[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
Most Google Cloud Attacks Start With Bug Exploitation
Real-Time Banking Trojan Strikes Brazil's Pix Users
Iran MOIS Colludes With Criminals to Boost Cyberattacks
Commercial Spyware Opponents Fear US Policy Shifting
Delinea's StrongDM Acquisition Highlights the Changing Role of PAM
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
What Orgs Can Learn From Olympics, World Cup IR Plans
INC Ransomware Group Holds Healthcare Hostage in Oceania
Xygeni GitHub Action Compromised Via Tag Poison
Ars Technica
The who, what, and why of the attack that has shut down Stryker's Windows network
14,000 routers are infected by malware that's highly resistant to takedowns
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
Amazon appears to be down, with over 20,000 reported problems
Trump gets data center companies to pledge to pay for power generation
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
CyberScoop
Stryker attack highlights nebulous nature of Iranian cyber activity amid joint U.S.-Israel conflict
Authorities takedown global proxy network SocksEscort
Officials worry Salt Typhoon apathy is killing momentum for tougher telecom security rules
Feds say another DigitalMint negotiator ran ransomware attacks and helped extort $75 million
Salesforce issues new security alert tied to third customer attack spree in six months
If consequences matter, they should apply to vendors, too
Microsoft’s monthly Patch Tuesday is first in 6 months with no actively exploited zero-days
FBI says even in an AI-powered world, security basics still matter
Federal judge blocks Perplexity’s AI browser from making Amazon purchases
Critical defect in Java security engine poses serious downstream security risks
InfoSecurity Magazine
Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep
Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning
PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time
Critical Zero-Click Flaw in n8n Allows Full Server Compromise
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
Police Scotland Fined After Sharing Victim’s Phone Data
Iran Claims Massive Cyber-Attack on MedTech Firm Stryker
France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025
Infosecurity Europe Announces 2026 Keynote Line Up
Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio
SecurityWeek
Starbucks Data Breach Impacts Employees
In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown
Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War
Bold Security Emerges From Stealth With $40 Million in Funding
Google Paid Out $17 Million in Bug Bounty Rewards in 2025
Iran-Linked Hacker Attack on Stryker Disrupted Manufacturing and Shipping
Onyx Security Launches With $40 Million in Funding
Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet
Chrome 146 Update Patches Two Exploited Zero-Days
Apple Updates Legacy iOS Versions to Patch Coruna Exploits
ZDNet
YouTube rolls out unskippable ads - they're so annoying I'm mulling drastic measures
Lenovo is selling a $99 Android tablet that I can actually recommend
I recommend this bestselling DeWalt cordless power tool set to everyone - and it's nearly 50% off
I found 4 tech gadgets that actually helped me sleep better (and ditch the alarm)
How to enable Advanced Protection on Android 16 - and why you shouldn't skip it
Cloud attacks are getting faster and deadlier - here's your best defense plan
The MacBook Neo is already discounted at Best Buy (sort of)
Can you trust free VPNs? What you need to know, and what services to avoid
This HP Omen 17 is a powerhouse laptop that's $1,100 off on Best Buy for a limited time
How to enable Google's free VPN on your Pixel phone - it's easy
The Hacker News
Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
Investigating a New Click-Fix Variant
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
BleepingComputer
Poland's nuclear research centre targeted by cyberattack
Microsoft investigates classic Outlook sync and connection issues
From VMware to what’s next: Protecting data during hypervisor migration
Police sinkholes 45,000 IP addresses in cybercrime crackdown
Fake enterprise VPN sites used to steal company credentials
Starbucks discloses data breach affecting hundreds of employees
Google fixes two new Chrome zero-days exploited in attacks
Canadian retail giant Loblaw notifies customers of data breach
England Hockey investigating ransomware data breach
AI-generated Slopoly malware used in Interlock ransomware attack
gbhackers
New Critical AdGuard Home Flaw Lets Attackers Bypass Authentication
Authorities Shut Down Proxy Service Linked to Malware Campaign Targeting Thousands of Users
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
Starbucks Data Breach Exposes Personal Data of Hundreds of Users
Storm-2561 Uses SEO Poisoning, Fake Signed VPN Apps to Steal Enterprise Credentials
