[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
China's Silver Dragon Razes Governments in EU, SE Asia
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
Vehicle Tire Pressure Sensors Enable Silent Tracking
Qualcomm Zero-Day Exploited in Targeted Android Attacks
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
AI Agent Overload: How to Solve the Workload Identity Crisis
As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks
Critical OpenClaw Vulnerability Exposes AI Agent Risks
The Tug-of-War Over Firewall Backlogs in the AI-Driven Development Era
Ars Technica
Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
OpenAI sidesteps Nvidia with unusually fast coding model on plate-sized chips
Attackers prompted Gemini over 100,000 times while trying to clone it, Google says
Once-hobbled Lumma Stealer is back with lures that are hard to resist
CyberScoop
Attackers are using your network against you, according to Cloudflare
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
Researchers discover suite of agentic AI browser vulnerabilities
CISA CIO Robert Costello exits agency
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities
The FBI’s cyber chief is using Winter SHIELD to accelerate China prep, threat intelligence sharing
How ‘silent probing’ can make your security playbook a liability
From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes
Gottumukkala out, Andersen in as acting CISA director
Project Compass is Europol’s new playbook for taking on The Com
InfoSecurity Magazine
Coalition of Western Countries Launches 6G Cybersecurity Guidelines
Global Takedown Neutralizes Tycoon2FA Phishing Service
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows
Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App
AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare
Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion
Half of US CISOs Work the Equivalent of a Six-Day Week
Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks
SecurityWeek
Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance
Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively
How Pirated Software Turns Helpful Employees Into Malware Delivery Agents
AI Security Firm JetStream Launches With $34 Million in Seed Funding
LastPass Warns of New Phishing Campaign
Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity
Google Plans Two-Week Release Schedule for Chrome
Global Coalition Publishes 6G Security and Resilience Principles
Critical FreeScout Vulnerability Leads to Full Server Compromise
VMware Aria Operations Vulnerability Exploited in the Wild
ZDNet
Google Pixel 10a review: Should Android users consider anything else at this price?
I stuck this power station in a freezer to test its subzero claims - here's what happened next
Everything Apple just announced: The $599 MacBook Neo, M5 Pro, iPhone 17e, and more
Want to try OpenClaw? NanoClaw is a simpler, potentially safer AI agent
Apple's $599 MacBook Neo first look: The budget Mac we've been waiting for?
I turned my Android phone into the perfect bedside clock - here's how
I used Nano Banana 2 to make perfect sketchnotes: 5 lessons learned (and how I broke Gemini)
The best kids' tablets of 2026: Expert tested and parent-reviewed
The best TVs of 2026: Expert tested and recommended
Is that text message spam or legit? This Android tool can tell you real quick
The Hacker News
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
New RFP Template for AI Usage Control and AI Governance
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
BleepingComputer
Europol-coordinated action disrupts Tycoon2FA phishing platform
Mississippi medical center reopens clinics hit by ransomware attack
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network
CISA flags VMware Aria Operations RCE flaw as exploited in attacks
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
Facebook accounts unavailable in worldwide outage
Microsoft: Hackers abuse OAuth error flows to spread malware
Google Chrome shifts to two-week release cycle for increased stability
LexisNexis confirms data breach as hackers leak stolen files
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
gbhackers
CISA Warns Qualcomm Chipsets Memory Corruption Vulnerability Is Actively Exploited in Attacks
Iran‑Linked “Dust Specter” APT Deploys AI‑Aided Malware Against Iraqi Officials
Honeywell Controllers Widely Exposed Without Authentication
New Threat Report: AI Accelerates High-Velocity Cyber Attacks
Perplexity’s Comet Browser Breached Through Calendar Invite Attack
VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave
Iranian APT Groups Intensify Cyberattacks on Critical Infrastructure Amid Rising Geopolitical Tensions
AzCopy Utility Misused for Data Exfiltration in Ongoing Ransomware Attacks
IPVanish VPN for macOS Flaw Enables Privilege Escalation and Code Execution
CISA Warns of VMware Aria Operations Vulnerability Actively Exploited in Attacks
Cybersecurity Dive
Pro-Russia actors team with Iran-linked hackers in attacks
Ransomware is now less about malware and more about impersonation
University of Mississippi Medical Center reopens clinics after ransomware attack
Iran-linked hackers raise threat level against US, allies
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction
ResOps: The new operating model bridging security, identity and recovery
Trump administration removes controversial acting CISA director
‘Resurge’ malware can remain undetected on devices
UFP Technologies investigating cyberattack that impacted company data
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
LexisNexis confirms data breach at Legal & Professional arm, some customer records affected
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
Google feels the need for security speed, so will ship Chrome updates every two weeks
Dev stunned by $82K Gemini bill after unknown API key thief goes to town
Chat at your own risk! Data brokers are selling deeply personal bot transcripts
Cyberwarriors elevated to big leagues in US war with Iran
Turns out most cybercriminals are old enough to know better
Until last month, attackers could've stolen info from Perplexity Comet users just by sending a calendar invite
Chrome Gemini panel became privilege escalator for rogue extensions
Cybercriminals swipe 15.8M medical records from French doctors ministry
VentureBeat
Pentagon vendor cutoff exposes the AI dependency map most enterprises never built
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
What if the real risk of AI isn’t deepfakes — but daily whispers?
When AI lies: The rise of alignment faking in autonomous systems
Enterprise MCP adoption is outpacing security controls
Claude didn't just plan an attack on Mexico's government. It executed one for a month — across four domains your security stack can't see.
Anthropic says DeepSeek, Moonshot, and MiniMax used 24,000 fake accounts to rip off Claude
TechCrunch
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
Fig Security emerges from stealth with $38M to help security teams deal with change
A new app alerts you if someone nearby is wearing smart glasses
Hacktivists claim to have hacked Homeland Security to release ICE contract data
Hackers and internet outages hit Iran amid US air strikes
Let’s explore the best alternatives to Discord
India disrupts access to popular developer platform Supabase with blocking order
CISA replaces acting director after a bumbling year on the job
Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023
Network World Security
Cisco: Latest news and insights
AMD: Latest news and insights
AWS Middle East outage: a reminder not to rely on cloud as disaster recovery plan
Cisco: AI is a double-edged sword in industrial networks
AMD accelerates telecom network AI
2026 network outage report and internet health check
Nvidia: Latest news and insights
Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
Intel: Latest news and insights
Intel aims advanced Xeon 6+ at AI edge computing
Help Net Security
Digital.ai expands post-build protection for Android and iOS applications
Tufin’s AI-powered tools simplify network security operations
Webinar: The True State of Security 2026
Over 1,200 IceWarp servers still vulnerable to unauthenticated RCE flaw (CVE-2025-14500)
Njordium Vendor Management System eliminates duplicate third-party assessments
The vulnerability that turns your AI agent against you
Google speeds up Chrome updates with new security-focused release cycle
ACI Connetic for Cards unifies card, A2A payments and fraud management on one platform
ArmorCode AI Exposure Management identifies, governs, and reduces shadow AI risk
Arkose Device ID uses AI to recognize devices across changing fingerprints
SC Magazine
Coruna exploit kit: Suspected government hacking tools surface in cybercriminal hands
Microsoft flags phishing campaign abusing Entra ID, Google OAuth links
Building Trusted Automation as Leaders Struggle with AI Adoption and CISOs Hire - Tim Morris - BSW #437
North Korea, DOJ, APT 28, Anthropic, OpenClaw, Supply Chain, Josh Marpet, and More - SWN #560
Shadow AI expands attack surfaces beyond visibility
Oracle EBS breach hits Madison Square Garden
Cyberattack confirmed by LISI Group after Qilin claims
Novel CyberStrikeAI tool exploited in attacks
AI bot facilitates sweeping GitHub repository compromise
Updated Contagious Interview campaign harnesses illicit npm packages for RAT delivery
© 2026 RiskDiscovery | Sponsored by:
Deception Logic