[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Bug in Google's Gemini AI Panel Opens Door to Hijacking
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
Cities Hosting Major Events Need More Focus on Wireless, Drone Defense
Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy
The Case for Why Better Breach Transparency Matters
Claude Code Security Shows Promise, Not Perfection
Marquis v. SonicWall Lawsuit Ups the Breach Blame Game
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years
Chinese Police Use ChatGPT to Smear Japan PM Takaichi
Flaws in Claude Code Put Developers' Machines at Risk
Ars Technica
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
OpenAI sidesteps Nvidia with unusually fast coding model on plate-sized chips
Attackers prompted Gemini over 100,000 times while trying to clone it, Google says
Once-hobbled Lumma Stealer is back with lures that are hard to resist
OpenAI researcher quits over ChatGPT ads, warns of "Facebook" path
Sixteen Claude AI agents working together created a new C compiler
CyberScoop
How ‘silent probing’ can make your security playbook a liability
From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes
Gottumukkala out, Andersen in as acting CISA director
Project Compass is Europol’s new playbook for taking on The Com
Senate moves one step closer to passing health care cyber reforms
Governments issue warning over Cisco zero-day attacks dating back to 2023
Vulnerabilities grew like weeds in 2025, but only 1% were weaponized in attacks
Across party lines and industry, the verdict is the same: CISA is in trouble
Chinese group’s ChatGPT use reveals worldwide harassment campaign against critics
Ex-L3Harris executive sentenced to 87 months in prison for selling zero-day exploits to Russian broker
InfoSecurity Magazine
Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity
ClawJacked Bug Enables Covert AI Agent Hijacking
Ransomware Payments Decline 8% as Attacks Surge 50%
North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks
UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by 75%
‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested
Aeternum Botnet Shifts Command Control to Polygon Blockchain
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify
UK's Data Watchdog Gets a Makeover to Match Growing Demands
Exploitable Vulnerabilities Present in 87% of Organizations
SecurityWeek
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Madison Square Garden Data Breach Confirmed Months After Hacker Attack
Nick Andersen Appointed Acting Director of CISA
AWS Expands Security Hub Into a Cross-Domain Security Platform
North Korean APT Targets Air-Gapped Systems in Recent Campaign
Google Working Towards Quantum-Safe Chrome HTTPS Certificates
US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates
Hackers Weaponize Claude Code in Mexican Government Cyberattack
Canadian Tire Data Breach Impacts 38 Million Accounts
Trump Orders All Federal Agencies to Phase Out Use of Anthropic Technology
ZDNet
The iPhone 17e is here: 6 ways Apple just upgraded its cheapest phone
Best of MWC 2026: We found the biggest news from Lenovo, Xiaomi, Honor, more
Apple's new M4 iPad Air is here - and it's twice as fast as your old M1 model
This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC
I test power banks for a living - this is the thinnest Qi2 charger I've tried
Why scammers say nothing when they call - and how to respond safely
Job hunting? 5 ways you can stand out in 2026 - and beat AI screening tools
41 hidden Google Maps settings and features every power user should know
5 ways to grow your business with AI - without leaving employees behind
I tested a solid-state power bank with 10,000mAh - it's held back by one obvious flaw
The Hacker News
⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
How to Protect Your SaaS from Bot Attacks with SafeLine WAF
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
BleepingComputer
How Deepfakes and Injection Attacks Are Breaking Identity Verification
Anthropic confirms Claude is down in a worldwide outage
ClawJacked attack let malicious websites hijack OpenClaw to steal data
Samsung TVs to stop collecting Texans’ data without express consent
QuickLens Chrome extension steals crypto, shows ClickFix attack
$4.8M in crypto stolen after Korean tax agency exposes wallet seed
Microsoft testing Windows 11 batch file security improvements
APT37 hackers use new malware to breach air-gapped networks
Europol-led crackdown on The Com hackers leads to 30 arrests
CISA warns that RESURGE malware can be dormant on Ivanti devices
gbhackers
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat
MSHTML Zero-Day in Windows Exploited by APT28 Prior to Feb 2026 Security Update
TPMS Flaw in Toyota, Mercedes, and Other Major Brands Enables Covert Vehicle Tracking
Proof-of-Concept Released for Windows ALPC Privilege Escalation via Error Reporting
UXSS Vulnerability in DuckDuckGo Browser’s AutoConsent JS Bridge Allows Cross-Origin Attacks
OneUptime Command Injection Vulnerability Poses Major Risk of Full System Takeover
