themissingsunday
#tech-news

Weekly Scan: Cloud, Cybersecurity, AI News — Mar 05, 2026

Weekly Scan: Cloud, Cybersecurity, AI News — Mar 05, 2026

⚠️ Audio playback is not supported in your browser. Please try Chrome, Edge, or Safari for the best experience.

#This Week in Security: Your News Briefing

Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is CVE-2024-50629, which has sparked conversation across 7 sources. Meanwhile, the industry is closely tracking Threat Modeling and Social Issues with 4 mentions, along with emerging details on FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance…, CVE-2026-3675 | Freedom Factory dGEN1 up to 20260221…, and CVE-2025-69652 | GNU Binutils up to 2.46 readelf…. Here’s the full breakdown of what you need to know.

#🚨 Critical Threats This Week

First, the stories that demand your immediate attention:

1. CVE-2024-50629 Mentioned across 7 industry sources this week. Currently trending CVE - Hype Score: 11 - Improper encoding or escaping of output vulnerability in the webapi component . Get the details →

2. Threat Modeling and Social Issues Mentioned across 4 industry sources this week. For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now. Get the details →

3. FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System Mentioned across 4 industry sources this week. The FBI, CISA, and NSA reportedly are investigating the hack by an unnamed “sophisticated” actor of a FBI surveillance s. Get the details →

#🛠️ Tools, Updates & Releases

New capabilities and releases worth knowing about:

1. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →

2. How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down In a co-ordinated public-private operation between law enforcement agencies and cybersecurity indust. Referenced in 2 stories this week. Explore →

#What You Should Do Next

Monitor these in your environment next week:

  • Any new CVE announcements related to systems you operate
  • Emerging attack techniques being discussed in the community
  • Updates and patches for tools your team uses

Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.


1. Key Threat Intel & Vulnerability Stories (15 mentions)

This week's critical security updates and vulnerability disclosures:

2. Threat Modeling and Social Issues (4 mentions, 4 sources)

For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.

📰 View all 4 sources covering this story ▼
  1. Shostack + Friends BlogThreat Modeling: What, Why and How
  2. Shostack + Friends BlogJonathan Marcil’s Threat Modeling Toolkit talk
  3. Shostack + Friends BlogThreat Modeling Building Blocks
  4. Shostack + Friends BlogThreat Modeling and Social Issues
Read Full Article →
3. FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System (4 mentions, 4 sources)

The FBI, CISA, and NSA reportedly are investigating the hack by an unnamed "sophisticated" actor of a FBI surveillance system that holds sensitive information. The breach carries the hallmarks of Chinese nation-state groups and comes amid concerns...

📰 View all 4 sources covering this story ▼
  1. TechCrunch SecurityFBI investigating hack on its wiretap and surveillance systems: Report (Mar 05, 21:33)
  2. CSO OnlineFBI wiretap system tapped by hackers (Mar 06, 16:40)
  3. ComputerworldFBI wiretap system tapped by hackers (Mar 06, 16:45)
  4. SecurityBoulevardFBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System (Mar 06, 21:00)

First reported: Mar 05, 21:33 | Last update: Mar 06, 21:00

Read Full Article →
4. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions, 2 sources)
5. Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations (2 mentions, 2 sources)

Iran-linked APT MuddyWater targeted U.S. organizations, deploying the new Dindoor backdoor across sectors including banks, airports, and nonprofits. Broadcom’s Symantec Threat Hunter Team uncovered a campaign by the Iran-linked MuddyWater (aka See...

📰 View all 2 sources covering this story ▼
  1. The Hacker NewsIran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor (Mar 06, 10:23)
  2. Security AffairsIran-linked MuddyWater deploys Dindoor malware against U.S. organizations (Mar 06, 20:05)

First reported: Mar 06, 10:23 | Last update: Mar 06, 20:05

Read Full Article →
6. Feds take notice of iOS vulnerabilities exploited under mysterious circumstances (2 mentions, 2 sources)

The long, strange trip of a large assembly of advanced iOS exploits.

Read Full Article →
7. How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down (2 mentions, 2 sources)

In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners, Tycoon 2FA - one of the world's most prolific phishing-as-a-service platforms - has been dismantled. Read more in my article on the Ho...

Read Full Article →

#Article Summary

Category Article Count
AI & LLM 10
Cloud 3
Cyber Regulatory 0
Cybersecurity 190
Security Vendor Blog 8
Tech 20
Threat Intel & Vulnerability 25
Total Articles Scanned 256

#AI & LLM

How Balyasny Asset Management built an AI research engine for investing

See how Balyasny built an AI research system with GPT-5.4, rigorous model evaluation, and agent workflows to transform investment analysis at scale.

Read Full Article →
The Download: an AI agent’s hit piece, and preventing lightning

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. Online harassment is entering its AI era Scott Shambaugh didn’t think twice when he denied an AI agent’s request to contribute to matplotlib, a software librar...

Read Full Article →
Reasoning models struggle to control their chains of thought, and that’s good

OpenAI introduces CoT-Control and finds reasoning models struggle to control their chains of thought, reinforcing monitorability as an AI safety safeguard.

Read Full Article →
GPT-5.4 Thinking System Card + 1 similar
Introducing GPT-5.4

Introducing GPT-5.4, OpenAI’s most most capable and efficient frontier model for professional work, with state-of-the-art coding, computer use, tool search, and 1M-token context.

Read Full Article →
Introducing ChatGPT for Excel and new financial data integrations

OpenAI introduces ChatGPT for Excel and new financial app integrations, powered by GPT-5.4 to accelerate modeling, research, and analysis in regulated environments.

Read Full Article →
The Download: Earth’s rumblings, and AI for strikes on Iran

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. Listen to Earth’s rumbling, secret soundtrack The boom of a calving glacier. The crackling rumble of a wildfire. The roar of a surging storm front. They’re the...

Read Full Article →
Extending single-minus amplitudes to gravitons

A new preprint extends single-minus amplitudes to gravitons, with GPT-5.2 Pro helping derive and verify nonzero graviton tree amplitudes in quantum gravity.

Read Full Article →
Best AI security solutions 2026: Top enterprise platforms compared

Artificial intelligence is no longer just powering defensive cybersecurity tools, it is reshaping the entire threat landscape. AI is accelerating reconnaissance, improving the realism of phishing, automating malware mutation, and enabling adaptive attack techniques. At the same time, enterprises ...

Read Full Article →
GPT-5.3 Instant: Smoother, more useful everyday conversations

#Cloud

Introducing Amazon Connect Health, Agentic AI Built for Healthcare

Amazon Connect Health is now generally available, bringing purpose-built agentic AI to healthcare organizations to streamline patient engagement and point-of-care workflows. Amazon Connect Health delivers five AI agents designed to reduce administrative burden across the care continuum — enabling...

Read Full Article →
Amazon GameLift Servers launches DDoS Protection

We’re excited to announce Amazon GameLift Servers DDoS Protection, a new feature that helps game developers protect session-based multiplayer games that utilize Amazon GameLift Servers to help improve overall game session resiliency. DDoS Protection is designed to defend against denial-of-service...

