themissingsunday
#tech-news

Weekly Scan: Cloud, Cybersecurity, AI News — Mar 03, 2026

Weekly Scan: Cloud, Cybersecurity, AI News — Mar 03, 2026

⚠️ Audio playback is not supported in your browser. Please try Chrome, Edge, or Safari for the best experience.

#This Week in Security: Your News Briefing

Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2025-38617, which has sparked conversation across 9 sources. Meanwhile, the industry is closely tracking Threat Modeling and Social Issues with 4 mentions, along with emerging details on CVE-2026-3241 | Concrete CMS up to 9.4.7 cross site scripting…, CVE-2025-70239 | D-Link DIR-513 1.10 formSetWAN_Wizard55 curTime…, and Chrome Gemini panel became privilege escalator for rogue extensions. Here’s the full breakdown of what you need to know.

#🚨 Critical Threats This Week

First, the stories that demand your immediate attention:

1. CVE-2025-38617 Mentioned across 9 industry sources this week. Currently trending CVE - Hype Score: 15 - In the Linux kernel, the following vulnerability has been resolved: net/packet. Get the details →

2. Threat Modeling and Social Issues Mentioned across 4 industry sources this week. For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now. Get the details →

3. CVE-2026-3241 | Concrete CMS up to 9.4.7 cross site scripting (EUVD-2026-9359) Mentioned across 3 industry sources this week. A vulnerability categorized as problematic has been discovered in Concrete CMS up to 9. Get the details →

#🛠️ Tools, Updates & Releases

New capabilities and releases worth knowing about:

1. Chrome Gemini panel became privilege escalator for rogue extensions High-severity flaw let malicious add-ons access system via browser’s embedded AI feature Security bo. Referenced in 3 stories this week. Explore →

2. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →

3. Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow dom. Referenced in 2 stories this week. Explore →

#What You Should Do Next

Monitor these in your environment next week:

  • Any new CVE announcements related to systems you operate
  • Emerging attack techniques being discussed in the community
  • Updates and patches for tools your team uses

Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.


1. Key Threat Intel & Vulnerability Stories (15 mentions)

This week's critical security updates and vulnerability disclosures:

2. Threat Modeling and Social Issues (4 mentions, 4 sources)

For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.

📰 View all 4 sources covering this story ▼
  1. Shostack + Friends BlogThreat Modeling: What, Why and How
  2. Shostack + Friends BlogJonathan Marcil’s Threat Modeling Toolkit talk
  3. Shostack + Friends BlogThreat Modeling Building Blocks
  4. Shostack + Friends BlogThreat Modeling and Social Issues
Read Full Article →
3. Chrome Gemini panel became privilege escalator for rogue extensions (3 mentions, 3 sources)

High-severity flaw let malicious add-ons access system via browser's embedded AI feature Security boffins have discovered a high-severity bug in Google Chrome that allowed malicious extensions to hijack its Gemini Live AI panel and inherit privile...

📰 View all 3 sources covering this story ▼
  1. Palo Alto Networks Unit 42Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack Ne… (Mar 02, 11:00)
  2. The Hacker NewsNew Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini… (Mar 02, 17:08)
  3. TheRegisterChrome Gemini panel became privilege escalator for rogue extensions (Mar 03, 11:39)

First reported: Mar 02, 11:00 | Last update: Mar 03, 11:39

Read Full Article →
4. AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning (2 mentions, 2 sources)

AI is making it ever easier for bad actors to launch attacks, and a newly-identified open source platform, CyberStrikeAI, seems to be lowering the bar even further. The platform packages end-to-end attack automation into a single AI-native orchest...

📰 View all 2 sources covering this story ▼
  1. BleepingComputerCyberStrikeAI tool adopted by hackers for AI-powered attacks (Mar 03, 00:06)
  2. CSO OnlineAI-powered attack kits go open source, and CyberStrikeAI may be just the beginni… (Mar 04, 02:47)

First reported: Mar 03, 00:06 | Last update: Mar 04, 02:47

Read Full Article →
5. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions, 2 sources)
6. Qualcomm Zero-Day Exploited in Targeted Android Attacks (2 mentions, 2 sources)

The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.

📰 View all 2 sources covering this story ▼
  1. BleepingComputerAndroid gets patches for Qualcomm zero-day exploited in attacks (Mar 03, 08:19)
  2. Dark ReadingQualcomm Zero-Day Exploited in Targeted Android Attacks (Mar 03, 20:28)

First reported: Mar 03, 08:19 | Last update: Mar 03, 20:28

Read Full Article →
7. LexisNexis says hackers accessed legacy data in contained breach (2 mentions, 2 sources)

The breach emerged this week when a threat actor claimed they stole 2 GB worth of information from the company that included millions of records.

📰 View all 2 sources covering this story ▼
  1. BleepingComputerLexisNexis confirms data breach as hackers leak stolen files (Mar 03, 15:40)
  2. The Record Cybersecurity NewsLexisNexis says hackers accessed legacy data in contained breach (Mar 03, 18:32)

First reported: Mar 03, 15:40 | Last update: Mar 03, 18:32

Read Full Article →
8. Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams (2 mentions, 2 sources)

Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks.

📰 View all 2 sources covering this story ▼
  1. TechRadar Pro SecurityHackers hijack .arpa domain for phishing scams — hosting malicious websites and … (Mar 02, 23:30)
  2. HackreadHackers Abuse .arpa Top-Level Domain to Host Phishing Scams (Mar 03, 14:23)

First reported: Mar 02, 23:30 | Last update: Mar 03, 14:23

Read Full Article →

#Article Summary

Category Article Count
AI & LLM 5
Cloud 4
Cyber Regulatory 0
Cybersecurity 183
Scraping Candidates 1
Security Vendor Blog 5
Tech 17
Threat Intel & Vulnerability 26
Total Articles Scanned 241

#AI & LLM

Best AI security solutions 2026: Top enterprise platforms compared

Artificial intelligence is no longer just powering defensive cybersecurity tools, it is reshaping the entire threat landscape. AI is accelerating reconnaissance, improving the realism of phishing, automating malware mutation, and enabling adaptive attack techniques. At the same time, enterprises ...

Read Full Article →
GPT-5.3 Instant System Card
GPT-5.3 Instant: Smoother, more useful everyday conversations
The Download: protesting AI, and what’s floating in space

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. I checked out one of the biggest anti-AI protests ever Pull the plug! Pull the plug! Stop the slop! Stop the slop! For a few hours this Saturday, February 28, ...