GTFire Phishing Campaign Exploits Google Services to Bypass Detection and Harvest Credentials
Langflow CSV Agent Flaw Could Let Attackers Execute Arbitrary Code
Project Compass Operation Cracks Down on “The Com” Cybercrime Collective – 30 Arrested, 179 Suspects Identified
Hackers Launch Massive SonicWall Firewall Attack Using 4,000+ IP Addresses
Cybersecurity Dive
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction
ResOps: The new operating model bridging security, identity and recovery
Trump administration removes controversial acting CISA director
‘Resurge’ malware can remain undetected on devices
UFP Technologies investigating cyberattack that impacted company data
AI accelerates lateral movement in cyberattacks
CISA orders agencies to patch Cisco devices now under attack
Software vulnerabilities are being weaponized faster than ever
China-linked hackers breached dozens of telecoms, government agencies
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Memory scalpers hunt scarce DRAM with bot blitz
Scammers try to SIM-swap Dubai citizens hours after Iranian missile strikes
UK government's Vulnerability Monitoring System is working - fixes flow far faster
South Korea’s tax office apologizes for leaking seed phrase to seized crypto
Denizens of DEF CON are 'fed up with government'
Double whammy: Steaelite RAT bundles data theft, ransomware in one evil tool
Suspected Nork digital intruders caught breaking into US healthcare, education orgs
Ransomware payments cratered in 2025, but attacks surged to record highs
French DIY etailer ManoMano admits customer data stolen
Cops back Dutch telco Odido after second wave of ShinyHunters leaks
VentureBeat
When AI lies: The rise of alignment faking in autonomous systems
What if the real risk of AI isn’t deepfakes — but daily whispers?
Enterprise MCP adoption is outpacing security controls
Claude didn't just plan an attack on Mexico's government. It executed one for a month — across four domains your security stack can't see.
Anthropic says DeepSeek, Moonshot, and MiniMax used 24,000 fake accounts to rip off Claude
Anthropic's Claude Code Security is available now after finding 500+ vulnerabilities: how security leaders should respond
Microsoft Copilot ignored sensitivity labels twice in eight months — and no DLP stack caught either one
TechCrunch
Hackers and internet outages hit Iran amid U.S. air strikes
Let’s explore the best alternatives to Discord
India disrupts access to popular developer platform Supabase with blocking order
CISA replaces acting director after a bumbling year on the job
Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023
Spyware makers sentenced to prison in Greece for wiretapping politicians and journalists
US cybersecurity agency CISA reportedly in dire shape amid Trump cuts and layoffs
Inside the story of the US defense contractor who leaked hacking tools to Russia
Former L3Harris Trenchant boss jailed for selling hacking tools to Russian broker
CarGurus data breach affects 12.5 million accounts
Network World Security
OpenAI launches stateful AI on AWS, signaling a control plane power shift
Security hole could let hackers take over Juniper Networks PTX core routers
Enterprise Spotlight: Data Center Modernization
Why do data centers need so much water?
ControlMonkey extends configuration disaster recovery to cloud network vendors
IBM X-Force: AI creates security challenges, but basic system flaws are more problematic
Netskope targets AI-driven network bottlenecks with AI Fast Path
AMD: Latest news and insights
AMD strikes massive AI chip deal with Meta
From packets to prompts: What Cisco’s AITECH certification means for IT pros
Help Net Security
Anthropic’s Claude hit by widespread service outage
NetQuest launches NetworkLens for hyperscale AI threat detection
UK reduces cyberattack fix times from two months to eight days
pureLiFi unveils LiFi architecture to extend gigabit capacity indoors
Motorola turns to GrapheneOS for smartphone security upgrade
Your dependencies are 278 days out of date and your pipelines aren’t protected
Security debt is becoming a governance issue for CISOs
BlacksmithAI: Open-source AI-powered penetration testing framework
When cyber threats start thinking for themselves
AI risk moves into the security budget spotlight
SC Magazine
Iran cyberattacks likely in expanding conflict, experts say
2026 SC Awards finalists announced ahead of RSA Conference
New Resilient CISO Award honors transformational leaders
2026 Trust Awards finalists announced ahead of RSA Conference
2026 Excellence Awards finalists announced; winners revealed at RSA Conference
Women’s History Month: Build cyber resilience by welcoming diversity
The drone gap: Why the U.S. industrial base continues to fall behind in a world at war by drone
OT Security/business resilience, lack of incentives for securing software & the news - Ben Worthy - ESW #448
Another roadblock faced by Trump's Cybercom, NSA nominee
Bill bolstering healthcare cybersecurity advanced by Senate panel
© 2026 RiskDiscovery | Sponsored by:
Deception Logic