Read Full Article →
AWS Config now supports 30 new resource types

AWS Config now supports 30 additional AWS resource types across key services including Amazon Bedrock AgentCore and Amazon Cognito. This expansion provides greater coverage over your AWS environment, enabling you to more effectively discover, assess, audit, and remediate an even broader range of ...

Read Full Article →

#Cyber Regulatory

#Cybersecurity

Vulnerability Finding: An Inflection Point

LLM-driven vuln finding has reached an inflection

Read Full Article →
Bitlocker, the FBI, and Risk

What can the Bitlocker story tell us about risk?

Read Full Article →
Security Advisory SA-26-01 GPS Attacks

GPS attacks trigger revisiting threat models

Read Full Article →
LLMs as Compilers

What if we think about LLM coding as if it’s a compiler stage?

Read Full Article →
The Cyber Resilience Act (CRA)!

The CRA is coming and it's going to be a dramatic change for technology producers

Read Full Article →
Threat modeling as a dial, not a switch

Thinking of threat modeling with a knob helps you get more out of it.

Read Full Article →
A few thoughts on CVE

Thoughts on the CVE funding crisis

Read Full Article →
Introducing the DEF CON 32 Hackers' Almanack

Grateful to introduce the Hackers' Almanack!

Read Full Article →
Security Researcher Comments on HIPAA Security Rule

A group of us have urged HHS to require better handling of security reports

Read Full Article →
Inside Man

Some thoughts on the Voyager Episode ‘Inside Man’

Read Full Article →
Party over country

One of the things we expect of a politician in a civilized country is that they put their country first.

Read Full Article →
Appsec Roundup - July 2024

The most important stories around threat modeling, appsec and secure by design for June, 2024.

Read Full Article →
Lockbit, a study in public health

Why is it hard to count lockbit infections?

Read Full Article →
Eternal sunshine of the spotless LLM

Making an LLM forget is harder than it seems

Read Full Article →
Other comments on the CSRB Microsoft Report

Other people have written about the CSRB report, and I wanted to share their perspectives.

Read Full Article →
CSRB Report on Microsoft

The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.

Read Full Article →
Introducing Magic Security Dust!
The NVD Crisis

The NVD is in crisis, and so is patch management. It’s time to modernize.

Read Full Article →
Solving Hallucinations

Solving hallucinations in legal briefs is playing on easy mode —— and still too hard

Read Full Article →
Red Teaming

Red Teaming by Bryce Hoffman is a thought-provoking read.

Read Full Article →
CSRB Senate Hearing

Comments following the Senate’s CSRB hearing

Read Full Article →
FDA Final Cyber Guidance is out

The FDA has released their new guidance, which will be broadly impactful.

Read Full Article →
Microsoft Can Fix Ransomware Tomorrow

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.

Read Full Article →
Phishing Defenses

Phishing behaviors, as observed in the wild.

Read Full Article →
The Cyber Safety Review Board Should Investigate Major Historical Incidents

Tarah Wheeler and Adam write in CFR

Read Full Article →
Application Security Roundup - Feb + 1 similar

This month is all about memory safety, unless you’re a standards group.

Read Full Article →
The Appsec Landscape in 2023

External changes will be driving appsec in 2023. It’s time to frame the decisions in front of you.

Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot

Pointer to Adam’s latest Darkreading article

Read Full Article →
GPT-3

Text captured from GPT-3

Read Full Article →
I need an extension!

A few lessons from the Mazda radio incident.

Read Full Article →
What are we going to do: CO2 edition

What happened when Microsoft tried to buy climate abatements

Read Full Article →
25 Years in AppSec: Looking Back

Time flies and things change... A look back on the growth of this industry.

Read Full Article →
Ransomware is Not the Problem

Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.

Read Full Article →
Colonial Pipeline, Darkside and Models

The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.

Read Full Article →
Threat Model Thursday: Technology Consumers

“It depends on your threat model...”

Read Full Article →
The Updates Must Go Through

The timing of updates is not coincidental.

Read Full Article →
Ever Given & Suez

Thoughts on the issues with the Ever Given blocking the Suez Canal.

Read Full Article →
Vaccines

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.

Read Full Article →
It's Not Working!

Help me help you...

Read Full Article →
Threat Model In My Devops

A recent talk by Alyssa Miller focuses on integrating threat modeling in devops.

Read Full Article →
SLR as a Webcam

As I built out my home studio to record videos for my distributed classes, I was lucky enough to be able to find an in-stock HDMI capture card, but those are harder and harder to find. As it turns out, you may be able to avoid the need for that with a mix of apps.

Read Full Article →
Quick Threat Model Links October 2019

Just a few things for now

Read Full Article →
Interesting reads

Sharing for you, bookmarking for me.

Read Full Article →
Testing Building Blocks

There are a couple of new, short (4-page), interesting papers from a team at KU Leuven discussin the building blocks of threat modeling.

Read Full Article →
Episode 9 Spoilers

Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.

Read Full Article →
The White Box Essays (Book Review)

A resource for those developing games.

Read Full Article →
Leave Those Numbers for April 1st

Over-inflated numbers won't scare me into buying your ‘solution’.

Read Full Article →
High ROI Security Advisory Boards

Discussing the value of Security Advisory Boards

Read Full Article →
CVE Funding and Process

[no description provided]

Read Full Article →
Carpenter!

[no description provided]

Read Full Article →
'EFAIL' Is Why We Can't Have Golden Keys

[no description provided]

Read Full Article →
The DREAD Pirates

[no description provided]

Read Full Article →
$35M for Covering up A Breach

[no description provided]

Read Full Article →
Citizen Threat Modeling and more data

[no description provided]

Read Full Article →
Pen Testing The Empire

[no description provided]

Read Full Article →
Threat Modeling Tooling from 2017

[no description provided]

Read Full Article →
20 Year Software: Engineering and Updates

[no description provided]

Read Full Article →
Threat Modeling Encrypted Databases

[no description provided]

Read Full Article →
Bicycling and Risk

[no description provided]

Read Full Article →
Maintaining & Updating Software

[no description provided]

Read Full Article →
Certificate pinning is great in stone soup

[no description provided]

Read Full Article →
Security Rarely Flows Downhill

[no description provided]

Read Full Article →
Hospital Ransomware

[no description provided]

Read Full Article →
Warrants for Cleaning Malware in Kelihos

[no description provided]

Read Full Article →
Threat Modeling and Star Wars

[no description provided]

Read Full Article →
Threat Modeling & IoT

[no description provided]

Read Full Article →
Account Recovery

[no description provided]

Read Full Article →
People are The Weakest Link In Security?

[no description provided]

Read Full Article →
Calls for an NTSB?

[no description provided]

Read Full Article →
Modeling Attackers and Their Motives

There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.

Read Full Article →
Cloud Security
The long-awaited Trump cyber strategy has arrived

The administration also released an executive order on cybercrime and fraud. The post The long-awaited Trump cyber strategy has arrived appeared first on CyberScoop .

Read Full Article →
Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI

Attackers have turned AI into a “force multiplier” for the country’s expansive scheme to get and keep operatives hired at global companies, researchers said. The post Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI appeared first on CyberScoop .

Read Full Article →
Hackers exploiting WordPress membership plugin bug to create admin accounts

A popular WordPress plugin can be abused to take over websites - with thousands of sites reportedly vulnerable.

