CSO Online

Dark Reading

Dark Web Informer

Europol

Krebs on Security

NSA

Reuters

Security Affairs

The Hacker News

Wired

ZDNET

Trump’s cyber strategy emphasizes offensive operations, deregulation, AI

Fri Mar 06 2026

The White House released President Donald Trump’s long-awaited cybersecurity strategy, a lean seven-page blueprint that breaks from past approaches by placing offensive cyber operations at the center

CSO Online

ClickFix attackers using new tactic to evade detection, says Microsoft

Fri Mar 06 2026

Threat actors are trying a different tactic to sucker employees into falling for ClickFix phishing attacks that install malware, says Microsoft.

CSO Online

The Future of Iran’s Internet Is More Uncertain Than Ever

Fri Mar 06 2026

Iran’s internet shutdown has reduced connectivity by 99 percent, with air strikes likely causing additional outages, and few workarounds remaining.

Wired

Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations

Fri Mar 06 2026

Iran-linked APT MuddyWater targeted U.S. organizations, deploying the new Dindoor backdoor across sectors including banks, airports, and nonprofits. Broadcom’s Symantec Threat Hunter Team uncovered a campaign by the Iran-linked MuddyWater  (aka SeedWorm, TEMP.Zagros, Mango Sandstorm, TA450, and Static Kitten) APT group targeting several U.S. organizations. “Activity associated with Iranian APT group Seedworm has been spotted on the networks of multiple […]

Security Affairs

Only 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling short

Fri Mar 06 2026

Cybersecurity is, as it should be in this era of AI-driven cyberattacks, a regular item on enterprise board agendas.

CSO Online

FBI wiretap system tapped by hackers

Fri Mar 06 2026

The US Federal Bureau of Investigation (FBI) has identified a suspected incident on a network used to manage wiretaps and foreign intelligence surveillance warrants, CNN reported.

CSO Online

OAuth vulnerability in n8n automation platform could lead to system compromise

Fri Mar 06 2026

A weakness in the configuration of OAuth credentials opens up a stored XSS vulnerability in the n8n automation platform, researchers at Imperva have discovered.

CSO Online

Cisco flags ongoing exploitation of two recently patched Catalyst SD-WAN flaws

Fri Mar 06 2026

Cisco warns that two recently patched Catalyst SD-WAN flaws, CVE-2026-20128 and CVE-2026-20122, are already being actively exploited in the wild. Cisco warned customers that threat actors are actively exploiting two recently patched Catalyst SD-WAN vulnerabilities, CVE-2026-20128 and CVE-2026-20122. The networking giant urged organizations to apply the latest security updates to reduce the risk of compromise. […]

Security Affairs

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

Fri Mar 06 2026

The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants. The activity is designed to produce a "high-volume, mediocre mass of implants" that are developed using lesser-known programming languages like Nim, Zig, and Crystal and rely on trusted services like...

The Hacker News

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

Fri Mar 06 2026

Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT. The stealthy attack chain has been codenamed VOID#GEIST by Securonix Threat Research. At a high level, the obfuscated batch script is used to deploy a second...

The Hacker News

Targeted advertising is also targeting malware

Fri Mar 06 2026

Online ads are increasingly being used a means of introducing malware into organizations, according to The Media Trust.

CSO Online

Microsoft warns of ClickFix campaign exploiting Windows Terminal to deliver Lumma Stealer

Fri Mar 06 2026

Microsoft warns of ClickFix campaign using Windows Terminal to deliver Lumma Stealer via social engineering attacks. Microsoft revealed a new ClickFix campaign where attackers exploit Windows Terminal to run a complex attack chain, ultimately deploying Lumma Stealer malware. The campaign uses social engineering to trick users into executing malicious commands, highlighting growing risks to Windows […]

Security Affairs

From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’

Fri Mar 06 2026

New research shows hundreds of attempts by apparent Iranian state hackers to hijack consumer-grade cameras, timed to missile and drone strikes. Israel, Russia, and Ukraine have also adopted this trick.

Wired

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

Fri Mar 06 2026

Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale. Risk-based cybersecurity is the foundation of that model. When done right, it builds client trust, increases upsell opportunities, and drives recurring revenue. But to deliver this consistently and efficiently, you need the right technology and processes....

