3/30/2026

European Commission Confirms Data Breach After europa.eu Hack

European Commission Downplays ShinyHunters Cyberattack Impact

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

State Department Reissues $10 Million Reward for Info on Iranian Hackers

ICO Fines UK Nuisance Call Scammers £100,000

Russian Court Sentences Notorious Card Fraud Ringleader ‘Flint’ and 25 Associates

Italian Regulator Fines Financial Giant $36 Million for Data Protection Failures

Microsoft Pulls KB5079391 Windows Update Over Install Issues
Healthcare Tech Firm CareCloud Says Hackers Stole Patient Data

Liberal Unified School District 480 (KS) Reports Computer Hack

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection

New RoadK1ll WebSocket Implant Used to Pivot on Breached Networks

Critical Fortinet Forticlient EMS Flaw Now Exploited in Attacks

OpenAI Patches ChatGPT Flaw That Smuggled Data Over DNS

Apple Adds macOS Terminal Warning to Block ClickFix Attacks

3/27-29/2026

Iran-Linked Hackers Breach FBI Director’s Personal Email, Publish Photos and Documents

Iran War Drives Urgent Need to Counter Underwater Attack Drones

Latvia Accuses Russia of of Unorthodox Disinformation Campaign Targeting Baltic States

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google

Dutch Court Threatens zAI With Fines Over Grok’s Nonconsensual Nude Images

European Parliament Rejects Extension of CSAM Scanning Rules for Tech Platforms

Anti-Piracy Coalition Takes Down AnimePlay App With 5 Million Users

Cybersecurity Stocks Fall on Report Anthropic Is Testing a Powerful New Model
European Commission Investigating Breach After Amazon Cloud Account Hack

Dutch Police Discloses Security Breach After Phishing Attack

Rocky Mountain Care Discloses Data Breach Following Ransomware Attack

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

Fake VS Code Alerts on GitHub Spread Malware to Developers

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites

3/26/2026

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

Iran-Linked Pay2Key Ransomware Group Re-Emerges

Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies With Custom Ransomware

Indian Government Probes CCTV Espionage Operation Linked to Pakistan

Using a VPN May Subject You to NSA Spying

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

A $20 Billion Crypto Scam Market Xinbi Guarantee Faces a New Government Crackdown

U.S. Official Accuses China of Supporting, Exploiting Cyber Scam Crisis in Southeast Asia

Suspected RedLine Infostealer Malware Admin Extradited to U.S.

Brit Lawmaker Targeted by AI Deepfake Fails to Get Answers From U.S. Big Tech

EU Investigating Snapchat and Pornography Sites in Child Safety Crackdown
Ajax Football Club Hack Exposed Fan Data, Enabled Ticket Hijack

TikTok for Business Accounts Targeted in New Phishing Campaign

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in Recent Mass Attacks

Supply Chain Attack Hits Widely-Used AI Package, Risks Impacting Thousands of Companies

CISA: New Langflow Flaw Actively Exploited to Hijack AI Workflows

Attackers Rapidly Weaponize Critical Oracle WebLogic RCE, Honeypot Study Finds

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

GitHub Adds AI-Powered Bug Detection to Expand Security Coverage

Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

3/25/2026

UK Cyber Chief Urges ‘Full Court Press’ to Counter Rising Cyber Threats

CISA’s Acting Chief Warns Shutdown Is Increasing Cyber Risks, Causing Resignations

When Satellite Data Becomes a Weapon

Iranians Don’t Have a Missile Alert System, So Volunteers Built Their Own Warning Map

Cloud Phones Linked to Rising Financial Fraud Threat

Fake X-Rays Created by AI Fool Radiologists and Even AI Itself

Meta and YouTube Lose Landmark Social-Media Addiction Trial

Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
Puerto Rico Government Agency Cancels Driver’s License Appointments After Cyberattack

Ransomware Attack Disrupts Operation at Major Spanish Fishing Port

New Torg Grabber Infostealer Malware Targets 728 Crypto Wallets

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Bubble AI App Builder Abused to Steal Microsoft Account Credentials

AI Supply Chain Attacks Don’t Even Require Malware…Just Post Poisoned Documentation

