SecurityWeek Mar 5, 2026, 11:23 AM (UTC)
Read
The company will expand its engineering team, deepen integrations, and accelerate go-to-market initiatives. The post Reclaim Security Raises $20 Million to Accelerate Remediation appeared first on SecurityWeek.
The Hacker News Mar 5, 2026, 11:00 AM (UTC)
Read
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credential…
Infosecurity Magazine Mar 5, 2026, 11:00 AM (UTC)
Read
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction
SecurityWeek Mar 5, 2026, 10:46 AM (UTC)
Read
The stolen credential marketplace had been active since 2021 and in late 2025 it counted 142,000 users. The post LeakBase Cybercrime Forum Shut Down, Suspects Arrested appeared first on SecurityWeek.
BleepingComputer Mar 5, 2026, 10:32 AM (UTC)
Read
Cisco has flagged two more Catalyst SD-WAN Manager security flaws as actively exploited in the wild, urging administrators to upgrade vulnerable devices. [...]
Infosecurity Magazine Mar 5, 2026, 10:30 AM (UTC)
Read
Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws
The Hacker News Mar 5, 2026, 10:10 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initiates with a phishing email containing a li…
Infosecurity Magazine Mar 5, 2026, 09:45 AM (UTC)
Read
A global operation has resulted in the takedown of popular cybercrime forum LeakBase
SecurityWeek Mar 5, 2026, 08:50 AM (UTC)
Read
Cisco has rolled out patches for 48 vulnerabilities in Firewall ASA, Secure FMC, and Secure FTD products. The post Cisco Patches Critical Vulnerabilities in Enterprise Networking Products appeared first on SecurityWeek.
BleepingComputer Mar 5, 2026, 08:34 AM (UTC)
Read
A Russian national pleaded guilty to a wire fraud conspiracy charge related to his role in administering the Phobos ransomware operation, which breached hundreds of victims worldwide. [...]
The Hacker News Mar 5, 2026, 06:51 AM (UTC)
Read
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies…
The Hacker News Mar 5, 2026, 06:34 AM (UTC)
Read
A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and…
SecurityWeek Mar 5, 2026, 04:04 AM (UTC)
Read
Google and iVerify analysis reveals a powerful exploit kit originally used by Russian state actors that is now appearing in broader criminal campaigns. The post Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks appeared first on SecurityWeek.
BleepingComputer Mar 4, 2026, 10:34 PM (UTC)
Read
Bitwarden announced support for logging into Windows 11 devices using passkeys stored in the manager's vault, enabling phishing-resistant authentication. [...]
BleepingComputer Mar 4, 2026, 09:51 PM (UTC)
Read
A maximum severity vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication. [...]
BleepingComputer Mar 4, 2026, 09:03 PM (UTC)
Read
Microsoft has released the KB5075039 Windows Recovery Environment update for Windows 10 to fix a long-standing issue that prevented some users from accessing the Recovery environment. [...]
BleepingComputer Mar 4, 2026, 08:44 PM (UTC)
Read
Password management software provider LastPass is warning users of a phishing campaign targeting its users with fake unauthorized account access alerts. [...]
BleepingComputer Mar 4, 2026, 07:12 PM (UTC)
Read
Cisco has released security updates to patch two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software. [...]
BleepingComputer Mar 4, 2026, 07:06 PM (UTC)
Read
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. [...]
BleepingComputer Mar 4, 2026, 06:44 PM (UTC)
Read
Customers of restaurants using the HungerRush point-of-sale (POS) platform say they received emails from a threat actor attempting to extort the company, warning that restaurant and customer data could be exposed if HungerRush fails to respond. [...]
SecurityWeek Mar 4, 2026, 06:37 PM (UTC)
Read
The phishing-as-a-service platform was used to send fraudulent emails to over 500,000 organizations every month. The post Tycoon 2FA Phishing Platform Dismantled in Global Takedown appeared first on SecurityWeek.
BleepingComputer Mar 4, 2026, 05:44 PM (UTC)
Read
The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals buy and sell hacking tools and stolen data. [...]