Read Full Article →
Scaling Search Relevance: Augmenting App Store Ranking with LLM-Generated Judgments

Large-scale commercial search systems optimize for relevance to drive successful sessions that help users find what they are looking for. To maximize relevance, we leverage two complementary objectives: behavioral relevance (results users tend to click or download) and textual relevance (a result...

Read Full Article →

#Cloud

AWS Config now supports 30 new resource types

AWS Config now supports 30 additional AWS resource types across key services including Amazon Bedrock AgentCore and Amazon Cognito. This expansion provides greater coverage over your AWS environment, enabling you to more effectively discover, assess, audit, and remediate an even broader range of ...

Read Full Article →
Amazon RDS for PostgreSQL supports minor versions 18.3, 17.9, 16.13, 15.17, and 14.22

Amazon Relational Database Service (RDS) for PostgreSQL now supports the latest minor versions 18.3, 17.9, 16.13, 15.17, and 14.22. These versions address the regression from the February 12, 2026 PostgreSQL community release. We recommend that you upgrade to the latest minor versions to fix know...

Read Full Article →
Amazon Bedrock announces OpenAI-compatible Projects API

Amazon Bedrock now supports OpenAI-compatible Projects API in the Mantle inference engine in Amazon Bedrock. Amazon Bedrock is a fully managed service that offers a broad selection of best-in-class foundation models from leading AI companies like Anthropic, Meta, and OpenAI, along with a broad se...

Read Full Article →
AWS Security Hub launches Extended plan for pay-as-you-go partner solutions

Today, we're announcing the general availability of AWS Security Hub Extended, a new plan that extends unified security operations across your enterprise through a single-vendor experience. This plan helps address the complexity of managing multiple vendor relationships and lengthy procurement cy...

Read Full Article →

#Cyber Regulatory

#Cybersecurity

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.

Read Full Article →
Risky Business #827 -- Iranian cyber threat actors are down but not out

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: The US-Israeli attack on Iran had a whole lot of cyber. It’s clearly in the playbook now! The NSA Triangulation / L3 Harris Trenchant iOS exploit kit is on the loose, and being used...

Read Full Article →
Microsoft’s February Security Update of High-Risk Vulnerability Notice for Multiple Products

Overview On February 11, 2026, NSFOCUS CERT monitored Microsoft’s release of its February security update patches, addressing 59 security issues across widely used products such as Windows, Azure, Microsoft Office, and Visual Studio Code. These vulnerabilities include privilege escalation, remote...

Read Full Article →
Vulnerability Finding: An Inflection Point

LLM-driven vuln finding has reached an inflection

Read Full Article →
Bitlocker, the FBI, and Risk

What can the Bitlocker story tell us about risk?

Read Full Article →
Security Advisory SA-26-01 GPS Attacks

GPS attacks trigger revisiting threat models

Read Full Article →
LLMs as Compilers

What if we think about LLM coding as if it’s a compiler stage?

Read Full Article →
The Cyber Resilience Act (CRA)!

The CRA is coming and it's going to be a dramatic change for technology producers

Read Full Article →
Threat modeling as a dial, not a switch

Thinking of threat modeling with a knob helps you get more out of it.

Read Full Article →
A few thoughts on CVE

Thoughts on the CVE funding crisis

Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack

Grateful to introduce the Hackers' Almanack!

Read Full Article →
Security Researcher Comments on HIPAA Security Rule

A group of us have urged HHS to require better handling of security reports

Read Full Article →
Inside Man

Some thoughts on the Voyager Episode ‘Inside Man’

Read Full Article →
Party over country

One of the things we expect of a politician in a civilized country is that they put their country first.

Read Full Article →
Appsec Roundup - July 2024

The most important stories around threat modeling, appsec and secure by design for June, 2024.

Read Full Article →
Lockbit, a study in public health

Why is it hard to count lockbit infections?

Read Full Article →
Eternal sunshine of the spotless LLM

Making an LLM forget is harder than it seems

Read Full Article →
Other comments on the CSRB Microsoft Report

Other people have written about the CSRB report, and I wanted to share their perspectives.

Read Full Article →
CSRB Report on Microsoft

The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.

Read Full Article →
Introducing Magic Security Dust!
The NVD Crisis

The NVD is in crisis, and so is patch management. It’s time to modernize.

Read Full Article →
Solving Hallucinations

Solving hallucinations in legal briefs is playing on easy mode —— and still too hard

Read Full Article →
Red Teaming

Red Teaming by Bryce Hoffman is a thought-provoking read.

Read Full Article →
CSRB Senate Hearing

Comments following the Senate’s CSRB hearing

Read Full Article →
FDA Final Cyber Guidance is out

The FDA has released their new guidance, which will be broadly impactful.

Read Full Article →
Microsoft Can Fix Ransomware Tomorrow

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.

Read Full Article →
Phishing Defenses

Phishing behaviors, as observed in the wild.

Read Full Article →
The Cyber Safety Review Board Should Investigate Major Historical Incidents

Tarah Wheeler and Adam write in CFR

Read Full Article →
Application Security Roundup - Feb + 1 similar

This month is all about memory safety, unless you’re a standards group.

Read Full Article →
The Appsec Landscape in 2023

External changes will be driving appsec in 2023. It’s time to frame the decisions in front of you.

Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot

Pointer to Adam’s latest Darkreading article

Read Full Article →
GPT-3

Text captured from GPT-3

Read Full Article →
I need an extension!

A few lessons from the Mazda radio incident.

Read Full Article →
What are we going to do: CO2 edition

What happened when Microsoft tried to buy climate abatements

Read Full Article →
25 Years in AppSec: Looking Back

Time flies and things change... A look back on the growth of this industry.

Read Full Article →
Ransomware is Not the Problem

Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.

Read Full Article →
Colonial Pipeline, Darkside and Models

The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.

Read Full Article →
Threat Model Thursday: Technology Consumers

“It depends on your threat model...”

Read Full Article →
The Updates Must Go Through

The timing of updates is not coincidental.

Read Full Article →
Ever Given & Suez

Thoughts on the issues with the Ever Given blocking the Suez Canal.

Read Full Article →
Vaccines

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.

Read Full Article →
It's Not Working!

Help me help you...

Read Full Article →
Threat Model In My Devops

A recent talk by Alyssa Miller focuses on integrating threat modeling in devops.

Read Full Article →
SLR as a Webcam

As I built out my home studio to record videos for my distributed classes, I was lucky enough to be able to find an in-stock HDMI capture card, but those are harder and harder to find. As it turns out, you may be able to avoid the need for that with a mix of apps.

Read Full Article →
Quick Threat Model Links October 2019

Just a few things for now

Read Full Article →
Interesting reads

Sharing for you, bookmarking for me.