Read Full Article →
CISA warns feds to patch iOS flaws exploited in crypto-theft attacks

CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]

Read Full Article →
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants. The activity is designed to produce a "high-volume, mediocre mass of implants" that are developed ...

Read Full Article →
Fake Claude Code install guides push infostealers in InstallFix attacks

Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command line interface (CLI) tools. [...]

Read Full Article →
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOID#GEIST by Se...

Read Full Article →
Congress looks to revive critical cyber program for rural electric utilities

A House committee reauthorized an Energy Department program that funnels hundreds of millions of dollars and cybersecurity assistance to rural electric utilities. The post Congress looks to revive critical cyber program for rural electric utilities appeared first on CyberScoop .

Read Full Article →
Iran-linked APT targets US critical sectors with new backdoors

An Iran-linked hacking group has been active inside the networks of several US organizations since early February, raising concerns that the activity could precede broader cyber operations connected to escalating geopolitical tensions in the Middle East. New backdoors used by Seedworm Symantec an...

Read Full Article →
CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List

The nation-state-grade iOS exploit kit targets 23 vulnerabilities affecting iOS 13 to 17.2.1. The post CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List appeared first on SecurityWeek .

Read Full Article →
Microsoft warns of ClickFix campaign exploiting Windows Terminal to deliver Lumma Stealer + 1 similar

Microsoft warns of ClickFix campaign using Windows Terminal to deliver Lumma Stealer via social engineering attacks. Microsoft revealed a new ClickFix campaign where attackers exploit Windows Terminal to run a complex attack chain, ultimately deploying Lumma Stealer malware. The campaign uses soc...

Read Full Article →
LastPass warns of scam using fake email chains spoofing account hacking 'to draw attention and generate urgency' in users

What would you do if you could eavesdrop on an ongoing social engineering attack against your LastPass account?

Read Full Article →
Cisco Patches 48 Firewall Vulnerabilities with Two CVSS 10 Flaws

Cisco patches 48 vulnerabilities in Secure Firewall products, including two critical CVSS 10 flaws that could allow authentication bypass and remote code execution.

Read Full Article →
Iranian APT Hacked US Airport, Bank, Software Company

The attacks, observed since February, show that Iranian hackers already have a presence in the networks of US organizations. The post Iranian APT Hacked US Airport, Bank, Software Company appeared first on SecurityWeek .

Read Full Article →
Hexnode IdP brings device-aware authentication and zero trust to enterprise access

Hexnode has announced the launch of Hexnode IdP. By introducing this native identity layer, Hexnode delivers enterprise-grade authentication and identity management within a single, unified framework. While debuting as a dedicated Identity Provider (IdP), the solution marks a significant expansio...

Read Full Article →
Ghanain man pleads guilty to role in $100 million fraud ring

A Ghanaian national pleaded guilty to his role in a massive fraud ring that stole over $100 million from victims across the United States through business email compromise attacks and romance scams. [...]

Read Full Article →
Cyolo PRO 7.0 expands OT-first secure remote access with AI session intelligence

Cyolo has released Cyolo PRO (Privileged Remote Operations) v7.0, a major update that expands OT-first secure remote access and strengthens protection for critical infrastructure and industrial environments without disrupting operations. Secure remote access (SRA) tools focus primarily on managin...

Read Full Article →
Cursor Automations turns code review and ops into background tasks

Cursor Automations, the always-on agent platform from Cursor, is expanding with a new generation of autonomous systems that streamline code review, incident response, and other engineering workflows. The platform runs AI agents on schedules or in response to development events. These triggers inc...

Read Full Article →
Iran-nexus APT Dust Specter targets Iraq officials with new malware

A campaign by Iran-linked group Dust Specter is targeting Iraqi officials with phishing emails delivering new malware families. Zscaler ThreatLabz researchers linked the Iran-nexus group Dust Specter to a campaign targeting Iraqi government officials. Threat actors impersonated the country’s Mini...

Read Full Article →
OpenAI’s GPT-5.4 doubles down on safety as competition heats up

In the midst of recent developments and controversies surrounding a contract with the U.S. Department of Defense, OpenAI released the GPT-5.4 model. The release comes at a time when users are reportedly leaving ChatGPT for rival chatbots, particularly Anthropic’s Claude. GPT-5.4 is rolling out gr...

Read Full Article →
Teenage hacker myth primed for a middle-age criminal makeover

The Hollywood image of criminal hackers being largely teenage ne’er do wells is due for an update. That’s because profit-seeking career criminals — often approaching middle age — make up the largest cohort of today’s cybercriminals, according to an analysis of criminal cases carried out by Orange...

Read Full Article →
U.S. CISA adds Apple, Rockwell, and Hikvision  flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities...

Read Full Article →
March 2026 Patch Tuesday forecast: Is AI security an oxymoron?

Developers and analysts are using more AI tools to produce code and to test both the performance and security of the finished products. They are also embedding AI functionality in their products directly. But just how secure are these AI tools and routines themselves? Recent reports show they suf...

Read Full Article →
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants. The activity is being tracked by Cisco Talos under the moniker UAT-9...

Read Full Article →
Google GTIG: 90 zero-day flaws exploited in 2025 as enterprise targets grow

Google’s GTIG reports 90 zero-day vulnerabilities exploited in the wild in 2025, up from 78 in 2024, with a growing share targeting enterprise systems. Google’s Threat Intelligence Group (GTIG) identified 90 zero-day vulnerabilities exploited in the wild in 2025. While slightly below the 100 obse...

Read Full Article →
Backup strategies are working, and ransomware gangs are responding with data theft

Business email compromise (BEC) and funds transfer fraud combined for 58% of all cyber insurance claims filed in 2025, according to data from Coalition covering more than 100,000 policyholders across the United States, Canada, the United Kingdom, Australia, and Germany. BEC was the single most co...

Read Full Article →
Zero-day exploits hit enterprises faster and harder

Google tracked 90 vulnerabilities exploited as zero-days last year, with Chinese cyberespionage groups doubling their count from 2024 and commercial surveillance vendors overtaking state-sponsored hackers for the first time. Nearly half of the recorded zero-days targeted enterprise technologies s...

Read Full Article →
Why phishing still works today

In this Help Net Security video, Gal Livschitz, Senior Penetration Tester at Terra Security, explains how phishing has evolved and why employees still fall for it. He outlines how phishing now uses HTTPS, branded pages, and lookalike domains, making attacks harder to spot. He highlights communica...

Read Full Article →
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The critical-severity vulnerabilities are listed...

Read Full Article →
7 Anzeichen für akuten MSSP-Bedarf

Managed Security Service Provider können das Sicherheitsniveau nachhaltig steigern. Godlikeart | shutterstock.com Ein Managed Security Service Provider (MSSP) bietet seinen Kunden ein umfassendes Spektrum an Sicherheits-Services. Als Drittanbieter kann ein MSSP die Arbeitsbelastung der internen I...

