rss:The Hacker News
—
20:02 KSA
HIGH
phishing
<strong>Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse</strong>
Active device code phishing campaign targeting Microsoft 365 identities across 340+ organizations in five countries including U.S., Canada, Australia, New Zealand, and German…
rss:The Hacker News
—
19:00 KSA
HIGH
data_breach
<strong>LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace</strong>
Russian law enforcement arrested the alleged administrator of LeakBase cybercrime forum in Taganrog. LeakBase operated as a major marketplace for stolen credentials and compromised data…
rss:Dark Reading
—
17:58 KSA
MEDIUM
phishing
<strong>Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam</strong>
Phishing campaigns starting in August 2024 impersonate Palo Alto Networks recruiters to defraud job seekers. Attackers use psychological manipulation and LinkedIn-scraped data to target …
rss:Dark Reading
—
17:58 KSA
LOW
apt
<strong>Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks</strong>
Four former NSA directors discussed offensive cyber operations and US Cyber Command's role in national security. The debate covered strategic boundaries and ethical considerations for gover…
rss:Dark Reading
—
17:58 KSA
LOW
general
<strong>CSA Launches CSAI Foundation for AI Security</strong>
Cloud Security Alliance established CSAI Foundation, a nonprofit dedicated to securing autonomous AI agent ecosystems. The initiative focuses on risk intelligence and certification frameworks to address emerging AI se…
rss:Dark Reading
—
16:54 KSA
MEDIUM
general
<strong>Blame Game: Why Public Cyber Attribution Carries Risks</strong>
Public attribution of cyberattacks to specific entities carries significant risks and potential negative consequences. Organizations should carefully evaluate diplomatic, legal, and operational implications …
rss:BleepingComputer
—
08:00 KSA
HIGH
phishing
<strong>Bubble AI app builder abused to steal Microsoft account credentials</strong>
Cybercriminals are exploiting the Bubble no-code platform to create and host malicious web applications that bypass phishing detection systems. These fraudulent apps are specifically designed to…
rss:BleepingComputer
—
08:00 KSA
CRITICAL
malware
<strong>New Torg Grabber infostealer malware targets 728 crypto wallets</strong>
A newly discovered infostealer malware named Torg Grabber is targeting 850 browser extensions, with over 700 specifically designed for cryptocurrency wallets. The malware steals sensitive data inclu…
rss:BleepingComputer
—
08:00 KSA
CRITICAL
vulnerability
<strong>Citrix urges admins to patch NetScaler flaws as soon as possible</strong>
Citrix has released patches for two critical vulnerabilities in NetScaler ADC and NetScaler Gateway products. One vulnerability bears significant similarities to the previously exploited CitrixBlee…
rss:SecurityWeek
—
04:37 KSA
HIGH
supply_chain
<strong>FCC Bans New Routers Made Outside the US Over National Security Risks</strong>
The FCC has banned new routers manufactured outside the United States following a White House determination that foreign-produced routers pose national security threats. This regulatory action…
rss:SecurityWeek
—
04:37 KSA
LOW
general
<strong>RSAC 2026 Conference Announcements Summary (Day 2)</strong>
Summary of cybersecurity vendor announcements from the second day of RSA Conference 2026. The conference showcases new security products, technologies, and industry developments relevant to enterprise cybersecur…
rss:SecurityWeek
—
04:37 KSA
CRITICAL
supply_chain
<strong>From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI</strong>
TeamPCP hackers compromised multiple open-source software platforms including GitHub Actions, NPM, Docker Hub, VS Code, and PyPI in a coordinated supply chain attack. The group collaborat…
rss:SecurityWeek
—
03:33 KSA
LOW
general
<strong>Onit Security Raises $11 Million for Exposure Management Platform</strong>
Cybersecurity startup Onit Security has raised $11 million in funding to develop its exposure management platform. The company plans to invest in product development and expand into new sectors to…
rss:Malwarebytes Lab
—
12:38 KSA
CRITICAL
data_breach
<strong>Hackers claim to have accessed data tied to millions of crime tipsters</strong>
A hacktivist group claims unauthorized access to sensitive information about crime tipsters and reported individuals spanning from 1987 to present. The breach exposes personally identifiable …
rss:The Hacker News
—
12:24 KSA
HIGH
malware
<strong>GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data</strong>
GlassWorm campaign has evolved to deliver a multi-stage malware framework that steals comprehensive data and installs a remote access trojan (RAT). The malware deploys a malic…
rss:The Hacker News
—
12:24 KSA
CRITICAL
apt
<strong>The Kill Chain Is Obsolete When Your AI Agent Is the Threat</strong>
Anthropic disclosed in September 2025 that a state-sponsored threat actor used an AI coding agent to conduct autonomous cyber espionage against 30 global targets. The AI agent independently handled 80-9…
rss:The Hacker News
—
12:24 KSA
HIGH
ransomware
<strong>Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks</strong>
Russian national Ilya Angelov, 40, was sentenced to two years in prison and fined $100,000 by U.S. Department of Justice for managing the TA551 botnet used to launch ransomware attack…
rss:SecurityWeek
—
12:23 KSA
HIGH
malware
<strong>Russian Cybercriminal Gets 2-Year Prison Sentence in US </strong>
Russian cybercriminal Ilya Angelov, member of TA-551/Shathak cybercrime group, sentenced to 2 years in US prison. The group is known for malware distribution campaigns and has been tracked under multiple t…
rss:SecurityWeek
—
12:23 KSA
HIGH
general
<strong>AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link</strong>
PwC research reveals AI is accelerating the speed and scale of cyberattacks, while identity theft has evolved into an organized cybercriminal supply chain. Identity management remains the most …
rss:SecurityWeek
—
12:23 KSA
MEDIUM
vulnerability
<strong>iOS, macOS 26.4 Roll Out With Fresh Security Patches</strong>
Apple released security patches for iOS 26.4 and macOS 26.4, along with updates for older devices including iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5. Updates address multiple se…
rss:Recorded Future
—
12:23 KSA
LOW
general
<strong>Practitioners Reveal What Makes Threat Intelligence Programs Mature</strong>
Cybersecurity practitioners from major organizations share strategies for maturing threat intelligence programs by transforming overwhelming data into actionable business insights. Key focus are…
rss:Recorded Future
—
12:23 KSA
CRITICAL
apt
<strong>GRU-Linked BlueDelta Evolves Credential Harvesting</strong>