Read Full Article →
Testing Building Blocks

There are a couple of new, short (4-page), interesting papers from a team at KU Leuven discussin the building blocks of threat modeling.

Read Full Article →
Episode 9 Spoilers

Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.

Read Full Article →
The White Box Essays (Book Review)

A resource for those developing games.

Read Full Article →
Leave Those Numbers for April 1st

Over-inflated numbers won't scare me into buying your ‘solution’.

Read Full Article →
High ROI Security Advisory Boards

Discussing the value of Security Advisory Boards

Read Full Article →
CVE Funding and Process

[no description provided]

Read Full Article →
Carpenter!

[no description provided]

Read Full Article →
'EFAIL' Is Why We Can't Have Golden Keys

[no description provided]

Read Full Article →
The DREAD Pirates

[no description provided]

Read Full Article →
$35M for Covering up A Breach

[no description provided]

Read Full Article →
Citizen Threat Modeling and more data

[no description provided]

Read Full Article →
Pen Testing The Empire

[no description provided]

Read Full Article →
Threat Modeling Tooling from 2017

[no description provided]

Read Full Article →
20 Year Software: Engineering and Updates

[no description provided]

Read Full Article →
Threat Modeling Encrypted Databases

[no description provided]

Read Full Article →
Bicycling and Risk

[no description provided]

Read Full Article →
Maintaining & Updating Software

[no description provided]

Read Full Article →
Certificate pinning is great in stone soup

[no description provided]

Read Full Article →
Security Rarely Flows Downhill

[no description provided]

Read Full Article →
Hospital Ransomware

[no description provided]

Read Full Article →
Warrants for Cleaning Malware in Kelihos

[no description provided]

Read Full Article →
Threat Modeling and Star Wars

[no description provided]

Read Full Article →
Threat Modeling & IoT

[no description provided]

Read Full Article →
Account Recovery

[no description provided]

Read Full Article →
People are The Weakest Link In Security?

[no description provided]

Read Full Article →
Calls for an NTSB?

[no description provided]

Read Full Article →
Modeling Attackers and Their Motives

There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.

Read Full Article →
The DocuSign Email That Wasn’t – A Three-Redirect Credential Harvest

TL;DR Attackers sent a convincing DocuSign notification with a "Review & Sign" button that chained through Google Maps redirects to an Amazon S3-hosted credential harvesting page. The redirect chain defeated URL scanners, and real law-firm footers added legitimacy. IRONSCALES Adaptive AI flagged ...

Read Full Article →
CISA flags VMware Aria Operations RCE flaw as exploited in attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the flaw as exploited in attacks. [...]

Read Full Article →
A suite of government hacking tools targeting iPhones is now being used by cybercriminals

Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They warned of an emerging market for "secondhand" exploits.

Read Full Article →
Facebook is experiencing a global outage

Facebook is experiencing a global outage since 4:15 PM ET, with users reporting they cannot access their accounts. Facebook users worldwide report problems while attempting to access their accounts. The outage started around 4:15 PM ET. Upon attempting to access their account, users are presented...

Read Full Article →
Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes

The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.

Read Full Article →
N8N: Shared Credentials and Account Takeover

Executive Summary We identified a security weakness in n8n’s credential management layer that could have completely compromised the application’s security. This finding highlights the core risks of centralized authentication in workflow automation platforms. As n8n serves as the central hub conne...

Read Full Article →
Can effective AI security make IT teams feel relieved

How Can Non-Human Identities Revolutionize AI Security? Have you ever considered the role machine identities play in AI security? Where artificial intelligence is becoming integral to numerous sectors, securing these non-human identities (NHIs) is critical. NHIs, essentially machine identities, f...

Read Full Article →
Can advanced AI security solutions help you feel more relaxed

Are Non-Human Identities the Key to Robust Cybersecurity? Safeguarding digital assets goes beyond securing human credentials. Increasingly, organizations are realizing the need to extend this protection to Non-Human Identities (NHIs), machine-driven identities integral to modern IT. These NHIs co...

Read Full Article →
How is AI security getting better over the years

How Do Non-Human Identities Influence AI Security? Have you ever wondered how the intricate dance between machine identities and cybersecurity shapes AI security? The advent of advanced AI systems has introduced an array of complex security challenges. Non-Human Identities (NHIs) have become para...

Read Full Article →
Microsoft: Hackers abuse OAuth error flows to spread malware

Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. [...]

Read Full Article →
Researchers discover suite of agentic AI browser vulnerabilities

Through a simple calendar invite, AI browsers like Comet can be directed to access local file systems, browse directories, open and read files, and exfiltrate data. The post Researchers discover suite of agentic AI browser vulnerabilities appeared first on CyberScoop .

Read Full Article →
'A human-chosen password doesn't stand a chance': OpenClaw has yet another major security flaw — here's what we know about "ClawJacked"

Don't leave your OpenClaw with an easy password, experts warn.

Read Full Article →
Coruna: Spy-grade iOS exploit kit powering financial crime

A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns and, ultimately, ended into the hands of financially motivated hackers, according to new research from Google’s Threat Int...

Read Full Article →
Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool

Fake Zoom and Google Meet pages trick users into installing a monitoring software on Windows systems through phishing links and fake updates.

Read Full Article →
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner...

Read Full Article →
Google Chrome shifts to two-week release cycle for increased stability

Google Chrome will shift from a four-week to a two-week release cycle to roll out new features, bug fixes, and performance improvements more frequently. [...]

Read Full Article →
BSIMM16 confirms: AI redefines AppSec

AI coding is the new reality — and it will further destabilize software supply chain security. So step up your AppSec.

Read Full Article →
Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

Fig Security, a new platform that finds and fixes broken security flows across your entire SecOps infrastructure, has launched from stealth with $38 million across Seed and Series A rounds. It addresses one of the least visible challenges yet most consequential in enterprise security: the quiet b...

Read Full Article →
Threat actors weaponize OAuth redirection logic to deliver malware

An ongoing phishing campaign is abusing the OAuth authentication redirection mechanism to avoid triggering conventional email and browser defenses, Microsoft researchers have revealed. The attackers are targeting government and public-sector organizations, and redirecting unsuspecting users from ...

Read Full Article →
Microsoft warns of OAuth phishing campaigns able to bypass email and browser defenses - says 'these campaigns demonstrate that this abuse is operational, not theoretical'

An OAuth feature is being abused in the wild to drop malware to people's computers.

Read Full Article →
Compromised Site Management Panels are a Hot Item in Cybercrime Markets

Compromised cPanel credentials are being sold in bulk across underground channels as plug-and-play phishing and scam infrastructure. Flare explains how analyzing 200,000 underground posts reveals a commoditized market for hacked site management panels. [...]