The Hacker News

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

Fri Mar 06 2026

New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies' networks, including banks, airports, non-profit, and the Israeli arm of a software company. The activity has been attributed to a state-sponsored hacking group called MuddyWater (aka Seedworm). It's affiliated with the Iranian...

The Hacker News

Iran-nexus APT Dust Specter targets Iraq officials with new malware

Fri Mar 06 2026

A campaign by Iran-linked group Dust Specter is targeting Iraqi officials with phishing emails delivering new malware families. Zscaler ThreatLabz researchers linked the Iran-nexus group Dust Specter to a campaign targeting Iraqi government officials. Threat actors impersonated the country’s Ministry of Foreign Affairs in phishing messages that delivered previously unseen malware, including SPLITDROP, TWINTASK, TWINTALK, […]

Security Affairs

U.S. CISA adds Apple, Rockwell, and Hikvision  flaws to its Known Exploited Vulnerabilities catalog

Fri Mar 06 2026

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: CVE-2023-43000 is a use-after-free issue in the WebKit component. Apple […]

Security Affairs

Teenage hacker myth primed for a middle-age criminal makeover

Fri Mar 06 2026

The Hollywood image of criminal hackers being largely teenage ne’er do wells is due for an update.

CSO Online

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

Fri Mar 06 2026

A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants. The activity is being tracked by Cisco Talos under the moniker UAT-9244, describing it as closely associated with another cluster known as FamousSparrow. It's worth...

The Hacker News

Challenges and projects for the CISO in 2026

Fri Mar 06 2026

Sophisticated attacks and the incorporation of AI tools, talent shortages, and tight budgets are some of the challenges commonly cited when it comes to managing cybersecurity in organizations.

CSO Online

Google GTIG: 90 zero-day flaws exploited in 2025 as enterprise targets grow

Fri Mar 06 2026

Google’s GTIG reports 90 zero-day vulnerabilities exploited in the wild in 2025, up from 78 in 2024, with a growing share targeting enterprise systems. Google’s Threat Intelligence Group (GTIG) identified 90 zero-day vulnerabilities exploited in the wild in 2025. While slightly below the 100 observed in 2023, the number increased from 78 in 2024, with […]

Security Affairs

Zero-day exploits hit enterprises faster and harder

Fri Mar 06 2026

Google tracked 90 vulnerabilities exploited as zero-days last year, with Chinese cyberespionage groups doubling their count from 2024 and commercial surveillance vendors overtaking state-sponsored hac

CSO Online

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Fri Mar 06 2026

Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware. The activity, observed in February 2026, makes use of the terminal emulator program instead of instructing users to launch the Windows Run dialog and paste a command...

The Hacker News

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

Fri Mar 06 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The critical-severity vulnerabilities are listed below - CVE-2017-7921 (CVSS score: 9.8) - An improper authentication vulnerability affecting...

The Hacker News

7 Anzeichen für akuten MSSP-Bedarf

Fri Mar 06 2026

Managed Security Service Provider können das Sicherheitsniveau nachhaltig steigern.

CSO Online

Europa im Visier von Cyber-Identitätsdieben

Fri Mar 06 2026

Deutsche Unternehmen müssen sich warm anziehen: Sowohl staatliche als auch „private“ Akteure haben es auf sie abgesehen.

CSO Online

LeakBase marketplace unplugged by cops in 14 countries

Fri Mar 06 2026

The LeakBase cyberforum, considered one of the world’s largest online marketplaces for cybercriminals to buy and sell stolen data and cybercrime tools, has been seized by the US, and arrests have also

CSO Online

Phobos Ransomware admin faces up to 20 years after guilty plea

Thu Mar 05 2026

Russian national Evgenii Ptitsyn (43) pleaded guilty in the U.S. for his role in the Phobos ransomware operation. Russian national Evgenii Ptitsyn pleaded guilty in the US to wire fraud conspiracy for his role in the Phobos ransomware scheme. The man was arrested in South Korea in 2024 and extradited to the United States. He […]

Security Affairs

Here’s Every Country Directly Impacted by the War on Iran

Thu Mar 05 2026

As the conflict in the Middle East continues to escalate, more than a dozen countries in the region have reportedly been affected by air strikes.

Wired

The Controversies Finally Caught Up to Kristi Noem

Thu Mar 05 2026

Donald Trump said he would replace the secretary of the Department of Homeland Security. Noem’s tenure was marked by aggressive anti-immigration tactics and ICE and CBP’s killing of two US protesters.

