Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild. The vulnerabilities in question are listed below – CVE-2026-20122 (CVSS score: 7.1) – An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file … Read More “Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities – The Hacker News” »
Category: Attack Feeds
Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA – Hackread – Cybersecurity News, Data Breaches, AI and More
Europol and partners dismantle Tycoon 2FA phishing service used to bypass MFA, disrupting a global phishing-as-a-service operation targeting organisations. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
LeakBase Cybercrime and Hacker Forum Seized – Hackread – Cybersecurity News, Data Breaches, AI and More
Europol seizes LeakBase cybercrime and hacker forum used to trade stolen data, disrupting a global platform with over 140,000 members. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cisco released information on a pair of max-severity vulnerabilities in its firewall management software Wednesday that unauthenticated, remote attackers could exploit to obtain the highest level of access to the underlying operating system or on affected devices. The vulnerabilities — CVE-2026-20079 and CVE-2026-20131 — affect the web-based interface of Cisco Secure Firewall Management Center (FMC) … Read More “Cisco reveals 2 max-severity defects in firewall management software – CyberScoop” »
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders – The Hacker News
Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can be decrypted later using quantum computers. This tactic—known as “harvest now, decrypt later”—means sensitive data … Read More “Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders – The Hacker News” »
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More – The Hacker News
Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity, security teams shared new findings, and a few unexpected moves from major tech companies also drew attention. Together, these updates offer a useful snapshot of … Read More “ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More – The Hacker News” »
A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen malware. Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the … Read More “Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware – The Hacker News” »
Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. “The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning … Read More “APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine – The Hacker News” »
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage. Enforced through an identity provider (IdP) such as Microsoft Entra ID, Okta, … Read More “Where Multi-Factor Authentication Stops and Credential Abuse Starts – The Hacker News” »
A joint law enforcement operation has dismantled LeakBase, one of the world’s largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access … Read More “FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials – The Hacker News” »
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks – The Hacker News
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies. The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing – Read … Read More “Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks – The Hacker News” »
When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker… who promptly sent an innocent colleague into a career-ending ambush. In this episode, we unravel the jaw-dropping tale of a defence contractor caught selling … Read More “Smashing Security podcast #457: How a cybersecurity boss framed his own employee – GRAHAM CLULEY” »
Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
How to Avoid Confidentiality Gaps in Early-Stage Startups – Hackread – Cybersecurity News, Data Breaches, AI and More
Startups often expose sensitive data during pitches and hiring. Learn when to use NDAs and simple workflows to close confidentiality gaps. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Institutional DeFi: Building Secure Bridges Between Decentralized Protocols and Corporate Treasury – Hackread – Cybersecurity News, Data Breaches, AI and More
Institutional DeFi helps corporations improve treasury liquidity, speed cross-border settlements, and manage capital using secure permissioned blockchain protocols. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Tycoon 2FA, a major phishing kit and platform that allowed low-skilled cybercriminals to bypass multifactor authentication and conduct large-scale adversary-in-the-middle attacks, was dismantled Wednesday by a global coalition of security companies and law enforcement agencies. Microsoft, which led the effort alongside Europol and authorities from six countries and 11 security firms or organizations, said it … Read More “Global coalition dismantles Tycoon 2FA phishing kit – CyberScoop” »
Can anonymity on the internet survive in the age of generative AI? A recent study from ETH Zurich examined how Large Language Models can combine information from across the internet to identify the human behind the accounts of various online platforms. In the study, LLM agents were given anonymous bios based on real profiles from users … Read More “LLMs are getting better at unmasking people online – CyberScoop” »
Can anonymity on the internet survive in the age of generative AI? A recent study from ETH Zurich examined how Large Language Models can combine information from across the internet to identify the human behind the accounts of various online platforms. In the study, LLM agents were given anonymous bios based on real profiles from users … Read More “LLMs are getting better at unmasking people online – CyberScoop” »
Best DeleteMe Alternatives (2026): Competitors and Comparisons – Hackread – Cybersecurity News, Data Breaches, AI and More
Best DeleteMe alternatives for 2026 compared, including Incogni, Optery, Aura, Kanary, and Privacy Bee for data broker removal and privacy protection. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict – The Hacker News
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. “The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2,” Radware … Read More “149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict – The Hacker News” »
Authorities from 14 countries shut down LeakBase, seized its domains and arrested multiple people allegedly involved in the cybercrime marketplace for stolen data and hacking tools, the Justice Department said Wednesday. LeakBase had more than 142,000 members, ranking it among the world’s largest forums for cybercriminals. The site, which was available on the open web, … Read More “Authorities from 14 countries shut down major cybercrime forum LeakBase – CyberScoop” »
Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap – Hackread – Cybersecurity News, Data Breaches, AI and More
New York, USA, 4th March 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Most Common Swap Scams in 2026, and How to Avoid Them – Hackread – Cybersecurity News, Data Breaches, AI and More
Swap scams target traders through fake DEX sites, token approvals, and phishing. Learn how to detect swap scams and protect funds before you swap now. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People – Hackread – Cybersecurity News, Data Breaches, AI and More
