5/14/2026

ODNI Taps Officials to Coordinate Response to Foreign Election Threats

Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign

Iranian MuddyWater Hackers Targeted Major South Korean Electronics Maker

Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

Bank of Spain Calls for Access to Advanced AI Tools, Flags Cyber Risks

Apple’s Security Has Been Tough to Crack. Mythos Helped Find a Way In.

Your iPhone Gets Stolen. Then the Hacking Begins

Connected Cars Generate Data Enticing to Automakers and Hackers Alike

Nobody Believes the ‘Criminals and Scumbags’ Who Hacked Canvas Really Deleted Stolen Student Data

To Gain Root Access at This Company, All an Intruder Had to Do Was Ask Nicely

AI Models Are Getting Better at Replacing Cybersecurity Pros on Certain Tasks
OpenAI Confirms Security Breach in TanStack Supply Chain Attack

TeamPCP Hackers Advertise Mistral AI Code Repos for Sale

Foxconn Factories Resume Operations After Ransomware Attack

Surfside Beach (SC) Loses Over $500K in Cyber Scam, State Authorities Investigating

KongTuke Hackers Now Use Microsoft Teams for Corporate Breaches

Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets

Hackers Exploit Auth Bypass Flaw in Burst Statistics WordPress Plugin

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

New Fragnesia Flaw Hands Linux Local Users Root Access

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

Windows 11 and Microsoft Edge Hacked at Pwn2Own Berlin 2026

5/13/2026

Tech Rivalry, Distrust Sap Summit Hopes for Trump-Xi AI Push

China ‘Very Disappointed’ With Europe’s Planned Investment Restrictions, Diplomat Says

Vietnam to Develop Domestic Cloud So It Can Ditch Risky Overseas Operators for Government Workloads

Android Adds Intrusion Logging for Sophisticated Spyware Forensics

WhatsApp Adds Meta AI Chats That Are Built to Be Fully Private

AI-Driven Cyberattacks Will Start to Be the ‘New Norm’ in Months, Palo Alto Warns

Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers

UK Moves to Shield Security Researchers in Cybercrime Law Overhaul

DHS Plans Experiment Running ‘Reconnaissance’ Drones Along the U.S.-Canada Border

Alleged Dream Market Admin Arrested in Germany After U.S. Indictment
Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

Foxconn Confirms Cyberattack Claimed by Nitrogen Ransomware Gang

Avada Builder Flaws Expose One Million WordPress Sites

Microsoft Fixes BitLocker Recovery Issue Only for Windows 11 Users

Windows BitLocker Zero-Day Gives Access to Protected Drives, PoC Released

Microsoft Fixes Windows Autopatch Bug Installing Restricted Drivers

Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

Microsoft on Pace to Break Annual Vulnerability Record as AI-Driven Patch Wave Takes Hold

European Commission Head Pushes Creation of New Law Delaying Teens’ Social Media Access

5/12/2026

European Countries Are Exporting Surveillance Tech to Countries With Poor Human Rights Records, Report Says

Trump and XI Appear Intent on Keeping Iran War From Overshadowing China Summit

Iran Is Using Tiny ‘Mosquito’ Boats to Shut Down the Strait of Hormuz

Pentagon Deploys Anthropic’s Mythos to Patch Cyber Gaps While Planning to Ditch Firm

Anthropic’s Mythos Sends U.S. Banks Rushing to Plug Cyber Holes

OpenAI Just Released Its Answer to Claude Mythos

Honest: How AI Killed a 133-Year-Old Princeton Tradition

iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android

Android 17 to Expand Banking Scam Call and Privacy Protections

Signal Adds Security Warnings for Social Engineering, Phishing Attacks

Airbit Crypto Ponzi Victims Can Now Claim Slice of $400M Asset Haul

Congressman Launches Inquiry Into How Food Retailers Use Surveillance Pricing

20 Leaders Who Built the CISO Era: 2 Decades of Change
Foxconn Ransomware Attack Shows Nothing Is Safe Forever

Canvas Owner Reaches ‘Agreement’ With Hackers to Secure Stolen Data

Congress Investigates Canvas Breach as Company Pays Ransom

ŠKoda Warns of Customer Data Breach After Online Shop Hack

FleetWave Outage Takes Another Turn. Chevin Confirms Crooks Accessed Customer Data

West Pharmaceutical Warns of Ransomware Attack Impacting Business Operations

Attackers Combine ClickFix With PySoxy Proxying to Maintain Persistence

Mini Shai-Hulud Hits TanStack npm Packages

RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

Fortinet Warns of Critical RCE Flaws in FortiSandbox and FortiAuthenticator

SAP Fixes Critical Vulnerabilities in Commerce Cloud and S/4HANA

Microsoft Releases Windows 10 KB5087544 Extended Security Update

Krebs: Patch Tuesday, May 2026 Edition

5/11/2026

Trump’s Complaints About Iran War Leaks Prompt Aggressive DOJ Investigations

The U.A.E. Has Been Secretly Carrying Out Attacks on Iran

UK Water Company Allowed Hackers to Lurk Undetected for Nearly Two Years, Regulator Finds

U.S.: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates

Google Says Criminals Used AI-Built Zero-Day in Planned Mass Hack Spree

Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

Britain’s Bank Regulator Expects ‘Quite Significant Disruption’ From Latest AI Models

I Asked ChatGPT to Manage a Stock Portfolio. Here’s How It Did.

Cyber-Crime Increasingly Coming With Threats of Physical Violence

Texas Sues Netflix Over Alleged Data Practices That Create ‘Surveillance Machinery’ Without User Consent
TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack

BWH Hotels Guests Warned After Reservation Data Checks Out With Cybercrooks

A Million Baby Monitors and Security Cameras Were Easily Viewable by Hackers

Education Tech Giant Instructure Confirms Hackers Used Canvas Flaw to Deface Portals

TrickMo Variant Routes Android Trojan Traffic Through TON

New GhostLock Tool Abuses Windows API to Block File Access

cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor

Rushed Patches Follow Broken Embargo on New Linux Kernel Vulnerabilities

Anthropic’s Bug-Hunting Mythos Was Greatest Marketing Stunt Ever, Says cURL Creator

Tech & Security Controls Can’t Stop These Threats — Only Your People Can

5/8-10/2026

Pro-Ukraine BO Team and Head Mare Hackers Appear to Team Up in Attacks Against Russia

Operation Epic Fury Exposes Security Detection Gaps in Oil and Gas Sector

Krebs: Canvas Breach Disrupts Schools & Colleges Nationwide

The Canvas Hack Is a New Kind of Ransomware Debacle

Disrupts Final Exams

Meet Rassvet, Russia’s Answer to Starlink

Worm Rubs Out Competitor’s Malware, Then Takes Control

Former Gov’t Contractor Convicted for Wiping Dozens of Federal Databases

Kingdom Market Administrator Given 16-Year Sentence

Police Shut Down Reboot of Crimenetwork Marketplace, Arrest Admin

Meta U-Turns on Encryption Push for Instagram as DMs Go Plaintext

GM to Pay Over $12 Million in California Privacy Settlement Involving Driver Data

Has CISA Finally Found Its New Leader in Tom Parker?

JD Vance Holds AI Wake-Up Call With Tech CEOs After Hacking Powers Unleashed

How the Story of a USB Penetration Test Went Viral
AWS Data Center Outage Hits Trading on Fanduel, Coinbase — Recovery to Take Hours

Zara Data Breach Exposed Personal Information of 197,000 People

NVIDIA Confirms GeForce NOW Data Breach Affecting Armenian Users

New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms

JDownloader Site Hacked to Replace Installers with Python RAT Malware

Hackers Abuse Google Ads, Claude.ai Chats to Push Mac Malware

Fake OpenAI Repository on Hugging Face Pushes Infostealer Malware

Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

Dirty Frag Vulnerability Made Public Early: Root Privilege on All Distributions

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

CISA Gives Feds Four Days to Patch Ivanti Flaw Exploited as Zero-Day

5/7/2026

Polish Intelligence Warns Hackers Attacked Water Treatment Control Systems

OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos

Thousands of Vibe-Coded Apps Expose Corporate and Personal Data on the Open Web

Cline Kanban Flaw Lets Websites Hijack AI Coding Agents

Anthropic Response to 1-Click Pwn: Shouldn’t Have Clicked ‘Ok’

