[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
LatAm Now Faces 2x More Cyberattacks Than US
VMware Aria Operations Bug Exploited, Cloud Resources at Risk
Stranger Things Meets Cybersecurity: Lessons from the Hive Mind
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
China's Silver Dragon Razes Governments in EU, SE Asia
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
Vehicle Tire Pressure Sensors Enable Silent Tracking
Qualcomm Zero-Day Exploited in Targeted Android Attacks
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
AI Agent Overload: How to Solve the Workload Identity Crisis
Ars Technica
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
OpenAI sidesteps Nvidia with unusually fast coding model on plate-sized chips
Attackers prompted Gemini over 100,000 times while trying to clone it, Google says
Once-hobbled Lumma Stealer is back with lures that are hard to resist
CyberScoop
Global coalition dismantles Tycoon 2FA phishing kit
LLMs are getting better at unmasking people online
Authorities from 14 countries shut down major cybercrime forum LeakBase
Attackers are using your network against you, according to Cloudflare
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
Researchers discover suite of agentic AI browser vulnerabilities
CISA CIO Robert Costello exits agency
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities
The FBI’s cyber chief is using Winter SHIELD to accelerate China prep, threat intelligence sharing
From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes
InfoSecurity Magazine
ContextCrush Flaw Exposes AI Development Tools to Attacks
Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
Zero-Click FreeScout Bug Enables Remote Code Execution
Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products
Europol Operation Seizes LeakBase Data Breach Site
Coalition of Western Countries Launches 6G Cybersecurity Guidelines
Global Takedown Neutralizes Tycoon2FA Phishing Service
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows
SecurityWeek
Russian Ransomware Operator Pleads Guilty in US
Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
Reclaim Security Raises $20 Million to Accelerate Remediation
LeakBase Cybercrime Forum Shut Down, Suspects Arrested
Cisco Patches Critical Vulnerabilities in Enterprise Networking Products
Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
Tycoon 2FA Phishing Platform Dismantled in Global Takedown
New LexisNexis Data Breach Confirmed After Hackers Leak Files
Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance
Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively
ZDNet
Forget iPhone 17e: Nothing's Phone 4a Pro costs less and looks a whole lot better
Apple was quietly all over the world's biggest Android phone show, and that says a lot
I stuck this power station in a freezer to test its subzero claims - here's how it held up
Lenovo ThinkPad vs. Apple MacBook: Which is the better laptop for you?
Get the iPhone 17e for $6 a month at AT&T - here's how
The biggest AI threats come from within - 12 ways to defend your organization
Bluetooth is working on wireless audio tech I once thought was impossible - what to know
How to clean up your digital footprint - and why it matters more than you think
iPhone 17e vs. iPhone 17: I compared the two models to decide which has the better value
TCL X11L review: One of the best out-of-the-box TVs that's entered our testing lab
The Hacker News
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
Where Multi-Factor Authentication Stops and Credential Abuse Starts
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
New RFP Template for AI Usage Control and AI Governance
BleepingComputer
Police dismantles online gambling ring exploiting Ukrainian women
Cisco flags more SD-WAN flaws as actively exploited in attacks
Phobos ransomware admin pleads guilty to wire fraud conspiracy
Bitwarden adds support for passkey login on Windows 11
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
Windows 10 KB5075039 update fixes broken Recovery Environment
Fake LastPass support email threads try to steal vault passwords
Cisco warns of max severity Secure FMC flaws giving root access
Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks
Hacker mass-mails HungerRush extortion emails to restaurant patrons
gbhackers
New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data
Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware
PoC Exploit for Cisco SD-WAN 0-Day Vulnerability Now Released, Actively Exploited in the Wild
RingH23 Threat Actors Target MacCMS and CDN Infrastructure with New Arsenal
DPRK Hackers Target Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
