The chief information officer at the Cybersecurity and Infrastructure Security Agency announced his departure Tuesday, ending his nearly five-year run at CISA. Robert Costello, an 18-year veteran of the Department of Homeland Security, posted about the move on LinkedIn. “Serving as CIO at CISA has been one of the greatest privileges of my career,” he … Read More “CISA CIO Robert Costello exits agency – CyberScoop” »
Researchers have discovered multiple vulnerabilities that let attackers to quietly hijack agentic AI browsers. Researchers at Zenity Labs discovered these flaws, which affected multiple AI browsers, including Perplexity’s Comet. Before being patched, an attacker could exploit them via a legitimate calendar invite, using a prompt injection to force the AI browser to act against its … Read More “Researchers discover suite of agentic AI browser vulnerabilities – CyberScoop” »
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as … Read More “Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations – The Hacker News” »
South Korea’s National Tax Service (NTS) has found itself in the middle of a deeply embarrassing – and costly – blunder after accidentally handing thieves the master key to a seized cryptocurrency wallet. Read more in my article on the Hot for Security blog. – Read More – GRAHAM CLULEY
Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS – Read More –
Project Compass Targets 764 Network as 30 Arrested and Victims Rescued – Hackread – Cybersecurity News, Data Breaches, AI and More
Europol’s Project Compass targets The Com (aka 764 network), an online group exploiting minors. After 30 arrests, officials say the hunt for those involved is far from over. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM – Hackread – Cybersecurity News, Data Breaches, AI and More
San Francisco, CA, United States, 3rd March 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale – Read More –
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries – The Hacker News
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected its use following an analysis of the IP address (“212.11.64[.]250”) that was used by the suspected – Read … Read More “Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries – The Hacker News” »
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode … Read More “Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow – The Hacker News” »
Seemplicity finds US security leaders work 11 or more extra hours per week – Read More –
Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors – Read More –
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication – The Hacker News
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It’s advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand’s real … Read More “Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication – The Hacker News” »
AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged – The Hacker News
The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This … Read More “AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged – The Hacker News” »
Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches – Read More –
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described – Read More … Read More “Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets – The Hacker News” »
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack – Read More –
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains – The Hacker News
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as … Read More “SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains – The Hacker News” »
Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component. “Memory corruption when adding user-supplied data without checking available buffer space,” Qualcomm said in an … Read More “Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited – The Hacker News” »
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains – The Hacker News
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as … Read More “SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains – The Hacker News” »
The Digital Personal Data Protection Act, 2023 (DPDP Act) in India is a structural change in the manner in… The post DPDP Act Phase 1: 10 Security Safeguards Every CISO Must Implement appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Popular Iranian App BadeSaba was Hacked to Send “Help Is on the Way” Alerts – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers took over Iran’s BadeSaba Calendar prayer app, sending “Help Is on the Way” alerts and messages urging soldiers to lay down weapons. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities – CyberScoop
Google disclosed one actively exploited zero-day vulnerability Monday, warning that the high-severity defect affecting an open-source Qualcomm display component for Android devices “may be under limited, targeted exploitation.” The memory-corruption vulnerability — CVE-2026-21385 — which Google’s Android security team reported to Qualcomm Dec. 18, affects 234 chipsets, Qualcomm said in a security bulletin. Qualcomm said … Read More “Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities – CyberScoop” »
The FBI’s cyber chief is using Winter SHIELD to accelerate China prep, threat intelligence sharing – CyberScoop
The FBI’s cyber chief is prioritizing preparation for stepped-up Chinese threats, enhanced confrontation of adversaries in cyberspace and quicker intelligence sharing with industry as the bureau enters the second and final month of a unique cybersecurity awareness campaign. Brett Leatherman, who took over as assistant director of the FBI’s cyber division last summer, listed those … Read More “The FBI’s cyber chief is using Winter SHIELD to accelerate China prep, threat intelligence sharing – CyberScoop” »
Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome – The Hacker News
Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers. “To ensure the scalability and efficiency of the ecosystem, Chrome has no immediate plan to add traditional X.509 certificates containing post-quantum cryptography to the Chrome Root Store,” the Chrome Secure … Read More “Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome – The Hacker News” »
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel – The Hacker News
Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of insufficient policy enforcement in the WebView tag. It was patched … Read More “New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel – The Hacker News” »
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more – Read More –
Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS – Read More –
Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026 – Hackread – Cybersecurity News, Data Breaches, AI and More
Torrance, United States / California, 2nd March 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Phishing Pages for Zoom and Google Meet Install Teramind Monitoring Tool – Hackread – Cybersecurity News, Data Breaches, AI and More
Fake Zoom and Google Meet pages trick users into installing Teramind monitoring software on Windows systems through phishing links and fake updates. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms – Read More –
⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More – The Hacker News
This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control, exposed keys, and normal features are being used as entry points. The pattern becomes clear only when you see everything … Read More “⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More – The Hacker News” »
Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages – Hackread – Cybersecurity News, Data Breaches, AI and More
Major Pakistani TV channels, including Geo News and ARY News, were hit by a coordinated cyberattack on 1 March 2026. Hackers took control of live satellite feeds to display unauthorised messages. Read more about the breach, the regional impact, and the reported counter-cyber response. – Read More – Hackread – Cybersecurity News, Data Breaches, AI … Read More “Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages – Hackread – Cybersecurity News, Data Breaches, AI and More” »
6 Ways Agentic AI Changes How Systems Act and Adapt – Hackread – Cybersecurity News, Data Breaches, AI and More
Learn how agentic AI changes system behavior in production environments through supervised fine-tuning, structured oversight, and lifecycle governance to improve reliability, manage risk, and support accountable deployment. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Most SaaS teams remember the day their user traffic started growing fast. Few notice the day bots started targeting them. On paper, everything looks great: more sign-ups, more sessions, more API calls. But in reality, something feels off: Sign-ups increase, but users aren’t activating. Server costs rise faster than revenue. Logs are filled with repeated … Read More “How to Protect Your SaaS from Bot Attacks with SafeLine WAF – The Hacker News” »
Alert: NCSC advises UK organisations to take action following conflict in the Middle East – All Feed
In response to the evolving events in the Middle East, the NCSC is advising that UK organisations review their cyber security posture. – Read More – All Feed
Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent – Read More –
A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai. The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-severity security feature bypass affecting the MSHTML Framework. “Protection mechanism failure in MSHTML Framework allows an unauthorized – … Read More “APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday – The Hacker News” »
While competing for medals and glory in Milan, Italy, U.S. Olympic athletes experienced something that is fast becoming a regular feature of modern public life: the widespread use of AI tools by politicians, trolls and sexual harassers to manipulate their images and voices Users on 4chan and other sites quickly generated and shared “nudified” or … Read More “From fake nudes to fake quotes: AI deepfakes plagued Olympic athletes – CyberScoop” »
For years, cyberattacks followed a familiar pattern: reconnaissance, exploitation, persistence, impact. Defenders built their strategies around that cycle, patching vulnerabilities, monitoring indicators, and working to reduce dwell time. But a quieter shift is underway. Today’s most sophisticated adversaries are using AI to study how organizations defend themselves. They run what we call “silent probing campaigns:” … Read More “How ‘silent probing’ can make your security playbook a liability – CyberScoop” »
A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai. The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-severity security feature bypass affecting the MSHTML Framework. “Protection mechanism failure in MSHTML Framework allows an unauthorized – … Read More “APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday – The Hacker News” »
The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added. … Read More “DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams – The Hacker News” »
Agencies strongly encourage immediate investigation of potential compromise of Cisco Catalyst SD-WAN. – Read More – All Feed
Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue – Read More –
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat – Hackread – Cybersecurity News, Data Breaches, AI and More
Frankfurt am Main, Germany, 2nd March 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT – The Hacker News
Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry. The packages masquerade as developer tools, but contain functionality to extract the actual command-and-control (C2) by using seemingly harmless Pastebin content as a dead … Read More “North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT – The Hacker News” »
Fake Xeno and Roblox Utilities Used to Install Windows RAT, Microsoft Warns – Hackread – Cybersecurity News, Data Breaches, AI and More
Fake Xeno and Roblox gaming tools are spreading a Windows RAT (remote access trojan) using PowerShell and LOLBins, Microsoft Threat Intelligence warns. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket – The Hacker News
OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control. “Our vulnerability lives in the core system itself – no plugins, no marketplace, no user-installed extensions – just the bare OpenClaw gateway, running exactly … Read More “ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket – The Hacker News” »