You Can Disable Gemini in Chrome if It’s Freaking You Out

EU Countries, Lawmakers Clinch Provisional Deal on Watered-Down AI Rules

A Hacker Ran Me Over With a Robot Lawn Mower

Legacy Security Tools Are Failing Data Protection, Capital One Software Report Finds

Fake IT Workers Rented Laptops to Nork Scammers, Got Prison Time

$250M Crypto-Robbing Gang’s Dirty Work Guy Sentenced to 6.5 Years Behind Bars

North Carolina Man Pleads Guilty to Doxxing Supreme Court Justices
Hackers Deface Canvas School Login Pages After Claiming Another Instructure Hack

Massive Cyber Attack Hits Entire San Diego Community College District

Australia Warns of ClickFix Attacks Pushing Vidar Stealer Malware

Researchers Spot Uptick in Use of Vercel for Phishing Campaigns

Fake Claude AI Site Drops Beagle Backdoor on Windows Users

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

Palo Alto Networks Firewall Zero-Day Exploited for Nearly a Month

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Argentina to Expel Russian Citizen Suspected of Running Disinformation Network in Latin America

5/6/2026

Iran-Linked APT MuddyWater Posed as Chaos Ransomware Member in Espionage Campaign

EU Plan to Phase Out Chinese Tech Could Cost Bloc Over $400 Billion, Chinese Study Says

Security Cameras Are Failing Spectacularly at Common Sense

Hackers Hate AI Slop Even More Than You Do

One in Eight Workers Has Sold Their Corporate Logins

CISA Urges Critical Infrastructure Providers to Make Plans to Remain Operational if hit by Cyber-Attack

Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks
DAEMON Tools Devs Confirm Breach, Release Malware-Free Version

New Stealthy Quasar Linux Malware Targets Software Developers

Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks

Hackers Abuse Google Ads for GoDaddy ManageWP Login Phishing

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Critical vm2 Sandbox Bug Lets Attackers Execute Code on Hosts

New Cisco DoS Flaw Requires Manual Reboot to Revive Devices

5/5/2026

China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions

North Korean APT ScarCruft Targets Yanbian Gamers via Trojanized Platform

Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says

States Concerned Over Access to Frontier AI Model Pilots

AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed to Cyber Risk

Researchers Gaslit Claude Into Giving Instructions to Build Explosives

Student Hacked Taiwan High-Speed Rail to Trigger Emergency Brakes

Karakurt Extortion Gang ‘Cold Case’ Negotiator Gets 8.5 Years in Prison

Romance Scammers Turn Sweet Talk Into £102M Payday

FTC to Ban Data Broker Kochava From Selling Americans’ Location Data

Australia Launches Cyber Review Board Modeled on Version Disbanded in U.S.
Real Estate Giant Cushman & Wakefield Confirms Vishing Incident as ShinyHunters and Qilin Both Come Knocking

ShinyHunters Claims Dump Puts 119K Vimeo Emails in the Wild

Instructure Hacker Claims Data Theft From 8,800 Schools, Universities

Microsoft Flags Mass Phishing Campaign Using Fake Compliance Emails

CloudZ Malware Abuses Microsoft Phone Link to Steal SMS and OTPs

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

Google Now Offers up to $1.5 Million for Some Android Exploits

German Officials Advance Legislation That Would Expand Law Enforcement Use of Surveillance Technology

5/4/2026

Itron Hackers Accessed Critical Infrastructure Operators

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

If the Vote You Rocked, Your Personal Info Can Be Grokked

EU Recommends Member States to Not Use Huwaei, ZTE in Connectivity Infrastructure

White House Considers Vetting AI Models Before They Are Released

ChatGPT Wrestles With Its Most Chilling Conversation: How Do I Plan an Attack?

You Have No Idea How Much You Still Use BlackBerry

DHS Demanded Google Surrender Data on Canadian’s Activity, Location Over Anti-ICE Posts

Forbes Preliminarily Agrees to Pay $10 Million to Settle California Wiretapping Lawsuit
Ransomware Group Claims Breach of Pro-Orbán Hungarian Media Firm

Instructure Confirms Data Breach, ShinyHunters Claims Attack

Hanover County Schools Confirms Data Breach Incident

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

Amazon SES Increasingly Abused in Phishing to Evade Detection

Backdoored PyTorch Lightning Package Drops Credential Stealer

Weaver E-Cology Critical Bug Exploited in Attacks Since March

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

CISA Says ‘Copy Fail’ Flaw Now Exploited to Root Linux Systems

Kids Say They Can Beat Age Checks by Drawing on a Fake Mustache

5/1-3/2026

Ubuntu Infrastructure Has Been Down for More Than a Day

Ubuntu Services Hit by Outages After DDoS Attack

Pro-Iran Crew turns DDoS into Shakedown as Ubuntu.com Stays Down

Cyber Spies Target Russian Aviation Firms to Steal Satellite and GPS Data

U.S. Officials Weigh Cutting Deadlines to Fix Digital Flaws Amid Worries Over AI-Powered Hacking, Sources Say

British Cyber Agency Warns of Looming ‘Patch Wave’ as AI Speeds Flaw Discovery

Brace for the Patch Tsunami: AI Is Unearthing Decades of Buried Code Debt

GPT-5.5 Matches Heavily Hyped Mythos Preview in New Cybersecurity Tests

Senate Judiciary Advances Bill That Would Bar Minors From Interacting With AI Companions

Security Strategies Shift Focus to Cyber Insurance

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Disneyland Now Uses Face Recognition on Visitors
Edu Tech Firm Instructure Discloses Cyber Incident, Probes Impact

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Critrical cPanel Flaw Mass-Exploited in “Sorry” Ransomware Attacks

City of Ardmore (OK) Issues Alert After Ransomware Attack

Ransomware Attack Cripples Adams County (MS) Systems, Officials Say

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

Telegram Mini Apps Abused for Crypto Scams, Android Malware Delivery

ConsentFix v3 Attacks Target Azure with Automated OAuth Abuse

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

Microsoft Fixes Remote Desktop Warnings Displaying Incorrectly

Microsoft Defender Wrongly Flags DigiCert Certs as Trojan:Win32/Cerdigent.A!dha

4/30/2026

Trump Signs Bill to Fund DHS After Lengthy Shutdown Over ICE Operations

Trump’s Cyber Ambassador Nominee Advances to Full Senate Vote

FBI Cyber Boss: China’s Hacker-For-Hire Ecosystem ‘Out of Control’

New Bluekit Phishing Service Includes an AI Assistant, 40 Templates

Bot Her Emails: Most Modern Phishing Campaigns Are AI-Enabled

‘It Took Nine Seconds’: Claude AI Agent Deletes Company’s Entire Database, Then Apologises

OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts

How Mythos Could Upend the Economics of Hacking

FBI Links Cybercriminals to Sharp Surge in Cargo Theft Attacks

Romanian Leader of Online Swatting Ring Gets 4 Years in Prison

France Investigates 15-Year-Old Over Alleged Hack of National ID Agency

Zambia Cancels Global Digital Freedoms Conference Days Before Start

Congress Punts FISA Renewal to June
Krebs: Anti-DDoS Firm Huge Networks Heaped Attacks on Brazilian ISPs

Moldova’s Health Insurance Agency Reports Possible Data Leak After Cyberattack

Stelia North America Hacked in Ransomware Attack

Dental Practice Software Maker Practice by Numbers Fixes Bug That Exposed Patients’ Medical Records

Sandhills (SC) Medical Data Breach May Have Exposed Info of 78,000+

90,000 Screenshots of One Celebrity’s Phone Were Exposed Online

PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

Critical cPanel and WHM Bug Exploited as a Zero-Day, PoC Now Available

New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

4/29/2026

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

U.S., China Partner on Scam Center Takedown in Dubai

Swiss Police Arrest 10 Suspected Members of Nigeria-Linked Crime Group Black Axe

European Police Dismantles €50 Million Crypto Investment Fraud Ring

European Commission Accuses Meta of Breaching Child Safety Rules

Microsoft Says Backend Change Broke Teams Free Chat and Calls

House Approves Spy Program on Second Attempt, Senate Fate Murky

‘New Einstein’ Vows to Find ‘Source Code of Universe’ and Change Everything; Rejects Bezos Job Offer

Parsing Agentic Offensive Security’s Existential Threat
Medtronic Confirms Data Breach After ShinyHunters Claims

Pine Bluff Schools (AR) Lose $3.2M in Cyberattack Scam

Popular WordPress Redirect Plugin Hid Dormant Backdoor for Years

Hackers Exploit RCE Flaws in Qinglong Task Scheduler for Cryptomining

Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

Cursor Extension Flaw Exposes Developer API Keys

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

4/28/2026

China-Linked Hackers Led Phishing Campaigns Targeting Journalists and Activists, Researchers Say