SecurityWeek Mar 4, 2026, 05:44 PM (UTC)
Read
The hackers claim to have stolen 2GB of files, including 400,000 personal information records. The post New LexisNexis Data Breach Confirmed After Hackers Leak Files appeared first on SecurityWeek.
The Hacker News Mar 4, 2026, 05:21 PM (UTC)
Read
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The hacktivist threat in the Middle East is highly lopsided, with t…
BleepingComputer Mar 4, 2026, 05:01 PM (UTC)
Read
An international law enforcement operation coordinated by Europol has disrupted Tycoon2FA, a major phishing-as-a-service (PhaaS) platform linked to tens of millions of phishing messages each month. [...]
Infosecurity Magazine Mar 4, 2026, 04:30 PM (UTC)
Read
A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards
Infosecurity Magazine Mar 4, 2026, 04:00 PM (UTC)
Read
Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA
SecurityWeek Mar 4, 2026, 03:36 PM (UTC)
Read
The deal awaits final shareholder and regulatory approvals and is expected to be completed in the second half of 2026. The post Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance appeared first on SecurityWeek.
BleepingComputer Mar 4, 2026, 03:28 PM (UTC)
Read
The University of Mississippi Medical Center (UMMC) says it has resumed normal operations, nine days after a ransomware attack blocked access to electronic medical records and took down many of its IT systems. [...]
BleepingComputer Mar 4, 2026, 03:02 PM (UTC)
Read
A routine RDP brute-force alert led to unusual credential hunting and a geo-distributed VPN-linked infrastructure. Huntress Labs explains how one compromised login unraveled a suspected ransomware-as-a-service ecosystem tied to initial access brokers. [...]
SecurityWeek Mar 4, 2026, 03:00 PM (UTC)
Read
A Belgian national, De Ceukelaire’ did not set out to be a hacker. Like many hackers he was born with the potential to become one and only gradually realized he is one. The post Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively ap…
Infosecurity Magazine Mar 4, 2026, 03:00 PM (UTC)
Read
Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict
Infosecurity Magazine Mar 4, 2026, 02:30 PM (UTC)
Read
Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks
Cybersecurity Ventures Mar 4, 2026, 01:47 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 4, 2026 – Read the full story in Finextra It is estimated that one third to a half of North Korea’s budget comes from cyberfraud and extortion. Finextra reports that mo…
The Hacker News Mar 4, 2026, 01:28 PM (UTC)
Read
Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Thr…
SecurityWeek Mar 4, 2026, 12:48 PM (UTC)
Read
Employees seeking free versions of paid software may unknowingly install malware-laced “cracked” apps that can steal credentials, deploy cryptominers, or open the door to ransomware. The post How Pirated Software Turns Helpful Employees Into Malware Delivery A…
SecurityWeek Mar 4, 2026, 12:43 PM (UTC)
Read
The startup aims to provide organizations with visibility into how AI operates across their environment. The post AI Security Firm JetStream Launches With $34 Million in Seed Funding appeared first on SecurityWeek.
The Hacker News Mar 4, 2026, 11:30 AM (UTC)
Read
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need "AI Governance," but th…
Infosecurity Magazine Mar 4, 2026, 10:45 AM (UTC)
Read
The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes
The Hacker News Mar 4, 2026, 09:37 AM (UTC)
Read
Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on Windows, macOS, and Linux systems. The names of the packages ar…
The Hacker News Mar 4, 2026, 08:14 AM (UTC)
Read
Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024. "Silver Dragon gains its initial a…
The Hacker News Mar 4, 2026, 04:35 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. The hig…
BleepingComputer Mar 3, 2026, 11:40 PM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the flaw as exploited in attacks. [...]
BleepingComputer Mar 3, 2026, 11:00 PM (UTC)
Read
The multinational Dutch paint company AkzoNobel has confirmed to BleepingComputer that hackers breached the network of one of its U.S. sites. [...]