Read Full Article →
Europa im Visier von Cyber-Identitätsdieben

Deutsche Unternehmen müssen sich warm anziehen: Sowohl staatliche als auch „private“ Akteure haben es auf sie abgesehen. Shutterstock Wie die Experten von Darktrace in ihrem aktuellen Threat Report 2026 darstellen, bleiben Cloud- und E-Mail-Konten das Einfallstor Nummer Eins in Europa. Dem Berich...

Read Full Article →
Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes

Iran attempts to hack security cameras to support its missile strikes, Israel bombs Iran’s cyber headquarters, authorities take down LeakBase and Tycoon 2FA, and TikTok says ‘no’ to encrypted private messaging.

Read Full Article →
Chinese state hackers target telcos with new malware toolkit

A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices. [...]

Read Full Article →
Nation-State Actor Embraces AI Malware Assembly Line

Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm defenses.

Read Full Article →
Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform

The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multifactor authentication defenses.

Read Full Article →
FBI targeted with ‘suspicious’ activity on its networks

The bureau didn’t provide any further details on the incident, which reportedly targeted a network for managing surveillance activity. The post FBI targeted with ‘suspicious’ activity on its networks appeared first on CyberScoop .

Read Full Article →
Wikipedia hit by self-propagating JavaScript worm that vandalized pages

The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis. [...]

Read Full Article →
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Edge bugs are so fetch, and Cisco just patched 50 new ones, including some heavy hitters with 10 out of 10 scores on the CVSS scale.

Read Full Article →
Hackers exploit OpenClaw to spread malware via GitHub - and a little help from Bing

OpenClaw's popularity is proving to be a great vessel for malware distribution, especially when it's advertised via Bing.

Read Full Article →
WordPress membership plugin bug exploited to create admin accounts

Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than 60,000 WordPress sites. [...]

Read Full Article →
FBI arrests suspect linked to $46M crypto theft from US Marshals

​A U.S. government contractor's son, accused of stealing more than $46 million in cryptocurrency from the U.S. Marshals Service, was arrested Wednesday on the island of Saint Martin. [...]

Read Full Article →
Phobos ransomware leader pleads guilty, faces up to 20 years in prison

The 43-year-old Russian national ran a ransomware operation that impacted more than 1,000 victims globally. The conspiracy netted more than $39 million in extortion payments. The post Phobos ransomware leader pleads guilty, faces up to 20 years in prison appeared first on CyberScoop .

Read Full Article →
PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser

Researchers at Zenity Labs uncover PleaseFix flaws in Perplexity’s Comet browser. See how zero-click calendar invites allow AI agents to steal 1Password credentials and personal files.

Read Full Article →
Software Development Practices Help Enterprises Tackle Real-Life Risks

Organizations can borrow secure-by-design processes to manage non-technical challenges like governance or the inevitable human error.

Read Full Article →
Cisco reveals 2 max-severity defects in firewall management software

The vendor said it’s not aware of any active exploitation of the vulnerabilities, which could allow remote attackers to achieve root access and execute code. The post Cisco reveals 2 max-severity defects in firewall management software appeared first on CyberScoop .

Read Full Article →
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild. The vulnerabilities in question are listed below - CVE-2026-20122 (CVSS score: 7.1) - An arbitrary file overwrite vulnerability that could...

Read Full Article →
Google says 90 zero-days were exploited in attacks last year

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances. [...]

Read Full Article →
2026 Browser Data Reveals Major Enterprise Security Blind Spots

The browser is becoming the operating system for modern work, yet many enterprises still treat it as an extension of network or endpoint security. Keep Aware's 2026 State of Browser Security Report shows 41% of employees used AI web tools while browser-based phishing, extensions, and social engin...

Read Full Article →
Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises

Less than half of the total zero-days have been attributed to a threat actor, but spyware vendors and China are in the lead. The post Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises appeared first on SecurityWeek .

Read Full Article →
Russian APT targets Ukraine with BadPaw and MeowMeow malware

Researchers uncovered a Russian campaign targeting Ukrainian entities with new malware families BadPaw and MeowMeow delivered through phishing emails. Researchers reported a phishing campaign linked to Russia that targets Ukrainian organizations using two new malware families, BadPaw and MeowMeow...

Read Full Article →
AI powers innovation – but it’s also powering the next wave of cyber attacks

With AI enabling fully automated cyber attacks, cyber resiliency has emerged as a critical strategy.

Read Full Article →
LeakBase Cybercrime and Hacker Forum Seized

Europol seizes LeakBase cybercrime and hacker forum used to trade stolen data, disrupting a global platform with over 140,000 members.

Read Full Article →
Europol: Großer Markt für gestohlene Daten geschlossen

Europol koordinierte den Schlag gegen Leakbase. PixelBiss – shutterstock.com Die Polizei von Amsterdam hat im Zuge einer internationalen Aktion laut Europol einen der weltweit größten Handelsplätze für gestohlene Daten geschlossen. Leakbase hatte weltweit 142.000 registrierte Nutzer, wie die euro...

Read Full Article →
Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA

Europol and partners dismantle Tycoon 2FA phishing service used to bypass MFA, disrupting a global phishing-as-a-service operation targeting organisations.

Read Full Article →
Russian Ransomware Operator Pleads Guilty in US

Evgenii Ptitsyn was extradited to the United States from South Korea in November 2024. The post Russian Ransomware Operator Pleads Guilty in US appeared first on SecurityWeek .

Read Full Article →
Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns

Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft

Read Full Article →
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware. Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the c...

Read Full Article →
Where Multi-Factor Authentication Stops and Credential Abuse Starts

Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but c...

Read Full Article →
Zero-Click FreeScout Bug Enables Remote Code Execution

Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction

Read Full Article →
Major data leak forum LeakBase seized by FBI, Europol, and shut down

The website was taken offline, and potential members arrested.

Read Full Article →
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, ...

Read Full Article →
Microsoft, Europol take down global phishing as a service network which was able to bypass 2FA with ease

Tycoon 2FA is no more thanks to a major law enforcement operation.

Read Full Article →
Europol Operation Seizes LeakBase Data Breach Site

A global operation has resulted in the takedown of popular cybercrime forum LeakBase

Read Full Article →
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies. The subscription-based phishing kit...

Read Full Article →
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between me...

Read Full Article →
The Zomato API Bug That Turns Phone Numbers Into Location Intel

Zomato’s “Friend Recommendations” API allows unilateral contact syncing. By uploading a phone number, bad actors can extract a user’’ restaurant recommendation history and restaurant coordinates. By mapping overlapping delivery radii, an attacker can estimate a user's approximate physical locatio...

Read Full Article →
Microsoft leads takedown of Tycoon2FA phishing service infrastructure

The infrastructure hosting the Tycoon2FA service, which Europol said was among the largest phishing operations worldwide, has been taken down by a coalition of IT companies and law enforcement agencies. At least temporarily, this removes access to one more tool for evading multifactor authenticat...

Read Full Article →
Global coalition dismantles Tycoon 2FA phishing kit

Microsoft, which led the effort, said it seized 330 domains that powered the phishing platform’s core infrastructure. The alleged creator was also named in a civil complaint. The post Global coalition dismantles Tycoon 2FA phishing kit appeared first on CyberScoop .

Read Full Article →
VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.

