BleepingComputer Mar 3, 2026, 11:44 AM
Read
Amazon has confirmed that three Amazon Web Services (AWS) data centers in the United Arab Emirates (UAE) and one in Bahrain have been damaged by drone strikes, causing an extensive outage that is still affecting dozens of cloud computing services. [...]
Infosecurity Magazine Mar 3, 2026, 11:00 AM
Read
Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches
BleepingComputer Mar 3, 2026, 10:50 AM
Read
Cloud Imperium Games (CIG), the game developer behind Star Citizen and Squadron 42, says attackers breached systems containing some users' personal information in January. [...]
SecurityWeek Mar 3, 2026, 10:43 AM
Read
Improper input sanitization in the framework can be exploited through the Shell tool, allowing attackers to modify system files and steal data. The post Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise appeared first on SecurityWeek.
Infosecurity Magazine Mar 3, 2026, 10:30 AM
Read
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack
BleepingComputer Mar 3, 2026, 09:48 AM
Read
The University of Hawaii confirmed that a ransomware gang stole the data of nearly 1.2 million individuals in August 2025 after breaching its Cancer Center's Epidemiology Division. [...]
SecurityWeek Mar 3, 2026, 09:40 AM
Read
Using low-cost receivers deployed along roads, academic researchers tracked drivers and their movement patterns. The post Researchers Uncover Method to Track Cars via Tire Sensors appeared first on SecurityWeek.
The Hacker News Mar 3, 2026, 09:20 AM
Read
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector o…
BleepingComputer Mar 3, 2026, 08:19 AM
Read
Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero-day flaw in a Qualcomm display component. [...]
The Hacker News Mar 3, 2026, 07:08 AM
Read
Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graph…
The Hacker News Mar 3, 2026, 06:53 AM
Read
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and…
BleepingComputer Mar 3, 2026, 12:06 AM
Read
Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet FortiGate firewalls. [...]
BleepingComputer Mar 2, 2026, 08:23 PM
Read
A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims' browsers. [...]
BleepingComputer Mar 2, 2026, 06:54 PM
Read
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors). [...]
BleepingComputer Mar 2, 2026, 05:30 PM
Read
A Florida woman was sentenced to 22 months in prison for running a massive years-long scheme to traffic thousands of stolen Microsoft Certificate of Authenticity (COA) labels. [...]
The Hacker News Mar 2, 2026, 05:08 PM
Read
Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8…
The Hacker News Mar 2, 2026, 04:52 PM
Read
Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers. "To ensure the scalability and efficiency of the ecosystem, Chrome has no immediate plan to add traditiona…
Infosecurity Magazine Mar 2, 2026, 04:15 PM
Read
Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS
BleepingComputer Mar 2, 2026, 03:54 PM
Read
The United Kingdom's National Cyber Security Centre (NCSC) alerted British organizations to a heightened risk of Iranian cyberattacks amid the ongoing conflict in the Middle East. [...]
Infosecurity Magazine Mar 2, 2026, 03:45 PM
Read
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more
SecurityWeek Mar 2, 2026, 03:26 PM
Read
Malicious extensions could hijack the Gemini Live in Chrome feature to spy on users and steal their files. The post Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant appeared first on SecurityWeek.
BleepingComputer Mar 2, 2026, 03:01 PM
Read
Deepfakes and injection attacks are targeting identity verification moments, from onboarding to account recovery. Incode explains why enterprises must validate the full session—media, device integrity, and behavior—to stop synthetic and injected attacks in rea…
Infosecurity Magazine Mar 2, 2026, 03:00 PM
Read
Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms
SecurityWeek Mar 2, 2026, 02:26 PM
Read
Malicious websites could open a WebSocket connection to localhost on the OpenClaw gateway port, brute force passwords, and take control of the agent. The post OpenClaw Vulnerability Allowed Websites to Hijack AI Agents appeared first on SecurityWeek.
SecurityWeek Mar 2, 2026, 01:53 PM
Read
The company is one of the many victims of the 2025 Oracle E-Business Suite (EBS) hacking campaign. The post Madison Square Garden Data Breach Confirmed Months After Hacker Attack appeared first on SecurityWeek.
