BleepingComputer Apr 2, 2026, 11:01 AM (UTC)
Read
Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access. [...]
SecurityWeek Apr 2, 2026, 10:42 AM (UTC)
Read
The AI recruiting firm is investigating the incident as Lapsus$ claimed the theft of 4TB of Mercor data. The post Mercor Hit by LiteLLM Supply Chain Attack appeared first on SecurityWeek.
SecurityWeek Apr 2, 2026, 09:51 AM (UTC)
Read
The malware can spy on victims, steal their information, and make configuration changes on devices. The post Sophisticated CrystalX RAT Emerges appeared first on SecurityWeek.
The Hacker News Apr 2, 2026, 09:51 AM (UTC)
Read
Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with spyware. According to reports from Italian newspaper La Repubblica and news agency ANSA, the vast majo…
BleepingComputer Apr 2, 2026, 09:12 AM (UTC)
Read
Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com. [...]
Infosecurity Magazine Apr 2, 2026, 08:30 AM (UTC)
Read
E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks
BleepingComputer Apr 2, 2026, 08:25 AM (UTC)
Read
Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability. [...]
SecurityWeek Apr 2, 2026, 08:01 AM (UTC)
Read
Variance has raised a total of $26 million in funding and the latest investment will fuel platform growth. The post Variance Raises $21.5M for Compliance Investigation Platform Powered by AI Agents appeared first on SecurityWeek.
The Hacker News Apr 2, 2026, 07:09 AM (UTC)
Read
Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from the risk posed by a recently disclosed exploit kit known as DarkSword. "We enabled the availability of iOS 18.7.7 for more devices…
SecurityWeek Apr 2, 2026, 04:04 AM (UTC)
Read
The company will accelerate product development, scale go-to-market efforts, and expand its global footprint. The post Linx Security Raises $50 Million for Identity Security and Governance appeared first on SecurityWeek.
BleepingComputer Apr 1, 2026, 11:17 PM (UTC)
Read
A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities. [...]
BleepingComputer Apr 1, 2026, 09:50 PM (UTC)
Read
Apple has now made it possible for more iPhones still running iOS 18 to receive security updates that protect against the actively exploited DarkSword exploit kit. [...]
BleepingComputer Apr 1, 2026, 09:35 PM (UTC)
Read
Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints. [...]
BleepingComputer Apr 1, 2026, 07:42 PM (UTC)
Read
A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks. [...]
BleepingComputer Apr 1, 2026, 06:07 PM (UTC)
Read
A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times. [...]
SecurityWeek Apr 1, 2026, 04:47 PM (UTC)
Read
The startup will expand its AI research team, train additional security models, and scale enterprise adoption. The post Depthfirst Raises $80 Million in Series B Funding appeared first on SecurityWeek.
The Hacker News Apr 1, 2026, 04:10 PM (UTC)
Read
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE. As part of the attacks, the thre…
SecurityWeek Apr 1, 2026, 03:35 PM (UTC)
Read
The company is investigating the full scope of the incident, including whether any files have been compromised. The post Toy Giant Hasbro Hit by Cyberattack appeared first on SecurityWeek.
SecurityWeek Apr 1, 2026, 03:04 PM (UTC)
Read
The malware steals credentials, installs a malicious browser extension, and can spread via USB drives. The post New DeepLoad Malware Dropped in ClickFix Attacks appeared first on SecurityWeek.
Infosecurity Magazine Apr 1, 2026, 03:00 PM (UTC)
Read
Android requires dev identity verification for sideloaded apps; phased global rollout from September
SecurityWeek Apr 1, 2026, 02:36 PM (UTC)
Read
Google has announced fixes for CVE-2026-5281, a zero-day affecting Chrome’s Dawn component. The post Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome appeared first on SecurityWeek.
The Hacker News Apr 1, 2026, 02:10 PM (UTC)
Read
Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late February 2026, leverages these scripts to initiate a multi-stage infection chain for…
BleepingComputer Apr 1, 2026, 02:05 PM (UTC)
Read
Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents. [...]