North Korean BlueNoroff Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures

Cyber Command, NSA Chief Warns Foreign Adversaries Likely to Target Midterms

The Simple Security Flaws That Exposed Trump to Another Gunman

Attack of the Killer Script Kiddies

After Mythos, Nobody Is Safe From Cybersecurity Threats

The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards

EU Countries, Lawmakers Fail to Reach Deal on Watered-Down AI Rules

Why Sharing a Screenshot Can Get You Jailed in the UAE

Ukrainian Police Detain Hackers Suspected of Stealing Thousands of Roblox Accounts for Resale

U.S. Reportedly Charges Scattered Spider Hacker Arrested in Finland

Ransomware Turf War as 0APT and KryBit Groups Trade Blows

Vidar Rises to Top of Chaotic Infostealer Market

No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC

Electricity Is a Growing Area of Cyber-Risk
Have I Been Pwned Claims Pitney Bowes Hit by 8.2m Email Address Leak

Checkmarx Confirms LAPSUS$ Hackers Leaked its Stolen GitHub Data

Video Service Vimeo Confirms Anodot Breach Exposed User Data

Ameriprise Data Breach Hits 48,000 Customers

Robinhood Account Creation Flaw Abused to Send Phishing Emails

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

Hackers are Exploiting a Critical LiteLLM Pre-Auth SQLi Flaw

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

Microsoft to Deprecate Legacy TLS in Exchange Online Starting July

Microsoft: New Remote Desktop Warnings May Display Incorrectly

4/27/2026

Cole Allen Charged With Attempting to Assassinate Trump

Alleged Silk Typhoon Hacker Extradited to U.S. for Cyberespionage

Money Launderer Linked to $230M Crypto Heist Gets 70 Months in Prison

FTC: Americans Lost Over $2.1 Billion to Social Media Scams in 2025

Tennessee Becomes Second State to Ban Cryptocurrency ATMs Over Scam Concerns

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side

Most Cybersecurity Professionals Feel Undervalued and Underpaid

Nearly Half of Cybersecurity Pros Want to Quit – Here’s Why
Medtronic Says Cyberattack on IT Network Has Not Disrupted Operations

Home Security Giant ADT Data Breach Affects 5.5 Million People

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud

PyPi Package With 1.1m Monthly Downloads Hacked to Push Infostealer

Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

Disinformation Campaign Targeted Tibetan Parliament-In-Exile Elections

4/24-26/2026

Trump Faces Unprecedented Third Assassination Attempt

Officials Identify Suspect in White House Correspondents’ Dinner

Washington Hotel Shooting Raises Questions About Trump Security

Iran’s Cyber Threat May Be Less ‘Shock and Awe’ Than ‘Low and Slow,’ Officials Say

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

German Government Suspects Russia of Signal Attack Targeting Politicians

Rogue Ransomware Negotiator Rattles Trust in Outside Data-Breach Responders

Toronto Police Arrest Three in Canada’s First Mobile Sms Blaster Case

Norway’s Prime Minister Proposes Ban on Social Media Access for Young Teens

Microsoft to Roll Out Entra Passkeys on Windows in Late April

Pentagon Grapples With Securing AI as It Moves Toward Autonomous Warfare
American Utility Firm Itron Discloses Breach of Internal IT Network

ShinyHunters Claim They Have Cruise Giant Carnival’s Booty as 7.5m Emails Surface

ADT Confirms Data Breach After ShinyHunters Leak Threat

New BlackFile Extortion Group Linked to Surge of Vishing Attacks

City of Suffolk (VA) Victim of Cybersecurity Attack

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

Over 10,000 Zimbra Servers Vulnerable to Ongoing XSS Attacks

New ‘Pack2TheRoot’ Flaw Gives Hackers Root Linux Access

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

4/23/2026

CISA: U.S. Agency Breached Through Cisco Vulnerability, FIRESTARTER Backdoor Allowed Access Through March

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

UK Warns of Chinese Hackers Using Proxy Networks to Evade Detection

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

Dev Targeted by Sophisticated Job Scam: ‘I Let My Guard Down, and Ran the Freaking Code’

Anthropic’s Mythos Breach Was Humiliating

‘Zealot’ Shows What AI’s Capable of in Staged Cloud Attack

Google Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AI

UK Regulator Closes Loophole That Allowed Rogue Companies to Track Phone Users’ Location

Surveillance Companies Exploiting Telecom System to Spy on Targets’ Locations, Research Shows

Age Checks Could Turn Internet Into an ID Checkpoint, Complains Proton CEO
Cosmetics Giant Rituals Discloses Data Breach Affecting Customers

Medical Data of 500,000 Britons Put Up for Sale on Chinese Website

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Trigona Ransomware Attacks Use Custom Exfiltration Tool to Steal Data

In a First, Ransomware Family Kyber Is Confirmed to Be Quantum-Safe

Hackers Exploit File Upload Bug in Breeze Cache WordPress Plugin

CISA Orders Feds to Patch BlueHammer Flaw Exploited as Zero-Day

Trump’s Pick for CISA Director Withdraws From Consideration

U.S. Sanctions Cambodian Senator for Millions Earned Through Scam Compounds

House Republicans Unveil Data Privacy Law That Would Override State Protections

4/22/2026

Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

China’s Cyber Capabilities Now Equal to the U.S., Warns Dutch Intelligence

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

North Korean Hackers Siphon More Than $12 Million From Crypto Users in Sprawling Campaign

Anthropic’s Mythos Rollout Has Missed America’s Cybersecurity Agency

Anthropic’s Most Dangerous AI Model Just Fell Into the Wrong Hands

Anthropic’s Super-Scary Bug Hunting Model Mythos Is Shaping up to Be a Nothingburger

Microsoft to Integrate Anthropic’s Mythos Into Its Security Development Program

UK Financial Sector Prepared for Mythos and Others, Says BOE Co-Chaired Group

UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns

UK Government Says 100 Countries Have Spyware That Can Hack People’s Phones

Scotland Yard Can Keep Using Live Facial Recognition on People in London, Say Judges

Google Unleashes Even More AI Security Agents to Fight the Baddies

Spain Dismantles Major $4.7m Manga Piracy Platform, Arrests Four
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

Surge in Silent Subject Phishing Attacks Targets VIP Users

MacOS Native Tools Enable Stealthy Enterprise Attacks

Kyber Ransomware Gang Toys With Post-Quantum Encryption on Windows

New GoGra Malware for Linux Uses Microsoft Graph API for Comms

Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

New Npm Supply-Chain Attack Self-Spreads to Steal Auth Tokens

New Mirai Campaign Exploits RCE Flaw in EoL D-Link Routers

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

Over 1,300 Microsoft Sharepoint Servers Vulnerable to Spoofing Attacks

Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

Apple Fixes iOS Bug That Retained Deleted Notification Data

New Defense Department Cyber Strategy Imminent, Official Says

French Police Arrest Suspected Hacker Behind Dozens of Data Breaches

4/21/2026

Nation-States Want to Cause Harm, Not Just Steal Cash – Stop Handing Your Cyber Defenses to the Cheapest Contractor

Ukraine Busts ‘Bot Farm’ Supplying Thousands of Fake Telegram Accounts to Russian Spies

EU Targets Two Russian Propaganda Networks With New Sanctions

They Built a Legendary Privacy Tool. Now They’re Sworn Enemies

UK Probes Telegram, Teen Chat Sites Over CSAM Sharing Concerns

Meta Is Sued Over Scam Ads on Facebook and Instagram

Murder, She Wrote: Ex-FBI Chief Wants Some Ransomware Crims Charged With Homicide

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

Krebs: ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
French Gov’t Agency Confirms Breach as Hacker Offers to Sell Data

New Lotus Data Wiper Used Against Venezuelan Energy, Utility Firms

NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

Actively Exploited Apache ActiveMQ Flaw Impacts 6,400 Servers

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

Mozilla Used Anthropic’s Mythos to Find and Fix 271 Bugs in Firefox

AI Hacking Tools Like Mythos Can Be ‘Net Positive’ Says Top Cyber Official

4/20/2026

The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad

Apple Hardware Executive John Ternus to Succeed Tim Cook as CEO

Banking Industry Scrambles for Anthropic’s Mythos as Global Regulators Review Risks

Claude Desktop Changes App Access Settings for Browsers You Don’t Even Have Installed Yet

Scot Becomes Second Scattered Spider-Linked Crook to Plead Guilty in U.S.