Cybersecurity Ventures Mar 2, 2026, 01:47 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 2, 2026 – Read the full story from Ox Security Cybersecurity Ventures predicted that global damage costs resulting from software supply chain attacks would reach $60 bi…
The Hacker News Mar 2, 2026, 01:26 PM
Read
This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control, exposed keys, and normal features are being used as entry poi…
SecurityWeek Mar 2, 2026, 12:53 PM
Read
Madhu Gottumukkala has been assigned to a new role within the Department of Homeland Security. The post Nick Andersen Appointed Acting Director of CISA appeared first on SecurityWeek.
SecurityWeek Mar 2, 2026, 12:30 PM
Read
The AWS Security Hub Extended plan aims to reduce security tool sprawl by correlating findings across multiple security domains. The post AWS Expands Security Hub Into a Cross-Domain Security Platform appeared first on SecurityWeek.
BleepingComputer Mar 2, 2026, 12:23 PM
Read
Claude appears to be having a major outage right now, with elevated errors reported across all platforms. [...]
The Hacker News Mar 2, 2026, 11:55 AM
Read
Most SaaS teams remember the day their user traffic started growing fast. Few notice the day bots started targeting them. On paper, everything looks great: more sign-ups, more sessions, more API calls. But in reality, something feels off: Sign-ups increase, bu…
SecurityWeek Mar 2, 2026, 11:46 AM
Read
Using Windows shortcut files, the APT deployed a new implant, a loader, a propagation tool, and two backdoors. The post North Korean APT Targets Air-Gapped Systems in Recent Campaign appeared first on SecurityWeek.
SecurityWeek Mar 2, 2026, 11:33 AM
Read
The internet giant is developing an evolution of the certificates based on Merkle Tree Certificates (MTCs). The post Google Working Towards Quantum-Safe Chrome HTTPS Certificates appeared first on SecurityWeek.
Infosecurity Magazine Mar 2, 2026, 11:30 AM
Read
Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent
SecurityWeek Mar 2, 2026, 11:04 AM
Read
Both sides conduct hacking and other attacks, including the deployment of wiper malware, DDoS, and disruptions to critical infrastructure. The post US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates appeared first on Se…
Infosecurity Magazine Mar 2, 2026, 10:45 AM
Read
Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue
The Hacker News Mar 2, 2026, 10:36 AM
Read
A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai. The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-s…
The Hacker News Mar 2, 2026, 08:44 AM
Read
Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but conta…
BleepingComputer Mar 1, 2026, 09:44 PM
Read
Security researchers have disclosed a high-severity vulnerability dubbed "ClawJacked" in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally running instance and take control over it. [...]
BleepingComputer Mar 1, 2026, 03:23 PM
Read
Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs [...]
BleepingComputer Feb 28, 2026, 07:18 PM
Read
A Chrome extension named "QuickLens - Search Screen with Google Lens" has been removed from the Chrome Web Store after it was compromised to push malware and attempt to steal crypto from thousands of users. [...]
The Hacker News Feb 28, 2026, 05:21 PM
Read
OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. "Our vulnerability lives in the core system itse…
BleepingComputer Feb 28, 2026, 03:17 PM
Read
South Korea's National Tax Service accidentally exposed the mnemonic recovery phrase of a seized cryptocurrency wallet in an official press release, allowing hackers to steal 6.4 billion won ($4.8M) worth in cryptocurrency. [...]