Read Full Article →
Josys centralizes identity data to replace manual IT oversight with automated governance

Josys has transitioned into an autonomous identity governance platform, expanding beyond traditional SaaS management. The enhanced platform empowers IT leaders and managed service providers (MSPs) to scale governance and compliance efforts by centralizing identity data within a single, AI-driven ...

Read Full Article →
ProcessUnity Risk Index delivers controls-driven vendor risk scoring for TPRM

ProcessUnity has introduced ProcessUnity Risk Index, a risk rating built specifically for third-party risk management programs, combining proprietary control intelligence with external threat and vulnerability data. ProcessUnity Risk Index rates vendors on a 100-point scale to drive faster, more ...

Read Full Article →
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive a...

Read Full Article →
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected it...

Read Full Article →
Enigma AI enables internal trust governance to asset-to-asset communications

Enigma Networks has announced the general availability of its Internal Trust Governance platform, Enigma AI, which continuously determines and validates which communications are necessary and safe across enterprise networks. Just as identity and access management (IAM) governs trust for users, En...

Read Full Article →
'The attack requires no exploit, no user clicks, and no explicit request forsensitive actions': Experts say Perplexity's AI Comet browser can be hijacked to steal your passwords

Security researchers found a zero-click exploit in Perplexity AI browser, and helped fix it.

Read Full Article →
1.2 Million Affected by University of Hawaii Cancer Center Data Breach

Hackers stole names, Social Security numbers, driver’s license information, voter registration records, and health-related information. The post 1.2 Million Affected by University of Hawaii Cancer Center Data Breach appeared first on SecurityWeek .

Read Full Article →
OAuth phishers make ‘check where the link points’ advice ineffective

Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication protocol to redirect victims to malware, using links that point to legitimate identity provider domains such as Microsoft Entra ID and Google Workspace. The links look safe but ultimately lead somewh...

Read Full Article →
Jetzt Staats-CISO werden – für unter 160.000 Euro

width="1600" height="900" sizes="auto, (max-width: 1600px) 100vw, 1600px"> Das britische Government Communications Headquarters (GCHQ) in Cheltenham, England. GCHQ Eine aktuelle Stellenausschreibung sorgt in der Branche für Kopfschütteln. Sie legt nahe, dass manche hochrangigen Regierungsstellen ...

Read Full Article →
Android Update Patches Exploited Qualcomm Zero-Day

An integer overflow or wraparound in the Qualcomm graphics component, the bug leads to memory corruption. The post Android Update Patches Exploited Qualcomm Zero-Day appeared first on SecurityWeek .

Read Full Article →
Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low

The cybersecurity industry is monitoring the landscape and says many of the big claims made by hacktivist groups remain unverified. The post Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low appeared first on SecurityWeek .

Read Full Article →
This new phishing campaign uses a fake Google Account security page to steal passcodes and more

Hackers don't need an app to steal login credentials anymore - a PWA will do.

Read Full Article →
Phishing campaign exploits OAuth redirection to bypass defenses

Microsoft researchers warn that threat actors abuse OAuth redirects to target government users and deliver malware. Microsoft has warned of phishing campaigns targeting government and public-sector organizations by abusing OAuth URL redirection. Instead of stealing credentials or exploiting softw...

Read Full Article →
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a...

Read Full Article →
Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

Improper input sanitization in the framework can be exploited through the Shell tool, allowing attackers to modify system files and steal data. The post Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise appeared first on SecurityWeek .

Read Full Article →
Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack

Read Full Article →
UH Cancer Center data breach affects nearly 1.2 million people

The University of Hawaii confirmed that a ransomware gang stole the data of nearly 1.2 million individuals in August 2025 after breaching its Cancer Center's Epidemiology Division. [...]

Read Full Article →
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of red...

Read Full Article →
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of ...

Read Full Article →
The Biosig Project libbiosig Intan CLP parsing heap-based buffer overflow vulnerability + 1 similar
The Biosig Project libbiosig ABF parsing out-of-bounds read vulnerability
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities

The company’s latest security update contains the highest number of Android vulnerabilities patched in a single month since April 2018. The post Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities appeared first on CyberScoop .

Read Full Article →
Fake Google Security site uses PWA app to steal credentials, MFA codes

A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims' browsers. [...]

Read Full Article →
Cybercriminals are hiring women for more authentic social engineering scams — and are promising up to $1,000 per call

Cybercriminal group SLSH recruits women to impersonate IT helpdesks, offering up to $1,000 per call while targeting major companies.

Read Full Article →
Alabama man pleads guilty to hacking, extorting hundreds of women

A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors). [...]

Read Full Article →
Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel

John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more

Read Full Article →
Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026

Torrance, United States / California, 2nd March 2026, CyberNewswire

Read Full Article →
APT37 combines cloud storage and USB implants to infiltrate air-gapped systems

North Korea-linked APT 37 used Zoho WorkDrive and USB malware to breach air-gapped networks in the Ruby Jumper campaign. North Korean group ScarCruft (aka APT37, Reaper, and Group123) deployed new tools in a campaign dubbed Ruby Jumper, using a backdoor that leverages Zoho WorkDrive for C2 and a ...

Read Full Article →
LLM-Assisted Deanonymization

Turns out that LLMs are good at de-anonymization: We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Reddit, LinkedIn, and anonymized interview transcripts, our method identifies users with high precision ­ and scales to tens of thousands of c...

Read Full Article →
ClawJacked Bug Enables Covert AI Agent Hijacking

Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent

Read Full Article →
From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes

Trolls on 4chan generated sexualized images of female athletes, and the White House shared an AI-manipulated video of a hockey player—welcome to the new normal. The post From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes appeared first on CyberScoop .

Read Full Article →
Ransomware Payments Decline 8% as Attacks Surge 50%

Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue

Read Full Article →
Bug in Google's Gemini AI Panel Opens Door to Hijacking

Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources.

Read Full Article →
Europol’s Project Compass nets 30 arrests in crackdown on “The Com”

Europol’s Project Compass led to 30 arrests targeting ‘The Com’ network, identifying 62 victims and protecting four children from harm. A yearlong operation, code-named Project Compass, led by Europol has dealt a major blow to The Com,’ a cybercrime network known for targeting children and teenag...

Read Full Article →
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat

Frankfurt am Main, Germany, 2nd March 2026, CyberNewswire

Read Full Article →
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but contain functionality to extract the actua...