PTC Warns of Imminent Threat from Critical Windchill, FlexPLM RCE Bug

TP-Link Warns Users to Patch Critical Router Auth Bypass Flaw

Kali Linux 2026.1 Released with 8 New Tools, New BackTrack Mode

Blame Game: Why Public Cyber Attribution Carries Risks

3/24/2026

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

Iran-Linked Ransomware Gang Targeted U.S. Healthcare Org Amid Military Conflict

Stryker Says Malware Was Involved in Recent Cyberattack as Production Lines Reopen

DarkSword: Someone Has Publicly Leaked an Exploit Kit That Can Hack Millions of iPhones

Your Body Is Betraying Your Right to Privacy

‘Your Data Will Be Used Against You’: Author of New Book on the Dangers of a Surveillance Society

U.S. Settles Social Media Censorship Case, Bars Agencies From Threatening Penalties

UK Pilot Program to Test Social Media Restrictions on Families Before Government Decides on Ban

Russian Initial Access Broker Handed 81-Month Sentence

Firefox Now Has a Free Built-in VPN with 50GB Monthly Data Limit

How a Large Bank Uses AI Digital Twins for Threat Hunting
Dutch Ministry of Finance Discloses Breach Affecting Employees

Infinite Campus Warns of Breach After ShinyHunters Claims Data Theft

HackerOne Discloses Employee Data Breach After Navia Hack

Crunchyroll Confirms Data Breach After Hacker Claims Unauthorized Access

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

New Npm ‘Ghost Campaign’ Uses Fake Install Logs to Hide Malware

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

PTC Warns of Imminent Threat From Critical Windchill, FlexPLM RCE Bug

Vibe Coding Could Reshape SaaS Industry and Add Security Risks, Warns UK Cyber Agency

3/23/2026

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

FBI Warns of Handala Hackers Using Telegram in Malware Attacks

Krebs: ‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A Mysterious Numbers Station Is Broadcasting Through the Iran War

U.S. Soldier Sentenced for Helping North Korean IT Workers

U.S. Regulator Bans Imports of New Foreign-Made Routers, Citing Security Concerns

High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports

Smooth Criminals Talking Their Way Into Cloud Environments, Google Says

U.S. Sentences Nigerian National to 7 Years in $6 Million Email Fraud Scheme

Russia-Linked Malware Operation Collapses After Security Failures, Developer’s Arrest

Online Crime Busts Are Teaching Hackers How to Avoid Getting Caught

Tycoon2FA Phishing Service Resumes Activity Post-Takedown
Crunchyroll Probes Breach After Hacker Claims to Steal 6.8m Users’ Data

Mazda Discloses Security Breach Exposing Employee and Partner Data

California-Based Semiconductor Testing Company Trio-Tech International Reports Ransomware Attack to SEC

Education Company Kaplan Reports Data Breach Impacting More Than 230,000

Hacker Walks Away With $24.5 Million After Breaching Resolv DeFi Platform

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

Most Cybersecurity Staff Don’t Know How Fast They Could Stop a Cyber-Attack on AI Systems

Claude Attacks Were ‘Rorschach Test’ for Infosec Community, Scaring Former NSA Boss

Google Unleashes Gemini AI Agents on the Dark Web

OpenAI Rolls Out ChatGPT Library to Store Your Personal Files and Images

3/20-22/2026

White House AI Plan Favors Speed Over New Rules

Private-Sector Role Clarified in Offensive U.S. Cyber Strategy

Ex-Data Analyst Stole Company Data in $2.5m Extortion Scheme

Musician Admits to $10M Streaming Royalty Fraud Using AI Bots

Krebs: Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

Police Take Down 373,000 Fake CSAM Sites in Operation Alice

FBI Takes Down Leak Sites Tied to Iran’s Ministry of Intelligence and Security

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online

A Top Democrat Is Urging Colleagues to Support Trump’s Spy Machine

Cryptographers Engage in War of Words Over RustSec Bug Reports and Subsequent Ban
Cyberattack on Vehicle Breathalyzer Company Intoxalock Leaves Drivers Stranded Across the U.S.

