[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Nation-State Actor Embraces AI Malware Assembly Line
Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
Software Development Practices Help Enterprises Tackle Real-Life Risks
LatAm Now Faces 2x More Cyberattacks Than US
VMware Aria Operations Bug Exploited, Cloud Resources at Risk
Stranger Things Meets Cybersecurity: Lessons from the Hive Mind
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
China's Silver Dragon Razes Governments in EU, SE Asia
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
Ars Technica
Trump gets data center companies to pledge to pay for power generation
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
OpenAI sidesteps Nvidia with unusually fast coding model on plate-sized chips
Attackers prompted Gemini over 100,000 times while trying to clone it, Google says
CyberScoop
FBI targeted with ‘suspicious’ activity on its networks
HHS updates a free risk tool to help hospitals size up their cybersecurity exposure
Phobos ransomware leader pleads guilty, faces up to 20 years in prison
Cisco reveals 2 max-severity defects in firewall management software
Global coalition dismantles Tycoon 2FA phishing kit
LLMs are getting better at unmasking people online
Authorities from 14 countries shut down major cybercrime forum LeakBase
Attackers are using your network against you, according to Cloudflare
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
Researchers discover suite of agentic AI browser vulnerabilities
InfoSecurity Magazine
AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns
ContextCrush Flaw Exposes AI Development Tools to Attacks
Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
Zero-Click FreeScout Bug Enables Remote Code Execution
Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products
Europol Operation Seizes LeakBase Data Breach Site
Coalition of Western Countries Launches 6G Cybersecurity Guidelines
Global Takedown Neutralizes Tycoon2FA Phishing Service
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
SecurityWeek
Data Security Firm Evervault Raises $25 Million in Series B Funding
Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises
Russian Ransomware Operator Pleads Guilty in US
Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
Reclaim Security Raises $20 Million to Accelerate Remediation
LeakBase Cybercrime Forum Shut Down, Suspects Arrested
Cisco Patches Critical Vulnerabilities in Enterprise Networking Products
Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
Tycoon 2FA Phishing Platform Dismantled in Global Takedown
New LexisNexis Data Breach Confirmed After Hackers Leak Files
ZDNet
Scaling agentic AI means trusting your data - here's what most CDOs are investing in
Wiim Sound review: This smart speaker is so close to fully replacing my Sonos
MacBook Neo vs. MacBook Air: I compared Apple's new laptops, and here's my winner
Own a Sony TV? Changing these 3 settings will greatly improve its picture quality
Was Amazon down today? Services resuming after customers couldn't check out on Thursday
Beats Studio Pro headphones are over 40% off right now - and I can vouch for them
Get Disney+ and Hulu bundled for just $5 a month right now - here's how
iPhone 17e vs. iPhone 17: I compared both models to decide if the $200 price gap is worth it
Your next Oura Ring might support voice and hand gesture controls - this acquisition is proof
Samsung Galaxy Book 6 Pro review: Why I'd buy this instead of the Ultra model
The Hacker News
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
Where Multi-Factor Authentication Stops and Credential Abuse Starts
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
BleepingComputer
FBI investigates breach of surveillance and wiretap systems
Chinese state hackers target telcos with new malware toolkit
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
Wikipedia hit by self-propagating JavaScript worm that vandalized pages
WordPress membership plugin bug exploited to create admin accounts
FBI arrests suspect linked to $46M crypto theft from US Marshals
Google says 90 zero-days were exploited in attacks last year
2026 Browser Data Reveals Major Enterprise Security Blind Spots
Police dismantles online gambling ring exploiting Ukrainian women
Cisco flags more SD-WAN flaws as actively exploited in attacks
gbhackers
AWS-LC Flaw Exposes Amazon Users to Attacks by Bypassing Certificate Chain Validation
New Linux Rootkits Leverage Advanced eBPF and io_uring Techniques for Stealthy Attacks
China-Nexus Hackers Target Telecommunication Providers with New Malware Attack
FBI Detains U.S. Government Contractor in Massive $46 Million Fraud Scheme
WordPress Membership Plugin Flaw Lets Attackers Create Admin Accounts