Read Full Article →
Hacker erpressen weniger Lösegeld

immer mehr betroffene Unternehmen und Organisationen folgen dem Rat, kein Lösegeld zu zahlen . fadfebrian – shutterstock.com Laut einem neuen Bericht des Analyseunternehmens Chainalysis konnten Hacker im Jahr 2025 im Zusammenhang mit Ransomware-Angriffen insgesamt 820 Millionen Dollar erbeuten. A...

Read Full Article →
Risky Bulletin: LLMs can deanonymize internet users based on their comments

LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.

Read Full Article →
Modernization-led cloud migration: The missing step in seizing the AI opportunity

How businesses can master migration-led migration, including key steps like mapping and securing long-term governance.

Read Full Article →
I smell a RAT — new Android malware can hack every top phone maker's security, and costs less than a second-hand iPhone

Oblivion is an Android RAT which bypasses permissions, intercepts messages, and enables hidden remote control across devices from Samsung, Xiaomi, and OPPO.

Read Full Article →
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. "Our vulnerability lives in the core system itself – no plugins, no marketplace, no u...

Read Full Article →
Who is the Kimwolf Botmaster “Dort”?

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of dist...

Read Full Article →
Looking for a holiday bargain? Don't get caught out — experts warn of dark web travel agencies using stolen credit cards to buy hotels, flights, and more

Cybercriminal networks resell real travel bookings bought with stolen credit cards.

Read Full Article →
Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

HBO's "The Pitt" is showing audiences what a real Mississippi healthcare system is going through this week, thanks to a ransomware attack.

Read Full Article →
Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy

Using AI to find security vulnerabilities holds significant promise, but the initial products fall short of the needs of enterprises and software developers, say experts.

Read Full Article →
Watch out - that Google Tasks email could be a scam, and land you in hot water at work

Hackers found a new legitimate tool to abuse, and this time it's Google Tasks.

Read Full Article →
Ransomware payments drop to record low, even as attacks surge

Fewer businesses are paying, but ransomware groups are growing in number.

Read Full Article →
The Case for Why Better Breach Transparency Matters

It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.

Read Full Article →
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks....

Read Full Article →
Trend Micro warns of worrying security flaw allowing full Windows takeover, so patch now

Two critical-severity flaws in Apex One, with Trend Micro advising users to apply the patch now.

Read Full Article →
Phishing Attacks Against People Seeking Programming Jobs

This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malware on their system. News article .

Read Full Article →
Your personal OpenClaw agent may also be taking orders from malicious websites

If you thought running an AI agent locally kept it safely inside your machine’s walls, you’re in for a surprise. Researchers at Oasis Security have disclosed a flaw chain that allowed a malicious website to quietly connect to a locally running OpenClaw agent and take full control. The issue stems...

Read Full Article →
US authorities punish sellers of malware and spyware

The US authorities have made it clear that they will have no truck with any individuals trying to by-pass regulations on trading cyberweapons with hostile powers. Selling sensitive cyber-exploit components to a Russian company landed Australian citizen Peter Williams with an 87-month prison sente...

Read Full Article →
‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested

International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes

Read Full Article →
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). "A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gu...

Read Full Article →
ManoMano data breach: massive DIY chain incident impacts 38 million customers - here's what we know

French ecommerce site suffers third-party breach, losing data on millions of customers.

Read Full Article →
Risky Bulletin: Russian man extorts Conti ransomware group

A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.

Read Full Article →
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.

Read Full Article →
Project Compass is Europol’s new playbook for taking on The Com

Officials said 30 perpetrators have been arrested in the past year, and global law enforcement cooperation is closing the gap. The post Project Compass is Europol’s new playbook for taking on The Com appeared first on CyberScoop .

Read Full Article →
Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts. "Instead of relying on traditional servers or domains for command-and-control, Aeternum stores ...

Read Full Article →
Zyxel warns over a dozen routers could be affected by critical RCE security flaw

Zyxel fixes a handful of worrying router flaws, including a critical RCE issue.

Read Full Article →
Google takes down telecom hackers using Sheets and SaaS apps to spread mayhem

A decade-old threat actor is up to some new shenanigans, but Google is having none of it.

Read Full Article →
Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023

The U.S. government and its allies said hackers have been exploiting the newly identified bug in Cisco networking gear around the world for years, and urged organizations to patch.

Read Full Article →
Aeternum Botnet Shifts Command Control to Polygon Blockchain

New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts

Read Full Article →
Inside the NuGet hackers' toolset

RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.

Read Full Article →
Hackers are harnessing AI to exploit security flaws faster than ever

As AI gets integrated, attacks speed up and grow in severity, so buisnesses should shape up.

Read Full Article →
Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks Intensify

2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities

Read Full Article →
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update. Behind the scenes, the tactics are sharper. Access happens faster. Control is established sooner. Cleanup becomes harder. H...

Read Full Article →
Notorious ransomware gang allegedly blackmailed by fake FSB officer

There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang. Read more in my article on the Hot for Security blog.

Read Full Article →
Cisco warns of critical SD-WAN security flaw which has been open since 2023

Maximum-severity Cisco flaw is being actively abused, and FCEB agencies were given just a few days to patch.

Read Full Article →
Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign

UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation

Read Full Article →
LLMs Generate Predictable Passwords

LLMs are bad at generating passwords: There are strong noticeable patterns among these 50 passwords that can be seen easily: All of the passwords start with a letter, usually uppercase G, almost always followed by the digit 7. Character choices are highly uneven ­ for example, L , 9, m, 2, $ and ...

Read Full Article →
Srsly Risky Biz: Is Claude too woke for war?

Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and ...

Read Full Article →
Smashing Security podcast #456: How to lose friends and DDoS people

When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email - they allegedly weaponised their own CAPTCHA page to launch a DDoS attack, threatened to invent an entirely new genre of AI porn, and tampered with pa...

Read Full Article →
RAMP Forum Seizure Fractures Ransomware Ecosystem

Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.

Read Full Article →
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries. "This prolific, elusive actor has a long history of targeting internat...

Read Full Article →
Another top adult site reveals data leak - Frivol says around 479,000 users may be affected

An adult site kept an open database, but it played down its importance.

Read Full Article →
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. "The vulnerabilities exploit various configuration mechanisms, ...

Read Full Article →
Malicious NuGet package targets Stripe

Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.

Read Full Article →
This new cybercrime platform lets hackers run malicious Google Ads and hide from Google's screening process

1Campaign has been around for three years and comes with a fancy dashboard.

Read Full Article →
SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit women to pull off social engineering attacks. The idea is to hire them for voice phishing campaigns targeting IT help desks, Dataminr said in a new threat brief....