Italian Regulator Fines National Postal Service Orgs $15 Million for Data Privacy Violations

Elon Musk Fails to Appear for Questioning by French Police Over Sexualized AI Images on X

Bluesky Blames App Outage on ‘Sophisticated’ DDoS Attack

Mastodon Says Its Flagship Server Was Hit by a DDoS Attack
KelpDAO Suffers $290 Million Heist Tied to Lazarus Hackers

Cyberattack at French Identity Document Agency May Have Exposed Personal Data

Seiko USA Website Defaced as Hacker Claims Customer Data Theft

China’s Apple App Store Infiltrated by Crypto-Stealing Wallet Apps

Microsoft: Teams Increasingly Abused in Helpdesk Impersonation Attacks

Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection

The Gentlemen Ransomware Now Uses SystemBC for Bot-Powered Attacks

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

4/17-19/2026

Ukraine Confirms Suspected APT28 Campaign Targeting Prosecutors, Anti-Corruption Agencies

NSA Using Anthropic’s Mythos Despite Blacklist

The Shocking Secrets of Madison Square Garden’s Surveillance Machine

Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

Ransomware Attack Continues to Disrupt Healthcare in London Nearly Two Years Later

Grinex Exchange Blames “Western Intelligence” for $13.7M Crypto Hack

Man Gets 30 Months for Selling Thousands of Hacked DraftKings Accounts

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Just Like Phishing for Gullible Humans, Prompt Injecting Ais Is Here to Stay
Cloud Development Platform Vercel Was Hacked

City of Tallahassee (FL) Technology Systems Hit by Cyberattack Friday, Officials Report No Operational Impacts

Apple Account Change Alerts Abused to Send Phishing Emails

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Critical Flaw in Protobuf Library Enables JavaScript Code Execution

NIST to Stop Rating Non-Priority Flaws Due to Volume Increase

Time for Government, Business Leaders to Figure Out AI Cybersecurity Regulation

4/16/2026

ZionSiphon Malware Designed to Sabotage Water Treatment Systems

North Korean APT38 Targets macOS Users in Latest Heist

White House Works to Give U.S. Agencies Anthropic Mythos AI

Anthropic Rolls Out Claude Opus 4.7, an AI Model That Is Less Risky Than Mythos

OpenAI Launches AI Model GPT-Rosalind for Life Sciences Research

Google Expands Gemini AI Use to Fight Malicious Ads on Its Platform

Entry-Level Cyber Workers Are Losing Out to AI

New ATHR Vishing Platform Uses AI Voice Agents for Automated Attacks

Europe’s Online Age Verification App Is Here

European Police Email 75,000 People Asking Them to Stop DDoS Attacks

U.S. Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea

Russia-Linked Grinex Crypto Exchange Suspends Operations After Hack

Cargo Thieving Hackers Running Sophisticated Remote Access Campaigns, Researchers Find
Cookeville Medical Center (TN) Notifies Patients After July 2025 Ransomware Attack

Fashion Retailer Express Left Customers’ Personal Data and Order Details Exposed to the Internet

Data Breach at Edtech Giant McGraw Hill Affects 13.5 Million Accounts

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Operation PowerOFF Identifies 75k DDoS Users, Takes Down 53 Domains

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

APK Malformation Found in Thousands of Android Malware Samples

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

New Microsoft Defender “RedSun” Zero-Day PoC Grants SYSTEM Privileges

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

Microsoft’s Original Windows Secure Boot Certificate Is Expiring

4/15/2026

Russia-Linked Hackers Compromised Scores of Ukrainian Prosecutors’ Email Accounts

Sweden Blames Russian Hackers for Attempting ‘Destructive’ Cyberattack on Thermal Plant

Researchers Spot Surge in Brute-Force Attacks from Middle East

Trump Backs Government AI Safeguards in Banking System, Acknowledges Risks

ECB to Quiz Bankers About Risks of Anthropic’s New AI Model

AI Companies to Play Bigger Role in CVE Program, Says CISA

OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

Teen Arrested in Northern Ireland Over Cyberattack on School Network

French Cops Free Mother and Son After 20-Hour Crypto Kidnap Ordeal
New AgingFly Malware Used in Attacks on Ukraine Gov’t, Hospitals

Signed Adware Operation Disables Antivirus Across 23,000 Hosts

WordPress Plugin Suite Hacked to Push Malware to Thousands of Sites

CISA Flags Windows Task Host Vulnerability as Exploited in Attacks

Critical Nginx-ui MCP Flaw Actively Exploited in the Wild

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

Microsoft Pays $2.3M for Cloud and AI Flaws at Zero Day Quest

NIST to Limit Work on CVE Entries as Submissions Surge

Big Tech Fails to Opt-Out Users Requesting Not to Be Tracked Much of the Time, New Research Says

4/14/2026

Russia Appears to Block Social Media Platform Bluesky Amid Wider Internet Restrictions

In the Wake of Anthropic’s Mythos, OpenAI Has a New Cybersecurity Model—And Strategy

UK Gov’s Mythos AI Tests Help Separate Cybersecurity Threat From Hype

No Honor Among Thieves as 0APT Threatens Rival Ransomware Gang Krybit

Fake Ledger Live App on Apple’s App Store Stole $9.5m in Crypto

Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market

Teen Hacker Sentenced to Federal Prison After Major PowerSchool Data Breach Exposes Student Records

Virginia Enacts Ban on Precise Geolocation Data Sales as Momentum for Similar Prohibitions Builds

CISOs Urged to Innovate with Talent Retention as Job Satisfaction Declines

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
McGraw-Hill Confirms Data Breach Following Extortion Threat

Crypto-Exchange Kraken Extorted by Hackers After Insider Breach

Triad Nexus Expands Global Fraud Operations Despite U.S. Sanctions

New ‘JanaWare’ Ransomware Targeting Turkish Citizens as Cybercriminal Ecosystem Fragments

Malicious Chrome Extensions Campaign Exposes User Data

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

Krebs: Patch Tuesday, April 2026 Edition

Microsoft Adds Windows Protections for Malicious Remote Desktop Files

Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

4/13/2026

North Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware

Iran-Linked Group Handala Claims to Have Breached Three Major Uae Organizations

Anthropic Talking to the Trump Administration About Its Next AI Model

‘It Reads Like a Spy Novel’: $280 Million Theft From Drift Involved North Korean Fake Companies, Cutouts

The Dumbest Hack of the Year Exposed a Very Real Problem

Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators

FBI Takedown of W3LL Phishing Service Leads to Developer Arrest

Majority of Australian Youth Still Use Social Media Despite Ban, Researchers Find

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
Booking.com Warns Reservation Data May Have Checked Out With Intruders

Gym Giant Basic-Fit Confirms Data on a Million Members Stolen in Cyberattack

Stolen Rockstar Games Analytics Data Leaked by Extortion Gang

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

Fake Linux Leader Using Slack to Con Devs Into Giving up Their Secrets

Mirax Android Trojan Turns Devices Into Residential Proxy Node

The Silent “Storm”: New Infostealer Hijacks Sessions, Decrypts Server-Side

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

Critical Flaw in wolfSSL Library Enables Forged Certificate Use

CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

4/10-12/2026

Nearly 4,000 U.S. Industrial Devices Exposed to Iranian Cyberattacks

Hungarian Government Creds Left in the Safe Hands of ‘FrankLampard’

Vance, Bessent Questioned Tech Giants on AI Security Before Anthropic’s Mythos Release

Your Push Notifications Aren’t Safe From the FBI

How the Internet Broke Everyone’s Bullshit Detectors

Over 20,000 Crypto Fraud Victims Identified in International Crackdown

UK Government Threatens Tech Bosses With Jail Time if They Do Not Adequately Fight Nudification Tools

Senator Grassley Launches Inquiry Into 8 Tech Giants for Failures to Adequately Report CSAM

Commvault Explores Sale After Takeover Interest, Sources Say

Florida Investigates OpenAI for Role ChatGPT May Have Played in Deadly Shooting

Google Rolls Out Gmail End-To-End Encryption on Mobile Devices
OpenAI Identifies Security Issue Involving Third-Party Tool, Says User Data Was Not Accessed

Hackers Give Rockstar Games Until April 14 to Pay for Stolen Data

Rockstar Games Says Hack Will Have ‘No Impact’