Russian military intelligence (GRU)-linked threat group BlueDelta has evolved its credential harvesting techniques in targeted campaigns against government, energy, and research sectors across Europe and Eurasia…
rss:Recorded Future
—
12:23 KSA
HIGH
ransomware
<strong>New ransomware tactics to watch out for in 2026</strong>
Ransomware groups earned less revenue in 2025 despite a 47% surge in attacks, forcing evolution of tactics including bundled DDoS extortion services, active insider recruitment within target organizations, and expl…
rss:Malwarebytes Lab
—
12:23 KSA
MEDIUM
supply_chain
<strong>New FCC router ban could leave home networks less secure</strong>
The FCC has announced a ban on routers manufactured outside the United States, raising concerns that this policy could inadvertently reduce home network security. The restriction may limit access to secure…
rss:Dark Reading
—
12:22 KSA
CRITICAL
apt
<strong>SANS: Top 5 Most Dangerous New Attack Techniques to Watch</strong>
SANS Institute identifies the top five most dangerous attack techniques, all leveraging artificial intelligence for the first time. This marks a significant shift in the threat landscape as AI becomes the…
rss:Dark Reading
—
12:22 KSA
MEDIUM
general
<strong>Why a 'Near Miss' Database Is Key to Improving Information Sharing</strong>
Organizations typically share attack information only after successful breaches occur. Establishing a 'near miss' database for close-call incidents could significantly improve threat in…
rss:Dark Reading
—
12:22 KSA
HIGH
apt
<strong>AI-Native Security Is a Must to Counter AI-Based Attacks</strong>
AI-powered attacks are now a reality requiring defenders to adopt AI-native security solutions. Nvidia GTC conference experts emphasize that organizations must leverage the same AI technologies used by att…
rss:BleepingComputer
—
12:22 KSA
HIGH
supply_chain
<strong>Paid AI Accounts Are Now a Hot Underground Commodity</strong>
Premium AI service accounts are being sold on underground cybercrime markets as commodities, similar to compromised email accounts and VPS access. Flare Systems research reveals organized criminal operations b…
rss:BleepingComputer
—
12:22 KSA
LOW
general
<strong>Kali Linux 2026.1 released with 8 new tools, new BackTrack mode</strong>
Kali Linux 2026.1 has been released with 8 new penetration testing tools, theme updates, and a new BackTrack mode for Kali-Undercover. This release enhances capabilities for security professionals a…
rss:BleepingComputer
—
12:22 KSA
CRITICAL
vulnerability
<strong>TP-Link warns users to patch critical router auth bypass flaw</strong>
TP-Link has released security patches for multiple vulnerabilities in its Archer NX router series, including a critical authentication bypass flaw that could allow attackers to upload malicious firmwa…
rss:The Hacker News
—
08:03 KSA
CRITICAL
vulnerability
<strong>Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems</strong>
Threat actors are actively exploiting a critical severity vulnerability (CVSS 10.0) in Quest KACE Systems Management Appliance. Arctic Wolf detected malicious activity starting…
rss:The Hacker News
—
08:03 KSA
HIGH
phishing
<strong>FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks</strong>
Russian Intelligence Services are conducting large-scale phishing campaigns targeting Signal and WhatsApp users with high intelligence value. The FBI warns these attacks aim to compromise…
rss:The Hacker News
—
08:03 KSA
CRITICAL
vulnerability
<strong>Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager</strong>
Oracle released critical security patches for a vulnerability (CVE-2026-21992, CVSS 9.8) in Identity Manager and Web Services Manager. The flaw allows unauthenticated remote …
rss:Recorded Future
—
08:03 KSA
MEDIUM
general
<strong>Threat and Vulnerability Management in 2026</strong>
Organizations must evolve their threat and vulnerability management approaches as traditional tools prove inadequate. Intelligence-driven TVM solutions are becoming essential for identifying and prioritizing security r…
rss:Recorded Future
—
08:03 KSA
HIGH
ransomware
<strong>Best Ransomware Detection Tools</strong>
Intelligence-driven ransomware detection tools focus on identifying precursor behaviors before encryption occurs. These advanced solutions reduce false positives and enable faster incident response by detecting early-stage ransomw…
rss:Recorded Future
—
08:03 KSA
CRITICAL
vulnerability
<strong>December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity</strong>
December 2025 witnessed a 120% surge in critical CVEs with 22 actively exploited vulnerabilities. React2Shell (CVE-2025-55182) emerged as the dominant…
rss:Malwarebytes Lab
—
08:03 KSA
HIGH
vulnerability
<strong>Meet Khaled Mohamed: the bug hunter who found a Microsoft flaw</strong>
Security researcher Khaled Mohamed discovered a vulnerability in Microsoft Authenticator, transitioning from amateur to professional bug bounty hunter. The flaw represents a potential security risk i…
rss:Dark Reading
—
08:03 KSA
HIGH
apt
<strong>SideWinder Espionage Campaign Expands Across Southeast Asia</strong>
India-linked APT group SideWinder targets government, telecom, and critical infrastructure across Southeast Asia using spear-phishing and exploiting old vulnerabilities. The group maintains persistent a…
rss:Dark Reading
—
08:03 KSA
HIGH
malware
<strong>More Attackers Are Logging In, Not Breaking In</strong>
Credential theft surged dramatically in late 2025 driven by industrialized infostealer malware operations and AI-powered social engineering attacks. Attackers increasingly use stolen credentials for initial access r…
rss:Dark Reading
—
08:03 KSA
LOW
general
<strong>Clear Communication: The Missing Link in Cybersecurity Success</strong>
Effective cybersecurity requires bridging the gap between technical expertise and clear communication across teams. Building trust and collaboration through improved communication practices enhances …
rss:The Hacker News
—
06:58 KSA
HIGH
vulnerability
<strong>We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them</strong>
Security researchers discovered eight attack vectors in AWS Bedrock, Amazon's AI application platform. The platform's connectivity to enterprise data and systems, while…
rss:The Hacker News
—
06:58 KSA
HIGH
phishing
<strong>Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware</strong>
Microsoft detected phishing campaigns exploiting U.S. tax season, affecting 29,000 users. Attackers send fake IRS refund and payroll notices to steal credentials and deploy Remote Monitoring and…
rss:The Hacker News
—
06:58 KSA
CRITICAL
supply_chain
<strong>Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper</strong>
Researchers uncovered a supply chain attack on Trivy security scanner distributed via Docker Hub. Malicious versions (0.69.4, 0.69.5) contain infostealer malware, worm capabilities, an…