SecurityWeek Apr 1, 2026, 01:54 PM (UTC)
Read
The agency has not named the problematic foreign-made applications, but TikTok and Temu come to mind. The post FBI Warns of Data Security Risks From China-Made Mobile Apps appeared first on SecurityWeek.
SecurityWeek Apr 1, 2026, 01:30 PM (UTC)
Read
Jonathan Spalletta exploited smart contract vulnerabilities to steal approximately $55 million in cryptocurrency and cause Uranium to shut down. The post US Charges Uranium Crypto Exchange Hacker appeared first on SecurityWeek.
Infosecurity Magazine Apr 1, 2026, 01:30 PM (UTC)
Read
Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration
The Hacker News Apr 1, 2026, 12:46 PM (UTC)
Read
There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build. It doesn’t enable. Its entire function is to say "No." No to ChatGPT. No to DeepSeek. No to the file-sharing tool the produ…
The Hacker News Apr 1, 2026, 12:36 PM (UTC)
Read
A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka Metamorfo) via another malware called Horabot. The activity has been attributed to a…
Cybersecurity Ventures Apr 1, 2026, 12:35 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 1, 2026 – Read the full story in Forbes In 2025, the global damage cost resulting from cybercrime was an estimated $10.5 trillion USD, up from just $3 trillion annually…
Infosecurity Magazine Apr 1, 2026, 12:05 PM (UTC)
Read
Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint
The Hacker News Apr 1, 2026, 11:42 AM (UTC)
Read
Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The high-severity vulnerability, CVE-2026-5281 (CVSS score: N/A), concerns a use-after…
BleepingComputer Apr 1, 2026, 11:39 AM (UTC)
Read
The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers. [...]
The Hacker News Apr 1, 2026, 10:58 AM (UTC)
Read
For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next. Threat actors now use malware less frequently in favor of what’s already inside your environment, including abusing trusted too…
BleepingComputer Apr 1, 2026, 10:25 AM (UTC)
Read
Google has fixed the fourth Chrome vulnerability exploited in zero-day attacks since the start of the year. [...]
Infosecurity Magazine Apr 1, 2026, 09:30 AM (UTC)
Read
Most UK manufacturers compromised last year suffered financial loss, says ESET
Infosecurity Magazine Apr 1, 2026, 09:00 AM (UTC)
Read
Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn
The Hacker News Apr 1, 2026, 07:44 AM (UTC)
Read
Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. "We have attributed the attack to a suspected North Korean threat actor we track as…
BleepingComputer Apr 1, 2026, 06:35 AM (UTC)
Read
Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying users. [...]
The Hacker News Apr 1, 2026, 06:12 AM (UTC)
Read
Anthropic on Tuesday confirmed that internal code for its popular artificial intelligence (AI) coding assistant, Claude Code, had been inadvertently released due to a human error. "No sensitive customer data or credentials were involved or exposed," an Anthrop…
BleepingComputer Apr 1, 2026, 05:33 AM (UTC)
Read
Microsoft released an emergency update to fix the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to installation issues. [...]
BleepingComputer Apr 1, 2026, 12:32 AM (UTC)
Read
Anthropic says it accidentally leaked the source code for Claude Code, which is closed source, but the company says no customer data or credentials were exposed. [...]
BleepingComputer Mar 31, 2026, 11:13 PM (UTC)
Read
Google is rolling out a new feature in the U.S. that allows users to change their @gmail address or create a new alias. [...]