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Foster City (CA) Hit by Ransomware Attack, Plans to Declare State of Emergency

VoidStealer Malware Steals Chrome Master Key via Debugger Trick

Microsoft Azure Monitor Alerts Abused for Callback Phishing Attacks

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

Hackers Exploit Critical Langflow Bug in Just 20 Hours

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

AI Conundrum: Why Model Context Protocol (MCP) Security Can’t Be Patched Away

3/19/2026

Russian Hackers Exploit Zimbra Flaw in Ukrainian Gov’t Attacks

Bitrefill Blames North Korean Lazarus Group for Cyberattack

CISA Urges U.S. Orgs to Secure Microsoft Intune Systems After Stryker Breach

FBI Seizes Handala Data Leak Site After Stryker Cyberattack

Orthodox Jewish News Site Yeshiva World News Hacked After Threats of Iran Cyber Attack

Ransomware Affiliate Exposes Details of ‘The Gentlemen’ Operation

Jeff Bezos in Talks to Raise $100 Billion for AI Manufacturing Fund

Signal’s Creator Is Helping Encrypt Meta AI

U.S. Intel Chiefs Urge Lawmakers to Extend Section 702 Surveillance Power Without Changes

Google Gives Android Users a Way to Install Unverified Apps if They Prove They Really, Really Want To
Navia Discloses Data Breach Impacting 2.7 Million People

Aura Confirms Data Breach Exposing 900,000 Marketing Contacts

Financial Brands Targeted in Global Mobile Banking Malware Surge

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

C2 Implant ‘SnappyClient’ Targets Crypto Wallets

54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Unknown Attackers Exploit Yet Another Critical Sharepoint Bug

New ‘PolyShell’ Flaw Allows Unauthenticated RCE on Magento e-Stores

Max Severity Ubiquiti Unifi Flaw May Allow Account Takeover

3/18/2026

Thank you for reading our 1,500th post!

Russia-Linked Hackers UNC6353 Use Advanced iPhone Exploit to Target Ukrainians

DarkSword: Hackers Can Raid iOS 18 With an Infected Link

Israel Is Hunting Down Iranian Regime Members in Their Hideouts, One by One

Israel Behind ‘Highly Accurate’ Cyber Attack on Iranian Port

Greek Firms Scan Computer Systems as Iran War Raises Cyberattack Risks

CISA Official Says Agency Has Not Seen Uptick in Cyber Threats Amid Iran War

North Korea’s 100,000-Strong Fake IT Worker Army Rake in $500M a Year for Kim Jong Un

Crypto E-Commerce Platform Bitrefill Accuses North Korea of Stealing 18,500 Purchase Records

Crypto Scam “ShieldGuard” Dismantled After Malware Discovery

Moscow Seeks to Limit Internet to State-Approved Websites Amid Ongoing Outages
Marquis: Ransomware Gang Stole Data of 672K People in Cyberattack

Nordstrom’s Email System Abused to Send Crypto Scams to Customers

Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

CISA Orders Feds to Patch Zimbra XSS Flaw Exploited in Attacks

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

ConnectWise Patches New Flaw Allowing ScreenConnect Hijacking

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure

Users Hate It, but Age-Check Tech Is Coming: Here’s How It Works

3/17/2026

U.S. Cyber Assault on Iran Before Bombing Hasn’t Stopped Hackers

Stryker Says Cyberattack on Its Network Contained

Stryker Says It’s Restoring Systems After Pro-Iran Hackers Wiped Thousands of Employee Devices

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware

Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears

EU Sanctions Iranian Cyber Front Over Election Meddling, Charlie Hebdo Breach

Europe Sanctions Chinese and Iranian Firms for Cyberattacks

Russia Is Sharing Satellite Imagery and Drone Technology With Iran

How World ID Wants to Put a Unique Human Identity on Every AI Agent

Finance Bros to Tech Bros: Don’t Mess With My Bloomberg Terminal

Georgia Man Charged for Robbing NBA, NFL Players Through Stolen Apple Account Details

Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026
Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web

Medusa Ransomware Gang Claims Attacks on Prominent Mississippi Hospital, New Jersey County

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

GlassWorm Malware hits 400+ Code Repos on GitHub, npm, VSCode, OpenVSX

Warlock Ransomware Group Augments Post-Exploitation Activities

Android OS-Level Attack Bypasses Mobile Payment Security

New Font-Rendering Trick Hides Malicious Commands From AI Tools

Researchers Disclose Vulnerabilities in IP KVMs From Four Manufacturers

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

‘CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

Energy Department Set to Release Its First-Ever Cyber Strategy

3/16/2026

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage

EU Sanctions Chinese and Iranian Companies for Cyber Attacks

Stryker Attack Wiped Tens of Thousands of Devices, No Malware Needed

Stryker Says Hospital Tools Are Safe, but Digital Ordering Systems Still Down After Cyberattack