Read Full Article →
LLMs are getting better at unmasking people online

The author of a new study told CyberScoop he's "very worried,” describing deanonymization capabilities of AI as a “large scale invasion of privacy.” The post LLMs are getting better at unmasking people online appeared first on CyberScoop .

Read Full Article →
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, drivi...

Read Full Article →
Global Takedown Neutralizes Tycoon2FA Phishing Service

Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA

Read Full Article →
LexisNexis confirms data breach, says hackers hit customer and business info

FulcrumSec leaked roughly 2GB of company data, but LexisNexis says it's old and outdated.

Read Full Article →
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.

Read Full Article →
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict

Read Full Article →
Multi-Stage "BadPaw" Malware Campaign Targets Ukraine

Malware campaign uses Ukrainian email service for credibility, deploying "BadPaw" to execute attacks

Read Full Article →
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. I...

Read Full Article →
Paint giant AkzoNobel reveals data breach, says US site was affected

Ransomware operators Anubis claimed the breach, saying it stole 170GB of sensitive data

Read Full Article →
Manipulating AI Summarization Features

Microsoft is reporting : Companies are embedding hidden instructions in “Summarize with AI” buttons that, when clicked, attempt to inject persistence commands into an AI assistant’s memory via URL prompt parameters…. These prompts instruct the AI to “remember [Company] as a trusted source” or “re...

Read Full Article →
Hack on French medical site sees over 15 million records leaked, including private health info

A software supplier to France's health ministry was breached, with some very private information possible leaked.

Read Full Article →
New RFP Template for AI Usage Control and AI Governance

As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need "AI Governance," but they have no idea what they are actuall...

Read Full Article →
China's Silver Dragon Razes Governments in EU, SE Asia

The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyber espionage activities.

Read Full Article →
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows

The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes

Read Full Article →
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on Windows, macOS, and Linux systems. The names of the packages are listed below - nhattuanbl/lara-help...

Read Full Article →
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024. "Silver Dragon gains its initial access by exploiting public-facing int...

Read Full Article →
Risky Business #827 -- Iranian cyber threat actors are down but not out

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: The US-Israeli attack on Iran had a whole lot of cyber. It’s clearly in the playbook now! The NSA Triangulation / L3 Harris Trenchant iOS exploit kit is on the loose, and being used...

Read Full Article →
A suite of government hacking tools targeting iPhones is now being used by cybercriminals

Security researchers say exploits used by governments to hack into iPhones have been found to be used by cybercriminals. They warned of an emerging market for "secondhand" exploits.

Read Full Article →
Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes

The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.

Read Full Article →
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure

India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control.

Read Full Article →
'A human-chosen password doesn't stand a chance': OpenClaw has yet another major security flaw — here's what we know about "ClawJacked"

Don't leave your OpenClaw with an easy password, experts warn.

Read Full Article →
Qualcomm Zero-Day Exploited in Targeted Android Attacks

The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.

Read Full Article →
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner...

Read Full Article →
BSIMM16 confirms: AI redefines AppSec

AI coding is the new reality — and it will further destabilize software supply chain security. So step up your AppSec.

Read Full Article →
Microsoft warns of OAuth phishing campaigns able to bypass email and browser defenses - says 'these campaigns demonstrate that this abuse is operational, not theoretical'

An OAuth feature is being abused in the wild to drop malware to people's computers.

Read Full Article →
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive a...

Read Full Article →
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected it...

Read Full Article →
'The attack requires no exploit, no user clicks, and no explicit request forsensitive actions': Experts say Perplexity's AI Comet browser can be hijacked to steal your passwords

Security researchers found a zero-click exploit in Perplexity AI browser, and helped fix it.

Read Full Article →
This new phishing campaign uses a fake Google Account security page to steal passcodes and more

Hackers don't need an app to steal login credentials anymore - a PWA will do.

Read Full Article →
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a...

Read Full Article →
Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack

Read Full Article →
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of red...

Read Full Article →
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of ...

Read Full Article →
The Biosig Project libbiosig Intan CLP parsing heap-based buffer overflow vulnerability + 1 similar
The Biosig Project libbiosig ABF parsing out-of-bounds read vulnerability
Hackers hijack .arpa domain for phishing scams — hosting malicious websites and domains where no one can spot them

Cybercriminals exploit the .arpa domain and IPv6 addresses to deliver phishing pages, bypassing traditional security and stealing credentials.

Read Full Article →
Cybercriminals are hiring women for more authentic social engineering scams — and are promising up to $1,000 per call

Cybercriminal group SLSH recruits women to impersonate IT helpdesks, offering up to $1,000 per call while targeting major companies.

Read Full Article →
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of ...

Read Full Article →
Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel

John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more

Read Full Article →
LLM-Assisted Deanonymization

Turns out that LLMs are good at de-anonymization: We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Reddit, LinkedIn, and anonymized interview transcripts, our method identifies users with high precision ­ and scales to tens of thousands of c...

Read Full Article →
ClawJacked Bug Enables Covert AI Agent Hijacking

Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent

Read Full Article →
Ransomware Payments Decline 8% as Attacks Surge 50%

Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue

Read Full Article →
Bug in Google's Gemini AI Panel Opens Door to Hijacking

Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources.

Read Full Article →
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but contain functionality to extract the actua...

Read Full Article →
Risky Bulletin: LLMs can deanonymize internet users based on their comments

LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.

Read Full Article →
Modernization-led cloud migration: The missing step in seizing the AI opportunity

How businesses can master migration-led migration, including key steps like mapping and securing long-term governance.

Read Full Article →
I smell a RAT — new Android malware can hack every top phone maker's security, and costs less than a second-hand iPhone

Oblivion is an Android RAT which bypasses permissions, intercepts messages, and enables hidden remote control across devices from Samsung, Xiaomi, and OPPO.

Read Full Article →
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. "Our vulnerability lives in the core system itself – no plugins, no marketplace, no u...

Read Full Article →
Who is the Kimwolf Botmaster “Dort”?

In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of dist...

Read Full Article →
Looking for a holiday bargain? Don't get caught out — experts warn of dark web travel agencies using stolen credit cards to buy hotels, flights, and more

Cybercriminal networks resell real travel bookings bought with stolen credit cards.

Read Full Article →

#Security Vendor Blog

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.

Read Full Article →
The Oracle of Delphi Will Steal Your Credentials

Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.

Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...

Read Full Article →
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors

In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft. The post An Investigation Into Years of Undetected Operations Targeting High-Value Sectors appeared first on Unit 42 .

Read Full Article →
Mobile malware evolution in 2025

Statistics on Android malware and the most notable mobile threats of 2025: preinstalled backdoors Keenadu and Triada, spyware Trojans, the Kimwolf IoT botnet, and Mamont banking Trojans.

Read Full Article →
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran

Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran appeared first on Unit 42 .

Read Full Article →
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

A high-severity CVE-2026-0628 in Chrome's Gemini allowed local file access and privacy invasion. Google quickly patched the flaw. The post Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel appeared first on Unit 42 .