The Hacker News Mar 31, 2026, 06:28 PM (UTC)
Read
Google on Monday said it's officially rolling out Android developer verification to all developers to combat the problem of bad actors distributing harmful apps while "hiding behind anonymity." The development comes ahead of a planned verification mandate that…
The Hacker News Mar 31, 2026, 04:03 PM (UTC)
Read
A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as a zero-day as part of a campaign targeting government entities in Southeast Asia dubbed TrueChaos. The vulnerability in question is CVE-2026-3502…
Infosecurity Magazine Mar 31, 2026, 03:30 PM (UTC)
Read
Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds
Infosecurity Magazine Mar 31, 2026, 02:00 PM (UTC)
Read
Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service
The Hacker News Mar 31, 2026, 01:09 PM (UTC)
Read
Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI platform that could allow artificial intelligence (AI) agents to be weaponized by an attacker to gain unauthorized access to sensitive data and compromise an organizat…
Infosecurity Magazine Mar 31, 2026, 01:01 PM (UTC)
Read
OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
Cybersecurity Ventures Mar 31, 2026, 12:19 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 31, 2026 – Read the full story in Forbes One message has persisted over the past few years: cybersecurity is no longer an IT concern; it has become a fundamental busine…
Infosecurity Magazine Mar 31, 2026, 12:15 PM (UTC)
Read
TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs
The Hacker News Mar 31, 2026, 11:50 AM (UTC)
Read
The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a dramatic increase in speed. Speed of attack, speed of exploitation, and speed of change across modern e…
The Hacker News Mar 31, 2026, 11:46 AM (UTC)
Read
Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross RAT. "The operation covers VPN clients, encrypted messen…
Infosecurity Magazine Mar 31, 2026, 10:01 AM (UTC)
Read
Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches
Infosecurity Magazine Mar 31, 2026, 08:45 AM (UTC)
Read
The National Cyber Security Centre wants UK firms to patch CVE-2025-53521
The Hacker News Mar 31, 2026, 06:08 AM (UTC)
Read
The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency that delivers a trojan capable of targeting Windows, macOS, and Linux systems. Versions 1.14.1 and…
The Hacker News Mar 30, 2026, 06:05 PM (UTC)
Read
A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. "A single malicious prompt could turn an otherwise ordinary conversation i…
The Hacker News Mar 30, 2026, 03:47 PM (UTC)
Read
A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad. "It likely uses AI-assisted obfuscation and process injection to evade static scanning, while credentia…
Cybersecurity Ventures Mar 30, 2026, 03:35 PM (UTC)
Read
AI-Driven Security and SOC – Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber San Jose, Calif. – Mar. 30, 2026 Mid-market organizations face sophisticated cyber threats with constrained security budgets and lea…
Infosecurity Magazine Mar 30, 2026, 03:00 PM (UTC)
Read
Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams
Infosecurity Magazine Mar 30, 2026, 02:00 PM (UTC)
Read
Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update
The Hacker News Mar 30, 2026, 01:56 PM (UTC)
Read
Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and research that stopped being theoretical right around the time defenders stopped paying…
The Hacker News Mar 30, 2026, 01:00 PM (UTC)
Read
What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come from fragmented workflows, manual triage steps, and limited visibility early in the investigation. Fix…
The Hacker News Mar 30, 2026, 12:18 PM (UTC)
Read
Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that's distributed via malicious Windows shortcut (LNK) files that are disguised as private key folders. The CTRL toolkit, according to Censys, is custom-built using .NET and i…
Infosecurity Magazine Mar 30, 2026, 12:00 PM (UTC)
Read
Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials
The Hacker News Mar 30, 2026, 11:30 AM (UTC)
Read
Secrets sprawl isn't slowing down: in 2025, it accelerated faster than most security teams anticipated. GitGuardian's State of Secrets Sprawl 2026 report analyzed billions of commits across public GitHub and uncovered 29 million new hardcoded secrets in 2025 a…
Infosecurity Magazine Mar 30, 2026, 10:45 AM (UTC)
Read
Researchers from watchTowr and Defused have found evidence that attackers are actively exploiting CVE-2026-3055, a critical NetScaler vulnerability