Wired

Cisco issues emergency patches for critical firewall vulnerabilities

Thu Mar 05 2026

Cisco has handed security teams one of the largest ever patching workloads affecting its firewall products, including fixes for two ‘perfect 10’ vulnerabilities in the company’s Secure Firewall Manage

CSO Online

Russian APT targets Ukraine with BadPaw and MeowMeow malware

Thu Mar 05 2026

Researchers uncovered a Russian campaign targeting Ukrainian entities with new malware families BadPaw and MeowMeow delivered through phishing emails. Researchers reported a phishing campaign linked to Russia that targets Ukrainian organizations using two new malware families, BadPaw and MeowMeow. The attack chain begins with a phishing email carrying a link to a ZIP archive. When […]

Security Affairs

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

Thu Mar 05 2026

Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild. The vulnerabilities in question are listed below - CVE-2026-20122 (CVSS score: 7.1) - An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system....

The Hacker News

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Thu Mar 05 2026

Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can be decrypted later using quantum computers. This tactic—known as “harvest now, decrypt later”—means sensitive data transmitted today could become...

The Hacker News

Coruna iOS exploit kit moved from spy tool to mass criminal campaign in under a year

Thu Mar 05 2026

Google’s threat intelligence researchers have identified a sophisticated exploit kit targeting iPhones that was first used by a commercial surveillance vendor’s customer before being repurposed by a s

CSO Online

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

Thu Mar 05 2026

Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity, security teams shared new findings, and a few unexpected moves from major tech companies also drew attention. Together, these updates offer a useful snapshot of what is happening...

The Hacker News

Europol: Großer Markt für gestohlene Daten geschlossen

Thu Mar 05 2026

Europol koordinierte den Schlag gegen Leakbase.

CSO Online

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

Thu Mar 05 2026

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware. Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different...

The Hacker News

Europol schließt riesigen Markt für gestohlene Daten

Thu Mar 05 2026

loading="lazy" width="400px">LeakBase wird von den Strafverfolgungsbehörden untersucht.

CSO Online

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Thu Mar 05 2026

Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage.  Enforced through an identity provider (IdP) such as Microsoft Entra ID, Okta, or...

The Hacker News

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Thu Mar 05 2026

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals...

The Hacker News

How a Music Streaming CEO Built an Open-Source Global Threat Map in His Spare Time

Thu Mar 05 2026

Frustrated by fragmented war news, Anghami’s Elie Habib built World Monitor, a platform that fuses global data, like aircraft signals and satellite detections, to track conflicts as they unfold.

Wired

Operation Leak: FBI and Europol dismantle LeakBase Cybercrime forum

Thu Mar 05 2026

The Federal Bureau of Investigation seized the LeakBase cybercrime forum in an international crackdown led by Europol. The Federal Bureau of Investigation seized the LeakBase cybercrime forum (leakbase[.]la), a platform used to trade hacking tools and stolen data. The action formed part of “Operation Leak,” an international effort coordinated by Europol involving authorities from 14 […]

Security Affairs

State-affiliated hackers set up for critical OT attacks that operators may not detect

Thu Mar 05 2026

Several state-linked threat groups known for breaking into operational technology (OT) networks have shifted their focus over the past year from gaining and maintaining access to actively mapping out

CSO Online

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Thu Mar 05 2026

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies. The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing...

The Hacker News

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Thu Mar 05 2026

A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access the forum's website ("leakbase[.]la") are now...

The Hacker News

Google uncovers Coruna iOS Exploit Kit targeting iOS 13–17.2.1

Thu Mar 05 2026

Google warns of the Coruna iOS exploit kit, using 23 exploits across five chains to target iPhones running iOS 13–17.2.1, but not the latest iOS. Google’s Threat Intelligence Group has identified a powerful new iOS exploit kit called Coruna (also known as CryptoWaters) that targets Apple iPhones running iOS versions 13.0 through 17.2.1. The kit […]

Security Affairs

14 old software bugs that took way too long to squash

Thu Mar 05 2026

In 2021, a vulnerability was revealed in a system that lay at the foundation of modern computing.

CSO Online

Die besten Cyber-Recovery-Lösungen

Thu Mar 05 2026

Nicht greifende Recovery-Prozesse sind für Unternehmen ein Albtraumszenario, das dank ausgefeilter Angriffe immer öfter zur Realität wird.