Krebs on Security Feb 28, 2026, 12:01 PM
Read
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort"…
The Hacker News Feb 28, 2026, 09:56 AM
Read
New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings come from Truffle Security, which discovere…
The Hacker News Feb 28, 2026, 04:57 AM
Read
Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a "supply chain risk." "This action follows months of negotiations that reached an impasse over two excepti…
The Hacker News Feb 27, 2026, 06:11 PM
Read
The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were traced to cryptocurrency addresses used for…
The Hacker News Feb 27, 2026, 05:59 PM
Read
The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025. Of these, 401 instances are located in the U.S…
The Hacker News Feb 27, 2026, 03:33 PM
Read
Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legiti…
Infosecurity Magazine Feb 27, 2026, 02:15 PM
Read
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group
Cybersecurity Ventures Feb 27, 2026, 01:53 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 27, 2026 – Watch the YouTube Short Cybercrime Magazine’s latest YouTube Short video, produced by Taylor Fox, looks back at a riveting privacy and surveillance story tha…
The Hacker News Feb 27, 2026, 12:43 PM
Read
The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay com…
Infosecurity Magazine Feb 27, 2026, 11:45 AM
Read
The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week
Infosecurity Magazine Feb 27, 2026, 11:00 AM
Read
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes
The Hacker News Feb 27, 2026, 10:06 AM
Read
Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). "A malicious downloader staged a portable Java runtime and executed a maliciou…
The Hacker News Feb 27, 2026, 07:56 AM
Read
Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effort, the advertisers' methods of payment have been suspended,…
The Hacker News Feb 26, 2026, 06:00 PM
Read
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. "Instead of relying on traditional servers or domains for…
Infosecurity Magazine Feb 26, 2026, 04:00 PM
Read
New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts
The Hacker News Feb 26, 2026, 03:17 PM
Read
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is being tracked by Cisco Talos under the moniker UAT-10027…
Infosecurity Magazine Feb 26, 2026, 03:00 PM
Read
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities
Cybersecurity Ventures Feb 26, 2026, 02:28 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 26, 2026 – Read the full story in BitGuardian The staggering prediction by Cybersecurity Ventures that global cybercrime damages would reach $10.5 trillion USD annually…
The Hacker News Feb 26, 2026, 02:28 PM
Read
Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tactics are sharper. Access happens faster. Control is establis…
Infosecurity Magazine Feb 26, 2026, 02:00 PM
Read
Datadog report reveals two-fifths of services are affected by exploitable bugs
Infosecurity Magazine Feb 26, 2026, 02:00 PM
Read
The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up
Infosecurity Magazine Feb 26, 2026, 12:09 PM
Read
UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation
The Hacker News Feb 26, 2026, 12:06 PM
Read
Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to adversaries as well. The rise of ransomware and cyber extort…
The Hacker News Feb 26, 2026, 10:35 AM
Read
A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. "The activity aligns w…
The Hacker News Feb 26, 2026, 10:09 AM
Read
Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector. The package, codenamed StripeApi.Net, attempt…
Infosecurity Magazine Feb 26, 2026, 09:30 AM
Read
The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation
The Hacker News Feb 26, 2026, 06:13 AM
Read
A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023. The vuln…
The Hacker News Feb 25, 2026, 05:46 PM
Read
Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has…
The Hacker News Feb 25, 2026, 05:00 PM
Read
Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities explo…
The Hacker News Feb 25, 2026, 03:06 PM
Read
The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks,…
The Hacker News Feb 25, 2026, 02:30 PM
Read
Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth, and “just escalate it” calls. That cost doesn’t stay inside the SOC; it shows up…
Infosecurity Magazine Feb 25, 2026, 02:30 PM
Read
IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws
Cybersecurity Ventures Feb 25, 2026, 02:05 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 25, 2026 – Listen to the podcast “CISO Confidential” is a new series on the Cybercrime Magazine Podcast, brought to our listeners by Doppel, a cybersecurity company on…
Infosecurity Magazine Feb 25, 2026, 01:00 PM
Read
Malicious NuGet package mimicking Stripe's library targeted developers
The Hacker News Feb 25, 2026, 12:43 PM
Read
Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role…
The Hacker News Feb 25, 2026, 11:00 AM
Read
Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360: Defending the Digital Battlespace report. This sh…
Infosecurity Magazine Feb 25, 2026, 10:30 AM
Read