Spring Lake Park Schools (MN) Closed Monday Due to Suspected Ransomware Incident

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

Microsoft: Canadian Employees Targeted in Payroll Pirate Attacks

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

4/9/2026

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

3 Russian Submarines Detected Near Britain Were Spying, UK. Says

Russia Accuses Former Radio Free Europe Journalist of Aiding Cyberattacks for Ukraine

Do Ceasefires Slow Cyberattacks? History Suggests Not

Politicians Are Spending More Money on Security as They Increasingly Become Targets

Crypto? Huh. Good Gosh Y’all, What Is It Good For? $45M in This Case

Microsoft Suspends Dev Accounts for High-Profile Open Source Projects

Google API Keys Quietly Gain Access to Gemini on Android Devices

U.S. Software Stocks Slump on Renewed AI Disruption Jitters
Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets

Treasury Department Announces Crypto Industry Cyber Threat Sharing Initiative

Cybercriminals Target Accountants to Drain Russian Firms’ Bank Accounts

STX RAT Targets Finance Sector With Advanced Stealth Tactics

Hackers Use Pixel-Large SVG Trick to Hide Credit Card Stealer

Smart Slider Updates Hijacked to Push Malicious WordPress, Joomla Versions

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Google Chrome Adds Infostealer Protection Against Session Cookie Theft

4/8/2026

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

‘We Were Not Ready for This’: Lebanon’s Emergency System Is Hanging by a Thread

Two Prominent Egyptian Journalists Targeted With Elaborate Spearphishing Campaign

Hack-For-Hire Group Caught Targeting Android Devices and iCloud Backups

Who Is Satoshi Nakamoto? My Quest to Unmask Bitcoin’s Creator

British Cryptographer Adam Back Denies NYT Report That He Is Bitcoin Creator Satoshi Nakamoto

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Criminal Wannabes Even More Dangerous Than the Pros, Says Ex-FBI Cyber Chief

AI Is Forcing a Rethink in Cybersecurity

AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties

CIA Director Quietly Elevated Agency’s Cyber Espionage Division

TikTok Removes Covert Networks Ahead of Hungary Vote as Disinformation Concerns Grow
Trove of Sensitive LAPD Records Leaked in Data Hack of City Attorney’s Office

Minnesota Governor Sends National Guard to Winona County After Cyberattack

Dutch Healthcare Software Vendor ChipSoft Goes Dark After Ransomware Attack

NHS Scotland-Linked Domains Caught Serving Porn and Dodgy Sports Streams

Passport Numbers for More Than 300,000 Leaked During December Eurail Data Breach

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

Google: New UNC6783 Hackers Steal Corporate Zendesk Support Tickets

New macOS Stealer Campaign Uses Script Editor in ClickFix Attack

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

CISA Orders Feds to Patch Exploited Ivanti EPMM Flaw by Sunday

Hackers Exploit Critical Flaw in Ninja Forms WordPress Plugin

Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years

4/7/2026

Iran-Linked Hackers Are Sabotaging U.S. Energy and Water Infrastructure

Krebs: Russian Group APT28 Hacked Routers to Steal Microsoft Office Tokens

Hundreds of Orgs Compromised Daily in Microsoft Device Code Phishing Attacks

National Security Veterans Warn Against Delays in FISA 702 Reauthorization

FBI: Americans Lost a Record $21 Billion to Cybercrime Last Year

The College Student—and His Cat Meme—Who Hunted the World’s Biggest Cyberweapon

Anthropic Limits Mythos AI Rollout Over Fears Hackers Could Use Model for Cyberattacks

Anthropic Teams up With Its Rivals to Keep AI From Hacking Everything
Cyberattack on Telecom Giant Rostelecom Disrupts Internet Services Across Russia

Cyberattack Hits Northern Ireland’s Centralized School Network, Disrupting Access for Thousands

Massachusetts Hospital Turning Ambulances Away After Cyberattack

Snowflake Customers Hit in Data Theft Attacks After SaaS Integrator Breach

GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

Max Severity Flowise RCE Vulnerability Now Exploited in Attacks

4/6/2026

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

Krebs: Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

Suspect in Hacking of Climate Activists Is Extradited to New York

First Stalkerware Maker Prosecuted Since 2014 Receives No Jail Time

Drift $280M Crypto Theft Linked to 6-Month In-Person Operation

FBI: Cyber Fraud Surges to $17.6 Billion in Losses as Scams, Crypto Theft Soar

Embattled Startup Delve Has ‘Parted Ways’ With Y Combinator

A.I. Is on Its Way to Upending Cybersecurity
Major Outage Hits Russian Banking Apps, Metro Payments Across Regions

Hackers Threaten to Leak Data After Cyberattack on German Party Die Linke

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

New GPUBreach Attack Enables System Takeover via GPU Rowhammer

Microsoft Links Medusa Ransomware Affiliate to Zero-Day Attacks

CISA Orders Feds to Patch Exploited Fortinet EMS Flaw by Friday

Disgruntled Researcher Leaks “BlueHammer” Windows Zero-Day Exploit

Big Tech Vows to Continue Csam Scanning in Europe Despite Expiration of Law Allowing It

4/3-5/2026

CERT-EU: European Commission Hack Exposes Data of 30 EU Entities

EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking Group

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

Chinese Firms Market Iran War Intelligence ‘Exposing’ U.S. Forces

Trump Officials Try to Fight Foreign Disinformation They Once Dismissed

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The Hack That Exposed Syria’s Sweeping Security Failures

LinkedIn Secretly Scans for 6,000+ Chrome Extensions, Collects Data

Man Admits to Locking Thousands of Windows Devices in Extortion Plot

Researchers Didn’t Want to Glamorize Cybercrims. So They Roasted Them

Ukraine Warns Russian Hackers Are Revisiting Past Breaches to Prepare New Attacks

Act-of-War Clauses Cloud Cyber Insurance Coverage

White House Says Trump Orders Back Pay From Shutdown to All Homeland Security Employees

Trump Wants to Take a Battle Axe to CISA Again and Slash $707M From Budget
Massachusetts Emergency Communications System Impacted by Cyberattack

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Anyone With a Link Can View Your Granola Notes by Default

Die Linke German Political Party Confirms Data Stolen by Qilin Ransomware

Cyberattack Targeted Italy’s Uffizi but Nothing Stolen, Museum Says

Hims & Hers Warns of Data Breach After Zendesk Support Ticket Breach

Venom: New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs

Traffic Violation Scams Switch to QR Codes in New Phishing Texts

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Device Code Phishing Attacks Surge 37X as New Kits Spread Online

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Hackers Exploit React2Shell in Automated Credential Theft Campaign

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

FCC Proposes $4.5 Million Fine for Voice Service Provider Hosting ‘Suspicious’ Foreign Call Traffic

4/2/2026

Drift Crypto Platform Confirms $280 Million Stolen in Hack as Researchers Point Finger at North Korea

Iran Says It Hit Oracle Facilities in UAE

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

The Company’s Biggest Security Hole Lived in the Breakroom

They Thought They Were Downloading Claude Code Source. They Got a Nasty Dose of Malware Instead

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

Residential Proxies Evaded IP Reputation Checks in 78% of 4B Sessions

Fate of DHS Funding Uncertain as U.S. Congress Republicans Decide Next Steps

Trump Says He’ll Sign Order to Pay All DHS Employees as Shutdown Continues

French Senate Passes Bill That Would Ban Children Under 15 From Social Media

Boards Are Falling Short on Cybersecurity

RSAC 2026: AI Dominates, But Community Remains Key to Security
Medtech Giant Stryker Fully Operational After Data-Wiping Attack

Money Transfer App Duc Exposed Thousands of Driver’s Licenses and Passports to the Open Web

Oklahoma Tax Commission Data Breach Raises Concerns

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

New ‘Storm’ Infostealer Remotely Decrypts Stolen Credentials

New CrystalRAT Malware Adds RAT, Stealer and Prankware Features

Researchers Observe Sub-One-Hour Ransomware Attacks

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

New Progress ShareFile Flaws Can be Chained in Pre-Auth RCE Attacks

Over 14,000 F5 BIG-IP APM Instances Still Exposed to RCE Attacks

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

Critical Cisco IMC Auth Bypass Gives Attackers Admin Access

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

4/1/2026

Chinese Hackers TA416 Target European Governments in Espionage Campaigns

FBI Warns Against Using Chinese Mobile Apps Due to Privacy Risks

Cambodia Extradites Alleged Cyber Scam Linchpin to China as Crackdown Intensifies