CSO Online

Microsoft leads takedown of Tycoon2FA phishing service infrastructure

Thu Mar 05 2026

The infrastructure hosting the Tycoon2FA service, which Europol said was among the largest phishing operations worldwide, has been taken down by a coalition of IT companies and law enforcement agencie

CSO Online

Cisco fixes maximum-severity Secure FMC bugs threatening firewall security

Wed Mar 04 2026

Cisco patched two critical Secure FMC vulnerabilities that could let attackers gain root access to managed firewalls. Cisco addressed two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) that could allow attackers to gain root access. Cisco Secure Firewall Management Center (FMC) is a centralized management platform for Cisco firewalls. It lets administrators configure, […]

Security Affairs

Automate or orchestrate? Implementing a streamlined remediation program to shorten MTTR

Wed Mar 04 2026

Security teams want lower MTTR, but flaws persist. How to use automation vs. orchestration to reduce risk effectively? Almost all security teams want to reduce their Mean Time to Remediate (MTTR). And for good reason: research from 2024 found that it takes an average of 4.5 months to remediate critical vulnerabilities. The problem is that […]

Security Affairs

Why AI, Zero Trust, and modern security require deep visibility

Wed Mar 04 2026

AI.

CSO Online

The 10-hour problem: How visibility gaps are burning out the SOC

Wed Mar 04 2026

Security teams aren’t drowning because the threats improved.

CSO Online

LastPass warns of spoofed alerts aimed at stealing master passwords

Wed Mar 04 2026

LastPass warns of a phishing campaign using fake security alerts about unauthorized access or password changes to steal users’ master passwords. LastPass has warned users about a new phishing campaign using fake security alerts that claim unauthorized access or master password changes. The emails, which spoof LastPass’s display name, attempt to trick recipients into revealing […]

Security Affairs

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

Wed Mar 04 2026

A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devices’ electromagnetic and acoustic leaks—a spying trick the NSA once codenamed TEMPEST.

Wired

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Wed Mar 04 2026

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2," Radware said in a Tuesday...

The Hacker News

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Wed Mar 04 2026

Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It's not effective against the latest version of iOS. The findings were first reported by WIRED. "The...

The Hacker News

From phishing to Google Drive C2: Silver Dragon expands APT41 playbook

Wed Mar 04 2026

APT group Silver Dragon, linked to APT41, targets governments via server exploits and phishing, using Cobalt Strike and Google Drive for C2. Check Point researchers have identified Silver Dragon, an APT group tied to the China-linked group APT41, targeting government entities in Europe and Southeast Asia since mid-2024. The group gains initial access by exploiting […]

Security Affairs

Iranian cyberattacks fail to materialize but threat remains acute

Wed Mar 04 2026

Five days into US and Israel’s war with Iran, the worst predictions for cyber-retaliation have yet to materialize.

CSO Online

New RFP Template for AI Usage Control and AI Governance

Wed Mar 04 2026

As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need "AI Governance," but they have no idea what they are actually looking for. The CISO’s Dilemma: You Have the AI Budget, but Do You Have the Requirements? As AI...

The Hacker News

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Wed Mar 04 2026

Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on Windows, macOS, and Linux systems. The names of the packages are listed below - nhattuanbl/lara-helper (37 Downloads) nhattuanbl/simple-queue (29 Downloads) nhattuanbl/lara-swagger (49 Downloads)...

The Hacker News

U.S. CISA adds Qualcomm and Broadcom VMware Aria Operations flaws to its Known Exploited Vulnerabilities catalog

Wed Mar 04 2026

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Qualcomm and Broadcom VMware Aria Operations flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Google Chromium CSS, Microsoft Windows, TeamT5 ThreatSonar Anti-Ransomware, and Zimbra flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: In […]

Security Affairs

Data breach at University of Hawaiʻi Cancer Center impacts 1.2 Million individuals

Wed Mar 04 2026

A ransomware attack on the University of Hawaiʻi Cancer Center exposed personal data of 1.2 million people. A 2025 ransomware attack targeting the University of Hawaiʻi Cancer Center compromised the personal information of about 1.2 million individuals. The attack hit the University of Hawaiʻi Cancer Center on August 31, 2025, impacting servers that support research […]

Security Affairs

Anthropic AI ultimatums and IP theft: The unspoken risk

Wed Mar 04 2026

Two recent high-profile events concerning Anthropic’s Claude AI underscore a little-discussed risk at the heart of the enterprise’s rush to capitalize on leading AI capabilities.