Read Full Article →
Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you can’t reach a confident verdict early, alerts turn into repeat checks, back-and-forth, and “just escalate it” calls. That cost doesn’t stay inside the SOC; it shows up as missed SLAs, higher cost per case...

Read Full Article →
‘This is an AI arms race’ — CrowdStrike warns attackers are moving through networks in under 30 minutes and ‘security teams must operate faster than the adversary to win’

Breakout time is the clearest signal of how intrusion has changed, researchers say, as they see data exfiltration within minutes of initial compromise.

Read Full Article →
SolarWinds Serv-U has some critical security flaws, so users should update now or face attack

Four critical flaws were addressed, all of which could lead to remote code execution.

Read Full Article →
$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon

Amid a privacy backlash, a US $10,000 reward has been offered for anyone who can find a way to run Ring doorbell cameras locally, cutting off the flow of video data to Amazon's servers. Read more in my article on the Hot for Security blog.

Read Full Article →
Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero in exchange for millions of dollars. Peter Williams pleaded guil...

Read Full Article →
Operation Red Card 2.0 Leads to 651 Arrests in Africa

In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than $4.3 million.

Read Full Article →
SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if successfully exploited, could result in remote code execution. The vulnerabilities, all rated 9.1 on the CVSS scoring system, are listed below - CVE-2025-40538 - A broken access c...

Read Full Article →
Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov

Russia launches a criminal probe into Telegram’s founder, two teenagers arrested for a South Korean bike share hack, Anthropic accuses Chinese AI firms of distillation attacks, and the US Treasury sanctions a Russian exploit broker.

Read Full Article →

#Scraping Candidates

Cloud Security

#Security Vendor Blog

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.

Read Full Article →
The Oracle of Delphi Will Steal Your Credentials

Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.

Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...

Read Full Article →
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran

Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran appeared first on Unit 42 .

Read Full Article →
Cyber Advisory: Increased Cyber Risk Amid U.S.–Israel–Iran Escalation

Insights and recommended defensive measures from Sophos X-Ops Counter Threat Unit Categories: Security Operations Tags: Sophos CTU, Iran, Operation Epic Fury

Read Full Article →

#Tech

Inside SKALA: How Chernobyl’s Reactor Was Actually Controlled

Running a nuclear power plant isn’t an easy task, even with the level of automation available to a 1980s Soviet RBMK reactor. In their continuing efforts to build a full-sized, …read more

Read Full Article →
OpenAI says its latest model is less likely to beat around the bush

The AI giant is also trying to walk back some terms of its deal with the Defense Department OpenAI says GPT‑5.3 Instant, the latest addition to its GPT-5.3 family of models, is less inclined to moralize.…

Read Full Article →
FCC chair calls Paramount/WBD merger "a lot cleaner" than defunct Netflix deal

FCC to review foreign debt, but Carr indicates it will be a formality.

Read Full Article →
Exploring Security Vulnerabilities in a Cheapo WiFi Extender

If all you want is just a basic WiFi extender that gets some level of network connectivity to remote parts of your domicile, then it might be tempting to get …read more

Read Full Article →
This is why our electricity bills are so high right now

New data shows electricity rates rose 5 percent nationwide in 2025.

Read Full Article →
OAuth phishers make ‘check where the link points’ advice ineffective

Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication protocol to redirect victims to malware, using links that point to legitimate identity provider domains such as Microsoft Entra ID and Google Workspace. The links look safe but ultimately lead somewh...

Read Full Article →
What is digital employee experience — and why is it more important than ever?

On any given day, an organization’s employees might be using smartphones, laptops, desktop computers, tablets, a variety of cloud and networking services, a host of enterprise applications and mobile apps, and other digital tools. Many of them might be working remotely, and nearly all of them wil...

Read Full Article →
Iran's cyberwar has begun

'Expect elevated activity for the foreseeable future' Iranian hackers have launched spying expeditions, digital probes, and distributed denial of service (DDoS) attacks in the wake of the US and Israel launching missile strikes over the weekend, and security researchers urge organizations to expe...

Read Full Article →
OpenAI says its US defense deal is safer than Anthropic’s, but is it? + 1 similar

OpenAI has struck a deal to supply the US government with AI services, announcing it hours after US President Donald Trump’s decision on Friday to ban its AI rival Anthropic from all US government contracts. Sam Altman, CEO of OpenAI, said of the negotiation, “ It was definitely rushed, and the o...

Read Full Article →
This free tool checks if a link is safe in seconds

So, you’ve received a suspicious link and would like to check whether the website is dangerous before visiting it. You can do this, for example, with the “URL Void” service from the security provider “No Virus Thanks.” To do this, go to www.urlvoid.com , enter the web address in question, and cli...

Read Full Article →
Trump administration bans Anthropic, seemingly embraces OpenAI

The Trump administration on Friday moved to ban the use of products from artificial intelligence company Anthropic by federal businesses, escalating a high-stakes clash over whether private AI makers can limit how the US military uses their systems. Just hours later, Anthropic rival OpenAI’s CEO,...

Read Full Article →
OpenAI launches stateful AI on AWS, signaling a control plane power shift

Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the short-term but lacking for more complex, multi-step scenarios. To overcome these limitations, OpenAI is introducing what it is calling, naturally, “stateful AI.” The company has ann...

Read Full Article →
Claude 3 snares itself regular writing gig

Claude Opus 3, which has been replaced by Claude Opus 4.6 as Anthropic’s most powerful AI model, has managed to find a new position. The “newly retired” AI model has launched its own Substack blog, Claude’s Corner , which it is aiming to publish it weekly. Claude set out its purpose in writing th...

Read Full Article →
Google broke up an international spy ring using… Sheets

The humble spreadsheet is a staple of modern work, one you probably barely think about. But with global systems intimately interconnected, and only growing more so, it seems almost anything can be an attack vector. Such is the case with Google Sheets. Google reports that it disrupted a wide-rangi...

Read Full Article →
Jack Dorsey shrinks Block to ‘intelligence‑native’ model, cutting 4,000 jobs

Block, the payments and financial services company led by Jack Dorsey, is cutting more than 4,000 jobs, nearly half its workforce, because AI tools have made a leaner organisation not just possible, but strategically preferable, Dorsey said in a letter to its shareholders . The cuts will reduce B...

Read Full Article →
Do NOT use AI-generated passwords, security experts warn

Choosing a secure password isn’t always easy. That’s why some people are turning to “artificial intelligence” (e.g., chatbots like ChatGPT and Google Gemini) to create secure passwords for them. But security experts at Irregular warn against this approach. After some tests, they’ve discovered tha...