rss:SecurityWeek
—
06:58 KSA
HIGH
ransomware
<strong>US Prisons Russian Access Broker for Aiding Ransomware Attacks</strong>
Russian national Aleksei Volkov sentenced to 81 months in US prison for facilitating Yanluowang ransomware attacks as an initial access broker. This case highlights international law enforcement effo…
rss:Recorded Future
—
06:57 KSA
HIGH
malware
<strong>Rublevka Team: Anatomy of a Russian Crypto Drainer Operation</strong>
Rublevka Team represents the industrialization of cryptocurrency scams through organized traffer teams and wallet drainer operations. The group demonstrates sophisticated methods for high-volume crypto…
rss:Recorded Future
—
06:57 KSA
LOW
general
<strong>Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future</strong>
Recorded Future tested its Autonomous Threat Operations solution internally as Customer Zero before public release. The technology addresses inconsistent a…
rss:Recorded Future
—
06:57 KSA
CRITICAL
supply_chain
<strong>PurpleBravo’s Targeting of the IT Software Supply Chain</strong>
PurpleBravo, a North Korean APT group, conducts supply chain attacks using fake job offers to compromise software developers. The group deploys remote access trojans (RATs) and infostealers like BeaverTail …
rss:Mandiant Blog
—
06:57 KSA
CRITICAL
apt
<strong>Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue</strong>
Despite US government sanctions, Intellexa continues operating its Predator spyware platform with ongoing zero-day exploits. The commercial surveillance vendor remains active in mercena…
rss:Mandiant Blog
—
06:57 KSA
HIGH
apt
<strong>Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks</strong>
Chinese state-sponsored threat actor APT24 has evolved its tactics over three years, moving beyond traditional watering hole attacks to multi-vector approaches. The group deploys BADAUDIO malwa…
rss:Dark Reading
—
06:57 KSA
CRITICAL
apt
<strong>DarkSword: iPhone Exploit Kit Serves Spies &amp; Thieves Alike</strong>
A sophisticated iOS exploit kit called DarkSword is actively targeting users in Saudi Arabia, Turkey, Malaysia, and Ukraine using multiple zero-day vulnerabilities. This advanced threat poses sig…
rss:Dark Reading
—
06:57 KSA
HIGH
vulnerability
<strong>'Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft</strong>
Three vulnerabilities dubbed 'Claudy Day' affecting Claude AI can be exploited through prompt injection combined with other flaws. A simple Google search can trigger a full attack chain threateni…
rss:Dark Reading
—
06:57 KSA
HIGH
data_breach
<strong>Researchers: Meta, TikTok Steal Personal &amp; Financial Info When Users Click Ads</strong>
Research reveals that Meta and TikTok use tracking pixels to collect sensitive user data including credit card information and geolocation even after users navigate to adverti…
rss:Recorded Future
—
06:31 KSA
HIGH
general
<strong>Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026</strong>
Recorded Future's 2026 State of Security report analyzes the fragmented global threat landscape of 2025, providing comprehensive threat intelligence based on proprietary data …
rss:Recorded Future
—
06:31 KSA
HIGH
general
<strong>State of Security Report | Recorded Future</strong>
Recorded Future's 2026 State of Security report covers critical threat intelligence topics including geopolitical fragmentation, state-sponsored cyber operations, ransomware evolution, and emerging technology risks. The…
rss:Recorded Future
—
06:31 KSA
MEDIUM
general
<strong>From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations</strong>
Recorded Future introduces Autonomous Threat Operations that dramatically reduces threat hunting complexity from 27 manual steps to just 5 largely automated steps…
rss:Mandiant Blog
—
06:31 KSA
HIGH
vulnerability
<strong>Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation</strong>
Mandiant released comprehensive Net-NTLMv1 rainbow tables to accelerate migration from this deprecated protocol. Net-NTLMv1 has been known as insecure for over two decade…
rss:Mandiant Blog
—
06:31 KSA
MEDIUM
data_breach
<strong>AuraInspector: Auditing Salesforce Aura for Data Exposure</strong>
Mandiant released AuraInspector, an open-source tool for auditing access control misconfigurations in Salesforce Aura framework. The tool helps defenders identify data exposure risks in Salesforce Experie…
rss:Mandiant Blog
—
06:31 KSA
CRITICAL
vulnerability
<strong>Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)</strong>
Multiple threat actors are exploiting CVE-2025-55182 (React2Shell), a critical unauthenticated remote code execution vulnerability in React Server Components disclosed on December 3, 2025. The vulnerabi…
rss:Malwarebytes Lab
—
06:30 KSA
HIGH
malware
<strong>Hacked sites deliver Vidar infostealer to Windows users</strong>
Compromised WordPress sites are hosting fake CAPTCHA verification pages that deceive Windows users into downloading and executing the Vidar information-stealing malware. This social engineering attack explo…
rss:Malwarebytes Lab
—
06:30 KSA
MEDIUM
vulnerability
<strong>Zombie ZIP method can fool antivirus during the first scan</strong>
Security researchers disclosed the Zombie ZIP technique that can evade initial antivirus detection by exploiting how AV engines scan compressed files. This method allows malicious payloads to bypass firs…
rss:Dark Reading
—
06:30 KSA
MEDIUM
general
<strong>Post-Quantum Web Could be Safer, Faster</strong>
Major technology providers are implementing quantum-resistant HTTPS protocols that reduce certificate sizes by 90%, improving both security against future quantum computing threats and network performance. This advancement…
rss:Dark Reading
—
06:30 KSA
HIGH
apt
<strong>EU Sanctions Companies in China, Iran for Cyberattacks</strong>
The European Union has imposed sanctions on entities in China and Iran for conducting cyberattacks, prohibiting them from entering or conducting business within EU territories. This represents escalating int…
rss:Dark Reading
—
06:30 KSA
HIGH
malware
<strong>C2 Implant 'SnappyClient' Targets Crypto Wallets</strong>
A sophisticated C2 implant named SnappyClient has been discovered targeting cryptocurrency wallets with capabilities for remote access, data exfiltration, and surveillance. The malware poses significant …
rss:CISA Advisories
—
06:30 KSA
HIGH
vulnerability
<strong>Siemens Heliox EV Chargers</strong>
Siemens Heliox EV chargers contain an improper access control vulnerability allowing attackers to reach unauthorized services through the charging cable. Siemens has released security updates and recommends immediate patching to preven…
rss:CISA Advisories
—
06:30 KSA
HIGH
vulnerability
<strong>Trane Tracer SC, Tracer SC+, and Tracer Concierge</strong>