CSO Online

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Wed Mar 04 2026

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024. "Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments," Check Point said...

The Hacker News

How to know you’re a real-deal CSO — and whether that job opening truly seeks one

Wed Mar 04 2026

Recruiters of senior-level IT professionals often say that a truly skilled and experienced CSO is among the hardest of all IT roles to fill.

CSO Online

Facebook is experiencing a global outage

Tue Mar 03 2026

Facebook is experiencing a global outage since 4:15 PM ET, with users reporting they cannot access their accounts. Facebook users worldwide report problems while attempting to access their accounts. The outage started around 4:15 PM ET. Upon attempting to access their account, users are presented the following message: “Account Temporarily Unavailable. Your account is currently unavailable due […]

Security Affairs

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

Wed Mar 04 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an...

The Hacker News

AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning

Wed Mar 04 2026

AI is making it ever easier for bad actors to launch attacks, and a newly-identified open source platform, CyberStrikeAI, seems to be lowering the bar even further.

CSO Online

A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

Tue Mar 03 2026

A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.

Wired

Ariomex, Iran-based crypto exchange, suffers data leak

Tue Mar 03 2026

Resecurity says Iran’s Ariomex crypto exchange suffered a data leak exposing user and transaction data from 2022 to 2025. Resecurity (USA) reports that Ariomex’s database, one of Iran’s cryptocurrency exchange platforms, suffered a data leak. The report published by the cybersecurity company presents the findings of a structured analysis of the leaked database, which contains […]

Security Affairs

Oracle EBS 2025 campaign impacts Madison Square Garden, sensitive data leaked

Tue Mar 03 2026

Madison Square Garden confirmed a data breach tied to the 2025 Oracle E-Business Suite hacking campaign. Madison Square Garden (MSG) has confirmed it was affected by a data breach linked to the 2025 cybercrime campaign targeting Oracle’s E-Business Suite (EBS) customers. Madison Square Garden (MSG) is a world-famous multi-purpose indoor arena located in New York […]

Security Affairs

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Tue Mar 03 2026

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from...

The Hacker News

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Tue Mar 03 2026

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode SOC performance over time. The Paradox at the Gate:...

The Hacker News

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

Tue Mar 03 2026

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new findings come from Team Cymru, which detected its use following an analysis of the IP address ("212.11.64[.]250") that was used by the suspected...

The Hacker News

Phishing campaign exploits OAuth redirection to bypass defenses

Tue Mar 03 2026

Microsoft researchers warn that threat actors abuse OAuth redirects to target government users and deliver malware. Microsoft has warned of phishing campaigns targeting government and public-sector organizations by abusing OAuth URL redirection. Instead of stealing credentials or exploiting software flaws, attackers leverage OAuth’s legitimate by-design behavior to bypass email and browser defenses. The tactic redirects […]

Security Affairs

OAuth phishers make ‘check where the link points’ advice ineffective

Tue Mar 03 2026

Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication protocol to redirect victims to malware, using links that point to legitimate identity provider domain

CSO Online

Jetzt Staats-CISO werden – für unter 160.000 Euro

Tue Mar 03 2026

width="1600" height="900" sizes="auto, (max-width: 1600px) 100vw, 1600px">Das britische Government Communications Headquarters (GCHQ) in Cheltenham, England.

CSO Online

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged

Tue Mar 03 2026

The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This is already showing up in production...

The Hacker News

Android devices hit by exploited Qualcomm flaw CVE-2026-21385

Tue Mar 03 2026

Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks. Google has confirmed that CVE-2026-21385 (CVSS score of 7.8), a high-severity vulnerability affecting an open-source Qualcomm component used in Android devices, has been actively exploited. “There are indications that CVE-2026-21385 may be under limited, targeted exploitation.” reads Google’s advisory. The flaw is […]

Security Affairs

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Tue Mar 03 2026

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand's real URL. It also lets...

The Hacker News

Studie: Hacker legen Betrieb bei vielen Unternehmen lahm

Tue Mar 03 2026

Hacker hatten auch 2025 deutsche Unternehmen im Visier.