Cybercrime Has Skyrocketed 245% Since the Start of the Iran War

‘100 Video Calls per Day’: Models Are Applying to Be the Face of AI Scams

OpenAI’s Bid to Allow X-Rated Talk Is Freaking Out Its Own Advisers

OpenAI Says ChatGPT Ads Are Not Rolling Out Globally for Now
Firms Urged to Check if Other Users Edited Their Data on Companies House

Cyberattack Disrupts Parking Payments in Russian City

Researchers Warn of Global Surge in Fake Shipment Tracking Scams

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

CISA Flags Wing FTP Server Flaw as Actively Exploited in Attacks

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

Luxembourg Court Overturns $858 Million Privacy Fine Against Amazon

SEC Prepares Proposal to Eliminate Quarterly Reporting Requirement

3/13-15/2026

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

Poland’s Nuclear Research Centre Targeted by Cyberattack

Cyberwarfare Puts Civilian Businesses at Risk

What Does the Iran War Mean for the Threat of Attacks in the U.S.? Here’s What Experts Say

Rogue AI Agents Can Work Together to Hack Systems and Steal Secrets

Trump Administration Set to Receive $10 Billion Fee for Brokering TikTok Deal

Interpol’s ‘Operation Synergia III’ Nets 94 Arrests in Major Cybercrime Sweep

FBI Seeks Victims of Steam Games Used to Spread Malware

European Council Includes Ban on Nudification Tools in Its Proposal for Amending AI Act

Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026

Betterleaks, a New Open-Source Secrets Scanner to Replace Gitleaks
Canadian Retail Giant Loblaw Notifies Customers of Data Breach

Starbucks Discloses Data Breach Affecting Hundreds of Employees

Fake Enterprise VPN Sites Used to Steal Company Credentials

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

AppsFlyer Web SDK Hijacked to Spread Crypto-Stealing JavaScript Code

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8

Microsoft Releases Windows 11 OOB Hotpatch to Fix RRAS RCE Flaw

A CEO’s Hack: Ask AI for A Performance Review

3/12/2026

Stryker Tells SEC That Timeline for Recovery From Cyberattack Unknown

Stryker Cyberattack Adds to Fears of New Front in Iran War

How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks

What Role Has Cyber Warfare Played in Iran?

New Data Shows Increase in FBI Searches of Americans’ Data Last Year

U.S. Lawmakers Move to Kill the FBI’s Warrantless Wiretap Access

Police Scotland Fined After Sharing Victim’s Phone Data

U.S. Charges Another Ransomware Negotiator Linked to BlackCat Attacks

Operation Lightning Takes Down SocksEscort Proxy Network Blamed for Tens of Millions in Fraud

U.S. Sanctions North Korea IT Worker Networks in Laos, Vietnam

China’s CERT Warns OpenClaw Can Inflict Nasty Wounds

Israeli Cyber Firm Onyx Security Launches Operations With $40 Million Funding Round

UK Regulators Demand Social Media Platforms Make It Harder for Kids Under 13 to Access Sites
Lloyds, Bank of Scotland and Halifax Apps Showed Customers Other Users’ Transactions

Telus Says It Is Investigating Hack of Its Systems

England Hockey Investigating Ransomware Data Breach

INC Ransomware Group Holds Healthcare Hostage in Oceania

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

PixRevolution Malware Hijacks Brazil’s PIX Transfers in Real Time

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Veeam Warns of Critical Flaws Exposing Backup Servers to RCE Attacks

Google Paid $17.1 Million for Vulnerability Reports in 2025

3/11/2026

Krebs: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Iran Plots ‘Infrastructure Warfare’ Against Multiple U.S. Tech Giants

Iran-Linked Hackers Claim Cyberattack on Albania’s Parliament Email Systems

Iranian Influence Operation Using Fake Personas to Deceive U.S. Instagram Users Disrupted, Meta Says

Meta Ramps up Efforts to Disrupt Industrialized Scamming

AI Cyber Startup Kai Raises $125 Million

Senators Propose Federal AI Commission Days After Anthropic Ban

Researchers Discover Major Security Gaps in LLM Guardrails

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Foreign Hacker in 2023 Compromised Epstein Files Held by FBI, Source and Documents Show
238,000 Impacted by Bell Ambulance Data Breach

