Exploit kit “Coruna” targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft – Read More –
Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. “The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning … Read More “APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine – The Hacker News” »
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage. Enforced through an identity provider (IdP) such as Microsoft Entra ID, Okta, … Read More “Where Multi-Factor Authentication Stops and Credential Abuse Starts – The Hacker News” »
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction – Read More –
A global operation has resulted in the takedown of popular cybercrime forum LeakBase – Read More –
Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws – Read More –
A joint law enforcement operation has dismantled LeakBase, one of the world’s largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access … Read More “FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials – The Hacker News” »
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks – The Hacker News
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies. The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing – Read … Read More “Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks – The Hacker News” »
Nowadays, information is among the most precious resources of companies and states in the digital age. The cross-border and system-to-system… The post Why India Needs Indigenous HSMs for DPDP Act and RBI Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker… who promptly sent an innocent colleague into a career-ending ambush. In this episode, we unravel the jaw-dropping tale of a defence contractor caught selling … Read More “Smashing Security podcast #457: How a cybersecurity boss framed his own employee – GRAHAM CLULEY” »
Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
How to Avoid Confidentiality Gaps in Early-Stage Startups – Hackread – Cybersecurity News, Data Breaches, AI and More
Startups often expose sensitive data during pitches and hiring. Learn when to use NDAs and simple workflows to close confidentiality gaps. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Institutional DeFi: Building Secure Bridges Between Decentralized Protocols and Corporate Treasury – Hackread – Cybersecurity News, Data Breaches, AI and More
Institutional DeFi helps corporations improve treasury liquidity, speed cross-border settlements, and manage capital using secure permissioned blockchain protocols. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Tycoon 2FA, a major phishing kit and platform that allowed low-skilled cybercriminals to bypass multifactor authentication and conduct large-scale adversary-in-the-middle attacks, was dismantled Wednesday by a global coalition of security companies and law enforcement agencies. Microsoft, which led the effort alongside Europol and authorities from six countries and 11 security firms or organizations, said it … Read More “Global coalition dismantles Tycoon 2FA phishing kit – CyberScoop” »
Can anonymity on the internet survive in the age of generative AI? A recent study from ETH Zurich examined how Large Language Models can combine information from across the internet to identify the human behind the accounts of various online platforms. In the study, LLM agents were given anonymous bios based on real profiles from users … Read More “LLMs are getting better at unmasking people online – CyberScoop” »
Can anonymity on the internet survive in the age of generative AI? A recent study from ETH Zurich examined how Large Language Models can combine information from across the internet to identify the human behind the accounts of various online platforms. In the study, LLM agents were given anonymous bios based on real profiles from users … Read More “LLMs are getting better at unmasking people online – CyberScoop” »
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. … Read More “Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Best DeleteMe Alternatives (2026): Competitors and Comparisons – Hackread – Cybersecurity News, Data Breaches, AI and More
Best DeleteMe alternatives for 2026 compared, including Incogni, Optery, Aura, Kanary, and Privacy Bee for data broker removal and privacy protection. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict – The Hacker News
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. “The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2,” Radware … Read More “149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict – The Hacker News” »
Authorities from 14 countries shut down LeakBase, seized its domains and arrested multiple people allegedly involved in the cybercrime marketplace for stolen data and hacking tools, the Justice Department said Wednesday. LeakBase had more than 142,000 members, ranking it among the world’s largest forums for cybercriminals. The site, which was available on the open web, … Read More “Authorities from 14 countries shut down major cybercrime forum LeakBase – CyberScoop” »
A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards – Read More –
Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap – Hackread – Cybersecurity News, Data Breaches, AI and More
New York, USA, 4th March 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Most Common Swap Scams in 2026, and How to Avoid Them – Hackread – Cybersecurity News, Data Breaches, AI and More
Swap scams target traders through fake DEX sites, token approvals, and phishing. Learn how to detect swap scams and protect funds before you swap now. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People – Hackread – Cybersecurity News, Data Breaches, AI and More
The University of Hawaii Cancer Centre has confirmed a massive ransomware attack affecting 1.24 million people. Sensitive data, including Social Security numbers and historical voter records dating back to 1993, was compromised. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA – Read More –
Cloudflare’s inaugural threat intelligence report identifies a series of weaknesses in technology that attackers have abused and industrialized into professional “attack factories,” leaving most organizations unprepared to respond. Attackers are turning the very services victims deploy and pay for into tools for launching large-scale attacks. Researchers say the barrier to entry has vanished, as identities … Read More “Attackers are using your network against you, according to Cloudflare – CyberScoop” »
Malware campaign uses Ukrainian email service for credibility, deploying “BadPaw” to execute attacks – Read More –
Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict – Read More –
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 – The Hacker News
Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It’s not effective against the latest version of iOS. … Read More “Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 – The Hacker News” »
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need “AI Governance,” but they have no idea what they are actually looking for. The CISO’s Dilemma: … Read More “New RFP Template for AI Usage Control and AI Governance – The Hacker News” »
Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge – Hackread – Cybersecurity News, Data Breaches, AI and More
New research from IMDEA Networks reveals how unencrypted signals from tyre pressure sensors in brands like Toyota and Mercedes can be used for covert vehicle tracking. Learn how these low-cost systems can map out your daily routines and why current regulations fail to protect driver privacy. – Read More – Hackread – Cybersecurity News, Data … Read More “Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge – Hackread – Cybersecurity News, Data Breaches, AI and More” »
Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses – Hackread – Cybersecurity News, Data Breaches, AI and More
Phishing drives about 90% of cyberattacks in 2026, using tactics like encrypted flows, QR code scams, and trusted cloud platforms to steal credentials. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybercriminals are now increasingly using Telegram to sell corporate access, malware subscriptions, and stealer logs, turning the messaging app into a fast cybercrime hub. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Telegram Increasingly Used to Sell Access, Malware and Stolen Logs – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybercriminals are now increasingly using Telegram to sell corporate access, malware subscriptions, and stealer logs, turning the messaging app into a fast cybercrime hub. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes – Read More –
Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems. The names of the packages are listed below – nhattuanbl/lara-helper (37 Downloads) nhattuanbl/simple-queue (29 Downloads) nhattuanbl/lara-swagger (49 Downloads) – Read More – The … Read More “Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux – The Hacker News” »
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 – The Hacker News
Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024. “Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments,” Check Point … Read More “APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2 – The Hacker News” »
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an – … Read More “CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog – The Hacker News” »
An exploit kit that may have originated from a leaked U.S. government framework is behind what researchers are calling the first mass-scale attack on iOS, the operating system for Apple’s iPhones. Traces of the exploits, found in the work of Chinese cybercriminals, also have been spotted in Russian attacks on Ukraine and used by a … Read More “Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack – CyberScoop” »
The chief information officer at the Cybersecurity and Infrastructure Security Agency announced his departure Tuesday, ending his nearly five-year run at CISA. Robert Costello, an 18-year veteran of the Department of Homeland Security, posted about the move on LinkedIn. “Serving as CIO at CISA has been one of the greatest privileges of my career,” he … Read More “CISA CIO Robert Costello exits agency – CyberScoop” »
Researchers have discovered multiple vulnerabilities that let attackers to quietly hijack agentic AI browsers. Researchers at Zenity Labs discovered these flaws, which affected multiple AI browsers, including Perplexity’s Comet. Before being patched, an attacker could exploit them via a legitimate calendar invite, using a prompt injection to force the AI browser to act against its … Read More “Researchers discover suite of agentic AI browser vulnerabilities – CyberScoop” »
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as … Read More “Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations – The Hacker News” »
South Korea’s National Tax Service (NTS) has found itself in the middle of a deeply embarrassing – and costly – blunder after accidentally handing thieves the master key to a seized cryptocurrency wallet. Read more in my article on the Hot for Security blog. – Read More – GRAHAM CLULEY
Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS – Read More –
Project Compass Targets 764 Network as 30 Arrested and Victims Rescued – Hackread – Cybersecurity News, Data Breaches, AI and More
Europol’s Project Compass targets The Com (aka 764 network), an online group exploiting minors. After 30 arrests, officials say the hunt for those involved is far from over. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM – Hackread – Cybersecurity News, Data Breaches, AI and More
San Francisco, CA, United States, 3rd March 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers Abuse .arpa Top-Level Domain to Host Phishing Scams – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers abuse the .arpa Top-Level Domain to host phishing scams, using IPv6 tunnels, reverse DNS tricks, and shadow domains to bypass security checks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale – Read More –
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries – The Hacker News
The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected its use following an analysis of the IP address (“212.11.64[.]250”) that was used by the suspected – Read … Read More “Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries – The Hacker News” »





