[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
EU Auto Rules Shift Gears on Cybersecurity Standards
Iran's Cyber-Kinetic War Doctrine Takes Shape
Cyberattack on Mexico's Gov't Agencies Highlight AI Threat
Nation-State Actor Embraces AI Malware Assembly Line
Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
Software Development Practices Help Enterprises Tackle Real-Life Risks
LatAm Now Faces 2x More Cyberattacks Than US
VMware Aria Operations Bug Exploited, Cloud Resources at Risk
Stranger Things Meets Cybersecurity: Lessons from the Hive Mind
Ars Technica
Amazon appears to be down, with over 20,000 reported problems
Trump gets data center companies to pledge to pay for power generation
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
OpenAI sidesteps Nvidia with unusually fast coding model on plate-sized chips
CyberScoop
Congress looks to revive critical cyber program for rural electric utilities
FBI targeted with ‘suspicious’ activity on its networks
HHS updates a free risk tool to help hospitals size up their cybersecurity exposure
Phobos ransomware leader pleads guilty, faces up to 20 years in prison
Cisco reveals 2 max-severity defects in firewall management software
Global coalition dismantles Tycoon 2FA phishing kit
LLMs are getting better at unmasking people online
Authorities from 14 countries shut down major cybercrime forum LeakBase
Attackers are using your network against you, according to Cloudflare
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
InfoSecurity Magazine
Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor
Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns
AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns
ContextCrush Flaw Exposes AI Development Tools to Attacks
Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
Zero-Click FreeScout Bug Enables Remote Code Execution
Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products
Europol Operation Seizes LeakBase Data Breach Site
Coalition of Western Countries Launches 6G Cybersecurity Guidelines
Global Takedown Neutralizes Tycoon2FA Phishing Service
SecurityWeek
CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List
Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks
James ‘Aaron’ Bishop Tapped to Serve as New Pentagon CISO
Iranian APT Hacked US Airport, Bank, Software Company
Data Security Firm Evervault Raises $25 Million in Series B Funding
Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises
Russian Ransomware Operator Pleads Guilty in US
Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
Reclaim Security Raises $20 Million to Accelerate Remediation
LeakBase Cybercrime Forum Shut Down, Suspects Arrested
ZDNet
6 essential strategies to defend against AI-powered threat actors in 2026
AI agents of chaos? New research shows how bots talking to bots can go sideways fast
Can Meta see your private life through its Ray-Ban smart glasses? What to know
Best of MWC 2026: The biggest news we saw from Lenovo, Xiaomi, and more this week
The Disney+ and Hulu bundle just dropped to the lowest price of the year so far
How the MacBook Neo compares to its closest Windows and Chromebook rivals - by the specs
Sick of Microsoft and Google? This new European office suite is a private, open-source alternative
How to disable standby mode on your TV - and does it really save on your electric bill?
We surveyed remote workers for their favorite tech gadgets - these 8 top the list
How I used CloneZilla to fully back up my PC in case disaster strikes (and it's free)
The Hacker News
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
BleepingComputer
CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
Fake Claude Code install guides push infostealers in InstallFix attacks
Microsoft 365 Backup to add file-level restore for faster recovery
Ghanain man pleads guilty to role in $100 million fraud ring
FBI investigates breach of surveillance and wiretap systems
Chinese state hackers target telcos with new malware toolkit
Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
Wikipedia hit by self-propagating JavaScript worm that vandalized pages
WordPress membership plugin bug exploited to create admin accounts
gbhackers
RMM Tools Crucial for IT Operations, But Growing Threat as Attackers Weaponize Them
AVideo Platform Vulnerability Allows Hackers to Hijack Streams via Zero-Click Command Injection
Apache ActiveMQ Flaw Enables DoS Attacks via Malformed Network Packets
AWS-LC Flaw Exposes Amazon Users to Attacks by Bypassing Certificate Chain Validation
New Linux Rootkits Leverage Advanced eBPF and io_uring Techniques for Stealthy Attacks
China-Nexus Hackers Target Telecommunication Providers with New Malware Attack