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

New Phantomraven npm Attack Wave Steals Dev Data via 88 Packages

Xygeni GitHub Action Compromised Via Tag Poison

SQLi Flaw in Elementor Ally Plugin Impacts 250k+ WordPress Sites

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

Krebs: Microsoft Patch Tuesday, March 2026 Edition

France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025

Cyber-Attacks on UK Firms Increase at Four Times Global Rate

WhatsApp Introduces Parent-Managed Accounts for Pre-Teens

3/10/2026

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

Finnish Intelligence Warns of Persistent Cyber Espionage From Russia, China

Israeli Cyber Authority Uses AI to Mock Iranian Hackers, Counter Psychological Warfare

Cybercrime Isn’t Just a Cover for Iran’s Government Goons – It’s a Key Part of Their Operations

GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps

Signal Issues Scam Warning to Users After Hackers Target Officials

Your Data Has Been Breached! (And This Notice Is a Scam!)

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds

U.S. Judiciary to Fast-Track Court Records System Upgrade After Hacking

Meta Acquires AI Agent Social Network Moltbook

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

Microsoft Brings Phishing-Resistant Windows Sign-Ins via Entra Passkeys
KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

New BeatBanker Android Malware Poses as Starlink App to Hijack Devices

New ‘BlackSanta’ EDR Killer Spotted Targeting HR Departments

Crooks Compromise WordPress Sites to Push Infostealers via Fake CAPTCHA Prompts

New ‘Zombie ZIP’ Technique Lets Malware Slip Past Security Tools

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

HPE Warns of Critical AOS-CX Flaw Allowing Admin Password Resets

Critical Microsoft Excel Bug Weaponizes Copilot Agent for Zero-Click Information Disclosure Attack

UK Plans to Shift Fraud Fight Onto Telecoms, Tech Companies

Rudd Confirmed to Head NSA, Cyber Command After Near Year-Long Vacancy

3/9/2026

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

Dutch Gov’t Warns of Russian Signal, WhatsApp Account Hijacking Attacks

Krebs: How AI Assistants are Moving the Security Goalposts

AI vs AI: Agent Hacked McKinsey’s Chatbot and Gained Full Read-Write Access in Just Two Hours

FBI Warns of Phishing Attacks Impersonating U.S. City, County Officials

UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source

White House Floats Victims Restoration Program for Millions Affected by Cyber Fraud

New White House Cyber Strategy Pledges to Ease Regulations, ‘Impose Costs’ on Bad Actors

CrowdStrike Sues Rival AiStrike for Trademark Infringement
ShinyHunters Claims More High-Profile Victims in Latest Salesforce Customers Data Heist

Ericsson U.S. Discloses Data Breach After Service Provider Hack

Ontario Health Agency Vendor Suffered Major Ransomware Attack in 2025

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Microsoft Teams Phishing Targets Employees With A0Backdoor Malware

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Google: Cloud Attacks Exploit Flaws More Than Weak Credentials

Are We Ready for Auto Remediation With Agentic AI?

Trump Nominee Lt. Gen. Joshua Rudd to Lead Cyber Command, NSA Clears Key Senate Hurdle

3/6-8/2026

FBI Investigates Breach of Surveillance and Wiretap Systems

China Suspected in Breach of FBI Surveillance Network

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

Mojtaba Khamenei to Succeed His Father as Iran’s Supreme Leader

Iran Internet Blackout Reaches 6th Day as Rights Groups Call for End to Digital Shutdown

The Future of Iran’s Internet Is More Uncertain Than Ever

Iran’s MuddyWater Hackers Hit US Firms with New ‘Dindoor’ Backdoor

White House Publishes Long-Awaited Cybersecurity Strategy

Trump Signs Executive Order Aimed at Cybercrime Gangs

CBP Used Online Ad Data to Track Phone Locations

Online Age-Verification Tools Spread Across U.S. For Child Safety, but Adults Are Being Surveilled

Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester

Palantir Rallies 15% for the Week as Iran War Boosts Prospects, Muting Anthropic Concern

AI Agents Now Help Attackers, Including North Korea, Manage Their Drudge Work

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

EU Court Adviser Says Banks Must Immediately Refund Phishing Victims

Ghanain Man Pleads Guilty to Role in $100 Million Fraud Ring
TfL Hack in 2024 Affected Around 10 Million People, BBC Can Reveal

