[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
White House Cyber Strategy Prioritizes Offense
'InstallFix' Attacks Spread Fake Claude Code Sites
Are We Ready for Auto Remediation With Agentic AI?
Chinese Cyber Threat Lurks In Critical Asian Sectors for Years
Cylake Offers AI-Native Security Without Relying on Cloud Services
North Korean APTs Use AI to Enhance IT Worker Scams
EU Auto Rules Shift Gears on Cybersecurity Standards
Iran's Cyber-Kinetic War Doctrine Takes Shape
Cyberattack on Mexico's Gov't Agencies Highlight AI Threat
Nation-State Actor Embraces AI Malware Assembly Line
Ars Technica
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
Amazon appears to be down, with over 20,000 reported problems
Trump gets data center companies to pledge to pay for power generation
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
CyberScoop
No, it’s not ‘unnecessarily burdensome’ to control your own data
Sean Cairncross lays out what’s coming next for Trump’s cyber strategy
We’ve seen ransomware cost American lives. Here’s what it will actually take to stop it.
The long-awaited Trump cyber strategy has arrived
Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI
DHS CISO, deputy CISO exit amid reported IT leadership overhaul
Congress looks to revive critical cyber program for rural electric utilities
FBI targeted with ‘suspicious’ activity on its networks
HHS updates a free risk tool to help hospitals size up their cybersecurity exposure
Phobos ransomware leader pleads guilty, faces up to 20 years in prison
InfoSecurity Magazine
Russian Hackers Target WhatsApp and Signal Accounts of Global Military and Government Officials
ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign
Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data
Trump Administration Unveils New Cyber Strategy for America
UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
AI Security Startups Dominate New Cyber Innovation Awards
TriZetto Provider Solutions Breach Hits 3.4 Million Patients
Ghanaian Pleads Guilty to Role in $100m Romance Scam
Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor
Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns
SecurityWeek
Cylake Raises $45 Million to Secure Organizations Barred From Cloud
Cybersecurity M&A Roundup: 42 Deals Announced in February 2026
ClickFix Attack Uses Windows Terminal to Evade Detection
Internet Infrastructure TLD .arpa Abused in Phishing Attacks
Cloned AI Tool Sites Distribute Malware in ‘InstallFix’ Campaign
Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited
US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies
Over 100 GitHub Repositories Distributing BoryptGrab Stealer
Pentagon’s Chief Tech Officer Says He Clashed With AI Company Anthropic Over Autonomous Warfare
FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information
ZDNet
Don't make these 3 common tablet charging mistakes - here's the right way to do it
How to preorder the Samsung Galaxy S26 Ultra (and other models) - plus the best deals
Amazon's Big Spring Sale 2026: Rumored dates, what to expect & everything to know
YouTube Premium vs. YouTube Premium Lite: Are the upgrades worth the $6 difference?
I tried GPT-5.4, and most answers were really good - but a few had me concerned
Switching to Tor Browser on Android turned out to be more useful than I expected
The good, bad, and ugly of AI healthcare, according to a doctor who uses AI
How to qualify for Apple's education discount - including for the $499 MacBook Neo
How I turned my Starlink Mini into the ultimate off-grid internet device - no AC adapter needed
AI is supercharging cloud cyberattacks - and third-party software is the most vulnerable
The Hacker News
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware
Can the Security Platform Finally Deliver for the Mid-Market?
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
BleepingComputer
Microsoft to enable Windows hotpatch security updates by default
APT28 hackers deploy customized variant of Covenant open-source tool
Microsoft Teams phishing targets employees with A0Backdoor malware
Google: Cloud attacks exploit flaws more than weak credentials
Dutch govt warns of Signal, WhatsApp account hijacking attacks
Ericsson US discloses data breach after service provider hack
Microsoft Teams will tag third-party bots trying to join meetings
ShinyHunters claims ongoing Salesforce Aura data theft attacks
FBI warns of phishing attacks impersonating US city, county officials
Why Password Audits Miss the Accounts Attackers Actually Want
gbhackers
OpenClaw Advisory Surge Highlights Blind Spot Between GitHub and CVE Vulnerability Tracking
Gogs Flaw Could Let Attackers Quietly Overwrite Large File Storage Data
Cloudflare Pingora Flaws Enable Request Smuggling and Cache Poisoning Attacks
OpenAI to Acquire Promptfoo to Address Vulnerabilities in AI Systems
SurxRAT Android Malware Uses LLMs for Phishing and Data Theft
iPhone Hacking Toolkit Tied to Russian Espionage May Have Originated in the U.S.