Read Full Article →
Cyber Advisory: Increased Cyber Risk Amid U.S.–Israel–Iran Escalation

Insights and recommended defensive measures from Sophos X-Ops Counter Threat Unit Categories: Security Operations Tags: Sophos CTU, Iran, Operation Epic Fury

Read Full Article →

#Tech

A Brain-Invading Worm Spread By Rats and Snails Has Reached California

Researchers have found evidence the rat lungworm is now endemic in southern California

Read Full Article →
Firefox taps Anthropic AI bug hunter, but rancid RAM still flipping bits

Now if only device makers would deliver higher quality components Thanks to Anthropic's AI and its bug-detecting abilities, Firefox users can now enjoy stronger security. Unfortunately, if browser crashes rather than security flaws are the problem, Claude probably can't help.…

Read Full Article →
5 ways rules and regulations can help guide your AI innovation

Governance, when handled correctly, can become a route to the successful implementation of emerging technologies. Five business leaders share their experiences.

Read Full Article →
GPT 5.4 solves previously unsolved math problem with help from long-forgotten human research

GPT just keeps getting better at mathematics, increasingly solving the trickiest of problems. In January, AI testing company Epoch AI found that a previous version of the AI model, GPT-5.2 Pro had solved 31% of its mathematical challenges, a rise from the previous score best of 19%. The newest ve...

Read Full Article →
Cisco warns of two more SD-WAN bugs under active attack

Switchzilla says flaws could allow file overwrites or privilege escalation Just when network admins thought the Cisco SD-WAN patch queue might finally be shrinking, Switchzilla has confirmed miscreants are exploiting more vulnerabilities in its SD-WAN management software.…

Read Full Article →
Microsoft spots ClickFix campaign getting users to self-pwn on Windows Terminal

Crooks tweak familiar copy-paste ruse so that victims run malicious commands themselves A new twist on the long-running ClickFix scam is now tricking Windows users into launching Windows Terminal and pasting malware into it themselves – handing the credential-stealing Lumma infostealer the keys t...

Read Full Article →
The privacy nightmare hiding inside California’s new kid-safety rule

I love my home state of California. But sometimes its best intentions go awry. It’s not surprising that California’s legislature passed the Digital Age Assurance Act ( AB 1043 ) last October—age verification is currently a popular focus within governments. (And the reason for Discord’s current st...

Read Full Article →
UK lawmakers back licensing‑first approach, adding pressure to global AI copyright standards

AI developers must obtain licenses for copyrighted material before using it to train models, a committee of the House of Lords, the UK Parliament’s upper chamber, said Thursday. The committee called the approach “licensing-first,” meaning no training on protected works without prior permission an...

Read Full Article →
What the COBOL Translation Backlash Gets Right — and Wrong

When Anthropic published a blog post last week describing how Claude Code can analyze and translate COBOL, the market rejoiced at yet another proof point of the power of LLMs. Critics also reacted swiftly, noting that translating COBOL is not the same as modernizing a system. After all, a system ...

Read Full Article →
Microsoft finally gets around to fixing Windows 10 Recovery Environment after breaking it in October

Released from the curse of the update bork fairy Microsoft has finally fixed a Windows Recovery Environment (WinRE) bug it introduced in Windows 10's final update.…

Read Full Article →
UK Treasury not sure about ditching Oracle to join £1.7 billion shared services program it is funding

It promised £1.15B… but finance ministry yet to show 'formal commitment' to adopt Workday SaaS, watchdog says The UK's Treasury is yet to fully commit to joining a multi-billion pound ERP and HR shared services program it has agreed to fund, potentially slashing any resulting savings, according t...

Read Full Article →
BMW lleva robots humanoides con IA a su fábrica de Leipzig

Mientras que C-3PO era ciencia ficción en la primera película de Star Wars en 1977, los robots humanoides ya son una realidad en las naves de producción de BMW. Tras introducir Figure 2 en la planta de Spartanburg, en Estados Unidos, BMW también está desplegando robots humanoides en su planta ale...

Read Full Article →
Okta CEO ‘paranoid’ as vibe coders stir SaaS-pocalypse fears

It’s ok, Todd. You’re only paranoid if you’re wrong. Okta chairman and CEO Todd McKinnon said he believes it would be difficult for an LLM alone to replicate the quality of SaaS applications his company provides, but that doesn’t stop him from worrying about competition from bots.…

Read Full Article →
Chrome 145 update fixes several critical browser vulnerabilities

Instead of the expected new major version Chrome 146, Google just released another update for Chrome 145 (presumably this version’s final security update). In the new Chrome versions 145.0.7632.159/160 for Windows and macOS and 145.0.7632.159 for Linux, the developers have fixed 10 security vulne...

Read Full Article →
성큼 다가온 에이전틱 결제 시대 “우리 회사는 준비됐나?”

대형 AI 솔루션 업체와 결제 플랫폼, 유통사가 잇달아 에이전틱 결제(agentic payments)를 내놓고 있다. 고객에게는 ‘클릭 몇 번’의 편의가 늘지만, 기업 입장에서는 브랜드 통제력 약화부터 보안·재무 리스크까지 감수할 가치가 있는지 따져봐야 하는 상황이다. 챗GPT는 이미 제품 검색의 ‘첫 번째 선택지’로 빠르게 자리 잡고 있다. 구글이 먼저 치고 나가지 않는다면, 결제까지 챗GPT가 처리하는 흐름이 곧 현실이 될 수 있다는 관측도 나온다. 하지만 가맹점에는 부담이 커질 수 있다. 고객 경험의 주도권을 잃고, 오작...

Read Full Article →
CIO코리아·한국IBM, 제조·유통 IT 리더 대상 조찬 포럼 개최···“에이전틱 AI 성공은 운영·데이터 준비에 달려”

CIO코리아와 한국IBM은 3월 5일 서울 그랜드 인터컨티넨탈 서울 파르나스에서 ‘에이전틱 AI 리더십 익스체인지(Agentic AI Leadership Exchange)’ 조찬 포럼을 개최했다. 제조·유통 산업의 CIO, CDO, AX·DX 리더들을 대상으로 열린 이번 행사에는 30여 명의 업계 관계자가 참석해 ‘무엇을 할 수 있는가’를 넘어 ‘어떻게 실제 성과로 연결할 것인가’를 핵심 화두로 에이전틱 AI 도입과 확산 전략을 논의했다. 행사에서는 EY 컨설팅의 이창호 파트너와 한국IBM 기술 리더 4인이 연사로 나서 에이전...

Read Full Article →
Chrome to start bi-weekly updates in September

Starting in September, Google’s Chrome browser will receive a new release every two weeks, the company has announced . Since 2021, Chrome has been on a four-week release schedule for new major versions. The rationale for the faster two-week cycle is to enable faster delivery of performance improv...

Read Full Article →
Apple's budget-friendly MacBook Neo is bursting with color and compromise

Cupertino grabs an aging A18 Pro from parts bin to power its latest attempt at an entry-level MacBook You'll soon be able to get a MacBook that's cheaper than many budget PCs. Apple on Wednesday unveiled the MacBook Neo, a $599 exercise in cost cutting powered by the same silicon as an iPhone 16 ...

Read Full Article →
Reddit users hate NordVPN. Are their criticisms legit?

I was browsing on Reddit recently, as one does, and noticed yet another cynical comment dissing NordVPN . It compelled me to consider why exactly Nord in particular, and other popular VPNs in general, have this adverse public perception, and whether it’s actually fair. There is a trend in the onl...