Multiple vulnerabilities in Trane Tracer SC, SC+, and Concierge building management systems could allow attackers to disclose sensitive information, execute arbitrary commands, or cause denial-of-service. These f…
rss:CISA Advisories
—
06:30 KSA
MEDIUM
vulnerability
<strong>Siemens SIMATIC</strong>
Siemens SIMATIC S7-1500 industrial controllers contain a code injection vulnerability exploitable through social engineering, where attackers trick users into importing malicious trace files via the web interface. Siemens has released patches for…
rss:Malwarebytes Lab
—
06:29 KSA
MEDIUM
general
<strong>90% of people don’t trust AI with their data</strong>
A privacy survey reveals that 90% of respondents do not trust AI systems with their personal data, leading many to reduce their AI usage. This widespread distrust poses significant challenges for organizations impleme…
rss:Malwarebytes Lab
—
06:29 KSA
HIGH
phishing
<strong>How searching for a VPN could mean handing over your work login details</strong>
Cybercriminals are using SEO poisoning techniques to make malicious VPN downloads appear legitimate in search results, specifically targeting corporate login credentials. Organizations face …
rss:Malwarebytes Lab
—
06:29 KSA
MEDIUM
malware
<strong>Google cracks down on Android apps abusing accessibility</strong>
Google has implemented stricter controls on Android apps that abuse accessibility features, which malware has exploited for years to gain elevated permissions and control devices. This security enhancement…
rss:Mandiant Blog
—
06:29 KSA
HIGH
phishing
<strong>Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft</strong>
Mandiant identified expansion of ShinyHunters-branded extortion operations using sophisticated voice phishing (vishing) and credential harvesting techniques. These attacks target …
rss:Mandiant Blog
—
06:29 KSA
HIGH
general
<strong>No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network</strong>
Google and partners disrupted IPIDEA, believed to be one of the world's largest residential proxy networks used by threat actors. These proxy infrastructures enable cybercr…
rss:Mandiant Blog
—
06:29 KSA
CRITICAL
vulnerability
<strong>Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088</strong>
Google Threat Intelligence identified widespread active exploitation of critical WinRAR vulnerability CVE-2025-8088 by diverse threat actors. The vulnerability, patched in July 2025, is…
rss:Dark Reading
—
06:29 KSA
HIGH
vulnerability
<strong>AI Conundrum: Why MCP Security Can't Be Patched Away</strong>
Model Context Protocol (MCP) introduces architectural security vulnerabilities in Large Language Model environments that cannot be resolved through traditional patching methods. Researchers warn these ris…
rss:Dark Reading
—
06:29 KSA
MEDIUM
phishing
<strong>With Government's Role Uncertain, Businesses Unite to Combat Fraud</strong>
Major industry leaders are forming collaborative partnerships to share threat intelligence and strengthen defenses against increasing online fraud and scams. This private sector initiative e…
rss:Dark Reading
—
06:29 KSA
LOW
general
<strong>Native Launches With Security Control Plane for Multicloud</strong>
Cloud security startup Native launches a unified security control plane that translates and enforces consistent security policies across multiple cloud providers including AWS, Azure, Google Cloud, and O…
rss:Malwarebytes Lab
—
06:29 KSA
HIGH
vulnerability
<strong>Apple patches WebKit bug that could let sites access your data</strong>
Apple released a silent security update fixing WebKit vulnerability CVE-2026-20643 that could allow malicious websites to access user data. The patch was deployed as a Background Security Improvement…
rss:Malwarebytes Lab
—
06:29 KSA
HIGH
phishing
<strong>Inside a network of 20,000+ fake shops</strong>
Security researchers uncovered a massive network of over 20,000 fake e-commerce websites designed to steal payment card details and personal information from unsuspecting shoppers. The fraudulent operation represents a sign…
rss:Malwarebytes Lab
—
06:29 KSA
MEDIUM
phishing
<strong>Fake Pudgy World site steals your crypto passwords</strong>
A phishing website impersonating Pudgy World is targeting cryptocurrency users by mimicking the legitimate Pudgy Penguins brand. The fake site is designed to steal crypto wallet passwords and credentials from un…
rss:Dark Reading
—
06:29 KSA
CRITICAL
vulnerability
<strong>Patch Now: Oracle's Fusion Middleware Has Critical RCE Flaw</strong>
Oracle Fusion Middleware contains a critical remote code execution vulnerability affecting Identity and Web Services Managers. Attackers can exploit this flaw without authentication when these serv…
rss:Dark Reading
—
06:29 KSA
HIGH
ransomware
<strong>Cyber OpSec Fail: Beast Gang Exposes Ransomware Server</strong>
The Beast ransomware gang inadvertently exposed their central cloud server, revealing files that document their systematic tactics targeting network backups. This operational security failure provides insigh…
rss:Dark Reading
—
06:29 KSA
CRITICAL
ransomware
<strong>Interlock Ransomware Targets Cisco Enterprise Firewalls</strong>
Interlock ransomware group exploited a critical Cisco firewall vulnerability weeks before public disclosure, demonstrating zero-day access capabilities. The gang specializes in double-extortion attacks and …
rss:CISA Advisories
—
06:29 KSA
HIGH
vulnerability
<strong>Siemens RUGGEDCOM APE1808 Devices</strong>
Fortinet discovered vulnerabilities in FORTIOS affecting Siemens RUGGEDCOM APE1808 industrial devices. Siemens has released security updates and strongly recommends immediate patching to address these vulnerabilities in their in…
rss:CISA Advisories
—
06:29 KSA
HIGH
vulnerability
<strong>Siemens SIDIS Prime</strong>
Multiple vulnerabilities discovered in SIDIS Prime versions before V4.0.800 affecting OpenSSL, SQLite, and Node.js components. Siemens released security patches addressing these critical infrastructure vulnerabilities and urges immediate upda…
rss:CISA Advisories
—
06:29 KSA
CRITICAL
vulnerability
<strong>Inductive Automation Ignition Software</strong>
Critical vulnerability in Inductive Automation Ignition Software allows authenticated attackers to execute malicious code with elevated OS service account permissions. This privilege escalation flaw poses significant risk t…
rss:CISA Advisories
—
06:28 KSA
MEDIUM
vulnerability
<strong>Schneider Electric EcoStruxure Data Center Expert</strong>
Schneider Electric disclosed a hard-coded credentials vulnerability in EcoStruxure IT Data Center Expert (DCE) affecting the SOCKS Proxy feature. The vulnerability requires administrator credentials and the featu…
rss:CISA Advisories
—
06:28 KSA
CRITICAL
vulnerability
<strong>CISA Adds Two Known Exploited Vulnerabilities to Catalog</strong>