Infosecurity Magazine Mar 30, 2026, 09:30 AM (UTC)
Read
The UK Information Commissioner’s Office has handed a £100,000 fine to Birmingham-based TMAC
Infosecurity Magazine Mar 30, 2026, 08:15 AM (UTC)
Read
The European Commission has revealed details of a data breach impacting its AWS infrastructure
The Hacker News Mar 30, 2026, 07:00 AM (UTC)
Read
Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a "complex and well-resourced operation." The campaigns have led to the deployment of various malware families, in…
The Hacker News Mar 28, 2026, 03:40 PM (UTC)
Read
Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other documents to the internet. Handala Hack Team, which carried…
The Hacker News Mar 28, 2026, 09:11 AM (UTC)
Read
A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The vulnerability, CVE-2026-3055 (CVSS score: 9.3), refers to a case of ins…
The Hacker News Mar 28, 2026, 07:07 AM (UTC)
Read
Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attributed with high confidence to the Russian sta…
The Hacker News Mar 28, 2026, 07:07 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerab…
Cybersecurity Ventures Mar 27, 2026, 05:32 PM (UTC)
Read
Resource guide for CISOs and MSSPs – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Mar. 27, 2026 Domain security unexpectedly and repeatedly came up in Cybercrime Magazine’s discussions with chief information security officers (CISOs) and managed security…
The Hacker News Mar 27, 2026, 05:22 PM (UTC)
Read
Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based attacks and urge them to install the update. The development was first reported by MacRumors. "Apple is aware of attacks ta…
The Hacker News Mar 27, 2026, 04:53 PM (UTC)
Read
TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data. The two versions, 4.87.1 and 4.87.2, published to the Python P…
Infosecurity Magazine Mar 27, 2026, 04:01 PM (UTC)
Read
Push Security has uncovered a new AiTM phishing campaign targeting TikTok for Business accounts using Google and TikTok themed login pages
Infosecurity Magazine Mar 27, 2026, 03:06 PM (UTC)
Read
Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware
The Hacker News Mar 27, 2026, 01:57 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX's pre-publish scanning pipeline to cause the tool to allow a malicious Microsoft Visual Studio Code (VS Code) extension to pass the vetting process and go live in the regi…
Infosecurity Magazine Mar 27, 2026, 12:30 PM (UTC)
Read
‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration
Cybersecurity Ventures Mar 27, 2026, 12:29 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 27, 2026 –Read the full story from CANOPY Cybercrime damage was on pace to hit $10.5 trillion in 2025, according to Cybersecurity Ventures. A single U.S. data breach av…
The Hacker News Mar 27, 2026, 12:03 PM (UTC)
Read
Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report from Push Security. Business accounts associated with social media platforms are a lucrative target,…
Infosecurity Magazine Mar 27, 2026, 12:00 PM (UTC)
Read
The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”
The Hacker News Mar 27, 2026, 11:00 AM (UTC)
Read
Rising geopolitical tensions are reflected (or in some cases preceded) by cyber operations, while technology itself has become politicized. Let’s admit it: we are in the middle of it. Introduction: One tech power to rule them all is a thing of the past The rel…
The Hacker News Mar 27, 2026, 10:04 AM (UTC)
Read
A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landscape in January 2025, with recent attacks leveraging a custom Windows ransomware strain codenamed Gen…
The Hacker News Mar 27, 2026, 08:07 AM (UTC)
Read
Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation history. Both LangChain and LangGraph are open-source…
The Hacker News Mar 26, 2026, 05:40 PM (UTC)
Read
A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting and maintaining stealthy access me…
Infosecurity Magazine Mar 26, 2026, 04:40 PM (UTC)
Read
Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code
Infosecurity Magazine Mar 26, 2026, 04:00 PM (UTC)
Read
Attackers rapidly exploited a critical Oracle WebLogic RCE flaw the same day exploit code was released, according to a CloudSEK honeypot study
Infosecurity Magazine Mar 26, 2026, 03:00 PM (UTC)
Read
EtherRAT hides C2 in Ethereum smart contracts via EtherHiding, steals wallets and credentials
Infosecurity Magazine Mar 26, 2026, 01:15 PM (UTC)
Read
PwC Annual Threat Dynamics report says AI-threats are the biggest concern of clients
The Hacker News Mar 26, 2026, 01:12 PM (UTC)
Read
Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything feels under control. But one question usually stays unanswered: Would your defenses actually stop a real attack? That’s wh…
The Hacker News Mar 26, 2026, 01:11 PM (UTC)
Read
Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to trigger malicious prompts simply by visiting a web page. The flaw "allowed any website to silently inject prompts into that…
Cybersecurity Ventures Mar 26, 2026, 12:42 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 26, 2026 The 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos was released on the first day of the RSAC Conference in San Francisco earlier this…
Infosecurity Magazine Mar 26, 2026, 12:20 PM (UTC)
Read
OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws
The Hacker News Mar 26, 2026, 11:58 AM (UTC)
Read
Unmasking impostors is something the art world has faced for decades, and there are valuable lessons from the works of Elmyr de Hory that can apply to the world of defensive cybersecurity. During the 1960s, de Hory gained infamy as a premier forger, passing of…
The Hacker News Mar 26, 2026, 11:45 AM (UTC)
Read
Some weeks in security feel loud. This one feels sneaky. Less big dramatic fireworks, more of that slow creeping sense that too many people are getting way too comfortable abusing things they probably shouldn’t even be touching. There’s a little bit of everyth…
The Hacker News Mar 26, 2026, 11:07 AM (UTC)
Read
The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version of the same exploit that was used in the Operation Triangulation campaign back in 2023, according to new findings fro…
Infosecurity Magazine Mar 26, 2026, 10:45 AM (UTC)
Read
Halcyon and Beazley Security track the return of Iranian ransomware group Pay2Key
Infosecurity Magazine Mar 26, 2026, 10:07 AM (UTC)
Read
The National Crime Agency has warned construction firms about surging invoice fraud
The Hacker News Mar 26, 2026, 06:53 AM (UTC)
Read
Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively bypassing security controls. "Instead of the usual HTTP requests or image beacons, this malware uses…
The Hacker News Mar 25, 2026, 05:35 PM (UTC)
Read
The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. According to TASS and MVD Media, a news website linked to the Russian Interior Ministry, the suspect is a reside…
Infosecurity Magazine Mar 25, 2026, 04:05 PM (UTC)
Read
Cloud Android phones fuel financial fraud, evading detection and enabling dropper accounts
Infosecurity Magazine Mar 25, 2026, 03:30 PM (UTC)
Read
Cybersecurity company’s annual report issues warning over a “mass-marketed impersonation crisis” over attackers abusing legitimate credentials
The Hacker News Mar 25, 2026, 02:26 PM (UTC)
Read
Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of comprehensive data theft and installing a remote access trojan (RAT), which deploys an information-stealing Google Chrome extensio…
Cybersecurity Ventures Mar 25, 2026, 01:19 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 25, 2026 – Read the full story from StocksToday.com This past weekend, Stocks today.com shared an economic observation about physical constraints—blocked shipping lanes…
Infosecurity Magazine Mar 25, 2026, 12:30 PM (UTC)
Read
The US Federal Communications Commission has placed all “consumer-grade” internet routers produced outside the US on its “covered list”
Infosecurity Magazine Mar 25, 2026, 12:00 PM (UTC)
Read
Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group
The Hacker News Mar 25, 2026, 11:58 AM (UTC)
Read
In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance,…
The Hacker News Mar 25, 2026, 11:52 AM (UTC)
Read
The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies. Ilya Angelov, 40, of Tolyatti, Russia, was also fined $100,000. Ange…
The Hacker News Mar 25, 2026, 11:34 AM (UTC)
Read
Cybersecurity researchers are calling attention to an active device code phishing campaign that's targeting Microsoft 365 identities across more than 340 organizations in the U.S., Canada, Australia, New Zealand, and Germany. The activity, per Huntress, was fi…
Infosecurity Magazine Mar 25, 2026, 11:00 AM (UTC)
Read
Expel has warned of malicious Chrome extensions stealing users’ AI conversations
Infosecurity Magazine Mar 25, 2026, 09:35 AM (UTC)
Read
UK police trumpet success of Operation Henhouse as they seize and freeze over £27m in suspected fraud proceeds
The Hacker News Mar 25, 2026, 07:11 AM (UTC)
Read
The U.S. Federal Communications Commission (FCC) said on Monday that it was banning the import of new, foreign-made consumer routers, citing "unacceptable" risks to cyber and national security. The action was designed to safeguard Americans and the underlying…
