[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Attackers Abuse LiveChat to Phish Credit Card, Personal Data
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
The Data Gap: Why Nonprofit Cyber Incidents Go Underreported
Cyberattackers Don't Care About Good Causes
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
Most Google Cloud Attacks Start With Bug Exploitation
Real-Time Banking Trojan Strikes Brazil's Pix Users
Why Post-Quantum Cryptography Can't Wait
Iran MOIS Colludes With Criminals to Boost Cyberattacks
Commercial Spyware Opponents Fear US Policy Shifting
Ars Technica
Supply-chain attack using invisible code hits GitHub and other repositories
The who, what, and why of the attack that has shut down Stryker's Windows network
14,000 routers are infected by malware that's highly resistant to takedowns
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
Amazon appears to be down, with over 20,000 reported problems
Trump gets data center companies to pledge to pay for power generation
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
CyberScoop
The ransomware economy is shifting toward straight-up data extortion
Attackers are exploiting AI faster than defenders can keep up, new report warns
Washington is right: Cybercrime is organized crime. Now we need to shut down the business model
Stryker attack highlights nebulous nature of Iranian cyber activity amid joint U.S.-Israel conflict
Authorities takedown global proxy network SocksEscort
Officials worry Salt Typhoon apathy is killing momentum for tougher telecom security rules
Feds say another DigitalMint negotiator ran ransomware attacks and helped extort $75 million
Salesforce issues new security alert tied to third customer attack spree in six months
If consequences matter, they should apply to vendors, too
Microsoft’s monthly Patch Tuesday is first in 6 months with no actively exploited zero-days
InfoSecurity Magazine
Researchers Warn of Global Surge in Fake Shipment Tracking Scams
CrackArmor Flaws Expose Linux Systems to Privilege Escalation
Security Flaw in AWS Bedrock Code Interpreter Raises Alarms
FBI Calls for Help to Track Steam Malware Campaign
UK: Companies House Web Glitch Exposes Corporate Details to Fraudsters
Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep
Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning
PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time
Critical Zero-Click Flaw in n8n Allows Full Server Compromise
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
SecurityWeek
Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact
Security Firm Executive Targeted in Sophisticated Phishing Attack
China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation
Threat Actor Targeting VPN Users in New Credential Theft Campaign
ForceMemo: Python Repositories Compromised in GlassWorm Aftermath
Hacking Attempt Reported at Poland’s Nuclear Research Center
Loblaw Data Breach Impacts Customer Information
Critical HPE AOS-CX Vulnerability Allows Admin Password Resets
Starbucks Data Breach Impacts Employees
In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown
ZDNet
Amazon's Big Spring Sale starts March 25: Dates, details, and deals to know
How to clear your MacBook cache (and why it'll do wonders for performance)
This tiny satellite device replaced my smartwatch while adventuring off-grid
This $5 USB-C accessory can save you hundreds in tech repair costs - here's how
I tried Android's notification summaries on my Pixel, and they're surprisingly useful
I replaced my Whoop with a rival fitness band that has no monthly fees - and it's nearly as good
Apple's AirPods Max 2 are here - what's new and what $549 gets you now
Amazon's Big Spring Sale kicks off March 25 - what to know (and what will be on sale)
I stopped drowning in browser tabs, thanks to this clever AI tool
Are Ridge Wallets worth the hype? My buying advice after weeks of testing one
The Hacker News
⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More
Why Security Validation Is Becoming Agentic
ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
BleepingComputer
Shadow AI is everywhere. Here’s how to find and secure it.