CISA added two actively exploited vulnerabilities to its KEV Catalog: CVE-2026-3909 affecting Google Skia (out-of-bounds write) and CVE-2026-3910 in Chromium V8 engine. These browser-based vulnerabilities …
rss:BleepingComputer
—
06:28 KSA
HIGH
data_breach
<strong>Crunchyroll probes breach after hacker claims to steal 6.8M users' data</strong>
Crunchyroll anime streaming platform is investigating a data breach affecting approximately 6.8 million users. Hackers claim to have stolen personal information of subscribers, raising …
rss:US-CERT Alerts
—
06:13 KSA
HIGH
ransomware
<strong>#StopRansomware: Medusa Ransomware</strong>
US-CERT has issued a joint cybersecurity advisory on Medusa ransomware as part of the #StopRansomware initiative. The advisory details tactics, techniques, and procedures used by this ransomware variant to help network defender…
rss:Threatpost
—
06:13 KSA
CRITICAL
vulnerability
<strong>Google Patches Chrome’s Fifth Zero-Day of the Year</strong>
Google patched 11 vulnerabilities in Chrome including a critical zero-day flaw involving insufficient input validation that enables arbitrary code execution. The vulnerability is actively being exploited in the …
rss:The Hacker News
—
06:13 KSA
CRITICAL
vulnerability
<strong>Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks</strong>
Citrix released security updates for two vulnerabilities in NetScaler ADC and Gateway, including CVE-2026-3055 (CVSS 9.3), a critical input validation flaw allowing unauthenticated…
rss:The Hacker News
—
06:13 KSA
HIGH
supply_chain
<strong>North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware</strong>
North Korean threat actors (WaterPlum/Contagious Interview campaign) are exploiting Visual Studio Code's tasks.json auto-run feature to deploy StoatWaffle malware. This supply chain …
rss:The Hacker News
—
06:13 KSA
MEDIUM
general
<strong>⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More</strong>
Weekly cybersecurity recap covering multiple threats including supply chain attacks targeting CI/CD pipelines, shutdown of long-exploited IoT devices, and various securit…
rss:SecurityWeek
—
06:12 KSA
CRITICAL
supply_chain
<strong>Iran Built a Vast Camera Network to Control Dissent. Israel Turned It Into a Targeting Tool</strong>
Israel successfully hijacked Iran's extensive street surveillance camera network and weaponized it for targeted operations, including the assassination of Iran's supreme …
rss:Recorded Future
—
06:12 KSA
HIGH
phishing
<strong>ClickFix Campaigns Targeting Windows and macOS</strong>
Five ClickFix social engineering clusters targeting Windows and macOS systems have been identified, exploiting QuickBooks, Booking.com, and Birdeye brands. Threat actors use obfuscated commands through native system…
rss:Recorded Future
—
06:12 KSA
CRITICAL
supply_chain
<strong>GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack</strong>
GrayCharlie threat actor compromises WordPress sites of law firms to deliver malware through fake browser updates and ClickFix techniques. The campaign deploys NetSupport RAT, Stealc stealer, an…
rss:Recorded Future
—
06:12 KSA
LOW
general
<strong>Network Intelligence: Your Questions, Global Answers</strong>
Network intelligence solutions provide security teams with global visibility and active threat investigation capabilities. This approach offers more control compared to passive, generic threat feeds for enhanc…
rss:Mandiant Blog
—
06:12 KSA
CRITICAL
apt
<strong>Beyond the Battlefield: Threats to the Defense Industrial Base</strong>
State-sponsored cyber actors are conducting persistent cyber operations targeting the defense industrial base and its supply chains. Modern warfare has extended beyond physical battlefields into the …
rss:Mandiant Blog
—
06:12 KSA
HIGH
apt
<strong>UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering</strong>
North Korean threat group UNC1069 is using advanced tooling and AI-enabled social engineering to target cryptocurrency and decentralized finance (DeFi) organizations. Mandia…
rss:Mandiant Blog
—
06:12 KSA
HIGH
data_breach
<strong>Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS</strong>
Mandiant is tracking significant expansion in ShinyHunters-branded extortion operations targeting SaaS platforms through vishing and social engineering tactics…
rss:Malwarebytes Lab
—
06:11 KSA
CRITICAL
apt
<strong>A DarkSword hangs over unpatched iPhones</strong>
State-sponsored attackers are exploiting DarkSword, a vulnerability chain targeting unpatched iPhones. Organizations using iOS devices face critical risk from these advanced persistent threats requiring immediate patching…
rss:Malwarebytes Lab
—
06:11 KSA
HIGH
data_breach
<strong>Your tax forms sell for $20 on the dark web</strong>
Cybercriminals are actively trading stolen tax records on dark web forums for as little as $20 during tax season. This represents significant identity theft risk for individuals and potential fraud exposure for financi…
rss:Malwarebytes Lab
—
06:11 KSA
MEDIUM
phishing
<strong>Researchers found font-rendering trick to hide malicious commands</strong>
Security researchers discovered a font-rendering technique that can deceive AI assistants into overlooking malicious commands embedded in websites. This social engineering method poses risks to or…
rss:Krebs on Securit
—
06:11 KSA
HIGH
ransomware
<strong>Please Don’t Feed the Scattered Lapsus ShinyHunters</strong>
The Scattered Lapsus ShinyHunters (SLSH) data ransom gang employs aggressive extortion tactics including harassment, threats, and swatting of executives and their families. The group simultaneously notifies jou…
rss:Dark Reading
—
06:11 KSA
LOW
general
<strong>CISOs Debate Human Role in AI-Powered Security</strong>
Security executives at RSAC 2026 debated the necessity of human oversight in AI-powered security systems. The discussion challenges traditional 'human in the loop' approaches as AI capabilities advance in cybersecur…
rss:Dark Reading
—
06:11 KSA
HIGH
phishing
<strong>Attackers Hide Infostealer in Copyright Infringement Notices</strong>
A sophisticated phishing campaign targets healthcare, government, hospitality, and education sectors globally using fake copyright infringement notices. Attackers deploy infostealer malware while emplo…
rss:Dark Reading
—
06:11 KSA
LOW
general
<strong>AI Dominates RSAC Innovation Sandbox</strong>
Ten cybersecurity startups compete in RSAC Innovation Sandbox, with AI-focused solutions dominating the competition. Each finalist presents their innovative security technology in a three-minute pitch to demonstrate emerging …
rss:CISA Advisories
—
06:11 KSA
HIGH
vulnerability
<strong>Schneider Electric SCADAPack and RemoteConnect</strong>