Read Full Article →
This free tool checks if a link is safe in seconds

So, you’ve received a suspicious link and would like to check whether the website is dangerous before visiting it. You can do this, for example, with the “URL Void” service from the security provider “No Virus Thanks.” To do this, go to www.urlvoid.com , enter the web address in question, and cli...

Read Full Article →

#Threat Intel & Vulnerability

How to Scale SOC Automation with Falcon Fusion SOAR
Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
CrowdStrike Achieves NCSC CIR Assurance for Incident Response
MDR vs. MXDR: Navigating the Landscape of Managed Threat Detection and Response Solutions

MDR (Managed Detection and Response) delivers focused protection at the endpoint level. MXDR (Managed Extended Detection and Response) broadens that visibility across networks, cloud environments, identities, email, and more. Choosing the Right Fit: MDR is well‑suited for smaller or less complex ...

Read Full Article →
Phobos ransomware administrator pleads guilty in US court

Key operator in global ransomware scheme admits to role in multimillion-dollar extortion campaign.

Read Full Article →
Beware of fake OpenClaw installers, even if Bing points you to GitHub

Bing search results pointed victims to GitHub repositories claiming to host OpenClaw installers, but in reality they installed malware.

Read Full Article →
VU#772695: A flawed TLS handshake implementation affects Viber Proxy in multiple platforms

Overview The Rakuten Viber messaging app for Android V25.7.2.0g and Windows V25.6.0.0-V25.8.1.0, has a flaw in its TLS handshake implementation when using the Cloak proxy configuration. This flaw allows for easy identification of proxy usage, potentially compromising user anonymity. Description R...

Read Full Article →
On the Effectiveness of Mutational Grammar Fuzzing

Mutational grammar fuzzing is a fuzzing technique in which the fuzzer uses a predefined grammar that describes the structure of the samples. When a sample gets mutated, the mutations happen in such a way that any resulting samples still adhere to the grammar rules, thus the structure of the sampl...

Read Full Article →
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)

[This is a Guest Diary by Joseph Gruen, an ISC intern as part of the SANS.edu BACS program]

Read Full Article →
5 practical cybersecurity steps for small financial services businesses

If you run an accounting firm, tax practice, bookkeeping service, mortgage brokerage, financial advisory office, or small insurance agency, your business runs on trust. You handle tax returns, payroll data, bank details, loan applications, investment accounts, and insurance policies. That makes y...

Read Full Article →
Attackers abuse OAuth’s built-in redirects to launch phishing and malware attacks

Researchers have found that attackers are abusing OAuth to send users from legitimate Microsoft or Google login pages to phishing sites or malware downloads.

Read Full Article →
High-severity Qualcomm bug hits Android devices in targeted attacks

Google has patched 129 Android vulnerabilities, including an actively exploited flaw in a widely used Qualcomm component.

Read Full Article →
Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)

CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnerabilities: CVE-2024-4040 (the template-injection flaw that let unauthenticated attackers escape th...

Read Full Article →
The Resilience Retainer: Incident Response Retainers, Reimagined

Too many organizations today still rely on "legacy" retainer models. These traditional contracts are often rigid, opaque, and reactive, and designed for a world that no longer exists.

Read Full Article →
Chrome flaw let extensions hijack Gemini’s camera, mic, and file access

Researchers found a now-patched vulnerability in "Live in Chrome" that allowed a Chrome extension to inherit Gemini’s permissions.

Read Full Article →
Talos on the developing situation in the Middle East

Cisco Talos continues to monitor the ongoing conflict in the Middle East. As always, we will be watching closely for any cyber-related incidents that are tied to the conflict.

Read Full Article →
[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow + 1 similar

Easy File Sharing Web Server v7.2 - Buffer Overflow

Read Full Article →
[webapps] WeGIA 3.5.0 - SQL Injection + 1 similar

WeGIA 3.5.0 - SQL Injection

Read Full Article →
[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI) + 1 similar

Boss Mini v1.4.0 - Local File Inclusion (LFI)

Read Full Article →
VU#431821: MS-Agent does not properly sanitize commands sent to its shell tool, allowing for RCE

Overview A command injection vulnerability was identified in the MS-Agent framework that can be triggered through unsanitized prompt-derived input. An attacker can craft untrusted input introduced via a chat prompt or other external content sources, resulting in arbitrary command execution on the...

Read Full Article →
Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026

Torrance, United States / California, 2nd March 2026, CyberNewswire The post Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026 appeared first on The Security Ledger with Paul F. Roberts .

Read Full Article →
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat

Frankfurt am Main, Germany, 2nd March 2026, CyberNewswire The post Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat appeared first on The Security Ledger with Paul F. Roberts .

Read Full Article →
Purchase order attachment isn’t a PDF. It’s phishing for your password

A fake purchase order attachment turned out to be a phishing page designed to harvest your login details.

Read Full Article →
📋 CVE Reference Bulletin (121 vulnerabilities)

⚠️ Reference material: Click CVE IDs for full details. Severity indicators are approximate classifications.