The Hacker News Mar 3, 2026, 05:15 PM (UTC)
Read
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Hu…
Infosecurity Magazine Mar 3, 2026, 04:15 PM (UTC)
Read
Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS
Infosecurity Magazine Mar 3, 2026, 03:30 PM (UTC)
Read
Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale
The Hacker News Mar 3, 2026, 02:30 PM (UTC)
Read
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also t…
Infosecurity Magazine Mar 3, 2026, 02:30 PM (UTC)
Read
Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors
The Hacker News Mar 3, 2026, 02:29 PM (UTC)
Read
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings co…
Infosecurity Magazine Mar 3, 2026, 02:00 PM (UTC)
Read
Seemplicity finds US security leaders work 11 or more extra hours per week
Cybersecurity Ventures Mar 3, 2026, 01:38 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 3, 2026 – Listen to the podcast Ralph Echemendia is a world-renowned cybersecurity expert, known internationally by his alter ego “The Ethical Hacker.” In 2015, WIRED c…
The Hacker News Mar 3, 2026, 11:30 AM (UTC)
Read
The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrie…
The Hacker News Mar 3, 2026, 11:10 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It's advertised as a cybercrime platform by a threat group calling itself Ji…
Infosecurity Magazine Mar 3, 2026, 11:00 AM (UTC)
Read
Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches
Infosecurity Magazine Mar 3, 2026, 10:30 AM (UTC)
Read
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack
The Hacker News Mar 3, 2026, 09:20 AM (UTC)
Read
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector o…
The Hacker News Mar 3, 2026, 07:08 AM (UTC)
Read
Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graph…
The Hacker News Mar 3, 2026, 06:53 AM (UTC)
Read
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and…
The Hacker News Mar 2, 2026, 05:08 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8…
The Hacker News Mar 2, 2026, 04:52 PM (UTC)
Read
Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers. "To ensure the scalability and efficiency of the ecosystem, Chrome has no immediate plan to add traditiona…
Infosecurity Magazine Mar 2, 2026, 04:15 PM (UTC)
Read
Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS
Infosecurity Magazine Mar 2, 2026, 03:45 PM (UTC)
Read
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more
Infosecurity Magazine Mar 2, 2026, 03:00 PM (UTC)
Read
Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms
Cybersecurity Ventures Mar 2, 2026, 01:47 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 2, 2026 – Read the full story from Ox Security Cybersecurity Ventures predicted that global damage costs resulting from software supply chain attacks would reach $60 bi…
The Hacker News Mar 2, 2026, 01:26 PM (UTC)
Read
This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control, exposed keys, and normal features are being used as entry poi…
The Hacker News Mar 2, 2026, 11:55 AM (UTC)
Read
Most SaaS teams remember the day their user traffic started growing fast. Few notice the day bots started targeting them. On paper, everything looks great: more sign-ups, more sessions, more API calls. But in reality, something feels off: Sign-ups increase, bu…
Infosecurity Magazine Mar 2, 2026, 11:30 AM (UTC)
Read
Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent
Infosecurity Magazine Mar 2, 2026, 10:45 AM (UTC)
Read
Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue
The Hacker News Mar 2, 2026, 10:36 AM (UTC)
Read
A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai. The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-s…
The Hacker News Mar 2, 2026, 08:44 AM (UTC)
Read
Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but conta…
The Hacker News Feb 28, 2026, 05:21 PM (UTC)
Read
OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. "Our vulnerability lives in the core system itse…
Krebs on Security Feb 28, 2026, 12:01 PM (UTC)
Read
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort"…
The Hacker News Feb 28, 2026, 09:56 AM (UTC)
Read
New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings come from Truffle Security, which discovere…
The Hacker News Feb 28, 2026, 04:57 AM (UTC)
Read
Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a "supply chain risk." "This action follows months of negotiations that reached an impasse over two excepti…
The Hacker News Feb 27, 2026, 06:11 PM (UTC)
Read
The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were traced to cryptocurrency addresses used for…