Romania Under Daily Barrage of Cyberattacks, Defense Minister Says

Cyberattacks Intensify Pressure on Latin American Governments

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

The Axios Hack: What to Know

Google Drive Ransomware Detection Now on by Default for Paying Users

Apple Will Push Out Rare ‘Backported’ Patches to Protect iOS 18 Users From DarkSword Hacking Tool

The Forgotten Endpoint: Security Risks of Dormant Devices

Are We Training AI Too Late?
Hasbro Says It Was Hacked, and May Take ‘Several Weeks’ to Recover

Nissan Says Stolen Data Came From Third-Party Vendor After Hacking Group Claims Breach

Mercor Confirms Security Incident Tied to LiteLLM Supply Chain Attack

Crypto Platform Drift Suspends Services After Millions Stolen in Security Incident

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

New EvilTokens Service Fuels Microsoft Device Code Phishing Attacks

‘NoVoice’ Android Malware on Google Play Infected 2.3 Million Devices

New Venom Stealer MaaS Platform Automates Continuous Data Theft

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

3/31/2026

Iran’s Revolutionary Guard Threatens to Strike U.S. Companies in Mideast

Iran Threatens to Start Attacking Major U.S. Tech Firms on April 1

Iran’s Hackers Are on the Offensive Against the U.S. and Israel

Iran Targets M365 Accounts With Password-Spraying Attacks

North Korea-Linked Hack Hits Largely Invisible Software That Powers Online Services

Critical Compromise: Axios NPM Library With 100M Weekly Downloads Is Delivering Malware

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

Pro-Russian Hackers Pose as Ukraine’s Cyber Agency to Target Government, Businesses

Employee Data Breaches Surge to Seven-Year High

Cybercriminals Exploit Tax Season With New Phishing Tactics

Hacker Charged With Stealing $53 Million From Uranium Crypto Exchange
Claude Code Leak Exposes a Tamagotchi-Style ‘Pet’ and an Always-on Agent

Claude Code Source Code Accidentally Leaked in NPM Package

Cisco Source Code Stolen in Trivy-Linked Dev Environment Breach

Hackers Hit Minot Water Treatment Plant (ND) Server in Ransomware Case, FBI Investigating

Dutch Finance Ministry Takes Treasury Banking Portal Offline After Breach

Don’t Open That WhatsApp Message, Microsoft Warns

Leak Bazaar: New Criminal Service Plans to Monetize Data Stolen by Ransomware Gangs

CISA Orders Feds to Patch Actively Exploited Citrix Flaw by Thursday

GIGABYTE Control Center Vulnerable to Arbitrary File Write Flaw

Claude AI Finds Vim, Emacs RCE Bugs that Trigger on File Open

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google’s Vertex AI Has an Over-Privileged Problem

3/30/2026

European Commission Confirms Data Breach After europa.eu Hack

European Commission Downplays ShinyHunters Cyberattack Impact

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

State Department Reissues $10 Million Reward for Info on Iranian Hackers

ICO Fines UK Nuisance Call Scammers £100,000

Russian Court Sentences Notorious Card Fraud Ringleader ‘Flint’ and 25 Associates

Italian Regulator Fines Financial Giant $36 Million for Data Protection Failures

Microsoft Pulls KB5079391 Windows Update Over Install Issues
Healthcare Tech Firm CareCloud Says Hackers Stole Patient Data

Liberal Unified School District 480 (KS) Reports Computer Hack

Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels

DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection

New RoadK1ll WebSocket Implant Used to Pivot on Breached Networks

Critical Fortinet Forticlient EMS Flaw Now Exploited in Attacks

OpenAI Patches ChatGPT Flaw That Smuggled Data Over DNS

Apple Adds macOS Terminal Warning to Block ClickFix Attacks

3/27-29/2026

Iran-Linked Hackers Breach FBI Director’s Personal Email, Publish Photos and Documents

Iran War Drives Urgent Need to Counter Underwater Attack Drones

Latvia Accuses Russia of of Unorthodox Disinformation Campaign Targeting Baltic States

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google

Dutch Court Threatens zAI With Fines Over Grok’s Nonconsensual Nude Images

European Parliament Rejects Extension of CSAM Scanning Rules for Tech Platforms

Anti-Piracy Coalition Takes Down AnimePlay App With 5 Million Users

Cybersecurity Stocks Fall on Report Anthropic Is Testing a Powerful New Model
European Commission Investigating Breach After Amazon Cloud Account Hack

Dutch Police Discloses Security Breach After Phishing Attack

Rocky Mountain Care Discloses Data Breach Following Ransomware Attack

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

Fake VS Code Alerts on GitHub Spread Malware to Developers

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

File Read Flaw in Smart Slider Plugin Impacts 500K WordPress Sites

3/26/2026

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

Iran-Linked Pay2Key Ransomware Group Re-Emerges

Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies With Custom Ransomware

Indian Government Probes CCTV Espionage Operation Linked to Pakistan

Using a VPN May Subject You to NSA Spying

Invoice Fraud Costs UK Construction Sector Millions, NCA Warns

A $20 Billion Crypto Scam Market Xinbi Guarantee Faces a New Government Crackdown

U.S. Official Accuses China of Supporting, Exploiting Cyber Scam Crisis in Southeast Asia

Suspected RedLine Infostealer Malware Admin Extradited to U.S.

Brit Lawmaker Targeted by AI Deepfake Fails to Get Answers From U.S. Big Tech

EU Investigating Snapchat and Pornography Sites in Child Safety Crackdown
Ajax Football Club Hack Exposed Fan Data, Enabled Ticket Hijack

TikTok for Business Accounts Targeted in New Phishing Campaign

EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in Recent Mass Attacks

Supply Chain Attack Hits Widely-Used AI Package, Risks Impacting Thousands of Companies

CISA: New Langflow Flaw Actively Exploited to Hijack AI Workflows

Attackers Rapidly Weaponize Critical Oracle WebLogic RCE, Honeypot Study Finds

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

GitHub Adds AI-Powered Bug Detection to Expand Security Coverage

Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

3/25/2026

UK Cyber Chief Urges ‘Full Court Press’ to Counter Rising Cyber Threats

CISA’s Acting Chief Warns Shutdown Is Increasing Cyber Risks, Causing Resignations

When Satellite Data Becomes a Weapon

Iranians Don’t Have a Missile Alert System, So Volunteers Built Their Own Warning Map

Cloud Phones Linked to Rising Financial Fraud Threat

Fake X-Rays Created by AI Fool Radiologists and Even AI Itself

Meta and YouTube Lose Landmark Social-Media Addiction Trial

Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
Puerto Rico Government Agency Cancels Driver’s License Appointments After Cyberattack

Ransomware Attack Disrupts Operation at Major Spanish Fishing Port

New Torg Grabber Infostealer Malware Targets 728 Crypto Wallets

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Bubble AI App Builder Abused to Steal Microsoft Account Credentials

AI Supply Chain Attacks Don’t Even Require Malware…Just Post Poisoned Documentation

PTC Warns of Imminent Threat from Critical Windchill, FlexPLM RCE Bug

TP-Link Warns Users to Patch Critical Router Auth Bypass Flaw

Kali Linux 2026.1 Released with 8 New Tools, New BackTrack Mode

Blame Game: Why Public Cyber Attribution Carries Risks

3/24/2026

Silver Fox Cyber Campaigns Show Shift Toward Dual Espionage

Iran-Linked Ransomware Gang Targeted U.S. Healthcare Org Amid Military Conflict

Stryker Says Malware Was Involved in Recent Cyberattack as Production Lines Reopen

DarkSword: Someone Has Publicly Leaked an Exploit Kit That Can Hack Millions of iPhones

Your Body Is Betraying Your Right to Privacy

‘Your Data Will Be Used Against You’: Author of New Book on the Dangers of a Surveillance Society

U.S. Settles Social Media Censorship Case, Bars Agencies From Threatening Penalties

UK Pilot Program to Test Social Media Restrictions on Families Before Government Decides on Ban

Russian Initial Access Broker Handed 81-Month Sentence

Firefox Now Has a Free Built-in VPN with 50GB Monthly Data Limit

How a Large Bank Uses AI Digital Twins for Threat Hunting
Dutch Ministry of Finance Discloses Breach Affecting Employees