Microsoft pulls Samsung app blocking Windows C: drive from Store
OpenAI says ChatGPT ads are not rolling out globally for now
Betterleaks, a new open-source secrets scanner to replace Gitleaks
Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs
FBI seeks victims of Steam games used to spread malware
Poland's nuclear research centre targeted by cyberattack
Microsoft investigates classic Outlook sync and connection issues
gbhackers
Handala Hackers Exploit RDP and NetBird in Coordinated Wiper Attacks
Cyberattack Hits Poland’s Nuclear Research Center
CamelClone Uses Public File-Sharing Sites in Government Cyberattacks
Betterleaks Launches as Open-Source Tool for Scanning Files, Directories, and Git Repositories
RondoDox Botnet Scales Up, Exploiting 174 Vulnerabilities via Residential IPs
MEA Shipment Phishing Scams Surge, Stealing Banking Data in Real Time
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
Google Looker Studio Vulnerabilities Allow Attackers to Exfiltrate Data from Google Services
IBM Discovers ‘Slopoly’ AI-Generated Malware Linked to Hive0163 Ransomware
Fake FileZilla Downloads Spread RAT via Stealthy Multi-Stage Loader
Cybersecurity Dive
Robotics firm Intuitive Surgical says cyberattack compromised business, customer data
Stryker’s manufacturing, shipping disrupted after cyberattack
Even primitive AI-coded malware helps hackers move faster, thwart attribution
5 ways to protect manufacturing companies from cyberattacks
Coalition of information-sharing groups warns of cyber, physical attacks
Stryker investigating cyberattack that caused widespread outage
Google completes $32B acquisition of Wiz
Industry to NIST: Keep agentic AI standards flexible and voluntary
US entities face heightened cyber risk related to Iran war
Trump administration will test infrastructure cybersecurity approaches in pilot program
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Flaw in UK's corporate registry let directors rummage through rival records
Outsourcer Telus admits to attack – may have lost a petabyte of data to ShinyHunters
Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
Interpol cybercrime crackdown leads to 94 arrests, 45,000 IP takedowns
NanoClaw latches onto Docker Sandboxes for safer AI agents
Google rushes Chrome update fixing two zero-days already under attack
Rogue AI agents can work together to hack systems and steal secrets
Operation Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud
CISA warns max-severity n8n bug is being exploited in the wild
China’s CERT warns OpenClaw can inflict nasty wounds
VentureBeat
Anthropic and OpenAI just exposed SAST's structural blind spot with free tools
Enterprise identity was built for humans — not AI agents
Microsoft says ungoverned AI agents could become corporate 'double agents.' Its fix costs $99 a month.
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
When AI lies: The rise of alignment faking in autonomous systems
What if the real risk of AI isn’t deepfakes — but daily whispers?
TechCrunch
Wiz investor unpacks Google’s $32B acquisition
The FBI is investigating malware hidden inside games hosted on Steam
Law enforcement shuts down botnet made of tens of thousands of hacked routers
Pro-Iran hacktivist group says it is behind attack on medical tech giant Stryker
Hacker broke into FBI and compromised Epstein files, report says
Google wraps up $32B acquisition of cloud cybersecurity startup Wiz
DOGE employee stole Social Security data and put it on a thumb drive, report says
Mandiant’s founder just raised $190M for his autonomous AI agent security startup
US military contractor likely built iPhone hacking tools used by Russian spies in Ukraine
OpenAI acquires Promptfoo to secure its AI agents
Network World Security
Quantum Elements cuts quantum error rates using AI-powered digital twin
Who’s in the data-center space race?
Data mining? Old servers could become new source of rare earths
Meta is developing more AI chips for itself
How AWS is reinventing the telco revenue model
What’s the biggest barrier to AI success?
Arista targets AI data centers with new liquid cooled pluggable optic module
IBM proposes unified architecture for hybrid quantum-classical computing
FluidCloud’s Large Infrastructure Model targets the multicloud networking gap
Cisco grows high-end optical support for AI clusters
Help Net Security
Stellar Cyber 6.4.0 reduces alert noise and speeds investigations with Autonomous SOC capabilities
NinjaOne Vulnerability Management enables real-time detection and autonomous patching
Orca Platform enhancements use AI to cut cloud alert noise
Fingerprint’s MCP Server turns device intelligence into real-time AI-powered fraud insights
Meta ditches end-to-end encrypted messaging on Instagram
Microsoft Edge 146 adds IP privacy and local network access controls
Hackers tried to breach Poland’s nuclear research centre
KEEQuant advances chip-scale QKD for telecom, data centers, and critical infrastructure
45,000 malicious IP addresses taken down, 94 suspects arrested
JSOC IT’s AUTOPSY platform puts security stacks under live API verification
SC Magazine
Email sits at the center of the White House’s new cyber EO and strategy
Iran and the expanding cyber front: What government leaders need to know
AI Governance, new book (Code War) from Allie Mellen, and the weekly news! - Jeremy Snyder, Allie Mellen - ESW #450
AI phishing, malicious SVGs continues after surge over holidays
GAO flags gaps in Pentagon planning for CMMC adoption
Inadequate public pressure complicates push for stronger US telecom cyber rules
Ransomware negotiator accused of extorting victims
CISA alerts exploitation of Cisco Catalyst SD-WAN vulnerability
Coruna flaw fixes issued for older iPhone, iPad models
Telus Digital affirms hack following ShinyHunters assertions
© 2026 RiskDiscovery | Sponsored by:
Deception Logic