The Hacker News Feb 27, 2026, 05:59 PM (UTC)
Read
The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025. Of these, 401 instances are located in the U.S…
The Hacker News Feb 27, 2026, 03:33 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/xinfeisoft/crypto, impersonates the legiti…
Infosecurity Magazine Feb 27, 2026, 02:15 PM (UTC)
Read
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group
Cybersecurity Ventures Feb 27, 2026, 01:53 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 27, 2026 – Watch the YouTube Short Cybercrime Magazine’s latest YouTube Short video, produced by Taylor Fox, looks back at a riveting privacy and surveillance story tha…
The Hacker News Feb 27, 2026, 12:43 PM (UTC)
Read
The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay com…
Infosecurity Magazine Feb 27, 2026, 11:45 AM (UTC)
Read
The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week
Infosecurity Magazine Feb 27, 2026, 11:00 AM (UTC)
Read
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes
The Hacker News Feb 27, 2026, 10:06 AM (UTC)
Read
Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). "A malicious downloader staged a portable Java runtime and executed a maliciou…
The Hacker News Feb 27, 2026, 07:56 AM (UTC)
Read
Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effort, the advertisers' methods of payment have been suspended,…
The Hacker News Feb 26, 2026, 06:00 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. "Instead of relying on traditional servers or domains for…
Infosecurity Magazine Feb 26, 2026, 04:00 PM (UTC)
Read
New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts
The Hacker News Feb 26, 2026, 03:17 PM (UTC)
Read
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025. The campaign is being tracked by Cisco Talos under the moniker UAT-10027…
Infosecurity Magazine Feb 26, 2026, 03:00 PM (UTC)
Read
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities
Cybersecurity Ventures Feb 26, 2026, 02:28 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 26, 2026 – Read the full story in BitGuardian The staggering prediction by Cybersecurity Ventures that global cybercrime damages would reach $10.5 trillion USD annually…
The Hacker News Feb 26, 2026, 02:28 PM (UTC)
Read
Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tactics are sharper. Access happens faster. Control is establis…
Infosecurity Magazine Feb 26, 2026, 02:00 PM (UTC)
Read
Datadog report reveals two-fifths of services are affected by exploitable bugs
Infosecurity Magazine Feb 26, 2026, 02:00 PM (UTC)
Read
The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up
Infosecurity Magazine Feb 26, 2026, 12:09 PM (UTC)
Read
UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation
The Hacker News Feb 26, 2026, 12:06 PM (UTC)
Read
Introduction: Steal It Today, Break It in a Decade Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to adversaries as well. The rise of ransomware and cyber extort…
The Hacker News Feb 26, 2026, 10:35 AM (UTC)
Read
A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines. "The activity aligns w…
The Hacker News Feb 26, 2026, 10:09 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector. The package, codenamed StripeApi.Net, attempt…
Infosecurity Magazine Feb 26, 2026, 09:30 AM (UTC)
Read
The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation
The Hacker News Feb 26, 2026, 06:13 AM (UTC)
Read
A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023. The vuln…
The Hacker News Feb 25, 2026, 05:46 PM (UTC)
Read
Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has…
The Hacker News Feb 25, 2026, 05:00 PM (UTC)
Read
Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities explo…
The Hacker News Feb 25, 2026, 03:06 PM (UTC)
Read
The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks,…
The Hacker News Feb 25, 2026, 02:30 PM (UTC)
Read
Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth, and “just escalate it” calls. That cost doesn’t stay inside the SOC; it shows up…
Infosecurity Magazine Feb 25, 2026, 02:30 PM (UTC)
Read
IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws
Cybersecurity Ventures Feb 25, 2026, 02:05 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 25, 2026 – Listen to the podcast “CISO Confidential” is a new series on the Cybercrime Magazine Podcast, brought to our listeners by Doppel, a cybersecurity company on…
Infosecurity Magazine Feb 25, 2026, 01:00 PM (UTC)
Read
Malicious NuGet package mimicking Stripe's library targeted developers
The Hacker News Feb 25, 2026, 12:43 PM (UTC)
