Intelligence Feed

Curated cybersecurity reporting and advisories. Headlines link to original sources.

Items
136
Last update
Mar 25, 2026, 07:53 PM (UTC)
Showing
0 results
SecurityWeek Mar 25, 2026, 02:30 PM (UTC)
Read

Russian Cybercriminal Gets 2-Year Prison Sentence in US

Ilya Angelov was a member of the cybercrime group tracked as TA-551, Shathak, Gold Cabin, Monster Libra, and ATK236. The post Russian Cybercriminal Gets 2-Year Prison Sentence in US appeared first on SecurityWeek.

BleepingComputer Mar 25, 2026, 02:02 PM (UTC)
Read

Paid AI Accounts Are Now a Hot Underground Commodity

AI accounts are becoming part of the cybercrime supply chain, sold like email accounts or VPS access. Flare Systems shows how underground markets bundle and resell premium AI access at scale. [...]

SecurityWeek Mar 25, 2026, 01:29 PM (UTC)
Read

iOS, macOS 26.4 Roll Out With Fresh Security Patches

Apple released security fixes for older devices as well, in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5. The post iOS, macOS 26.4 Roll Out With Fresh Security Patches appeared first on SecurityWeek.

The Hacker News Mar 25, 2026, 11:58 AM (UTC)
Read

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance,…

SecurityWeek Mar 25, 2026, 07:57 AM (UTC)
Read

HackerOne Employee Data Exposed in Massive Navia Breach

The cybersecurity firm said the personal information of hundreds of employees was stolen in the hacker attack targeting Navia. The post HackerOne Employee Data Exposed in Massive Navia Breach appeared first on SecurityWeek.

SecurityWeek Mar 24, 2026, 07:42 PM (UTC)
Read

DoE Publishes 5-Year Energy Security Plan

CESER’s Project Armor is a five year initiative to harden the US critical energy infrastructure, including strengthening energy systems ‘to prevent and recover from wildfires and other hazards’. The post DoE Publishes 5-Year Energy Security Plan appeared first…

Cybersecurity Ventures Mar 24, 2026, 12:58 PM (UTC)
Read

The Global CISO Landscape: A Leadership Gap Too Large To Ignore

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 24, 2026 – Read the full story from Sophos The 2026 CISO Report, published by Cybersecurity Ventures in partnership with Sophos, highlights a critical imbalance in glob…

The Hacker News Mar 24, 2026, 10:38 AM (UTC)
Read

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by…

Krebs on Security Mar 23, 2026, 03:43 PM (UTC)
Read

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the…

Cybersecurity Ventures Mar 23, 2026, 03:37 PM (UTC)
Read

Autonomous SOC: What It Is, Key Benefits and Core Challenges

Six Predictions for the AI-Driven SOC – Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber San Jose, Calif. – Mar. 23, 2026 SOC Key Takeaways: What is Autonomous SOC solving? It addresses critical challenges in s…

Cybersecurity Ventures Mar 23, 2026, 12:42 PM (UTC)
Read

35,000 Chief Information Security Officers Employed Globally in 2026

2026 CISO Report from Cybersecurity Ventures in partnership with Sophos Sausalito, Calif. – Mar. 23, 2026 – Read the Full Report MSPs and MSSPs, the force multiplier in security leadership, are positioned to provide SMBs with CISO services. The world’s small t…

The Hacker News Mar 23, 2026, 10:55 AM (UTC)
Read

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver malware. The email campaigns take advantage of the urgency and time-sensitive nature of emails to send phishing messages mas…

Cybersecurity Ventures Mar 20, 2026, 01:14 PM (UTC)
Read

Cybersecurity Ventures Will See You At RSAC Conference 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 20, 2026 If you’re making the pilgrimage to RSAC 2026 in San Francisco next week, then we might see you there. For the past five years, Cybersecurity Ventures has been…

The Hacker News Mar 20, 2026, 10:00 AM (UTC)
Read

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepf…

Krebs on Security Mar 20, 2026, 12:49 AM (UTC)
Read

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web camera…

Cybersecurity Ventures Mar 19, 2026, 12:57 PM (UTC)
Read

Corporate Wifi Is A Major Target For AI-driven Cyberattacks

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 19, 2026 – Read the full story in Financial Express Corporate Wi-Fi networks, once considered a routine part of office infrastructure, are emerging as a growing cyberse…

The Hacker News Mar 19, 2026, 10:58 AM (UTC)
Read

How Ceros Gives Security Teams Visibility and Control in Claude Code

Security teams have spent years building identity and access controls for human users and service accounts. But a new category of actor has quietly entered most enterprise environments, and it operates entirely outside those controls. Claude Code, Anthropic's…

The Hacker News Mar 18, 2026, 11:58 AM (UTC)
Read

Claude Code Security and Magecart: Getting the Threat Model Right

When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As teams adopt Claude Code Security for static analysis, this is…

Cybersecurity Ventures Mar 16, 2026, 12:54 PM (UTC)
Read

How Secure Is The Data Stored By Cloud Providers?

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 16, 2026 – Read the full Forbes story The cloud is home to a dizzying amount of data. According to Cybersecurity Ventures, nearly half of the world’s data exists in ext…

Cybersecurity Ventures Mar 13, 2026, 01:09 PM (UTC)
Read

How AI And LLMs Are Redefining Cloud Security and Cyber Defense

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 13, 2026 – Read the full story in Forbes Cloud security has become the backbone of enterprise resilience, but the threat landscape has evolved faster than traditional s…

Page 1 of 1 0 results