A former general manager of a US defense contractor has been sentenced after selling zero days to Russia
Infosecurity Magazine Feb 25, 2026, 09:40 AM
Read
The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully
The Hacker News Feb 25, 2026, 08:49 AM
Read
A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of…
The Hacker News Feb 25, 2026, 07:04 AM
Read
SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below…
The Hacker News Feb 25, 2026, 05:23 AM
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2026…
The Hacker News Feb 24, 2026, 06:52 PM
Read
A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by…
Infosecurity Magazine Feb 24, 2026, 05:00 PM
Read
DTEX claims insider incidents cost $19.5m in 2025, with employee negligence most expensive
Infosecurity Magazine Feb 24, 2026, 04:05 PM
Read
Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information
Infosecurity Magazine Feb 24, 2026, 02:30 PM
Read
Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks
The Hacker News Feb 24, 2026, 02:21 PM
Read
A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor's targeting bey…
Infosecurity Magazine Feb 24, 2026, 01:00 PM
Read
ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes
The Hacker News Feb 24, 2026, 11:58 AM
Read
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, ident…
The Hacker News Feb 24, 2026, 11:52 AM
Read
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom…
Infosecurity Magazine Feb 24, 2026, 11:30 AM
Read
Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities
Infosecurity Magazine Feb 24, 2026, 10:00 AM
Read
CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective
The Hacker News Feb 24, 2026, 09:54 AM
Read
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct…
The Hacker News Feb 24, 2026, 06:04 AM
Read
Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities to improve their own models. The distillation attacks ge…
The Hacker News Feb 23, 2026, 07:41 PM
Read
The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and…
The Hacker News Feb 23, 2026, 05:59 PM
Read
Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. "Analysis of the recovered dropper, persistence triggers, and mining payl…
Infosecurity Magazine Feb 23, 2026, 04:00 PM
Read
Supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages, targeting AI tools has been identified by security researchers
Infosecurity Magazine Feb 23, 2026, 03:30 PM
Read
Sophisticated Python malware uncovered in fraud probe shows obfuscation, disposable infrastructure
Cybersecurity Ventures Feb 23, 2026, 02:17 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 23, 2026 In 2024, Long Island Medium star Theresa Caputo slammed online scammers and begged fans not to send money to them. The reality star warned fans about many soci…
The Hacker News Feb 23, 2026, 01:00 PM
Read
Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are familiar. Across devices,…
Infosecurity Magazine Feb 23, 2026, 12:30 PM
Read
A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances
The Hacker News Feb 23, 2026, 11:58 AM
Read
As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and Application Programming Interfaces (APIs) to support those models. Modern security risks are being introduced less from the models themselves a…
Infosecurity Magazine Feb 23, 2026, 11:30 AM
Read
Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident
Infosecurity Magazine Feb 23, 2026, 10:30 AM
Read
A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone
The Hacker News Feb 23, 2026, 10:20 AM
Read
Cybersecurity researchers have disclosed what they say is an active "Shai-Hulud-like" supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft. The campaign has b…
Infosecurity Magazine Feb 23, 2026, 08:30 AM
Read
University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday
The Hacker News Feb 23, 2026, 07:25 AM
Read
The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations and individuals mainly located across the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operat…
The Hacker News Feb 21, 2026, 02:49 PM
Read
A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That's according to new findings from Ama…
The Hacker News Feb 21, 2026, 07:58 AM
Read
Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in…
The Hacker News Feb 21, 2026, 07:21 AM
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in questi…
The Hacker News Feb 21, 2026, 04:30 AM
Read
With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications and Certified CISO v4 help close the gap between AI adoption and workforce readiness. EC-Council, creator of the world-renowned Certified Ethi…
Krebs on Security Feb 20, 2026, 08:00 PM
Read
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sideste…
Cybersecurity Ventures Feb 20, 2026, 01:42 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 20, 2026 –Watch the YouTube video The award-winning Cybercrime Magazine YouTube Channel released its first Short last month and the video has more than 720,000 Views. I…
Infosecurity Magazine Feb 20, 2026, 12:30 PM
Read
DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report
Infosecurity Magazine Feb 20, 2026, 11:35 AM
Read
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET
Infosecurity Magazine Feb 19, 2026, 04:30 PM
Read
New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows
Infosecurity Magazine Feb 19, 2026, 03:30 PM
Read
Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps
Cybersecurity Ventures Feb 19, 2026, 01:31 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 19, 2026 –Read the full story in Charter Capital Three out of five small-to-midsized businesses (SMBs) permanently shuttered their doors within six months of being hit…
Infosecurity Magazine Feb 19, 2026, 01:00 PM
Read
Forescout paper reveals ICS advisories hit a record 508 in 2025
Infosecurity Magazine Feb 19, 2026, 12:00 PM
Read
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal
Infosecurity Magazine Feb 19, 2026, 10:45 AM
Read
Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched
Infosecurity Magazine Feb 19, 2026, 10:00 AM
Read
Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw
Infosecurity Magazine Feb 18, 2026, 04:00 PM
Read
Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics
Infosecurity Magazine Feb 18, 2026, 03:00 PM
Read
AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication
Cybersecurity Ventures Feb 18, 2026, 01:48 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 18, 2026 –Read the full report in GlobeNewswire Cybercrime has become the world’s third-largest economy, with costs projected to reach $12.2 trillion annually by 2031,…
Infosecurity Magazine Feb 18, 2026, 11:30 AM
Read
Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025
Infosecurity Magazine Feb 18, 2026, 10:10 AM
Read
Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines
Infosecurity Magazine Feb 17, 2026, 04:00 PM
Read
Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development
Infosecurity Magazine Feb 17, 2026, 03:00 PM
Read
iOS 26.4 Beta adds end-to-end encryption for RCS messaging and enhanced Memory Integrity Enforcement
Infosecurity Magazine Feb 17, 2026, 01:45 PM
Read
Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics
Cybersecurity Ventures Feb 17, 2026, 01:21 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 17, 2026 –Listen to the podcast What if your deepest secrets were held to ransom? Author and presenter Jenny Kleeman explores the shocking true story of thousands of pr…
Infosecurity Magazine Feb 17, 2026, 01:00 PM
Read
Teleport study reveals that organizations running over-privileged AI have a 76% incident rate
Infosecurity Magazine Feb 17, 2026, 12:50 PM
Read
Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments
Infosecurity Magazine Feb 17, 2026, 09:35 AM
Read
Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files
Infosecurity Magazine Feb 16, 2026, 05:15 PM
Read
Security researchers have challenged end-to-end encryption claims from popular commercial password managers
Infosecurity Magazine Feb 16, 2026, 04:30 PM
Read
NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations
Infosecurity Magazine Feb 16, 2026, 04:15 PM
Read
OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages
Infosecurity Magazine Feb 16, 2026, 03:45 PM
Read
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo
Cybersecurity Ventures Feb 16, 2026, 01:57 PM
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 16, 2026 –Read the full story in Forbes Cybercriminals are no longer concentrating their efforts on large enterprises; they’re increasingly directing attacks toward sma…
Infosecurity Magazine Feb 16, 2026, 11:30 AM
Read
A high severity vulnerability in Google Chrome and allows remote attackers to execute code
Infosecurity Magazine Feb 16, 2026, 10:30 AM
Read
Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations
Infosecurity Magazine Feb 16, 2026, 09:30 AM
Read
Dutch telco Odido has revealed a major data breach impacting over six million customers
Infosecurity Magazine Feb 13, 2026, 12:30 PM
Read
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk
Infosecurity Magazine Feb 13, 2026, 11:25 AM
Read
Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at LayerX
Infosecurity Magazine Feb 12, 2026, 01:30 PM
Read
Accenture Cybersecurity warns over difficult to detect, “sophisticated toolset” being deployed as part of extortion campaigns
Infosecurity Magazine Feb 12, 2026, 12:45 PM
Read
Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle
Infosecurity Magazine Feb 12, 2026, 10:45 AM
Read
New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts
Infosecurity Magazine Feb 12, 2026, 09:30 AM
Read
Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation
Infosecurity Magazine Feb 11, 2026, 04:35 PM
Read
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware
Krebs on Security Feb 11, 2026, 04:08 PM
Read
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users…
Infosecurity Magazine Feb 11, 2026, 12:05 PM
Read
A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia
Infosecurity Magazine Feb 11, 2026, 11:35 AM
Read
This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed
Infosecurity Magazine Feb 11, 2026, 09:50 AM
Read
Six actively exploited zero-day bug have been patched by Microsoft
Krebs on Security Feb 10, 2026, 09:49 PM
Read
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six "zero-day" vulnerabilities that attackers are already exploiting in the wild.