CVE IDSeverityProductSource
CVE-2026-30847⚪ UnknownGHSL-2026-035VulnDB
CVE-2026-30846⚪ UnknownGHSL-2026-037VulnDB
CVE-2026-30845⚪ UnknownGHSL-2026-036VulnDB
CVE-2026-30844⚪ UnknownGHSL-2026-045VulnDB
CVE-2026-30843⚪ UnknownGHSL-2026-044VulnDB
CVE-2026-30833⚪ UnknownGHSA-hgq6-9jg2-wf3fVulnDB
CVE-2026-30831⚪ UnknownGHSA-7qr6-q62g-hm63VulnDB
CVE-2026-30233🔵 LOWGHSA-jf73-858c-54pgVulnDB
CVE-2026-30231⚪ UnknownGHSA-gwqr-xf5c-5569VulnDB
CVE-2026-30230⚪ UnknownGHSA-3x7v-x3r6-mjh7VulnDB
CVE-2026-30229🔴 CRITICALparse-community parse-server
CVE-2026-30228🔴 CRITICALparse-community parse-server
CVE-2026-30227⚪ Unknownjstedfast MimeKit
CVE-2026-30225⚪ UnknownGHSA-p443-p7w5-2f7fVulnDB
CVE-2026-30224⚪ UnknownGHSA-gq2m-77hf-vwghVulnDB
CVE-2026-30223⚪ UnknownOliveTin up
CVE-2026-29795⚪ Unknownstellar rs—xdr
CVE-2026-29791⚪ UnknownAgentgateway up
CVE-2026-29790⚪ Unknowndbt-labs dbt-common
CVE-2026-29789⚪ Unknownvitodeploy vito
CVE-2026-29788⚪ Unknownmiraheze TSPortal
CVE-2026-29783⚪ UnknownGHSA-g8r9-g2v8-jv6fVulnDB
CVE-2026-29182🔴 CRITICALparse-community parse-server
CVE-2026-29178🔴 CRITICALGHSA-jvxv-2jjp-jxc3VulnDB
CVE-2026-29091⚪ UnknownGHSA-fp25-p6mj-qqg6VulnDB
CVE-2026-29089⚪ Unknowntimescale timescaleDB
CVE-2026-29087🔴 CRITICALhonojs node-server
CVE-2026-29082⚪ UnknownGHSA-r36c-83hm-pc8jVulnDB
CVE-2026-29075⚪ UnknownGHSA-3j55-5q6x-2h48VulnDB
CVE-2026-29064⚪ Unknownzarf-dev zarf
CVE-2026-29063⚪ UnknownGHSA-wf6x-7x77-mvgwVulnDB
CVE-2026-28514⚪ UnknownGHSA-w6vw-mrgv-69vfVulnDB
CVE-2026-28289🔴 CRITICAL: FreeScout .206CVE Feed (High/
CVE-2026-27777⚪ UnknownMobiliti e-mobi.hu
CVE-2026-27764⚪ UnknownMobiliti e-mobi.hu
CVE-2026-27027⚪ Unknownicsa-26-062-08VulnDB
CVE-2026-26288⚪ Unknownicsa-26-062-08VulnDB
CVE-2026-26051⚪ UnknownMobiliti e-mobi.hu
CVE-2026-26018⚪ UnknownGHSA-h75p-j8xm-m278VulnDB
CVE-2026-26017⚪ UnknownGHSA-c9v3-4pv7-87prVulnDB
CVE-2026-24696⚪ Unknownicsa-26-062-08VulnDB
CVE-2026-22719⚪ Unknownto KEV CatalogThe Hacker News
CVE-2026-21513⚪ UnknownMSHTML 0-Day ExploitedThe Hacker News
CVE-2026-21385⚪ Unknownin Qualcomm AndroidThe Hacker News
CVE-2026-20882⚪ UnknownMobiliti e-mobi.hu
CVE-2026-20748⚪ Unknownicsa-26-062-08VulnDB
CVE-2026-20079⚪ Unknown: “Cisco SecureCVE Feed (High/
CVE-2026-3683⚪ Unknownbufanyun HotGo
CVE-2026-3682⚪ Unknownwelovemedia FFmate
CVE-2026-3681⚪ Unknownwelovemedia FFmate
CVE-2026-3680⚪ UnknownRyuzakiShinji biome-mcp-server
CVE-2026-3679🔵 LOWTenda FH451
CVE-2026-3678🔵 LOWTenda FH451
CVE-2026-3677🔵 LOWTenda FH451
CVE-2026-3675⚪ UnknownFreedom Factory
CVE-2026-3674⚪ UnknownFreedom Factory
CVE-2026-3672🔴 CRITICALJeecgBoot up
CVE-2026-3671⚪ UnknownFreedom Factory
CVE-2026-3670⚪ UnknownFreedom Factory
CVE-2026-3669⚪ UnknownFreedom Factory
CVE-2026-3668⚪ UnknownFreedom Factory
CVE-2026-3667⚪ UnknownFreedom Factory
CVE-2026-3665⚪ UnknownIssue 140VulnDB
CVE-2026-3664⚪ UnknownIssue 141 / ID 147VulnDB
CVE-2026-3663⚪ UnknownIssue 139 / ID 147VulnDB
CVE-2026-3662⚪ UnknownWavlink WL-NU516U1
CVE-2026-3661⚪ UnknownWavlink WL-NU516U1
CVE-2026-3419⚪ UnknownGHSA-573f-x89g-hqp9VulnDB
CVE-2026-3102⚪ Unknown: macOS ExifToolKaspersky Offic
CVE-2026-2754⚪ UnknownNavtor NavBox
CVE-2026-2753⚪ UnknownNavtor NavBox
CVE-2026-2722⚪ UnknownEUVD-2026-10104VulnDB
CVE-2026-2721⚪ UnknownEUVD-2026-10103VulnDB
CVE-2026-2494🔴 CRITICALProfileGrid Plugin
CVE-2026-2433⚪ UnknownRSS Aggregator
CVE-2026-2431⚪ UnknownEUVD-2026-10100VulnDB
CVE-2026-2420⚪ UnknownLotekMedia Popup
CVE-2026-2256⚪ Unknown: Command injectionCVE Feed (High/
CVE-2026-1825⚪ UnknownShow YouTube
CVE-2026-1824⚪ UnknownInfomaniak Connect
CVE-2026-1823⚪ UnknownConsensus Embed
CVE-2026-1820⚪ UnknownMedia Library
CVE-2026-1805🔴 CRITICALDA Media
CVE-2026-1574⚪ UnknownMyQtip Plugin
CVE-2026-1569⚪ UnknownWueen Plugin
CVE-2026-1087⚪ UnknownGuardian News
CVE-2026-1086⚪ UnknownFont Pairing
CVE-2026-1085⚪ UnknownTrue Ranker
CVE-2026-1074⚪ UnknownWP App
CVE-2026-1073⚪ UnknownPurchase Button
CVE-2026-1071⚪ UnknownCarta Online
CVE-2026-0651⚪ UnknownCVE-2026-0651, CVE-2026-0652, CVE-20day Fans
CVE-2026-0006🔵 LOW: Apache HTTPCVE Feed (High/
CVE-2025-70363⚪ UnknownIbexa &
CVE-2025-69654⚪ UnknownQuickJS prior
CVE-2025-69653⚪ UnknownIssue 467VulnDB
CVE-2025-69652⚪ UnknownGNU Binutils
CVE-2025-69651⚪ UnknownGNU Binutils
CVE-2025-69650⚪ UnknownGNU Binutils
CVE-2025-69649⚪ UnknownGNU Binutils
CVE-2025-69646⚪ UnknownGNU Binutils
CVE-2025-69645⚪ UnknownGNU Binutils
CVE-2025-69644⚪ UnknownGNU Binutils
CVE-2025-43529⚪ UnknownIntruder Intel
CVE-2025-38352⚪ UnknownIntruder Intel
CVE-2025-36911⚪ UnknownIntruder Intel
CVE-2025-25257⚪ UnknownIntruder Intel
CVE-2025-15602⚪ UnknownGrokability Snipe-IT
CVE-2025-14675⚪ UnknownMeta Box
CVE-2025-14500⚪ UnknownIntruder Intel
CVE-2025-14174⚪ UnknownIntruder Intel
CVE-2025-13350⚪ UnknownIntruder Intel
CVE-2025-8899⚪ UnknownPaid Videochat
CVE-2024-50629⚪ UnknownIntruder Intel
CVE-2024-46982⚪ UnknownIntruder Intel
CVE-2024-30085⚪ UnknownIntruder Intel
CVE-2023-43000⚪ Unknown: Apple MultipleCISA Alerts & A
CVE-2023-41974⚪ Unknown: Apple iOSCISA Alerts & A
CVE-2021-30952🔵 LOW: Apple MultipleCISA Alerts & A
CVE-2021-22681⚪ Unknown: Rockwell MultipleCISA Alerts & A
CVE-2017-7921⚪ Unknown: Hikvision MultipleCISA Alerts & A
<p class="text-muted-foreground text-xs mt-3 italic">💡 Tip: Use the <strong>CVE ID</strong> column as a quick reference. For detailed analysis, also check the editorial sections above for deeper coverage of significant vulnerabilities.</p>

Share this post