Critical pac4j-jwt Authentication Bypass Vulnerability Allows Attackers to Impersonate Any User
Top 10 Best Cybersecurity Marketing Agencies to Watch in 2026
ClickFix Campaign Exploits Fake LinkedIn VCs to Spread Malware Among Crypto and Web3 Experts
Google Rolls Out Emergency Chrome Update to Patch 10 Critical Security Vulnerabilities
Cisco Secure Firewall Management Flaw Allows Remote Code Execution
Cybersecurity Dive
Iran-nexus hackers target flaws in surveillance cameras
CrowdStrike reports record quarter amid investor concerns about AI impact
Pro-Russia actors team with Iran-linked hackers in attacks
Ransomware is now less about malware and more about impersonation
University of Mississippi Medical Center reopens clinics after ransomware attack
Iran-linked hackers raise threat level against US, allies
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction
ResOps: The new operating model bridging security, identity and recovery
Trump administration removes controversial acting CISA director
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
UK watchdog eyes Meta's smart glasses after workers say they 'see everything'
'Hundreds' of Iranian hacking attempts have hit surveillance cameras since the missile strikes
Malware-laced OpenClaw installers get Bing AI search boost
LexisNexis confirms data breach at Legal & Professional arm, some customer records affected
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
Google feels the need for security speed, so will ship Chrome updates every two weeks
Dev stunned by $82K Gemini bill after unknown API key thief goes to town
Chat at your own risk! Data brokers are selling deeply personal bot transcripts
Cyberwarriors elevated to big leagues in US war with Iran
Turns out most cybercriminals are old enough to know better
VentureBeat
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
What if the real risk of AI isn’t deepfakes — but daily whispers?
When AI lies: The rise of alignment faking in autonomous systems
Enterprise MCP adoption is outpacing security controls
Claude didn't just plan an attack on Mexico's government. It executed one for a month — across four domains your security stack can't see.
Anthropic says DeepSeek, Moonshot, and MiniMax used 24,000 fake accounts to rip off Claude
TechCrunch
US and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
Fig Security emerges from stealth with $38M to help security teams deal with change
A new app alerts you if someone nearby is wearing smart glasses
Hacktivists claim to have hacked Homeland Security to release ICE contract data
Hackers and internet outages hit Iran amid US air strikes
Let’s explore the best alternatives to Discord
India disrupts access to popular developer platform Supabase with blocking order
CISA replaces acting director after a bumbling year on the job
Network World Security
Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit
Digital sovereignty options for on-prem deployments
Cato Networks brings adaptive threat defense to SASE
Cisco: Latest news and insights
AMD: Latest news and insights
AWS Middle East outage: a reminder not to rely on cloud as disaster recovery plan
Cisco: AI is a double-edged sword in industrial networks
AMD accelerates telecom network AI
2026 network outage report and internet health check
Nvidia: Latest news and insights
Help Net Security
Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
Reclaim Security secures $26 million to automate cybersecurity remediation
That attractive online ad might be a malware trap
FreeScout vulnerability enables unauthenticated, zero-click RCE via email (CVE-2026-28289)
Google changes Play Store policies after settling Epic Games dispute
Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk
LeakBase cybercrime forum with 142,000 users taken down in global operation
Authorities pull plug on Tycoon 2FA phishing-as-a-service platform
As AI agents start making purchases, security teams must rethink risk
Workers reviewing Meta Ray-Ban footage encounter users’ intimate moments
SC Magazine
Cybersecurity leaders working 10-plus extra hours per week on average
Trust, responsibility and transhumanism: Zero Trust World 2026
AI speeds cyberattacks, shrinking lateral movement to minutes
Codific highlights five key cyber risks to power grids
Federal networks exposed in Cisco flaw
North America leads global ransomware cases
Chrome launches quantum-resistant HTTPS plan
Expert flags misuse of AI chatbot messages
Congressional Dems press DHS watchdog on ICE location data purchases
Vulnerabilities expose agentic AI browsers to potential compromise
© 2026 RiskDiscovery | Sponsored by:
Deception Logic