The University of Hawaii Cancer Centre has confirmed a massive ransomware attack affecting 1.24 million people. Sensitive data, including Social Security numbers and historical voter records dating back to 1993, was compromised. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cloudflare’s inaugural threat intelligence report identifies a series of weaknesses in technology that attackers have abused and industrialized into professional “attack factories,” leaving most organizations unprepared to respond. Attackers are turning the very services victims deploy and pay for into tools for launching large-scale attacks. Researchers say the barrier to entry has vanished, as identities … Read More “Attackers are using your network against you, according to Cloudflare – CyberScoop” »
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 – The Hacker News
Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It’s not effective against the latest version of iOS. … Read More “Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 – The Hacker News” »
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need “AI Governance,” but they have no idea what they are actually looking for. The CISO’s Dilemma: … Read More “New RFP Template for AI Usage Control and AI Governance – The Hacker News” »
Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge – Hackread – Cybersecurity News, Data Breaches, AI and More
New research from IMDEA Networks reveals how unencrypted signals from tyre pressure sensors in brands like Toyota and Mercedes can be used for covert vehicle tracking. Learn how these low-cost systems can map out your daily routines and why current regulations fail to protect driver privacy. – Read More – Hackread – Cybersecurity News, Data … Read More “Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge – Hackread – Cybersecurity News, Data Breaches, AI and More” »
Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses – Hackread – Cybersecurity News, Data Breaches, AI and More
Phishing drives about 90% of cyberattacks in 2026, using tactics like encrypted flows, QR code scams, and trusted cloud platforms to steal credentials. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybercriminals are now increasingly using Telegram to sell corporate access, malware subscriptions, and stealer logs, turning the messaging app into a fast cybercrime hub. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Telegram Increasingly Used to Sell Access, Malware and Stolen Logs – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybercriminals are now increasingly using Telegram to sell corporate access, malware subscriptions, and stealer logs, turning the messaging app into a fast cybercrime hub. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems. The names of the packages are listed below – nhattuanbl/lara-helper (37 Downloads) nhattuanbl/simple-queue (29 Downloads) nhattuanbl/lara-swagger (49 Downloads) – Read More – The … Read More “Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux – The Hacker News” »
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 – The Hacker News
Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024. “Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments,” Check Point … Read More “APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 – The Hacker News” »
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an – … Read More “CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog – The Hacker News” »
An exploit kit that may have originated from a leaked U.S. government framework is behind what researchers are calling the first mass-scale attack on iOS, the operating system for Apple’s iPhones. Traces of the exploits, found in the work of Chinese cybercriminals, also have been spotted in Russian attacks on Ukraine and used by a … Read More “Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack – CyberScoop” »
The chief information officer at the Cybersecurity and Infrastructure Security Agency announced his departure Tuesday, ending his nearly five-year run at CISA. Robert Costello, an 18-year veteran of the Department of Homeland Security, posted about the move on LinkedIn. “Serving as CIO at CISA has been one of the greatest privileges of my career,” he … Read More “CISA CIO Robert Costello exits agency – CyberScoop” »
Researchers have discovered multiple vulnerabilities that let attackers to quietly hijack agentic AI browsers. Researchers at Zenity Labs discovered these flaws, which affected multiple AI browsers, including Perplexity’s Comet. Before being patched, an attacker could exploit them via a legitimate calendar invite, using a prompt injection to force the AI browser to act against its … Read More “Researchers discover suite of agentic AI browser vulnerabilities – CyberScoop” »
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as … Read More “Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations – The Hacker News” »
South Korea’s National Tax Service (NTS) has found itself in the middle of a deeply embarrassing – and costly – blunder after accidentally handing thieves the master key to a seized cryptocurrency wallet. Read more in my article on the Hot for Security blog. – Read More – GRAHAM CLULEY
Project Compass Targets 764 Network as 30 Arrested and Victims Rescued – Hackread – Cybersecurity News, Data Breaches, AI and More
Europol’s Project Compass targets The Com (aka 764 network), an online group exploiting minors. After 30 arrests, officials say the hunt for those involved is far from over. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM – Hackread – Cybersecurity News, Data Breaches, AI and More
San Francisco, CA, United States, 3rd March 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries – The Hacker News
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected its use following an analysis of the IP address (“212.11.64[.]250”) that was used by the suspected – Read … Read More “Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries – The Hacker News” »
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode … Read More “Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow – The Hacker News” »
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication – The Hacker News
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It’s advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand’s real … Read More “Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication – The Hacker News” »
AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged – The Hacker News
The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This … Read More “AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged – The Hacker News” »
Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described – Read More … Read More “Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets – The Hacker News” »
Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component. “Memory corruption when adding user-supplied data without checking available buffer space,” Qualcomm said in an … Read More “Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited – The Hacker News” »
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains – The Hacker News
The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as … Read More “SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains – The Hacker News” »