Infinite Campus Warns of Breach After ShinyHunters Claims Data Theft

HackerOne Discloses Employee Data Breach After Navia Hack

Crunchyroll Confirms Data Breach After Hacker Claims Unauthorized Access

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

New Npm ‘Ghost Campaign’ Uses Fake Install Logs to Hide Malware

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

PTC Warns of Imminent Threat From Critical Windchill, FlexPLM RCE Bug

Vibe Coding Could Reshape SaaS Industry and Add Security Risks, Warns UK Cyber Agency

3/23/2026

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

FBI Warns of Handala Hackers Using Telegram in Malware Attacks

Krebs: ‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A Mysterious Numbers Station Is Broadcasting Through the Iran War

U.S. Soldier Sentenced for Helping North Korean IT Workers

U.S. Regulator Bans Imports of New Foreign-Made Routers, Citing Security Concerns

High-Tech Sector Overtakes Finance as Top Target for Cyber-Attacks, Mandiant Reports

Smooth Criminals Talking Their Way Into Cloud Environments, Google Says

U.S. Sentences Nigerian National to 7 Years in $6 Million Email Fraud Scheme

Russia-Linked Malware Operation Collapses After Security Failures, Developer’s Arrest

Online Crime Busts Are Teaching Hackers How to Avoid Getting Caught

Tycoon2FA Phishing Service Resumes Activity Post-Takedown
Crunchyroll Probes Breach After Hacker Claims to Steal 6.8m Users’ Data

Mazda Discloses Security Breach Exposing Employee and Partner Data

California-Based Semiconductor Testing Company Trio-Tech International Reports Ransomware Attack to SEC

Education Company Kaplan Reports Data Breach Impacting More Than 230,000

Hacker Walks Away With $24.5 Million After Breaching Resolv DeFi Platform

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

Most Cybersecurity Staff Don’t Know How Fast They Could Stop a Cyber-Attack on AI Systems

Claude Attacks Were ‘Rorschach Test’ for Infosec Community, Scaring Former NSA Boss

Google Unleashes Gemini AI Agents on the Dark Web

OpenAI Rolls Out ChatGPT Library to Store Your Personal Files and Images

3/20-22/2026

White House AI Plan Favors Speed Over New Rules

Private-Sector Role Clarified in Offensive U.S. Cyber Strategy

Ex-Data Analyst Stole Company Data in $2.5m Extortion Scheme

Musician Admits to $10M Streaming Royalty Fraud Using AI Bots

Krebs: Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

Police Take Down 373,000 Fake CSAM Sites in Operation Alice

FBI Takes Down Leak Sites Tied to Iran’s Ministry of Intelligence and Security

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online

A Top Democrat Is Urging Colleagues to Support Trump’s Spy Machine

Cryptographers Engage in War of Words Over RustSec Bug Reports and Subsequent Ban
Cyberattack on Vehicle Breathalyzer Company Intoxalock Leaves Drivers Stranded Across the U.S.

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Foster City (CA) Hit by Ransomware Attack, Plans to Declare State of Emergency

VoidStealer Malware Steals Chrome Master Key via Debugger Trick

Microsoft Azure Monitor Alerts Abused for Callback Phishing Attacks

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

Hackers Exploit Critical Langflow Bug in Just 20 Hours

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

AI Conundrum: Why Model Context Protocol (MCP) Security Can’t Be Patched Away

3/19/2026

Russian Hackers Exploit Zimbra Flaw in Ukrainian Gov’t Attacks

Bitrefill Blames North Korean Lazarus Group for Cyberattack

CISA Urges U.S. Orgs to Secure Microsoft Intune Systems After Stryker Breach

FBI Seizes Handala Data Leak Site After Stryker Cyberattack

Orthodox Jewish News Site Yeshiva World News Hacked After Threats of Iran Cyber Attack

Ransomware Affiliate Exposes Details of ‘The Gentlemen’ Operation

Jeff Bezos in Talks to Raise $100 Billion for AI Manufacturing Fund

Signal’s Creator Is Helping Encrypt Meta AI

U.S. Intel Chiefs Urge Lawmakers to Extend Section 702 Surveillance Power Without Changes

Google Gives Android Users a Way to Install Unverified Apps if They Prove They Really, Really Want To
Navia Discloses Data Breach Impacting 2.7 Million People

Aura Confirms Data Breach Exposing 900,000 Marketing Contacts

Financial Brands Targeted in Global Mobile Banking Malware Surge

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

C2 Implant ‘SnappyClient’ Targets Crypto Wallets

54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Unknown Attackers Exploit Yet Another Critical Sharepoint Bug

New ‘PolyShell’ Flaw Allows Unauthenticated RCE on Magento e-Stores

Max Severity Ubiquiti Unifi Flaw May Allow Account Takeover

3/18/2026

Thank you for reading our 1,500th post!

Russia-Linked Hackers UNC6353 Use Advanced iPhone Exploit to Target Ukrainians

DarkSword: Hackers Can Raid iOS 18 With an Infected Link

Israel Is Hunting Down Iranian Regime Members in Their Hideouts, One by One

Israel Behind ‘Highly Accurate’ Cyber Attack on Iranian Port

Greek Firms Scan Computer Systems as Iran War Raises Cyberattack Risks

CISA Official Says Agency Has Not Seen Uptick in Cyber Threats Amid Iran War

North Korea’s 100,000-Strong Fake IT Worker Army Rake in $500M a Year for Kim Jong Un

Crypto E-Commerce Platform Bitrefill Accuses North Korea of Stealing 18,500 Purchase Records

Crypto Scam “ShieldGuard” Dismantled After Malware Discovery

Moscow Seeks to Limit Internet to State-Approved Websites Amid Ongoing Outages
Marquis: Ransomware Gang Stole Data of 672K People in Cyberattack

Nordstrom’s Email System Abused to Send Crypto Scams to Customers

Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

CISA Orders Feds to Patch Zimbra XSS Flaw Exploited in Attacks

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

ConnectWise Patches New Flaw Allowing ScreenConnect Hijacking

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure

Users Hate It, but Age-Check Tech Is Coming: Here’s How It Works

3/17/2026

U.S. Cyber Assault on Iran Before Bombing Hasn’t Stopped Hackers

Stryker Says Cyberattack on Its Network Contained

Stryker Says It’s Restoring Systems After Pro-Iran Hackers Wiped Thousands of Employee Devices

Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware

Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears

EU Sanctions Iranian Cyber Front Over Election Meddling, Charlie Hebdo Breach

Europe Sanctions Chinese and Iranian Firms for Cyberattacks

Russia Is Sharing Satellite Imagery and Drone Technology With Iran

How World ID Wants to Put a Unique Human Identity on Every AI Agent

Finance Bros to Tech Bros: Don’t Mess With My Bloomberg Terminal

Georgia Man Charged for Robbing NBA, NFL Players Through Stolen Apple Account Details

Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026
Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web

Medusa Ransomware Gang Claims Attacks on Prominent Mississippi Hospital, New Jersey County

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

GlassWorm Malware hits 400+ Code Repos on GitHub, npm, VSCode, OpenVSX

Warlock Ransomware Group Augments Post-Exploitation Activities

Android OS-Level Attack Bypasses Mobile Payment Security

New Font-Rendering Trick Hides Malicious Commands From AI Tools

Researchers Disclose Vulnerabilities in IP KVMs From Four Manufacturers

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

‘CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment

Energy Department Set to Release Its First-Ever Cyber Strategy

3/16/2026

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage

EU Sanctions Chinese and Iranian Companies for Cyber Attacks

Stryker Attack Wiped Tens of Thousands of Devices, No Malware Needed

Stryker Says Hospital Tools Are Safe, but Digital Ordering Systems Still Down After Cyberattack

Cybercrime Has Skyrocketed 245% Since the Start of the Iran War

‘100 Video Calls per Day’: Models Are Applying to Be the Face of AI Scams

OpenAI’s Bid to Allow X-Rated Talk Is Freaking Out Its Own Advisers

OpenAI Says ChatGPT Ads Are Not Rolling Out Globally for Now
Firms Urged to Check if Other Users Edited Their Data on Companies House

Cyberattack Disrupts Parking Payments in Russian City

Researchers Warn of Global Surge in Fake Shipment Tracking Scams

ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

CISA Flags Wing FTP Server Flaw as Actively Exploited in Attacks

Security Flaw in AWS Bedrock Code Interpreter Raises Alarms

Luxembourg Court Overturns $858 Million Privacy Fine Against Amazon

SEC Prepares Proposal to Eliminate Quarterly Reporting Requirement

3/13-15/2026

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

Poland’s Nuclear Research Centre Targeted by Cyberattack

Cyberwarfare Puts Civilian Businesses at Risk

What Does the Iran War Mean for the Threat of Attacks in the U.S.? Here’s What Experts Say