Read Full Article →
I hate that we need scam protection in ChatGPT. But we do

AI doesn’t always give accurate answers—much less specific. Meanwhile, security software sometimes gets outright ignored. You wouldn’t think combining the two would make for a solid match, but Malwarebytes is proving me wrong. Recently, the venerable security software maker launched a ChatGPT int...

Read Full Article →

#Threat Intel & Vulnerability

How to Scale SOC Automation with Falcon Fusion SOAR
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
CrowdStrike Achieves NCSC CIR Assurance for Incident Response
Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)

CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnerabilities: CVE-2024-4040 (the template-injection flaw that let unauthenticated attackers escape th...

Read Full Article →
The Resilience Retainer: Incident Response Retainers, Reimagined

Too many organizations today still rely on "legacy" retainer models. These traditional contracts are often rigid, opaque, and reactive, and designed for a world that no longer exists.

Read Full Article →
Chrome flaw let extensions hijack Gemini’s camera, mic, and file access

Researchers found a now-patched vulnerability in "Live in Chrome" that allowed a Chrome extension to inherit Gemini’s permissions.

Read Full Article →
Talos on the developing situation in the Middle East

Cisco Talos continues to monitor the ongoing conflict in the Middle East. As always, we will be watching closely for any cyber-related incidents that are tied to the conflict.

Read Full Article →
[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow + 1 similar

Easy File Sharing Web Server v7.2 - Buffer Overflow

Read Full Article →
[webapps] WeGIA 3.5.0 - SQL Injection + 1 similar

WeGIA 3.5.0 - SQL Injection

Read Full Article →
[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI) + 1 similar

Boss Mini v1.4.0 - Local File Inclusion (LFI)

Read Full Article →
VU#431821: MS-Agent does not properly sanitize commands sent to its shell tool, allowing for RCE

Overview A command injection vulnerability was identified in the MS-Agent framework that can be triggered through unsanitized prompt-derived input. An attacker can craft untrusted input introduced via a chat prompt or other external content sources, resulting in arbitrary command execution on the...

Read Full Article →
Wisconsin k-12 district hit by weeklong outage

Dysruption Hub reports: A reported “cyber incident” left the Denmark School District in the Village of Denmark, Wisconsin, without internet access for five school days, forcing teachers and students to rely on paper-based workarounds, according to a local news report. But that “cyberincident” app...

Read Full Article →
Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026

Torrance, United States / California, 2nd March 2026, CyberNewswire The post Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026 appeared first on The Security Ledger with Paul F. Roberts .

Read Full Article →
Shutdown Stalls Compliance Plans for Cyber Breach Reporting Rule

Cassandre Coyer reports: A partial government shutdown threatens to further derail a key federal cybersecurity agency’s incident reporting rule—and delay answers that companies need to comply. The Department of Homeland Security shutdown, now entering its third week, may push back the finish line...

Read Full Article →
CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams

Ashley Nyquist, Ashden Fein, Caleb Skeath, John Webster Leslie, Matthew Harden, Catherine McGrath, and Samar Amidi of Covington and Burling write: On January 28, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) published a new resource on Assembling a Multi-Disciplinary Insi...

Read Full Article →
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat

Frankfurt am Main, Germany, 2nd March 2026, CyberNewswire The post Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat appeared first on The Security Ledger with Paul F. Roberts .

Read Full Article →
Purchase order attachment isn’t a PDF. It’s phishing for your password

A fake purchase order attachment turned out to be a phishing page designed to harvest your login details.

Read Full Article →
Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)

It's Friday, let's have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:

Read Full Article →
Inside a fake Google security check that becomes a browser RAT

Disguised as a security check, this fake Google alert uses browser permissions to harvest contacts, location data, and more.

Read Full Article →
Notorious ransomware gang allegedly blackmailed by fake FSB officer

There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money... from a notorious Russian ransomware gang. Conti, one of the world's most infamous cybercriminal operations, was allegedly the victim of an...

Read Full Article →
The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary], (Wed, Feb 25th)
New Dohdoor malware campaign targets education and health care

Cisco Talos discovered an ongoing malicious campaign since at least as early as December 2025 by a threat actor we track as “UAT-10027,” delivering a previously undisclosed backdoor dubbed “Dohdoor.”

Read Full Article →
Instagram flagged explicit messages to minors in 2018. Image-blurring arrived six years later

Unsealed court records reveal Instagram executives discussed explicit messages to teens years before a blur feature was introduced.

Read Full Article →
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges.

Read Full Article →
📋 CVE Reference Bulletin (117 vulnerabilities)

⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.

