intelligence
3 Min Read March 21, 2026 CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on… Threat Intelligence Vulnerability
Shadow IT Vulnerability Management4 Min Read March 10, 2026 The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction You can't control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The…
Cyber Espionage Threat Intelligence3 Min Read March 10, 2026 APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to…
API Security Cloud Security2 Min Read March 10, 2026 Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool Salesforce has warned of an increase in threat actor activity that's aimed at exploiting misconfigurations in publicly accessible Experience…
DevOps Threat Intelligence3 Min Read March 9, 2026 UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency…
Cybersecurity Hacking20 Min Read March 9, 2026 ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware Another week in cybersecurity. Another week of "you've got to be kidding me." Attackers were busy. Defenders were busy. And somewhere in the…
Endpoint Security Security Operations2 Min Read March 9, 2026 Can the Security Platform Finally Deliver for the Mid-Market? Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of…
Browser Security Threat Intelligence5 Min Read March 9, 2026 Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push…
Artificial Intelligence DevSecOps2 Min Read March 7, 2026 OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues OpenAI on Friday began rolling out Codex Security, an artificial intelligence (AI)-powered security agent that's designed to find, validate,…
Artificial Intelligence Browser Security3 Min Read March 7, 2026 Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with…
Cyber Espionage Threat Intelligence4 Min Read March 6, 2026 Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence…
Threat Intelligence Windows Security3 Min Read March 6, 2026 Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various…
Artificial Intelligence Enterprise Security3 Min Read March 6, 2026 The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale.…
Cloud Security Cyber Warfare5 Min Read March 6, 2026 Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself…
Cyber Espionage Threat Intelligence3 Min Read March 6, 2026 China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since…
Browser Security Endpoint Security2 Min Read March 6, 2026 Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app…
Network Security Vulnerability1 Min Read March 6, 2026 Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell…
Enterprise Security Vulnerability2 Min Read March 5, 2026 Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active…
Cybersecurity Hacking News10 Min Read March 5, 2026 ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how…
Data Protection Encryption2 Min Read March 5, 2026 Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s encryption can be…
Malware Threat Intelligence3 Min Read March 5, 2026 Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's…
Active Directory Windows Security5 Min Read March 5, 2026 Where Multi-Factor Authentication Stops and Credential Abuse Starts Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In…
Mobile Security Threat Intelligence4 Min Read March 4, 2026 Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions…
Artificial Intelligence SaaS Security3 Min Read March 4, 2026 New RFP Template for AI Usage Control and AI Governance As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget…
Application Security Threat Intelligence2 Min Read March 4, 2026 Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a…
Malware Windows Security3 Min Read March 4, 2026 APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to…
Endpoint Security Threat Intelligence3 Min Read March 3, 2026 Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc…
Network Security Regulatory Compliance8 Min Read March 3, 2026 Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time…
Artificial Intelligence Enterprise Security5 Min Read February 28, 2026 ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a…
API Security Generative AI3 Min Read February 28, 2026 Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to…
Artificial Intelligence National Security3 Min Read February 28, 2026 Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI)…
Financial Crime Social Engineering2 Min Read February 27, 2026 DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus…
Network Security Vulnerability2 Min Read February 27, 2026 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that…
Linux Security Malware2 Min Read February 27, 2026 Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via…
Malware Surveillance3 Min Read February 27, 2026 ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive…
Endpoint Security Windows Security2 Min Read February 27, 2026 Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to…
Digital Advertising Online Scam5 Min Read February 27, 2026 Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers…
Blockchain Malware4 Min Read February 26, 2026 Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control…
Malware Threat Intelligence2 Min Read February 26, 2026 UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare…
Cybersecurity Hacking News10 Min Read February 26, 2026 ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an…
Data Protection Encryption8 Min Read February 26, 2026 Expert Recommends: Prepare for PQC Right Now Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into…
Malware Supply Chain Attack5 Min Read February 26, 2026 Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical…
Cloud Security Social Engineering3 Min Read February 25, 2026 SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women…