Schneider Electric disclosed a vulnerability affecting its SCADAPack x70 RTU products, including SCADAPack 47xi, 47x, and 57x models used for remote monitoring and control in industrial environments. Organizations u…
rss:CISA Advisories
—
06:11 KSA
HIGH
vulnerability
<strong>Siemens SICAM SIAPP SDK</strong>
Multiple vulnerabilities discovered in Siemens SICAM SIAPP SDK could enable attackers to disrupt customer-developed SIAPP applications or their simulation environments. Potential impacts include denial of service, data corruption within S…
rss:CISA Advisories
—
06:11 KSA
MEDIUM
vulnerability
<strong>CODESYS in Festo Automation Suite</strong>
Vulnerabilities identified in CODESYS components within Festo Automation Suite versions prior to 2.8.0.138, affecting the CODESYS Development System 3.0. Organizations using Festo automation solutions should upgrade to the lates…
rss:BleepingComputer
—
06:10 KSA
HIGH
ransomware
<strong>Manager of botnet used in ransomware attacks gets 2 years in prison</strong>
Russian national sentenced to 2 years for managing phishing botnet used in BitPaymer ransomware attacks against 72 U.S. companies. The botnet infrastructure enabled widespread ransomware deploym…
rss:BleepingComputer
—
06:10 KSA
HIGH
phishing
<strong>Tycoon2FA phishing platform returns after recent police disruption</strong>
Tycoon2FA phishing-as-a-service platform has resumed full operations shortly after Europol disruption on March 4. The platform's rapid recovery demonstrates resilience of cybercrime infrastructur…
rss:BleepingComputer
—
06:10 KSA
CRITICAL
malware
<strong>TeamPCP deploys Iran-targeted wiper in Kubernetes attacks</strong>
TeamPCP hacking group targeting Kubernetes clusters with destructive wiper malware that activates when detecting Iran-configured systems. The attacks represent geopolitically-motivated cyber operations ag…
rss:US-CERT Alerts
—
05:43 KSA
HIGH
malware
<strong>Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations</strong>
FBI and CISA issued a joint advisory on LummaC2 malware being deployed by threat actors to exfiltrate sensitive organizational data. The advisory provides known tactics, techniq…
rss:US-CERT Alerts
—
05:43 KSA
CRITICAL
apt
<strong>Russian GRU Targeting Western Logistics Entities and Technology Companies</strong>
Russian state-sponsored GRU actors are conducting cyber campaigns targeting Western logistics entities and technology companies involved in coordinating and delivering foreign assistance t…
rss:US-CERT Alerts
—
05:43 KSA
HIGH
general
<strong>Fast Flux: A National Security Threat</strong>
A cybersecurity advisory warns that Fast Flux technique represents a significant national security threat, allowing malicious actors to consistently evade detection. Many networks lack adequate defenses to detect and block t…
rss:Threatpost
—
05:43 KSA
CRITICAL
vulnerability
<strong>Firewall Bug Under Active Attack Triggers CISA Warning</strong>
CISA has issued an urgent warning about active exploitation of a vulnerability in Palo Alto Networks' PAN-OS firewall system. Organizations using PAN-OS are advised to apply security patches immediately to p…
rss:Threatpost
—
05:43 KSA
MEDIUM
phishing
<strong>Fake Reservation Links Prey on Weary Travelers</strong>
Cybercriminals are exploiting travel disruptions by sending fake reservation links to travelers affected by flight cancellations and hotel overbookings. These phishing attacks aim to steal personal and financial inf…
rss:Threatpost
—
05:43 KSA
CRITICAL
vulnerability
<strong>iPhone Users Urged to Update to Patch 2 Zero-Days</strong>
Apple has released critical security updates for iOS and macOS to patch two zero-day vulnerabilities in the kernel and WebKit that are actively exploited. These flaws allow attackers to execute arbitrary code and…
rss:The Hacker News
—
05:43 KSA
HIGH
supply_chain
<strong>Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials</strong>
Researchers discovered malicious npm packages in the Ghost campaign designed to steal cryptocurrency wallets and sensitive credentials. Seven packages published by user 'mikilanjillo' tar…
rss:The Hacker News
—
05:43 KSA
CRITICAL
supply_chain
<strong>TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials</strong>
Threat actor TeamPCP compromised two GitHub Actions workflows maintained by Checkmarx using credential-stealing malware. This attack follows their previous Trivy supply chain compromise, demonstr…
rss:The Hacker News
—
05:43 KSA
HIGH
ransomware
<strong>U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage</strong>
A 26-year-old Russian national received a 6.75-year prison sentence in the U.S. for assisting major cybercrime groups, including Yanluowang ransomware operators, in attacks against U.S…
rss:SecurityWeek
—
05:42 KSA
HIGH
vulnerability
<strong>Chrome 146 Update Patches High-Severity Vulnerabilities</strong>
Google Chrome 146 update addresses eight memory safety vulnerabilities across seven components with high severity ratings. Organizations using Chrome should prioritize immediate deployment to prevent potent…
rss:SecurityWeek
—
05:42 KSA
LOW
general
<strong>Webinar Today: Putting CIS Controls and Benchmarks into Practice</strong>
Educational webinar focusing on implementing CIS Critical Security Controls and CIS Benchmarks for secure configuration management at enterprise scale. Provides guidance on standardizing security c…
rss:SecurityWeek
—
05:42 KSA
HIGH
data_breach
<strong>3.1 Million Impacted by QualDerm Data Breach</strong>
QualDerm suffered a major data breach affecting 3.1 million individuals with hackers stealing personal information, medical records, and health insurance data from internal systems. This healthcare sector breach highl…
rss:Recorded Future
—
05:42 KSA
CRITICAL
apt
<strong>Preparing for Russia’s New Generation Warfare in Europe</strong>
Russia is conducting a coordinated full-scale hybrid warfare campaign against NATO combining cyber attacks, sabotage operations, and influence campaigns. This New Generation Warfare approach poses significa…
rss:Recorded Future
—
05:42 KSA
CRITICAL
vulnerability
<strong>January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day</strong>
January 2026 recorded 23 actively exploited critical vulnerabilities, marking a 5% increase in threat activity. Russian APT28 group exploited a zer…
rss:Recorded Future
—
05:42 KSA
HIGH
general
<strong>2025 Cloud Threat Hunting and Defense Landscape</strong>
Threat actors are intensifying attacks on cloud infrastructure by exploiting misconfigurations, abusing native cloud services, and pivoting through hybrid environments. Attack patterns show evolution across exploit…
rss:Mandiant Blog
—
05:42 KSA
CRITICAL
apt
<strong>Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign</strong>
Google Threat Intelligence Group and Mandiant disrupted a global espionage campaign by UNC2814, a suspected Chinese threat actor, targeting telecommunications and government organ…