Rogue AI Agents Can Work Together to Hack Systems and Steal Secrets

Trump Administration Set to Receive $10 Billion Fee for Brokering TikTok Deal

Interpol’s ‘Operation Synergia III’ Nets 94 Arrests in Major Cybercrime Sweep

FBI Seeks Victims of Steam Games Used to Spread Malware

European Council Includes Ban on Nudification Tools in Its Proposal for Amending AI Act

Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026

Betterleaks, a New Open-Source Secrets Scanner to Replace Gitleaks
Canadian Retail Giant Loblaw Notifies Customers of Data Breach

Starbucks Discloses Data Breach Affecting Hundreds of Employees

Fake Enterprise VPN Sites Used to Steal Company Credentials

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

AppsFlyer Web SDK Hijacked to Spread Crypto-Stealing JavaScript Code

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8

Microsoft Releases Windows 11 OOB Hotpatch to Fix RRAS RCE Flaw

A CEO’s Hack: Ask AI for A Performance Review

3/12/2026

Stryker Tells SEC That Timeline for Recovery From Cyberattack Unknown

Stryker Cyberattack Adds to Fears of New Front in Iran War

How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks

What Role Has Cyber Warfare Played in Iran?

New Data Shows Increase in FBI Searches of Americans’ Data Last Year

U.S. Lawmakers Move to Kill the FBI’s Warrantless Wiretap Access

Police Scotland Fined After Sharing Victim’s Phone Data

U.S. Charges Another Ransomware Negotiator Linked to BlackCat Attacks

Operation Lightning Takes Down SocksEscort Proxy Network Blamed for Tens of Millions in Fraud

U.S. Sanctions North Korea IT Worker Networks in Laos, Vietnam

China’s CERT Warns OpenClaw Can Inflict Nasty Wounds

Israeli Cyber Firm Onyx Security Launches Operations With $40 Million Funding Round

UK Regulators Demand Social Media Platforms Make It Harder for Kids Under 13 to Access Sites
Lloyds, Bank of Scotland and Halifax Apps Showed Customers Other Users’ Transactions

Telus Says It Is Investigating Hack of Its Systems

England Hockey Investigating Ransomware Data Breach

INC Ransomware Group Holds Healthcare Hostage in Oceania

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

PixRevolution Malware Hijacks Brazil’s PIX Transfers in Real Time

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Veeam Warns of Critical Flaws Exposing Backup Servers to RCE Attacks

Google Paid $17.1 Million for Vulnerability Reports in 2025

3/11/2026

Krebs: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Iran Plots ‘Infrastructure Warfare’ Against Multiple U.S. Tech Giants

Iran-Linked Hackers Claim Cyberattack on Albania’s Parliament Email Systems

Iranian Influence Operation Using Fake Personas to Deceive U.S. Instagram Users Disrupted, Meta Says

Meta Ramps up Efforts to Disrupt Industrialized Scamming

AI Cyber Startup Kai Raises $125 Million

Senators Propose Federal AI Commission Days After Anthropic Ban

Researchers Discover Major Security Gaps in LLM Guardrails

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Foreign Hacker in 2023 Compromised Epstein Files Held by FBI, Source and Documents Show
238,000 Impacted by Bell Ambulance Data Breach

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

New Phantomraven npm Attack Wave Steals Dev Data via 88 Packages

Xygeni GitHub Action Compromised Via Tag Poison

SQLi Flaw in Elementor Ally Plugin Impacts 250k+ WordPress Sites

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

Krebs: Microsoft Patch Tuesday, March 2026 Edition

France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025

Cyber-Attacks on UK Firms Increase at Four Times Global Rate

WhatsApp Introduces Parent-Managed Accounts for Pre-Teens

3/10/2026

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

Finnish Intelligence Warns of Persistent Cyber Espionage From Russia, China

Israeli Cyber Authority Uses AI to Mock Iranian Hackers, Counter Psychological Warfare

Cybercrime Isn’t Just a Cover for Iran’s Government Goons – It’s a Key Part of Their Operations

GPS Attacks Near Iran Are Wreaking Havoc on Delivery and Mapping Apps

Signal Issues Scam Warning to Users After Hackers Target Officials

Your Data Has Been Breached! (And This Notice Is a Scam!)

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds

U.S. Judiciary to Fast-Track Court Records System Upgrade After Hacking

Meta Acquires AI Agent Social Network Moltbook

OpenAI’s Promptfoo Deal Plugs Agentic AI Testing Gap

Microsoft Brings Phishing-Resistant Windows Sign-Ins via Entra Passkeys
KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

New BeatBanker Android Malware Poses as Starlink App to Hijack Devices

New ‘BlackSanta’ EDR Killer Spotted Targeting HR Departments

Crooks Compromise WordPress Sites to Push Infostealers via Fake CAPTCHA Prompts

New ‘Zombie ZIP’ Technique Lets Malware Slip Past Security Tools

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

HPE Warns of Critical AOS-CX Flaw Allowing Admin Password Resets

Critical Microsoft Excel Bug Weaponizes Copilot Agent for Zero-Click Information Disclosure Attack

UK Plans to Shift Fraud Fight Onto Telecoms, Tech Companies

Rudd Confirmed to Head NSA, Cyber Command After Near Year-Long Vacancy

3/9/2026

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

Dutch Gov’t Warns of Russian Signal, WhatsApp Account Hijacking Attacks

Krebs: How AI Assistants are Moving the Security Goalposts

AI vs AI: Agent Hacked McKinsey’s Chatbot and Gained Full Read-Write Access in Just Two Hours

FBI Warns of Phishing Attacks Impersonating U.S. City, County Officials

UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source

White House Floats Victims Restoration Program for Millions Affected by Cyber Fraud

New White House Cyber Strategy Pledges to Ease Regulations, ‘Impose Costs’ on Bad Actors

CrowdStrike Sues Rival AiStrike for Trademark Infringement
ShinyHunters Claims More High-Profile Victims in Latest Salesforce Customers Data Heist

Ericsson U.S. Discloses Data Breach After Service Provider Hack

Ontario Health Agency Vendor Suffered Major Ransomware Attack in 2025

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Microsoft Teams Phishing Targets Employees With A0Backdoor Malware

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Google: Cloud Attacks Exploit Flaws More Than Weak Credentials

Are We Ready for Auto Remediation With Agentic AI?

Trump Nominee Lt. Gen. Joshua Rudd to Lead Cyber Command, NSA Clears Key Senate Hurdle

3/6-8/2026

FBI Investigates Breach of Surveillance and Wiretap Systems

China Suspected in Breach of FBI Surveillance Network

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

Mojtaba Khamenei to Succeed His Father as Iran’s Supreme Leader

Iran Internet Blackout Reaches 6th Day as Rights Groups Call for End to Digital Shutdown

The Future of Iran’s Internet Is More Uncertain Than Ever

Iran’s MuddyWater Hackers Hit US Firms with New ‘Dindoor’ Backdoor

White House Publishes Long-Awaited Cybersecurity Strategy

Trump Signs Executive Order Aimed at Cybercrime Gangs

CBP Used Online Ad Data to Track Phone Locations

Online Age-Verification Tools Spread Across U.S. For Child Safety, but Adults Are Being Surveilled

Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester

Palantir Rallies 15% for the Week as Iran War Boosts Prospects, Muting Anthropic Concern

AI Agents Now Help Attackers, Including North Korea, Manage Their Drudge Work

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

EU Court Adviser Says Banks Must Immediately Refund Phishing Victims

Ghanain Man Pleads Guilty to Role in $100 Million Fraud Ring
TfL Hack in 2024 Affected Around 10 Million People, BBC Can Reveal

DeKalb County (IN) Officials Release Data Breach Notice to Residents

Tennis Player Shares Threats Sent to Personal Phone, WTA Tour Says No Breach of Private Data

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

Bing AI Promoted Fake OpenClaw GitHub Repo Pushing Info-Stealing Malware

Fake Claude Code Install Guides Push Infostealers in InstallFix Attacks

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

Termite Ransomware Breaches Linked to ClickFix CastleRAT Attacks

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Hackers Abuse .arpa DNS and ipv6 to Evade Phishing Defenses

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA Warns Feds to Patch iOS Flaws Exploited in Crypto-Theft Attacks

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

Ransomware’s New Target: The Systems Built to Recover From It

Indonesia to Ban Children Under 16 From Social Media