Google Uncovers 90 Zero-Day Vulnerabilities Under Active Exploitation in 2025
New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data
Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware
PoC Exploit for Cisco SD-WAN 0-Day Vulnerability Now Released, Actively Exploited in the Wild
RingH23 Threat Actors Target MacCMS and CDN Infrastructure with New Arsenal
Cybersecurity Dive
Microsoft, Europol disrupt global phishing platform Tycoon 2FA
Plankey’s nomination as CISA director now in jeopardy
Iran-nexus hackers target flaws in surveillance cameras
CrowdStrike reports record quarter amid investor concerns about AI impact
Pro-Russia actors team with Iran-linked hackers in attacks
Ransomware is now less about malware and more about impersonation
University of Mississippi Medical Center reopens clinics after ransomware attack
Iran-linked hackers raise threat level against US, allies
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
ResOps: The new operating model bridging security, identity and recovery
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Google says spyware makers and China-linked groups dominated zero-day attacks last year
Iran intelligence backdoored US bank, airport, software outfit networks
UK watchdog eyes Meta's smart glasses after workers say they 'see everything'
'Hundreds' of Iranian hacking attempts have hit surveillance cameras since the missile strikes
Malware-laced OpenClaw installers get Bing AI search boost
LexisNexis confirms data breach at Legal & Professional arm, some customer records affected
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
Google feels the need for security speed, so will ship Chrome updates every two weeks
Dev stunned by $82K Gemini bill after unknown API key thief goes to town
Chat at your own risk! Data brokers are selling deeply personal bot transcripts
VentureBeat
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
What if the real risk of AI isn’t deepfakes — but daily whispers?
When AI lies: The rise of alignment faking in autonomous systems
Enterprise MCP adoption is outpacing security controls
Claude didn't just plan an attack on Mexico's government. It executed one for a month — across four domains your security stack can't see.
Anthropic says DeepSeek, Moonshot, and MiniMax used 24,000 fake accounts to rip off Claude
TechCrunch
FBI investigating hack on its wiretap and surveillance systems: Report
Italian prosecutors confirm journalist was hacked with Paragon spyware
FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech
US and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
Fig Security emerges from stealth with $38M to help security teams deal with change
A new app alerts you if someone nearby is wearing smart glasses
Hacktivists claim to have hacked Homeland Security to release ICE contract data
Network World Security
Data center new builds diminish even as demand rises
Cisco issues emergency patches for critical firewall vulnerabilities
Cisco: Latest news and insights
Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit
Digital sovereignty options for on-prem deployments
Cato Networks brings adaptive threat defense to SASE
AMD: Latest news and insights
AWS Middle East outage: a reminder not to rely on cloud as disaster recovery plan
Cisco: AI is a double-edged sword in industrial networks
AMD accelerates telecom network AI
Help Net Security
March 2026 Patch Tuesday forecast: Is AI security an oxymoron?
Backup strategies are working, and ransomware gangs are responding with data theft
Why phishing still works today
Western governments lay the groundwork for secure 6G networks
What happens when AI teams compete against human hackers
New infosec products of the week: March 6, 2026
Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud
Codenotary Trust delivers autonomous AI security for Linux and Kubernetes
Push Security adds malicious browser extension detection to block threats in employee browsers
Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
SC Magazine
Defense against configurations with Bruce Mines
Securing remote workforce with ThreatLocker's Erik Jansen
Endpoint hardening in 5 minutes with ThreatLocker's Amanda Makowsky
AI is useless, zero trust is dangerous: Contrary lessons from Zero Trust World 2026
Data privacy violations result in $1.1M penalty for PlayOn Sports
Exhaustive cybersecurity review launched at IRS amid privacy concerns
ShinyHunters claims massive Woflow breach
Fake LastPass alerts seek master password compromise
Bing-boosted fake OpenClaw installers deliver infostealers, GhostSocks malware
New China-linked cyberespionage campaign exploits Windows, Google Drive
© 2026 RiskDiscovery | Sponsored by:
Deception Logic