Read
Cybersecurity researchers have discovered four malicious NuGet packages that are designed to target ASP.NET web application developers to steal sensitive data. The campaign, discovered by Socket, exfiltrates ASP.NET Identity data, including user accounts, role…
The Hacker News Feb 25, 2026, 11:00 AM (UTC)
Read
Why automating sensitive data transfers is now a mission-critical priority More than half of national security organizations still rely on manual processes to transfer sensitive data, according to The CYBER360: Defending the Digital Battlespace report. This sh…
Infosecurity Magazine Feb 25, 2026, 10:30 AM (UTC)
Read
A former general manager of a US defense contractor has been sentenced after selling zero days to Russia
Infosecurity Magazine Feb 25, 2026, 09:40 AM (UTC)
Read
The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully
The Hacker News Feb 25, 2026, 08:49 AM (UTC)
Read
A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of…
The Hacker News Feb 25, 2026, 07:04 AM (UTC)
Read
SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below…
The Hacker News Feb 25, 2026, 05:23 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2026…
The Hacker News Feb 24, 2026, 06:52 PM (UTC)
Read
A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious Copilot instructions in a GitHub issue. The artificial intelligence (AI)-driven vulnerability has been codenamed RoguePilot by…
Infosecurity Magazine Feb 24, 2026, 05:00 PM (UTC)
Read
DTEX claims insider incidents cost $19.5m in 2025, with employee negligence most expensive
Infosecurity Magazine Feb 24, 2026, 04:05 PM (UTC)
Read
Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information
Infosecurity Magazine Feb 24, 2026, 02:30 PM (UTC)
Read
Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks
Infosecurity Magazine Feb 24, 2026, 01:00 PM (UTC)
Read
ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes
Infosecurity Magazine Feb 24, 2026, 11:30 AM (UTC)
Read
Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities
Infosecurity Magazine Feb 24, 2026, 10:00 AM (UTC)
Read
CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective
Infosecurity Magazine Feb 23, 2026, 04:00 PM (UTC)
Read
Supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages, targeting AI tools has been identified by security researchers
Infosecurity Magazine Feb 23, 2026, 03:30 PM (UTC)
Read
Sophisticated Python malware uncovered in fraud probe shows obfuscation, disposable infrastructure
Cybersecurity Ventures Feb 23, 2026, 02:17 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 23, 2026 In 2024, Long Island Medium star Theresa Caputo slammed online scammers and begged fans not to send money to them. The reality star warned fans about many soci…
Infosecurity Magazine Feb 23, 2026, 12:30 PM (UTC)
Read
A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances
Infosecurity Magazine Feb 23, 2026, 11:30 AM (UTC)
Read
Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident
Infosecurity Magazine Feb 23, 2026, 10:30 AM (UTC)
Read
A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone
Infosecurity Magazine Feb 23, 2026, 08:30 AM (UTC)
Read
University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday
Krebs on Security Feb 20, 2026, 08:00 PM (UTC)
Read
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sideste…
Cybersecurity Ventures Feb 20, 2026, 01:42 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 20, 2026 –Watch the YouTube video The award-winning Cybercrime Magazine YouTube Channel released its first Short last month and the video has more than 720,000 Views. I…
Infosecurity Magazine Feb 20, 2026, 12:30 PM (UTC)
Read
DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report
Infosecurity Magazine Feb 20, 2026, 11:35 AM (UTC)
Read
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET
Infosecurity Magazine Feb 19, 2026, 04:30 PM (UTC)
Read
New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows
Infosecurity Magazine Feb 19, 2026, 03:30 PM (UTC)
Read
Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps
Cybersecurity Ventures Feb 19, 2026, 01:31 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 19, 2026 –Read the full story in Charter Capital Three out of five small-to-midsized businesses (SMBs) permanently shuttered their doors within six months of being hit…
Infosecurity Magazine Feb 19, 2026, 01:00 PM (UTC)
Read
Forescout paper reveals ICS advisories hit a record 508 in 2025
Infosecurity Magazine Feb 19, 2026, 12:00 PM (UTC)
Read
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal