[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
AI Phishing Is No. 1 With a Bullet for Cyberattackers
North Korea's Lazarus Targets macOS Users via ClickFix
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets
China-Backed Hackers Are Industrializing Botnets
Bad Memories Still Haunt AI Agents
'Zealot' Shows What AI's Capable of in Staged Cloud Attack
Africa Relinquishes Cyberattack Lead to Latin America — For Now
Ars Technica
In a first, a ransomware family is confirmed to be quantum-safe
Microsoft issues emergency update for macOS and Linux ASP.NET threat
Contrary to popular superstition, AES 128 is just fine in a post-quantum world
US-sanctioned currency exchange says $15 million heist done by "unfriendly states"
Recent advances push Big Tech closer to the Q-Day danger zone
“Negative” views of Broadcom driving thousands of VMware migrations, rival says
Iran-linked hackers disrupt operations at US critical infrastructure sites
Thousands of consumer routers hacked by Russia's military
OpenClaw gives users yet another reason to be freaked out about security
New Rowhammer attacks give complete control of machines running Nvidia GPUs
CyberScoop
Vercel attack fallout expands to more customers and third-party systems
US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied
Dragos: Despite AI use, new malware targeting water plants is ‘hype’
Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities
A dozen allied agencies say China is building covert hacker networks out of everyday routers
CISA director pick Sean Plankey withdraws his nomination
House Republicans roll out national privacy bill
The Supreme Court is about to decide how far geofence warrants can go
The AI era demands a different kind of CISO
Former DigitalMint ransomware negotiator pleads guilty to extortion scheme
InfoSecurity Magazine
UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China
AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns
Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation
Google Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AI
Apple Fixes iOS Notification Bug Exposing Deleted Messages
Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform
Cyber-Attacks Surge 63% Annually in Education Sector
Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents
NCSC Backs Passkeys, Hailing a New Era of Sign-in
MacOS Native Tools Enable Stealthy Enterprise Attacks
SecurityWeek
Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions
In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device
Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents
Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise
US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor
Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US
Vulnerabilities Patched in CrowdStrike, Tenable Products
Bitwarden NPM Package Hit in Supply Chain Attack
Copperhelm Raises $7 Million for Agentic Cloud Security Platform
Cloudsmith Raises $72 Million in Series C Funding
ZDNet
Get Spotify's student discount and Hulu for just $6 a month - here's how
FCC's router ban expands to portable hotspots - 4 things this means for you
I'm automating these 5 unexpected home devices - and life has been so much easier
How I used Claude AI to plan an entire hiking trip to the Adirondacks in 30 minutes - for free
The 4 streaming services I swear by - and my bill is just $40 a month
The Microsoft Surface Pro is nearly 40% off at Best Buy - and we highly recommend it
I tried ChatGPT Images 2.0: A fun, huge leap - and surprisingly useful for real work
I put GPT-5.5 through a 10-round test: It scored 93/100, losing points only for exuberance
I've earned nearly $700 just by using Rakuten - here's how I did it
The best inventory management software of 2026: Expert tested and reviewed
The Hacker News
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
BleepingComputer
New BlackFile extortion group linked to surge of vishing attacks
Microsoft to roll out Entra passkeys on Windows in late April
New ‘Pack2TheRoot’ flaw gives hackers root Linux access
DORA and operational resilience: Credential management as a financial risk control
Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks
Microsoft now lets admins uninstall Copilot on enterprise devices
Hackers exploit file upload bug in Breeze Cache WordPress plugin
Bitwarden CLI npm package compromised to steal developer credentials
Trigona ransomware attacks use custom exfiltration tool to steal data
New Checkmarx supply-chain breach affects KICS analysis tool
gbhackers
Hackers Exploit Agent ID Administrator Role to Hijack Service Principals
GPT-5.5 Bio Bug Bounty Program Aims to Improve AI Safety and Performance
Claude Desktop Reportedly Adds Browser Access Bridge for Chromium Browsers