FBI Detains U.S. Government Contractor in Massive $46 Million Fraud Scheme
WordPress Membership Plugin Flaw Lets Attackers Create Admin Accounts
Google Uncovers 90 Zero-Day Vulnerabilities Under Active Exploitation in 2025
New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data
Cybersecurity Dive
HHS adds cybersecurity guidance to healthcare sector self-assessment tool
Nearly half of exploited zero-day flaws target enterprise-grade technology
Microsoft, Europol disrupt global phishing platform Tycoon 2FA
Plankey’s nomination as CISA director now in jeopardy
Iran-nexus hackers target flaws in surveillance cameras
CrowdStrike reports record quarter amid investor concerns about AI impact
Pro-Russia actors team with Iran-linked hackers in attacks
Ransomware is now less about malware and more about impersonation
University of Mississippi Medical Center reopens clinics after ransomware attack
Iran-linked hackers raise threat level against US, allies
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Cisco warns of two more SD-WAN bugs under active attack
Microsoft spots ClickFix campaign getting users to self-pwn on Windows Terminal
Son of government contractor arrested after alleged $46M crypto heist from US Marshals
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October
Transport for London says 2024 breach affected 7M customers, not 5,000
Google says spyware makers and China-linked groups dominated zero-day attacks last year
Iran intelligence backdoored US bank, airport, software outfit networks
UK watchdog eyes Meta's smart glasses after workers say they 'see everything'
'Hundreds' of Iranian hacking attempts have hit surveillance cameras since the missile strikes
Malware-laced OpenClaw installers get Bing AI search boost
VentureBeat
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
What if the real risk of AI isn’t deepfakes — but daily whispers?
When AI lies: The rise of alignment faking in autonomous systems
Enterprise MCP adoption is outpacing security controls
Claude didn't just plan an attack on Mexico's government. It executed one for a month — across four domains your security stack can't see.
Anthropic says DeepSeek, Moonshot, and MiniMax used 24,000 fake accounts to rip off Claude
TechCrunch
TriZetto confirms 3.4M people’s health and personal data was stolen during breach
FBI investigating hack on its wiretap and surveillance systems: Report
Italian prosecutors confirm journalist was hacked with Paragon spyware
FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech
US and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
Fig Security emerges from stealth with $38M to help security teams deal with change
A new app alerts you if someone nearby is wearing smart glasses
Network World Security
AI transforms ‘dangling DNS’ into automated data exfiltration pipeline
Data center new builds diminish even as demand rises
Cisco issues emergency patches for critical firewall vulnerabilities
Cisco: Latest news and insights
Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit
Digital sovereignty options for on-prem deployments
Cato Networks brings adaptive threat defense to SASE
AMD: Latest news and insights
AWS Middle East outage: a reminder not to rely on cloud as disaster recovery plan
Cisco: AI is a double-edged sword in industrial networks
Help Net Security
Iran-linked APT targets US critical sectors with new backdoors
Microsoft working on Teams feature to keep unauthorized bots at bay
New cyber module strengthens risk planning for health organizations
Hexnode IdP brings device-aware authentication and zero trust to enterprise access
Cyolo PRO 7.0 expands OT-first secure remote access with AI session intelligence
Cursor Automations turns code review and ops into background tasks
OpenAI’s GPT-5.4 doubles down on safety as competition heats up
March 2026 Patch Tuesday forecast: Is AI security an oxymoron?
Backup strategies are working, and ransomware gangs are responding with data theft
Why phishing still works today
SC Magazine
Why our AI world demands a remediation-first approach to exposure management
‘Mail2Shell’ FreeScout patch bypass exploit leads to RCE
Defense against configurations with ThreatLocker's Bruce Mines
Securing remote workforce with ThreatLocker's Erik Jansen
Endpoint hardening in 5 minutes with ThreatLocker's Amanda Makowsky
AI is useless, zero trust is dangerous: Contrary lessons from Zero Trust World 2026
Data privacy violations result in $1.1M penalty for PlayOn Sports
Exhaustive cybersecurity review launched at IRS amid privacy concerns
ShinyHunters claims massive Woflow breach
Fake LastPass alerts seek master password compromise
© 2026 RiskDiscovery | Sponsored by:
Deception Logic