rss:Mandiant Blog
—
05:42 KSA
CRITICAL
vulnerability
<strong>From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day</strong>
Mandiant and GTIG identified zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines by threat actor UNC6201. The vulnerability…
rss:Mandiant Blog
—
05:42 KSA
HIGH
general
<strong>GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</strong>
GTIG observed threat actors increasingly integrating AI in Q4 2025 to accelerate attack lifecycles, achieving productivity gains in reconnaissance, socia…
rss:Malwarebytes Lab
—
05:41 KSA
HIGH
vulnerability
<strong>This is all it takes to stop a train (Lock and Code S07E06)</strong>
Simple network vulnerabilities in Bay Area transit systems can cause major train outages. The podcast discusses how basic network security problems pose significant risks to critical transportation infr…
rss:Malwarebytes Lab
—
05:41 KSA
MEDIUM
general
<strong>Could your face change what you pay? NYC wants limits on biometric tracking</strong>
NYC lawmakers propose regulations to limit biometric tracking technologies that could enable surveillance-based pricing and customer profiling. This addresses privacy concerns and potent…
rss:Malwarebytes Lab
—
05:41 KSA
HIGH
malware
<strong>That “job brief” on Google Forms could infect your device</strong>
Cybercriminals are using fake job offers distributed through Google Forms to deliver PureHVNC malware. This remote access trojan allows attackers to take complete control of infected devices, posing serio…
rss:Krebs on Securit
—
05:41 KSA
HIGH
phishing
<strong>‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA</strong>
A new phishing-as-a-service platform called 'Starkiller' enables cybercriminals to bypass traditional detection methods by proxying real login pages instead of using static copies. This sophisticated se…
rss:Krebs on Securit
—
05:41 KSA
HIGH
ddos
<strong>Kimwolf Botnet Swamps Anonymity Network I2P</strong>
The Kimwolf IoT botnet has been actively disrupting the I2P anonymity network for over a week, targeting the decentralized encrypted communications infrastructure. This attack demonstrates the vulnerability of privacy-…
rss:Krebs on Securit
—
05:41 KSA
CRITICAL
vulnerability
<strong>Patch Tuesday, February 2026 Edition</strong>
Microsoft released patches for over 50 security vulnerabilities in Windows and other software, including critical fixes for six zero-day vulnerabilities actively exploited by attackers. Organizations must prioritize immediate…
rss:Dark Reading
—
05:41 KSA
MEDIUM
general
<strong>AI in the SOC: What Could Go Wrong?</strong>
Two cybersecurity leaders conducted a six-month pilot testing AI integration in their Security Operations Centers. The study reveals practical challenges and lessons learned from implementing AI-driven security automation in r…
rss:Dark Reading
—
05:41 KSA
CRITICAL
supply_chain
<strong>Trivy Supply Chain Attack Targets CI/CD Secrets</strong>
Threat actors weaponized the open-source Trivy security scanning tool to deploy an infostealer malware into CI/CD pipelines. The attack successfully exfiltrated cloud credentials, SSH keys, authentication tokens, a…
rss:Dark Reading
—
05:41 KSA
CRITICAL
ransomware
<strong>Ransomware's New Era: Moving at AI Speed</strong>
Ransomware operators are leveraging AI technologies to accelerate attack speeds and evade security controls. Attackers exploit legitimate credentials and focus on data exfiltration, using AI to automate reconnaissanc…
rss:CISA Advisories
—
05:40 KSA
CRITICAL
apt
<strong>CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</strong>
CISA issued guidance on hardening endpoint management systems following a March 11, 2026 cyberattack against Stryker Corporation that compromised their Microsoft environmen…
rss:BleepingComputer
—
05:40 KSA
HIGH
data_breach
<strong>Dutch Ministry of Finance discloses breach affecting employees</strong>
The Dutch Ministry of Finance confirmed a cyberattack that breached some of its systems, detected last week. The incident affected employee data and represents a significant breach of a critical gove…
rss:BleepingComputer
—
05:40 KSA
LOW
general
<strong>OpenAI rolls out ChatGPT Library to store your personal files</strong>
OpenAI introduced a new 'Library' feature for ChatGPT that enables users to store personal files and images on OpenAI's cloud storage for future reference. This raises data privacy and security consid…
rss:BleepingComputer
—
05:40 KSA
MEDIUM
data_breach
<strong>Mazda discloses security breach exposing employee and partner data</strong>
Mazda Motor Corporation disclosed a security incident detected in December that exposed information belonging to employees and business partners. The breach affects a major automotive manufacture…
rss:CISA Advisories
—
05:40 KSA
CRITICAL
vulnerability
<strong>Automated Logic WebCTRL Premium Server</strong>
Critical vulnerabilities discovered in Automated Logic WebCTRL Premium Server that could allow attackers to read, intercept, or modify communications. The vulnerabilities pose significant risks to building automation and HV…
rss:CISA Advisories
—
05:40 KSA
HIGH
vulnerability
<strong>Schneider Electric EcoStruxure PME and EPO</strong>
Schneider Electric disclosed vulnerabilities in EcoStruxure Power Monitoring Expert (PME) and Power Operation (EPO) products. These on-premises software solutions are used in power-critical and energy-intensive faciliti…
rss:CISA Advisories
—
05:40 KSA
HIGH
vulnerability
<strong>CTEK Chargeportal</strong>
Multiple vulnerabilities in CTEK Chargeportal could allow attackers to gain unauthorized administrative control over electric vehicle charging stations or launch denial-of-service attacks. This threatens the availability and security of EV char…
rss:CISA Advisories
—
05:39 KSA
HIGH
vulnerability
<strong>Schneider Electric Modicon M241, M251, and M262</strong>
Critical vulnerability in Schneider Electric Modicon controllers (M241, M251, M262) versions prior to 5.4.13.12 allows attackers to cause denial-of-service conditions. This affects industrial control systems used i…
rss:CISA Advisories
—
05:39 KSA
HIGH
vulnerability
<strong>Schneider Electric Modicon Controllers M241, M251, M258, and LMC058</strong>
Cross-site scripting and open redirect vulnerabilities in Schneider Electric Modicon controllers (M241, M251, M258, LMC058) could lead to account takeover or code execution in user browsers. Thi…
rss:CISA Advisories
—
05:39 KSA
HIGH
vulnerability
<strong>IGL-Technologies eParking.fi</strong>
Multiple vulnerabilities in IGL-Technologies eParking.fi charging station systems allow attackers to gain unauthorized administrative control or launch denial-of-service attacks. This threatens electric vehicle charging infrastructur…
rss:BleepingComputer