Iran War Bait Fuels TA453, TA473 Phishing Campaigns
Apple Releases Emergency iOS 15.8.7 Update to Block ‘Coruna’ Exploit Kit
Two Newly Discovered Chrome Zero-Days Exploited in the Wild to Run Malicious Code
PsExec and Renamed Backup Tools Enabled Data Theft Before INC Ransomware Attack
Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Full Root Takeover
Cybersecurity Dive
Stryker’s manufacturing, shipping disrupted after cyberattack
Even primitive AI-coded malware helps hackers move faster, thwart attribution
5 ways to protect manufacturing companies from cyberattacks
Coalition of information-sharing groups warns of cyber, physical attacks
Stryker investigating cyberattack that caused widespread outage
Google completes $32B acquisition of Wiz
Industry to NIST: Keep agentic AI standards flexible and voluntary
US entities face heightened cyber risk related to Iran war
Trump administration will test infrastructure cybersecurity approaches in pilot program
Conflicting definitions and timelines cause cybersecurity regulation morass, industry reps say
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
Interpol cybercrime crackdown leads to 94 arrests, 45,000 IP takedowns
NanoClaw latches onto Docker Sandboxes for safer AI agents
Google rushes Chrome update fixing two zero-days already under attack
Rogue AI agents can work together to hack systems and steal secrets
Operation Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud
CISA warns max-severity n8n bug is being exploited in the wild
China’s CERT warns OpenClaw can inflict nasty wounds
Iran plots 'infrastructure warfare' against US tech giants
Iran-linked cyber crew says they hit US med-tech firm
VentureBeat
Anthropic and OpenAI just exposed SAST's structural blind spot with free tools
Enterprise identity was built for humans — not AI agents
Microsoft says ungoverned AI agents could become corporate 'double agents.' Its fix costs $99 a month.
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
When AI lies: The rise of alignment faking in autonomous systems
What if the real risk of AI isn’t deepfakes — but daily whispers?
TechCrunch
The FBI is investigating malware hidden inside games hosted on Steam
Law enforcement shuts down botnet made of tens of thousands of hacked routers
Pro-Iran hacktivist group says it is behind attack on medical tech giant Stryker
Hacker broke into FBI and compromised Epstein files, report says
Google wraps up $32B acquisition of cloud cybersecurity startup Wiz
DOGE employee stole Social Security data and put it on a thumb drive, report says
Mandiant’s founder just raised $190M for his autonomous AI agent security startup
US military contractor likely built iPhone hacking tools used by Russian spies in Ukraine
OpenAI acquires Promptfoo to secure its AI agents
Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn
Network World Security
Meta is developing more AI chips for itself
How AWS is reinventing the telco revenue model
What’s the biggest barrier to AI success?
Arista targets AI data centers with new liquid cooled pluggable optic module
IBM proposes unified architecture for hybrid quantum-classical computing
FluidCloud’s Large Infrastructure Model targets the multicloud networking gap
Cisco grows high-end optical support for AI clusters
Nvidia: Latest news and insights
F5 brings new visibility and AI controls to Big-IP, NGINX
Datalec targets rapid infrastructure deployment with new modular data centers
Help Net Security
Accertify’s Attack State targets credential stuffing and ATO attacks
EU Parliament backs extension of CSAM detection rules until 2027
Authorities dismantle SocksEscort proxy network behind millions in fraud
BioCatch DeviceIQ helps banks spot risky devices before login
Red Access firewall-native SSE adds GenAI security and browser protection to existing firewalls
AI coding agents keep repeating decade-old security mistakes
Passwords, MFA, and why neither is enough
New infosec products of the week: March 13, 2026
€1 million online fraud scheme uncovered, three suspects arrested
ENISA advisory examines package manager security risks
SC Magazine
Why protecting jailbreaking alone doesn’t cut it in the AI world
CISA adds n8n RCE flaw to list of known exploited vulnerabilities
Foiling modern phishing across the attack chain
Vulnerability Mis-Management - PSW #917
Iran-linked group claims wiper attack and takedown of medical device maker Stryker
Anthropic's 500 zero-days tell us something CISOs aren't ready to hear
ISC2 study highlights gender perception disparity in cybersecurity
New York sets stricter cybersecurity standards for water utilities
Investigation into unauthorized DOGE access to Social Security info sought
High-severity WordPress plugin flaw poses data compromise risk
© 2026 RiskDiscovery | Sponsored by:
Deception Logic