DeKalb County (IN) Officials Release Data Breach Notice to Residents

Tennis Player Shares Threats Sent to Personal Phone, WTA Tour Says No Breach of Private Data

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

Bing AI Promoted Fake OpenClaw GitHub Repo Pushing Info-Stealing Malware

Fake Claude Code Install Guides Push Infostealers in InstallFix Attacks

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

Termite Ransomware Breaches Linked to ClickFix CastleRAT Attacks

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Hackers Abuse .arpa DNS and ipv6 to Evade Phishing Defenses

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA Warns Feds to Patch iOS Flaws Exploited in Crypto-Theft Attacks

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

Ransomware’s New Target: The Systems Built to Recover From It

Indonesia to Ban Children Under 16 From Social Media

3/5/2026

Israel Says It Knocked Out Iran’s Cyber Warfare Headquarters

How Israel’s Cyber Chief Is Navigating Through the Dystopian Cyber-AI Period

Iran’s Pro-Regime Hackers Cannot Back Up Their Claims of Successful Cyber Attacks

How a Music Streaming CEO Built an Open-Source Global Threat Map in His Spare Time

Trump, Bondi Face Lawsuit Over Approval of ByteDance TikTok U.S. Asset Sale

Police Dismantles Online Gambling Ring Exploiting Ukrainian Women

FBI Arrests Suspect Linked to $46M Crypto Theft From U.S. Marshals

62 People Indicted by Taiwanese Prosecutors Over Ties to Cyber Scam Company Prince Group

Phobos Ransomware Admin Pleads Guilty to Wire Fraud Conspiracy
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

Italian Prosecutors Confirm Journalist Was Hacked With Paragon Spyware

Passaic County (NJ) IT Systems Hacked as Officials Warn Other NJ Towns May Be Targeted

Wikipedia Hit by Self-Propagating JavaScript Worm That Vandalized Pages

ContextCrush Flaw Exposes AI Development Tools to Attacks

AI-Driven Insider Risk Now a “Critical Business Threat,” Report Warns

Cisco Flags More SD-WAN Flaws as Actively Exploited in Attacks

WordPress Membership Plugin Bug Exploited to Create Admin Accounts

Google Says 90 Zero-Days Were Exploited in Attacks Last Year

3/4/2026

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

Spyware-Grade Coruna iOS Exploit Kit Now Used in Crypto Theft Attacks

Kaspersky Dismisses Claims Coruna iPhone Exploit Kit Is Connected to NSA-Linked Operation

Anthropic ‘Made a Mistake’ in Pentagon Talks and Should ‘Correct Course,’ FCC Boss Says

U.S. and EU Police Shut Down LeakBase, a Site Accused of Sharing Stolen Passwords and Hacking Tools

Microsoft Helps Bust Global Hacking Service Tycoon 2FA
Mississippi Medical Center Reopens Clinics Hit by Ransomware Attack

Hacker Mass-Mails HungerRush Extortion Emails to Restaurant Patrons

Fake LastPass Support Email Threads Try to Steal Vault Passwords

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Cisco Warns of Max Severity Secure FMC Flaws Giving Root Access

Mail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

Bitwarden Adds Support for Passkey Login on Windows 11

Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows

Stranger Things Meets Cybersecurity: Lessons from the Hive Mind

3/3/2026

Hack of Cameras, AI Use: Wide Cyberattack on Iran Preceded Khamenei Killing

Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Iranian Drone Strikes Hit Amazon Data Centers in Gulf, Disrupting Cloud Services

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

The Lead U.S. Cyber Agency Is Stretched Thin as Iran Hacking Threat Escalates

Cyberwarriors Elevated to Big Leagues in U.S. War With Iran

U.S. Banks on High Alert for Cyberattacks as Iran War Escalates

A Possible U.S. Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals

How Journalists Are Reporting From Iran With No Internet

With Developer Verification, Google’s Apple Envy Threatens to Dismantle Android’s Open Legacy

Western Allies Form 6G Security Coalition Amid Tech Rivalry With China

Google Urges Supreme Court to Strike Down Geofence Warrants as Unconstitutional
LexisNexis Confirms Data Breach as Hackers Leak Stolen Files

Paint Maker Giant AkzoNobel Confirms Cyberattack on u.s. Site

Star Citizen Game Dev Discloses Breach Affecting User Data

Until Last Month, Attackers Could’ve Stolen Info From Perplexity Comet Users Just by Sending a Calendar Invite