CVE IDSeverityProductSource
CVE-2026-29022🔵 LOWIssue 296VulnDB
CVE-2026-28695⚪ UnknownCraft CMS
CVE-2026-28289⚪ UnknownGHSA-5gpc-65p8-ffwpVulnDB
CVE-2026-27981⚪ UnknownGHSA-j86g-v96v-jpp3VulnDB
CVE-2026-27971🔴 CRITICALGHSA-p9x5-jp3h-96mmVulnDB
CVE-2026-27932⚪ UnknownGHSA-w5r5-m38g-f9f9VulnDB
CVE-2026-27905🔵 LOWGHSA-m6w7-qv66-g3mfVulnDB
CVE-2026-27622⚪ UnknownGHSA-cr4v-6jm6-4963VulnDB
CVE-2026-27601⚪ UnknownGHSA-qpx9-hpmf-5gmwVulnDB
CVE-2026-27600⚪ UnknownGHSA-cm7p-5mg5-82pmVulnDB
CVE-2026-27446⚪ UnknownApache Artemis/ActiveMQ
CVE-2026-27012🔴 CRITICALGHSA-247v-7cw6-q57vVulnDB
CVE-2026-26279⚪ UnknownFroxlor up
CVE-2026-26272⚪ UnknownGHSA-55fv-9q6q-vpcrVulnDB
CVE-2026-26266⚪ UnknownGHSA-f65p-p65r-g53qVulnDB
CVE-2026-25906🔵 LOWdsa-2026-094VulnDB
CVE-2026-25590⚪ UnknownGHSA-54x7-6fhx-3wmwVulnDB
CVE-2026-25146⚪ UnknownGHSA-2hq8-wc73-jvvqVulnDB
CVE-2026-25108⚪ UnknownVulnerabilityThe Hacker News
CVE-2026-24898⚪ UnknownGHSA-qwff-3mw7-7rc7VulnDB
CVE-2026-24848⚪ UnknownGHSA-5vp5-4rm6-h4c9VulnDB
CVE-2026-24502⚪ Unknowndsa-2026-106VulnDB
CVE-2026-24415🔴 CRITICALGHSA-jfgp-g7x7-j25jVulnDB
CVE-2026-22719⚪ Unknown: Broadcom VMwareCISA Alerts & A
CVE-2026-21866⚪ UnknownGHSA-qpv6-75c2-75h4VulnDB
CVE-2026-21513⚪ UnknownMSHTML 0-Day ExploitedThe Hacker News
CVE-2026-21385⚪ Unknownin Qualcomm AndroidThe Hacker News
CVE-2026-20127⚪ UnknownExploited Since 2023The Hacker News
CVE-2026-3494⚪ UnknownMariaDB Server
CVE-2026-3452🔴 CRITICALEUVD-2026-9356VulnDB
CVE-2026-3437⚪ Unknownicsa-26-062-04VulnDB
CVE-2026-3266⚪ UnknownOpenText Filr
CVE-2026-3244🔴 CRITICALEUVD-2026-9355VulnDB
CVE-2026-3242🔴 CRITICALEUVD-2026-9360VulnDB
CVE-2026-3241🔴 CRITICALEUVD-2026-9359VulnDB
CVE-2026-3240🔴 CRITICALEUVD-2026-9358VulnDB
CVE-2026-3224⚪ UnknownDEVO-2026-0005VulnDB
CVE-2026-3130🔵 LOWDEVO-2026-0005VulnDB
CVE-2026-3102⚪ Unknown: macOS ExifToolKaspersky Offic
CVE-2026-3058⚪ UnknownSeraphinite Solutions
CVE-2026-3056⚪ UnknownSeraphinite Solutions
CVE-2026-2994🔴 CRITICALEUVD-2026-9357VulnDB
CVE-2026-2915⚪ UnknownHP System
CVE-2026-2732⚪ UnknownEnable Media
CVE-2026-2606⚪ UnknownIBM webMethods
CVE-2026-2590⚪ UnknownDEVO-2026-0005VulnDB
CVE-2026-2363⚪ UnknownWP-Members Membership
CVE-2026-2355⚪ UnknownMy Calendar
CVE-2026-2256⚪ Unknown: Command injectionCVE Feed (High/
CVE-2026-1775⚪ Unknownicsa-26-062-05VulnDB
CVE-2026-1713🔴 CRITICALIBM MQ
CVE-2026-1706⚪ UnknownAll-in-One Video
CVE-2026-1674⚪ UnknownGutena Forms
CVE-2026-1567⚪ UnknownIBM InfoSphere
CVE-2026-1265⚪ UnknownIBM InfoSphere
CVE-2026-1236⚪ UnknownEnvira Gallery
CVE-2026-0869⚪ UnknownBrocade ASCG
CVE-2026-0540⚪ Unknowncure53 DOMPurify
CVE-2026-0047⚪ Unknown: Android ActivityManagerServiceCVE Feed (High/
CVE-2026-0006🔵 LOW: Apache HTTPCVE Feed (High/
CVE-2025-71218🔵 LOWTrend Micro
CVE-2025-71217⚪ UnknownTrend Micro
CVE-2025-71216⚪ UnknownTrend Micro
CVE-2025-71215⚪ UnknownTrend Micro
CVE-2025-71214⚪ UnknownTrend Micro
CVE-2025-71213⚪ UnknownTrend Micro
CVE-2025-71212🔵 LOWTrend Micro
CVE-2025-71211⚪ UnknownTrend Micro
CVE-2025-71210⚪ UnknownTrend Micro
CVE-2025-71209⚪ UnknownTrend Micro
CVE-2025-71208⚪ UnknownTrend Micro
CVE-2025-71207⚪ UnknownTrend Micro
CVE-2025-71206⚪ UnknownTrend Micro
CVE-2025-71205⚪ UnknownTrend Micro
CVE-2025-70241🔵 LOWD-Link DIR-513
CVE-2025-70240🔵 LOWD-Link DIR-513
CVE-2025-70239🔵 LOWD-Link DIR-513
CVE-2025-70237🔵 LOWD-Link DIR-513
CVE-2025-70236🔵 LOWEUVD-2025-208248VulnDB
CVE-2025-70234🔵 LOWD-Link DIR-513
CVE-2025-69765🔵 LOWTenda AX3
CVE-2025-68613⚪ UnknownIntruder Intel
CVE-2025-66168🔴 CRITICALApache ActiveMQ
CVE-2025-64328⚪ UnknownIntruder Intel
CVE-2025-63911⚪ UnknownCohesity TranZman
CVE-2025-63910⚪ UnknownCohesity TranZman
CVE-2025-54136⚪ UnknownIntruder Intel
CVE-2025-43529⚪ UnknownIntruder Intel
CVE-2025-38617⚪ UnknownIntruder Intel
CVE-2025-36364⚪ UnknownIBM DevOps
CVE-2025-36363⚪ UnknownIBM DevOps
CVE-2025-15599⚪ Unknowncure53 DOMPurify
CVE-2025-14923⚪ UnknownIBM WebSphere
CVE-2025-14604⚪ UnknownIBM Storage
CVE-2025-14500⚪ UnknownIntruder Intel
CVE-2025-14480⚪ UnknownIBM Aspera
CVE-2025-14456🔴 CRITICALIBM MQ
CVE-2025-13734⚪ UnknownIBM Engineering
CVE-2025-13688⚪ UnknownIBM DataStage
CVE-2025-13687⚪ UnknownIBM DataStage
CVE-2025-13686⚪ UnknownIBM DataStage
CVE-2025-13490⚪ UnknownIBM App
CVE-2025-10891⚪ UnknownIntruder Intel
CVE-2025-7544⚪ UnknownIntruder Intel
CVE-2025-0282⚪ UnknownIntruder Intel
CVE-2024-55027⚪ UnknownEUVD-2024-55466VulnDB
CVE-2024-55026⚪ UnknownEUVD-2024-55465VulnDB
CVE-2024-55025⚪ UnknownEUVD-2024-55464VulnDB
CVE-2024-55024⚪ UnknownEUVD-2024-55463VulnDB
CVE-2024-55023⚪ UnknownEUVD-2024-55462VulnDB
CVE-2024-55022⚪ UnknownEUVD-2024-55461VulnDB
CVE-2024-55021⚪ UnknownEUVD-2024-55460VulnDB
CVE-2024-55019⚪ UnknownEUVD-2024-55458VulnDB
CVE-2023-23397⚪ UnknownIntruder Intel
CVE-2021-35486🔴 CRITICALNokia Impact
CVE-2021-35485🔴 CRITICALNokia Impact
CVE-2021-35483🔴 CRITICALNokia Impact
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>

Share this post