Signed malware posing as Teams and Zoom apps drops RMM backdoors
Signal Confirms Sophisticated Phishing Scheme Caused Account Compromises
Chinese APT Campaign Uses Middle East Lures to Target Qatar With PlugX
Anthropic Files Lawsuit Against U.S. Government Over Claude Risk Designation
Cybersecurity Dive
Trump administration will test infrastructure cybersecurity approaches in pilot program
Conflicting definitions and timelines causing cybersecurity regulation morass, industry reps say
State-linked actors targeted US networks in lead-up to Iran war
How AI will impact security careers and what leaders should do about it
4 best practices to get IAM implementation right the first time
Trump’s new cybersecurity strategy makes promises but lacks details
HHS adds cybersecurity guidance to healthcare sector self-assessment tool
Nearly half of exploited zero-day flaws target enterprise-grade technology
Microsoft, Europol disrupt global phishing platform Tycoon 2FA
Plankey’s nomination as CISA director now in jeopardy
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
AI vs AI: Agent hacked McKinsey's chatbot and gained full read-write access in just two hours
ShinyHunters claims more high-profile victims in latest Salesforce customers data heist
EV charger biz ELECQ zapped by ransomware crooks, customer contact data stolen
Dutch cops warn 100 alleged scammers: Turn yourselves in or we tell Grandma
Russian cybercrims phish their way into officials' Signal and WhatsApp accounts
Microsoft Azure CTO set Claude on his 1986 Apple II code, says it found vulns
Royal Navy races to arm ships against drone threat
Iran is the first out-loud cyberwar the US has fought
FBI is investigating breach that may have hit its wiretapping tools
AI agents now help attackers, including North Korea, manage their drudge work
VentureBeat
Enterprise identity was built for humans — not AI agents
Microsoft says ungoverned AI agents could become corporate 'double agents.' Its fix costs $99 a month.
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
What if the real risk of AI isn’t deepfakes — but daily whispers?
When AI lies: The rise of alignment faking in autonomous systems
Enterprise MCP adoption is outpacing security controls
TechCrunch
An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
OpenAI acquires Promptfoo to secure its AI agents
Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn
Salt Typhoon is hacking the world’s phone and internet giants — here’s everywhere that’s been hit
Anthropic’s Claude found 22 vulnerabilities in Firefox over two weeks
TriZetto confirms 3.4M people’s health and personal data was stolen during breach
FBI investigating hack on its wiretap and surveillance systems: Report
Italian prosecutors confirm journalist was hacked with Paragon spyware
FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech
Network World Security
Cisco: Latest news and insights
Cisco: LPO not a panacea but plays strategic role in AI networks
AI transforms ‘dangling DNS’ into automated data exfiltration pipeline
Data center new builds diminish even as demand rises
Cisco issues emergency patches for critical firewall vulnerabilities
Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit
Digital sovereignty options for on-prem deployments
Cato Networks brings adaptive threat defense to SASE
AMD: Latest news and insights
AWS Middle East outage: a reminder not to rely on cloud as disaster recovery plan
Help Net Security
Mimecast brings gateway-grade email security to API deployment
New Claude tool uses AI agents to find bugs in pull requests
Phishing campaign spoofs local officials to steal permit fees
Escape lands $18 million funding to scale AI-driven offensive security automation
SailPoint expands AI-powered identity security with adaptive identity framework
Datadog MCP server delivers live observability to AI agents and IDEs
OneTrust expands AI governance with real-time monitoring and guardrail enforcement
Singulr AI’s Agent Pulse delivers enforceable runtime governance and visibility for AI agents
Airbus CSO on supply chain blind spots, space threats, and the limits of AI red-teaming
The people behind cyber extortion are often in their forties
SC Magazine
Making Medical Devices Secure - Tamil Mathi - ASW #373
New HHS toolkit helps healthcare sector gauge cyber preparedness
Opposition fails to deter House committee's advancement of child online safety bill
Bipartisan energy cybersecurity bills gain House panel nod
Qilin purports breach of US electric cooperative
Massive GitHub, DockerHub private key leaks impact corporations, governments
Fake CleanMyMac site facilitates SHub Stealer malware injection
Amatera infostealer deployed via phony Claude Code guides
Lumma Stealer-spreading ClickFix attack uncovered
Trio of RATs deployed in VOID#GEIST malware campaign
© 2026 RiskDiscovery | Sponsored by:
Deception Logic