Intelligence Feed

Curated cybersecurity reporting and advisories. Headlines link to original sources.

Items
138
Last update
Mar 26, 2026, 10:49 PM (UTC)
Showing
0 results
BleepingComputer Mar 26, 2026, 03:42 PM (UTC)
Read

UK sanctions Xinbi marketplace linked to Asian scam centers

The United Kingdom's Foreign, Commonwealth and Development Office (FCDO) has sanctioned Xinbi, a Chinese-language cryptocurrency-based online marketplace that sells stolen data and satellite internet equipment to scam networks in Southeast Asia. [...]

SecurityWeek Mar 26, 2026, 02:07 PM (UTC)
Read

Hightower Holding Data Breach Impacts 130,000

The holdings company says hackers stole names, Social Security numbers, and driver’s license numbers from its environment. The post Hightower Holding Data Breach Impacts 130,000 appeared first on SecurityWeek.

BleepingComputer Mar 26, 2026, 02:06 PM (UTC)
Read

WhatsApp rolls out more AI features, iOS multi-account support

WhatsApp is rolling out multiple features designed to make the app easier to use, including AI-powered message replies and photo retouching, support for two accounts on iOS, and chat history transfer between iOS and Android devices. [...]

SecurityWeek Mar 26, 2026, 01:31 PM (UTC)
Read

BIND Updates Patch High-Severity Vulnerabilities

Specially crafted domains could be used to cause out-of-memory conditions, leading to memory leaks in the BIND resolvers. The post BIND Updates Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

Cybersecurity Ventures Mar 26, 2026, 12:42 PM (UTC)
Read

Who’s Who In Domain Security: CISOs And MSSPs at RSAC 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 26, 2026 The 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos was released on the first day of the RSAC Conference in San Francisco earlier this…

SecurityWeek Mar 26, 2026, 12:32 PM (UTC)
Read

Cisco Patches Multiple Vulnerabilities in IOS Software

The high- and medium-severity flaws could lead to denial-of-service, secure boot bypass, information disclosure, and privilege escalation. The post Cisco Patches Multiple Vulnerabilities in IOS Software appeared first on SecurityWeek.

SecurityWeek Mar 26, 2026, 10:06 AM (UTC)
Read

Alleged RedLine Malware Administrator Extradited to US

Hambardzum Minasyan of Armenia has been accused of being involved in the development and administration of the infostealer malware. The post Alleged RedLine Malware Administrator Extradited to US appeared first on SecurityWeek.

SecurityWeek Mar 25, 2026, 02:30 PM (UTC)
Read

Russian Cybercriminal Gets 2-Year Prison Sentence in US

Ilya Angelov was a member of the cybercrime group tracked as TA-551, Shathak, Gold Cabin, Monster Libra, and ATK236. The post Russian Cybercriminal Gets 2-Year Prison Sentence in US appeared first on SecurityWeek.

BleepingComputer Mar 25, 2026, 02:02 PM (UTC)
Read

Paid AI Accounts Are Now a Hot Underground Commodity

AI accounts are becoming part of the cybercrime supply chain, sold like email accounts or VPS access. Flare Systems shows how underground markets bundle and resell premium AI access at scale. [...]

SecurityWeek Mar 25, 2026, 01:29 PM (UTC)
Read

iOS, macOS 26.4 Roll Out With Fresh Security Patches

Apple released security fixes for older devices as well, in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5. The post iOS, macOS 26.4 Roll Out With Fresh Security Patches appeared first on SecurityWeek.

The Hacker News Mar 25, 2026, 11:58 AM (UTC)
Read

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance,…

Cybersecurity Ventures Mar 24, 2026, 12:58 PM (UTC)
Read

The Global CISO Landscape: A Leadership Gap Too Large To Ignore

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 24, 2026 – Read the full story from Sophos The 2026 CISO Report, published by Cybersecurity Ventures in partnership with Sophos, highlights a critical imbalance in glob…

The Hacker News Mar 24, 2026, 10:38 AM (UTC)
Read

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by…

Krebs on Security Mar 23, 2026, 03:43 PM (UTC)
Read

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the…

Cybersecurity Ventures Mar 23, 2026, 03:37 PM (UTC)
Read

Autonomous SOC: What It Is, Key Benefits and Core Challenges

Six Predictions for the AI-Driven SOC – Christophe Briguet, Senior Director of Product Management – AI & Security Analytics, Stellar Cyber San Jose, Calif. – Mar. 23, 2026 SOC Key Takeaways: What is Autonomous SOC solving? It addresses critical challenges in s…

Cybersecurity Ventures Mar 23, 2026, 12:42 PM (UTC)
Read

35,000 Chief Information Security Officers Employed Globally in 2026

2026 CISO Report from Cybersecurity Ventures in partnership with Sophos Sausalito, Calif. – Mar. 23, 2026 – Read the Full Report MSPs and MSSPs, the force multiplier in security leadership, are positioned to provide SMBs with CISO services. The world’s small t…

The Hacker News Mar 23, 2026, 10:55 AM (UTC)
Read

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver malware. The email campaigns take advantage of the urgency and time-sensitive nature of emails to send phishing messages mas…

Cybersecurity Ventures Mar 20, 2026, 01:14 PM (UTC)
Read

Cybersecurity Ventures Will See You At RSAC Conference 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 20, 2026 If you’re making the pilgrimage to RSAC 2026 in San Francisco next week, then we might see you there. For the past five years, Cybersecurity Ventures has been…

The Hacker News Mar 20, 2026, 10:00 AM (UTC)
Read

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals are using AI to generate personalized phishing emails, deepf…

Krebs on Security Mar 20, 2026, 12:49 AM (UTC)
Read

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web camera…

Cybersecurity Ventures Mar 19, 2026, 12:57 PM (UTC)
Read

Corporate Wifi Is A Major Target For AI-driven Cyberattacks

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 19, 2026 – Read the full story in Financial Express Corporate Wi-Fi networks, once considered a routine part of office infrastructure, are emerging as a growing cyberse…

The Hacker News Mar 19, 2026, 10:58 AM (UTC)
Read

How Ceros Gives Security Teams Visibility and Control in Claude Code

Security teams have spent years building identity and access controls for human users and service accounts. But a new category of actor has quietly entered most enterprise environments, and it operates entirely outside those controls. Claude Code, Anthropic's…

The Hacker News Mar 18, 2026, 11:58 AM (UTC)
Read

Claude Code Security and Magecart: Getting the Threat Model Right

When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your repo. As teams adopt Claude Code Security for static analysis, this is…

Cybersecurity Ventures Mar 16, 2026, 12:54 PM (UTC)
Read

How Secure Is The Data Stored By Cloud Providers?

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 16, 2026 – Read the full Forbes story The cloud is home to a dizzying amount of data. According to Cybersecurity Ventures, nearly half of the world’s data exists in ext…

Page 1 of 1 0 results