Fake CAPTCHA Scam Triggers Costly SMS Fraud
Hackers Exploit Cisco Firepower N-Day Flaws for Unauthorized Access
Hackers Exploit Pastebin PowerShell Script to Hijack Telegram Sessions
Xiongmai IP Camera Flaw Lets Attackers Bypass Authentication
Void Dokkaebi Hackers Spread Malware Through Fake Job Interviews
Python Vulnerability Enables Out-of-Bounds Write on Windows
Hackers Exploit Ollama Model Uploads to Leak Server Data
Cybersecurity Dive
Hasbro expects March cyberattack to impact second-quarter revenue
AI-written software creates hassles for wary security teams
China disguises cyberattacks with ‘covert network’ botnets, US and allies warn
Iran-nexus threat groups refine attacks against critical infrastructure
Trump’s CISA director pick withdraws after tumultuous nomination
Microsoft SharePoint vulnerability widely exposed across multiple countries
Phishing — sometimes with AI’s help — topped initial-access methods in Q1, Cisco says
CISA urges security teams to view environments following axios compromise
Big banks seek to ease security worries as AI push accelerates
CISA confirms exploitation of 3 more Cisco networking device vulnerabilities
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
US clarifies mobile hotspots part of foreign router ban despite rarity of American made consumer kit
ShinyHunters claim they have cruise giant Carnival's booty as 7.5M emails surface
Governments on high alert after CISA snuffs out Firestarter backdoor on fed network
More ancient Linux device support faces the chop
Intel bets the farm on AI inference to drag CPU back to the top table
Microsoft beefs up Remote Desktop security with ... hard-to-read messages
It's a myth that you need Mythos to find bugs: Open source models can do it just as well
Greece relaxes Euro biometric border entry rules amid airport chaos
UK gov pays public £550 to discuss Digital ID – then bans journalists from the room
Researchers find cyber-sabotage malware that may predate Stuxnet by five years
VentureBeat
85% of enterprises are running AI agents. Only 5% trust them enough to ship.
Vercel breach exposes the OAuth gap most security teams cannot detect, scope or contain
Three AI coding agents leaked secrets through a single prompt injection. One vendor's system card predicted it
Adversaries hijacked AI security tools at 90+ organizations. The next wave has write access to the firewall
Most enterprises can't stop stage-three AI agent threats, VentureBeat survey finds
Microsoft patched a Copilot Studio prompt injection. The data exfiltrated anyway
Frontier models are failing one in three production attempts — and getting harder to audit
TechCrunch
Another spyware maker caught distributing fake Android snooping apps
Trump’s pick to run US cyber agency CISA asks to drop out
Vercel says some of its customers’ data was stolen prior to its recent hack
Surveillance vendors caught abusing access to telcos to track people’s phone locations, researchers say
France confirms data breach at government agency that manages citizens’ IDs
Apple fixes bug that cops used to extract deleted chat messages from iPhones
Cosmetics giant Rituals confirms data breach of customer membership records
UK government says 100 countries have spyware that can hack people’s phones
Ransomware negotiator pleads guilty to helping ransomware gang
With US spy laws set to expire, lawmakers are split over protecting Americans from warrantless surveillance
Network World Security
Cirrascale to offer on-prem Google Gemini models
Space data-center news: Roundup of extraterrestrial AI endeavors
Network jobs watch: Hiring, skills and certification trends
Cisco switch aimed at building practical quantum networks
How AI is reshaping copper, fiber networking
40% of data center projects will be late this year, study finds
It’s the end of set-and-forget security
2026 network outage report and internet health check
Google bets on workload-specific TPUs with 8t and 8i launch
SUSE bets automated migration can break VMware’s grip on virtualization
Help Net Security
SC Magazine
Cambodian senator, others hit with US sanctions over scam allegations
Ransomware supply chain untangled by RAMP forum leak
Further Vercel customer data compromise confirmed
Checkmarx supply chain hack impacts Bitwarden CLI
Threat of ZionSiphon malware downplayed
AI agents weaponized through indirect prompt injection intrusions
Chinese exploitation of US-made AI models to be quelled, Trump admin pledges
Over $700M in crypto, fake investment sites seized in US clampdown on Southeast Asian scam centers
CISA: Malware attack compromises US agency via Cisco exploit
US, allies warn of industrialized Chinese botnets
© 2026 RiskDiscovery | Sponsored by:
Deception Logic