Infosecurity Magazine Mar 24, 2026, 09:00 PM (UTC)
Read
The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make software more secure
The Hacker News Mar 24, 2026, 06:21 PM (UTC)
Read
TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent bac…
The Hacker News Mar 24, 2026, 05:05 PM (UTC)
Read
A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based individuals searching for tax-related documents to serve rogue installers for ConnectWise ScreenConnect that drop a tool named HwAudKiller to blind security pr…
The Hacker News Mar 24, 2026, 04:36 PM (UTC)
Read
On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an important milestone for this emerging category. For those unfamiliar with the various Gartner report types, “a Market Guide defines a market and explains what cl…
Infosecurity Magazine Mar 24, 2026, 04:00 PM (UTC)
Read
Silver Fox pivots from ValleyRAT tax lures to WhatsApp‑style stealers, blending espionage & phishing
Infosecurity Magazine Mar 24, 2026, 03:15 PM (UTC)
Read
A critical vulnerability in Citrix’s NetScaler products allows unauthenticated remote attackers to leak information from the appliance's memory
Infosecurity Magazine Mar 24, 2026, 02:30 PM (UTC)
Read
Ghost npm campaign fakes install logs to steal sudo passwords and drop RATs that loot crypto and data
Infosecurity Magazine Mar 24, 2026, 02:00 PM (UTC)
Read
Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience
Infosecurity Magazine Mar 24, 2026, 01:15 PM (UTC)
Read
Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk from cyber threats, says the Absolute Security 2026 Resilience Risk Index
Cybersecurity Ventures Mar 24, 2026, 12:58 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 24, 2026 – Read the full story from Sophos The 2026 CISO Report, published by Cybersecurity Ventures in partnership with Sophos, highlights a critical imbalance in glob…
Infosecurity Magazine Mar 24, 2026, 10:32 AM (UTC)
Read
Russian cybercriminal Aleksei Volkov has received close to seven years behind bars for role in Yanluowang ransomware
Infosecurity Magazine Mar 24, 2026, 09:30 AM (UTC)
Read
The FBI has warned that Iranian hacking group Handala has been targeting opponents of the regime since 2023
Infosecurity Magazine Mar 23, 2026, 04:30 PM (UTC)
Read
ISACA survey found that confusion over responsibility and lack of understanding around AI cyber-attacks makes containing them difficult
Infosecurity Magazine Mar 23, 2026, 04:05 PM (UTC)
Read
Tycoon2FA phishing platform resumes activity post-takedown, leveraging AITM techniques to bypass MFA
Krebs on Security Mar 23, 2026, 03:43 PM (UTC)
Read
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the…
Cybersecurity Ventures Mar 23, 2026, 03:37 PM (UTC)
Read
Six Predictions for the AI-Driven SOC – Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber San Jose, Calif. – Mar. 23, 2026 SOC Key Takeaways: What is Autonomous SOC solving? It addresses critical challenges in s…
Infosecurity Magazine Mar 23, 2026, 03:35 PM (UTC)
Read
High tech was the most frequently targeted industry in Mandiant investigations in 2025, overtaking financial services which led in 2023 and 2024
Infosecurity Magazine Mar 23, 2026, 03:05 PM (UTC)
Read
New Trivy Docker images 0.69.5 and 0.69.6 compromised with TeamPCP infostealer, impacting CI/CD scans
Cybersecurity Ventures Mar 23, 2026, 12:42 PM (UTC)
Read
2026 CISO Report from Cybersecurity Ventures in partnership with Sophos Sausalito, Calif. – Mar. 23, 2026 – Read the Full Report MSPs and MSSPs, the force multiplier in security leadership, are positioned to provide SMBs with CISO services. The world’s small t…
Infosecurity Magazine Mar 23, 2026, 10:30 AM (UTC)
Read
CISA added CVE-2026-20131 to its KEV catalog as it is being used in ransomware campaigns
Infosecurity Magazine Mar 23, 2026, 09:10 AM (UTC)
Read
German-led policing effort against fraud operation disrupts countless CSAM and cybercrime sites
Infosecurity Magazine Mar 20, 2026, 10:20 AM (UTC)
Read
Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day
Infosecurity Magazine Mar 20, 2026, 09:40 AM (UTC)
Read
The National Crime Agency’s director general warns that technology is rapidly reshaping crime
Krebs on Security Mar 20, 2026, 12:49 AM (UTC)
Read
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web camera…
Infosecurity Magazine Mar 19, 2026, 04:00 PM (UTC)
Read
Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics
Infosecurity Magazine Mar 19, 2026, 02:30 PM (UTC)
Read
Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices