[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
Vehicle Tire Pressure Sensors Enable Silent Tracking
Qualcomm Zero-Day Exploited in Targeted Android Attacks
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
AI Agent Overload: How to Solve the Workload Identity Crisis
As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks
Critical OpenClaw Vulnerability Exposes AI Agent Risks
The Tug-of-War Over Firewall Backlogs in the AI-Driven Development Era
30 Alleged Members of 'The Com' Arrested in Project Compass
Quantum-Resistant Data Diode Secures Sensitive Data on Edge Devices, Critical Systems
Ars Technica
Downdetector, Speedtest sold to IT service provider Accenture in $1.2B deal
LLMs can unmask pseudonymous users at scale with surprising accuracy
Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
Password managers' promise that they can't see your vaults isn't always true
Most VMware users still "actively reducing their VMware footprint," survey finds
Retraction: After a routine code rejection, an AI agent published a hit piece on someone by name
OpenAI sidesteps Nvidia with unusually fast coding model on plate-sized chips
Attackers prompted Gemini over 100,000 times while trying to clone it, Google says
Once-hobbled Lumma Stealer is back with lures that are hard to resist
CyberScoop
Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack
Researchers discover suite of agentic AI browser vulnerabilities
CISA CIO Robert Costello exits agency
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities
The FBI’s cyber chief is using Winter SHIELD to accelerate China prep, threat intelligence sharing
How ‘silent probing’ can make your security playbook a liability
From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes
Gottumukkala out, Andersen in as acting CISA director
Project Compass is Europol’s new playbook for taking on The Com
Senate moves one step closer to passing health care cyber reforms
InfoSecurity Magazine
Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App
AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare
Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion
Half of US CISOs Work the Equivalent of a Six-Day Week
Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks
Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign
Chrome Unveils Plan For Quantum-Safe HTTPS Certificates
Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel
Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity
ClawJacked Bug Enables Covert AI Agent Hijacking
SecurityWeek
Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters
Fig Security Launches With $38 Million to Bolster SecOps Resilience
Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability
Quantum Decryption of RSA Is Much Closer Than Expected
New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security
1.2 Million Affected by University of Hawaii Cancer Center Data Breach
Android Update Patches Exploited Qualcomm Zero-Day
Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low
Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise
Researchers Uncover Method to Track Cars via Tire Sensors
ZDNet
Is that message spam or real? This Android trick helps you ID the scams
Love to customize your Linux desktop? This lightweight distro is great fun for newbies and experts
Lenovo showed me its modular ThinkBook laptop, and I wish it wasn't just a concept
Google Pixel 10a vs. Pixel 10: I compared the two midrange phones, and this model wins
I saw the Nothing Phone 4a in multiple colors at MWC - and these two got the most love
The latest Pixel Drop arrives with 8 useful upgrades for your Android phone - what's new
How to watch hundreds of TV channels with this $20 antenna box from Best Buy
Best of MWC 2026: We found the biggest news from Lenovo, Xiaomi, Honor, more
3 tiny gadgets that quietly protect your devices from surges and snooping
I can't wait for Motorola's GrapheneOS phones: Why they're a win for privacy and open source
The Hacker News
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
BleepingComputer
CISA flags VMware Aria Operations RCE flaw as exploited in attacks
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
Facebook accounts unavailable in worldwide outage
Microsoft: Hackers abuse OAuth error flows to spread malware
Google Chrome shifts to two-week release cycle for increased stability
LexisNexis confirms data breach as hackers leak stolen files
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
Amazon: Drone strikes damaged AWS data centers in Middle East
Star Citizen game dev discloses breach affecting user data
UH Cancer Center data breach affects nearly 1.2 million people
gbhackers
Phishing Campaign Uses Google Cloud to Host Malicious Redirects via GCS Bucket
LexisNexis Faces Data Breach After 2.04 GB of Data Allegedly Stolen
Microsoft Alerts Customers to New Phishing Attack Exploiting OAuth in Entra ID to Bypass Detection
Silver Dragon APT Group Exploits Google Drive for Covert Attacks on Europe, Asia
Windows 11 23H2 to 25H2 Upgrade Reportedly Disrupts Internet Connectivity for Users
Malicious Laravel Packages Deploy PHP RAT, Grant Remote Access to Attackers
Thousands of iPhones Compromised in Massive Hack via Coruna Exploit Kit with 23 Vulnerabilities
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM
SloppyLemming Espionage Campaign Targets Pakistan, Bangladesh with BurrowShell Backdoor and Rust RAT
New Starkiller Phishing Framework Uses Real Login Pages to Bypass MFA Security
Cybersecurity Dive
Pro-Russia actors team with Iran-linked hackers in attacks
Ransomware is now less about malware and more about impersonation
University of Mississippi Medical Center reopens clinics after ransomware attack
Iran-linked hackers raise threat level against US, allies
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction
ResOps: The new operating model bridging security, identity and recovery
Trump administration removes controversial acting CISA director
‘Resurge’ malware can remain undetected on devices
UFP Technologies investigating cyberattack that impacted company data
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Google feels the need for security speed, so will ship Chrome updates every two weeks
Dev stunned by $82K Gemini bill after unknown API key thief goes to town
Chat at your own risk! Data brokers are selling deeply personal bot transcripts
Cyberwarriors elevated to big leagues in US war with Iran
Turns out most cybercriminals are old enough to know better
Until last month, attackers could've stolen info from Perplexity Comet users just by sending a calendar invite
Chrome Gemini panel became privilege escalator for rogue extensions
Cybercriminals swipe 15.8M medical records from French doctors ministry
Gamers furious as indie studio Cloud Imperium quietly admits to data breach
Phish of the day: Microsoft OAuth scams abuse redirects for malware delivery
VentureBeat
Endor Labs launches free tool AURI after study finds only 10% of AI-generated code is secure
When AI lies: The rise of alignment faking in autonomous systems
What if the real risk of AI isn’t deepfakes — but daily whispers?
Enterprise MCP adoption is outpacing security controls
Claude didn't just plan an attack on Mexico's government. It executed one for a month — across four domains your security stack can't see.
Anthropic says DeepSeek, Moonshot, and MiniMax used 24,000 fake accounts to rip off Claude
Anthropic's Claude Code Security is available now after finding 500+ vulnerabilities: how security leaders should respond
TechCrunch
A suite of government hacking tools targeting iPhones is now being used by cybercriminals
Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran
Fig Security emerges from stealth with $38M to help security teams deal with change
A new app alerts you if someone nearby is wearing smart glasses
Hacktivists claim to have hacked Homeland Security to release ICE contract data
Hackers and internet outages hit Iran amid US air strikes
Let’s explore the best alternatives to Discord
India disrupts access to popular developer platform Supabase with blocking order
CISA replaces acting director after a bumbling year on the job
Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023
Network World Security
AWS Middle East outage: a reminder not to rely on cloud as disaster recovery plan
Cisco: AI is a double-edged sword in industrial networks
AMD accelerates telecom network AI
2026 network outage report and internet health check
Nvidia: Latest news and insights
Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
Intel: Latest news and insights
Intel aims advanced Xeon 6+ at AI edge computing
Nvidia partners with telecom providers for open 6G networks
Why network bandwidth matters a lot
Help Net Security
Immutable Linux distribution Nitrux 6.0.0 adds GPU passthrough, boot-level recovery, C++ update system
ImmuniWeb launches a Cyber Threat Intelligence service
Cybersecurity professionals are burning out on extra hours every week
mquire: Open-source Linux memory forensics tool
Why workforce identity is still a vulnerability, and what to do about it
Cybersecurity is now the price of admission for industrial AI
Coruna: Spy-grade iOS exploit kit powering financial crime
Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
Threat actors weaponize OAuth redirection logic to deliver malware
Cloudflare tracked 230 billion daily threats and here is what it found
SC Magazine
North Korea, DOJ, APT 28, Anthropic, OpenClaw, Supply Chain, Josh Marpet, and More - SWN #560
Shadow AI expands attack surfaces beyond visibility
Oracle EBS breach hits Madison Square Garden
Cyberattack confirmed by LISI Group after Qilin claims
Novel CyberStrikeAI tool exploited in attacks
AI bot facilitates sweeping GitHub repository compromise
Updated Contagious Interview campaign harnesses illicit npm packages for RAT delivery
DHS allegedly breached by hacktivists, stolen data leaked
APT28 attacks involving MSHTML zero-day precede fixes
Ransomware attack exposes 1.2 million University of Hawaii Cancer Center records
© 2026 RiskDiscovery | Sponsored by:
Deception Logic