[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
VMware Aria Operations Bug Exploited, Cloud Resources at Risk
Stranger Things Meets Cybersecurity: Lessons from the Hive Mind
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
China's Silver Dragon Razes Governments in EU, SE Asia
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
Vehicle Tire Pressure Sensors Enable Silent Tracking
Qualcomm Zero-Day Exploited in Targeted Android Attacks
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
AI Agent Overload: How to Solve the Workload Identity Crisis
As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks
Ars Technica
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
OpenAI sidesteps Nvidia with unusually fast coding model on plate-sized chips
Attackers prompted Gemini over 100,000 times while trying to clone it, Google says
Once-hobbled Lumma Stealer is back with lures that are hard to resist
CyberScoop
Global coalition dismantles Tycoon 2FA phishing kit
LLMs are getting better at unmasking people online
Authorities from 14 countries shut down major cybercrime forum LeakBase
Attackers are using your network against you, according to Cloudflare
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
Researchers discover suite of agentic AI browser vulnerabilities
CISA CIO Robert Costello exits agency
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities
The FBI’s cyber chief is using Winter SHIELD to accelerate China prep, threat intelligence sharing
From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes
InfoSecurity Magazine
Coalition of Western Countries Launches 6G Cybersecurity Guidelines
Global Takedown Neutralizes Tycoon2FA Phishing Service
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows
Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App
AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare
Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion
Half of US CISOs Work the Equivalent of a Six-Day Week
Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks
SecurityWeek
Tycoon 2FA Phishing Platform Dismantled in Global Takedown
New LexisNexis Data Breach Confirmed After Hackers Leak Files
Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance
Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively
How Pirated Software Turns Helpful Employees Into Malware Delivery Agents
AI Security Firm JetStream Launches With $34 Million in Seed Funding
LastPass Warns of New Phishing Campaign
Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity
Google Plans Two-Week Release Schedule for Chrome
Global Coalition Publishes 6G Security and Resilience Principles
ZDNet
I tried Tecno's modular phone concept at MWC - and it quickly got weird
Apple's $599 MacBook Neo hands-on: The budget laptop we've all been waiting for?
How to get the MacBook Neo $499 education price - qualifications to know
Watching Shark's UV Reveal clean my house in real time was addictively satisfying
How to switch from ChatGPT to Claude: Transferring your memories and settings is easy
Best of MWC 2026: We found the biggest news from Lenovo, Xiaomi, Honor, more
Google Pixel 10a review: Should Android users consider anything else at this price?
I stuck this power station in a freezer to test its subzero claims - here's what happened next
Everything Apple just announced: The $599 MacBook Neo, M5 Pro, iPhone 17e, and more
Want to try OpenClaw? NanoClaw is a simpler, potentially safer AI agent
The Hacker News
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
New RFP Template for AI Usage Control and AI Governance
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
BleepingComputer
Bitwarden adds support for passkey login on Windows 11
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
Windows 10 KB5075039 update fixes broken Recovery Environment
Fake LastPass support email threads try to steal vault passwords
Cisco warns of max severity Secure FMC flaws giving root access
Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks
Hacker mass-mails HungerRush extortion emails to restaurant patrons
FBI seizes LeakBase cybercrime forum, data of 142,000 members
Europol-coordinated action disrupts Tycoon2FA phishing platform
Mississippi medical center reopens clinics hit by ransomware attack
gbhackers
CISA Warns Qualcomm Chipsets Memory Corruption Vulnerability Is Actively Exploited in Attacks
Iran‑Linked “Dust Specter” APT Deploys AI‑Aided Malware Against Iraqi Officials
Honeywell Controllers Widely Exposed Without Authentication
New Threat Report: AI Accelerates High-Velocity Cyber Attacks
Perplexity’s Comet Browser Breached Through Calendar Invite Attack
VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave
Iranian APT Groups Intensify Cyberattacks on Critical Infrastructure Amid Rising Geopolitical Tensions
AzCopy Utility Misused for Data Exfiltration in Ongoing Ransomware Attacks
IPVanish VPN for macOS Flaw Enables Privilege Escalation and Code Execution
CISA Warns of VMware Aria Operations Vulnerability Actively Exploited in Attacks
Cybersecurity Dive
Iran-nexus hackers target flaws in surveillance cameras
CrowdStrike reports record quarter amid investor concerns about AI impact
Pro-Russia actors team with Iran-linked hackers in attacks
Ransomware is now less about malware and more about impersonation
University of Mississippi Medical Center reopens clinics after ransomware attack
Iran-linked hackers raise threat level against US, allies
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction
ResOps: The new operating model bridging security, identity and recovery
Trump administration removes controversial acting CISA director
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Malware-laced OpenClaw installers get Bing AI search boost
LexisNexis confirms data breach at Legal & Professional arm, some customer records affected
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
Google feels the need for security speed, so will ship Chrome updates every two weeks
Dev stunned by $82K Gemini bill after unknown API key thief goes to town
Chat at your own risk! Data brokers are selling deeply personal bot transcripts
Cyberwarriors elevated to big leagues in US war with Iran
Turns out most cybercriminals are old enough to know better
Until last month, attackers could've stolen info from Perplexity Comet users just by sending a calendar invite
Chrome Gemini panel became privilege escalator for rogue extensions
VentureBeat
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
What if the real risk of AI isn’t deepfakes — but daily whispers?
When AI lies: The rise of alignment faking in autonomous systems
Enterprise MCP adoption is outpacing security controls
Claude didn't just plan an attack on Mexico's government. It executed one for a month — across four domains your security stack can't see.
Anthropic says DeepSeek, Moonshot, and MiniMax used 24,000 fake accounts to rip off Claude
TechCrunch
US and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
Fig Security emerges from stealth with $38M to help security teams deal with change
A new app alerts you if someone nearby is wearing smart glasses
Hacktivists claim to have hacked Homeland Security to release ICE contract data
Hackers and internet outages hit Iran amid US air strikes
Let’s explore the best alternatives to Discord
India disrupts access to popular developer platform Supabase with blocking order
CISA replaces acting director after a bumbling year on the job
Network World Security
Cato Networks brings adaptive threat defense to SASE
Cisco: Latest news and insights
AMD: Latest news and insights
AWS Middle East outage: a reminder not to rely on cloud as disaster recovery plan
Cisco: AI is a double-edged sword in industrial networks
AMD accelerates telecom network AI
2026 network outage report and internet health check
Nvidia: Latest news and insights
Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
Intel: Latest news and insights
Help Net Security
Digital.ai expands post-build protection for Android and iOS applications
Tufin’s AI-powered tools simplify network security operations
Webinar: The True State of Security 2026
Over 1,200 IceWarp servers still vulnerable to unauthenticated RCE flaw (CVE-2025-14500)
Njordium Vendor Management System eliminates duplicate third-party assessments
The vulnerability that turns your AI agent against you
Google speeds up Chrome updates with new security-focused release cycle
ACI Connetic for Cards unifies card, A2A payments and fraud management on one platform
ArmorCode AI Exposure Management identifies, governs, and reduces shadow AI risk
Arkose Device ID uses AI to recognize devices across changing fingerprints
SC Magazine
Compromised cPanel access fuels underground cybercrime market
Cloudflare report: Cybercrime industrialized with AI and cloud exploitation
Google Chrome accelerates release cycle to bi-weekly updates
DeepKeep launches AI agent security scanning solution
Study reveals impact of cyberattacks on German businesses
VMware Aria Operations flaw added to list of exploited vulnerabilities
Western governments propose 6G security principles
New Starkiller phishing kit bypasses MFA, mimics legitimate sites
Modern incident response lessons from the SoundCloud breach
Inside Zero Trust World 2026: Opening Impressions from the Show Floor - ZTW26 #1
© 2026 RiskDiscovery | Sponsored by:
Deception Logic