CSO Online

Epic Fury introduces new layer of enterprise risk

Tue Mar 03 2026

Operation Epic Fury — the US administration’s sustained kinetic pressure on core Iranian regime assets — introduces a new layer of operational risk for every multinational with people, assets, or depe

CSO Online

Chrome security flaw enabled spying via Gemini Live assistant

Tue Mar 03 2026

A Google Chrome vulnerability lets malicious extensions hijack Gemini Live to spy on users and steal sensitive files. Researchers at Palo Alto Networks found a Chrome vulnerability, tracked as CVE-2026-0628, that could let malicious extensions take control of the Gemini Live AI assistant. By abusing the flaw, attackers could spy on users and exfiltrate sensitive […]

Security Affairs

How Journalists Are Reporting From Iran With No Internet

Tue Mar 03 2026

After strikes killed senior Iranian officials, Iran cut off internet access. Journalists are relying on satellite links, encrypted apps, and smuggled footage to report from inside the country.

Wired

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Tue Mar 03 2026

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described...

The Hacker News

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Tue Mar 03 2026

Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component. "Memory corruption when adding user-supplied data without checking available buffer space," Qualcomm said in an advisory,...

The Hacker News

7 factors impacting the cyber skills gap

Tue Mar 03 2026

Individuals with strong cybersecurity skills are in high demand.

CSO Online

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

Tue Mar 03 2026

The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as BurrowShell and a Rust-based...

The Hacker News

Das gehört in Ihr Security-Toolset

Tue Mar 03 2026

Lesen Sie, welche Werkzeuge essenziell sind, um Unternehmen gegen Cybergefahren abzusichern.

CSO Online

Middle east crisis prompts UK NCSC warning on potential Iranian cyber activity

Mon Mar 02 2026

UK’s NCSC warns of potential Iranian cyberattacks as Middle East tensions rise, urging vigilance from exposed organizations. The UK’s National Cyber Security Centre (NCSC) has warned organizations of a potential increase in Iranian cyber threats amid the escalating Middle East conflict. While it sees no immediate shift in the direct threat to Britain, officials stress […]

Security Affairs

Vulnerability monitoring service secures public-sector websites faster

Mon Mar 02 2026

An automated scanning system has cut the time it takes to fix cybersecurity vulnerabilities across public sector IT systems, reducing median remediation time for general cyber vulnerabilities from 53

CSO Online

Attacks on GPS Spike Amid US and Israeli War on Iran

Mon Mar 02 2026

New analysis shows that attacks on satellite navigation systems have impacted some 1,100 ships in the Middle East since the US and Israel attacked Iran on February 28.

Wired

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Mon Mar 02 2026

Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system. The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of insufficient policy enforcement in the WebView tag. It was patched by Google in early January 2026...

The Hacker News

Russia-linked APT28 exploited MSHTML zero-day CVE-2026-21513 before patch

Mon Mar 02 2026

Russia-linked APT28 reportedly exploited MSHTML zero-day CVE-2026-21513 before Microsoft patched it, a high-severity bypass flaw. Akamai reports that Russia-linked APT28 may have exploited CVE-2026-21513 CVSS score of 8.8), a high-severity MSHTML vulnerability (CVSS 8.8), before Microsoft patched it in February 2026. The vulnerability is an Internet Explorer security control bypass that can lead to code […]

Security Affairs

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

Mon Mar 02 2026

Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers. "To ensure the scalability and efficiency of the ecosystem, Chrome has no immediate plan to add traditional X.509 certificates containing post-quantum cryptography to the Chrome Root Store," the Chrome Secure Web and Networking Team said. "...

The Hacker News

War in Iran Spiked Oil Prices. Trump Will Decide How High They Go

Mon Mar 02 2026

The conflict in the Middle East is driving oil prices up in a midterm year when Americans are already focused on high energy bills.

Wired

⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Mon Mar 02 2026

This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control, exposed keys, and normal features are being used as entry points. The pattern becomes clear only when you see everything together. Faster scans, smarter misuse of trusted services, and steady...

The Hacker News

APT37 combines cloud storage and USB implants to infiltrate air-gapped systems

Mon Mar 02 2026

North Korea-linked APT 37 used Zoho WorkDrive and USB malware to breach air-gapped networks in the Ruby Jumper campaign. North Korean group ScarCruft (aka APT37, Reaper, and Group123) deployed new tools in a campaign dubbed Ruby Jumper, using a backdoor that leverages Zoho WorkDrive for C2 and a USB-based implant to breach air-gapped systems. Zscaler ThreatLabz […]

Security Affairs