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

AI and Deepfakes Supercharge Sophisticated Cyber-Attacks, Says Cloudflare

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Google Chrome Shifts to Two-Week Release Cycle for Increased Stability

Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks

Half of U.S. CISOs Work the Equivalent of a Six-Day Week

Chat at Your Own Risk! Data Brokers Are Selling Deeply Personal Bot Transcripts

Turns Out Most Cybercriminals Are Old Enough to Know Better

California Fines National High School Ticketing Platform $1.1 Million for Privacy Violations

3/2/2026

Cyber Command Disrupted Iranian Comms, Sensors, Top General Says

Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel

UK Warns of Iranian Cyberattack Risks Amid Middle-East Conflict

Iran-Backed Hackers Aim for Economic Disruption

Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity

Attacks on GPS Spike Amid U.S. and Israeli War on Iran

Space Has Become ‘War-Fighting Domain’ as Militaries Race to Orbit, SES Chief Says

CyberStrikeAI Tool Adopted by Hackers for AI-Powered Attacks

Florida Woman Imprisoned for Massive Microsoft License Fraud Scheme

Alabama Man Pleads Guilty to Hacking, Extorting Hundreds of Women

German Court Convicts Alleged Mastermind Behind Global Investment Scam Network
Anthropic Confirms Claude Is Down in a Worldwide Outage Across All Platforms

Cyberattack Briefly Disrupts Russian Internet Regulator and Defense Ministry Websites

Russian Propaganda Network Uses ChatGPT to Plan Influence Operations in Africa

APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

Alleged India-Linked Espionage Campaign Targeted Pakistan, Bangladesh, Sri Lanka

Phish of the Day: Microsoft OAuth Scams Abuse Redirects for Malware Delivery

Fake Google Security Site Uses PWA App to Steal Credentials, MFA Codes

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Chrome Unveils Plan For Quantum-Safe HTTPS Certificates

2/27-3/1/2026

Iran’s Supreme Leader Ayatollah Ali Khamenei Killed in Major Attack by U.S. and Israel

Ahead of Strikes, Trump Was Told Iran Attack Is High Risk, High Reward

Israel Hacked Popular Iranian Prayer App to Urge Defections, Resistance

Hackers Hit Iranian Apps, Websites After U.S.-Israeli Strikes

Why the U.S. and Israel Struck When They Did: A Chance to Kill Iran’s Leaders

This Is the System That Intercepted Iran’s Missiles Over the UAE

The 5 Big ‘Known Unknowns’ of Donald Trump’s New War With Iran

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

CISA Is Getting a New Acting Director After Less Than a Year: Nick Andersen is Replacing Madhu Gottumukkala

New York State Elevates Its Cyber Chief to a Broader New Security Role

Krebs: Who is the Kimwolf Botmaster “Dort”?

‘Silent Failure at Scale’: The AI Risk That Can Tip the Business World Into Disorder

Data Broker Breaches Fueled Nearly $21 Billion in Identity-Theft Losses

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

Ukrainian Man Pleads Guilty to Running AI-Powered Fake ID Site

‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested

Intellexa Founder, Three Others Sentenced to 8 Years in Prison Over Greek Spyware Scandal

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams
South Korea’s Tax Office Apologizes for Leaking Seed Phrase to Seized Crypto

Personal Data Stolen in Ransomware Attack on Hong Kong’s Ngong Ping 360 Attraction

University of Hawaii Cancer Center Hack Exposed Social Security Numbers Of Up To 1.15 Million

North Korea’s APT37 Expands Toolkit to Breach Air-Gapped Networks

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

QuickLens Chrome Extension Steals Crypto, Shows ClickFix Attack

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

CISA Warns That RESURGE Malware Can Be Dormant on Ivanti Devices

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

UK Vulnerability Monitoring Service Cuts Unresolved Security Flaws by 75%

Microsoft Testing Windows 11 Batch File Security Improvements

EU Lawmakers Propose That Youth Under 16 Be Barred From Social Media Without Parental Consent

Instagram to Start Alerting Parents When Children Search for Terms Relating to Self-Harm

Life Mirrors Art: Ransomware Hits Hospitals on Television (TV) & In Real Life (IRL)

Samsung TVs to Stop Collecting Texans’ Data Without Express Consent