Infosecurity Magazine Feb 10, 2026, 04:00 PM
Read
High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files
Infosecurity Magazine Feb 10, 2026, 02:00 PM
Read
Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden
Infosecurity Magazine Feb 10, 2026, 02:00 PM
Read
ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access
Infosecurity Magazine Feb 10, 2026, 12:30 PM
Read
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation
Infosecurity Magazine Feb 10, 2026, 11:50 AM
Read
NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers
Infosecurity Magazine Feb 10, 2026, 09:45 AM
Read
The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches
Infosecurity Magazine Feb 9, 2026, 05:30 PM
Read
Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution
Infosecurity Magazine Feb 9, 2026, 04:00 PM
Read
Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms
Infosecurity Magazine Feb 9, 2026, 03:25 PM
Read
VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds
Infosecurity Magazine Feb 9, 2026, 11:15 AM
Read
The services of Florida-based payments platform BridgePay are offline due to a ransomware attack
Infosecurity Magazine Feb 9, 2026, 10:30 AM
Read
Revolut claims social media sites make £3.8bn annually from scam ads targeting European users
Infosecurity Magazine Feb 9, 2026, 09:30 AM
Read
SecurityScorecard has identified over 40,000 OpenClaw deployments exposed to potential attack
Infosecurity Magazine Feb 9, 2026, 09:00 AM
Read
CISA has issued a new directive requiring federal agencies to decommission all end of support edge devices within 12 months to reduce ongoing exploitation risks
Infosecurity Magazine Feb 6, 2026, 05:00 PM
Read
DKnife is a Chinese made malware framework that targets Chinese-based users
Infosecurity Magazine Feb 6, 2026, 04:22 PM
Read
Substack did not specify the number of users affected by the data breach
Infosecurity Magazine Feb 6, 2026, 08:30 AM
Read
Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies
Infosecurity Magazine Feb 5, 2026, 02:30 PM
Read
Flaws in GitHub Codespaces allow RCE via crafted repositories or pull requests
Infosecurity Magazine Feb 5, 2026, 01:30 PM
Read
Cellebrite data confirms digital evidence is now central to almost all cases
Infosecurity Magazine Feb 5, 2026, 11:50 AM
Read
Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation
Infosecurity Magazine Feb 5, 2026, 10:05 AM
Read
Pindrop warns of 1210% increase in AI-powered fraud last year
Infosecurity Magazine Feb 4, 2026, 04:15 PM
Read
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure
Infosecurity Magazine Feb 4, 2026, 03:00 PM
Read
ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops
Infosecurity Magazine Feb 4, 2026, 02:00 PM
Read
Cofense claims AI is making phishing emails more personalized and sophisticated
Infosecurity Magazine Feb 4, 2026, 01:00 PM
Read
Pillar Security discovered two new critical vulnerabilities in n8n that could lead to supply chain compromise, credential harvesting and complete takeover attacks
Infosecurity Magazine Feb 4, 2026, 10:15 AM
Read
CISA has added a critical CVE in SolarWinds Web Help Desk to its KEV Catalog
Infosecurity Magazine Feb 3, 2026, 04:30 PM
Read
A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project
Infosecurity Magazine Feb 3, 2026, 04:15 PM
Read
40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin
Infosecurity Magazine Feb 3, 2026, 03:15 PM
Read
DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon
Infosecurity Magazine Feb 3, 2026, 02:47 PM
Read
UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform
Infosecurity Magazine Feb 3, 2026, 02:00 PM
Read
A new ransomware-as-a-service operation dubbed “Vect” features custom malware
Infosecurity Magazine Feb 3, 2026, 12:45 PM
Read
Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026
Infosecurity Magazine Feb 3, 2026, 10:55 AM
Read
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF
Infosecurity Magazine Feb 3, 2026, 10:00 AM
Read
Wiz Security claims Moltbook misconfiguration allowed full read and write access
Krebs on Security Feb 2, 2026, 04:15 PM
Read
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journal…
Infosecurity Magazine Feb 2, 2026, 04:05 PM
Read
NSA released new guidelines to help organizations achieve target-level Zero Trust maturity
Infosecurity Magazine Feb 2, 2026, 03:15 PM
Read
A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure
Infosecurity Magazine Feb 2, 2026, 12:45 PM
Read
Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says
Infosecurity Magazine Feb 2, 2026, 10:30 AM
Read
Bitdefender has discovered a new Android malware campaign that uses Hugging Face
Infosecurity Magazine Feb 2, 2026, 09:20 AM
Read
Linwei Ding, a former Google engineer, has been found guilty of stealing trade secrets for China
Infosecurity Magazine Jan 30, 2026, 03:40 PM
Read
CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers
Infosecurity Magazine Jan 30, 2026, 11:55 AM
Read
The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran
Infosecurity Magazine Jan 30, 2026, 11:10 AM
Read
Cyber fraudsters targeting corporate finance departments costs businesses millions a year
Infosecurity Magazine Jan 29, 2026, 05:15 PM
Read
Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations
Infosecurity Magazine Jan 29, 2026, 04:50 PM
Read
The FBI outlines ten actions which organizations can take to defend networks against cybercriminal and nation-state threats