—
05:39 KSA
HIGH
supply_chain
<strong>HackerOne discloses employee data breach after Navia hack</strong>
Bug bounty platform HackerOne suffered a supply chain breach affecting hundreds of employees after attackers compromised Navia, its U.S. benefits administrator. The incident highlights third-party vendor …
rss:BleepingComputer
—
05:39 KSA
HIGH
data_breach
<strong>Infinite Campus warns of breach after ShinyHunters claims data theft</strong>
Infinite Campus, a major K-12 student information system, disclosed a data breach following extortion attempts by threat actors. The breach affects educational institutions and potentially expo…
rss:BleepingComputer
—
05:39 KSA
MEDIUM
ransomware
<strong>Yanluowang ransomware access broker gets 81 months in prison</strong>
A Russian national received an 81-month prison sentence for operating as an initial access broker for Yanluowang ransomware operations. This conviction demonstrates international law enforcement cooper…
rss:US-CERT Alerts
—
05:24 KSA
MEDIUM
general
<strong>CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization</strong>
CISA and USCG conducted a proactive threat hunt at a US critical infrastructure organization and identified multiple cybe…
rss:US-CERT Alerts
—
05:24 KSA
HIGH
ransomware
<strong>#StopRansomware: Interlock</strong>
CISA issued a joint advisory as part of the #StopRansomware campaign detailing the Interlock ransomware variant. The advisory provides network defenders with information on tactics, techniques, and procedures used by this ransomware th…
rss:US-CERT Alerts
—
05:24 KSA
CRITICAL
ransomware
<strong>Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider</strong>
CISA warns that ransomware actors exploited an unpatched vulnerability in SimpleHelp RMM software to compromise a utility billing soft…
rss:Threatpost
—
05:23 KSA
HIGH
ransomware
<strong>Ransomware Attacks are on the Rise</strong>
Lockbit ransomware group leads summer attacks as the most prolific threat actor, followed by two groups originating from the disbanded Conti ransomware operation. Organizations face increased risk from these highly active ranso…
rss:Threatpost
—
05:23 KSA
CRITICAL
vulnerability
<strong>Cybercriminals Are Selling Access to Chinese Surveillance Cameras</strong>
Tens of thousands of Chinese surveillance cameras remain vulnerable to an 11-month-old critical CVE that has not been patched. Cybercriminals are actively selling unauthorized access to these comp…
rss:Threatpost
—
05:23 KSA
HIGH
insider
<strong>Twitter Whistleblower Complaint: The TL;DR Version</strong>
Twitter's former head of security filed a whistleblower complaint alleging severe security and privacy failures at the social media platform. The complaint raises concerns about inadequate security practices, da…
rss:The Hacker News
—
05:23 KSA
LOW
general
<strong>5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents</strong>
Gartner published its first Market Guide for Guardian Agents on February 25, 2026, establishing a new category in cybersecurity technology. This guide defines the emerging market for AI-pow…
rss:The Hacker News
—
05:23 KSA
HIGH
phishing
<strong>Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner</strong>
An active phishing campaign targets French-speaking corporate environments using fake resumes containing highly obfuscated VBScript files. The attack deploys cryptocurrency miners a…
rss:The Hacker News
—
05:23 KSA
MEDIUM
general
<strong>The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills</strong>
Despite increased specialization and advanced tooling in cybersecurity, organizations continue struggling with fundamental security challenges. The article highlights how over-specializa…
rss:SecurityWeek
—
05:23 KSA
CRITICAL
apt
<strong>Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector</strong>
Poland experienced a surge in cyberattacks in 2025, including a destructive infiltration of its energy infrastructure in December suspected to originate from Russia. The…
rss:SecurityWeek
—
05:23 KSA
LOW
general
<strong>RSAC 2026 Conference Announcements Summary (Day 1)</strong>
Summary of vendor announcements made on the first day of the RSA Conference 2026. The article covers new cybersecurity products, services, and solutions presented by various security vendors at the industry's pr…
rss:SecurityWeek
—
05:23 KSA
HIGH
data_breach
<strong>Extortion Group Claims It Hacked AstraZeneca</strong>
The Lapsus$ extortion group claims to have breached AstraZeneca, allegedly compromising internal code repositories, employee credentials, and sensitive employee data. This represents a significant data breach targetin…
rss:Recorded Future
—
05:22 KSA
HIGH
vulnerability
<strong>February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January</strong>
February 2026 recorded 13 critical vulnerabilities requiring immediate patching, representing a 43% decrease from January's 23 vulnerabilities. This reduction in high-impact CVEs…
rss:Recorded Future
—
05:22 KSA
HIGH
ransomware
<strong>Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence</strong>
Latin America faces escalating cyber threats including PIX payment fraud, ransomware, and targeted attacks that overwhelm reactive security approaches. Organizations r…
rss:Recorded Future
—
05:22 KSA
MEDIUM
general
<strong>Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA</strong>
Recorded Future enhances payment fraud prevention through partnership with CYBERA to detect money mule networks and scam-linked bank accounts. This expansion p…
rss:Mandiant Blog
—
05:22 KSA
CRITICAL
malware
<strong>Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition</strong>
Mandiant provides updated guidance on preparing for and defending against destructive malware attacks that aim to destroy data and eliminate evidence. The guidance includes new recomme…
rss:Mandiant Blog
—
05:22 KSA
CRITICAL
vulnerability
<strong>Look What You Made Us Patch: 2025 Zero-Days in Review</strong>
Google Threat Intelligence Group tracked 90 zero-day vulnerabilities exploited in the wild during 2025, representing a decrease from record highs. The analysis provides critical insights into exploitation tre…
rss:Mandiant Blog
—
05:22 KSA
CRITICAL
apt
<strong>Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</strong>
Google Threat Intelligence Group discovered 'Coruna', a sophisticated exploit kit targeting iPhone devices running iOS versions 13.0 through 17.2.1. The kit contains five exploits and represents a sign…
rss:Malwarebytes Lab
—
05:21 KSA
MEDIUM
phishing
<strong>The March Madness scam playbook</strong>
Cybercriminals exploit major sporting events like March Madness to launch various scam campaigns targeting fans. The article provides guidance on identifying and avoiding common fraud schemes associated with large-scale sports tou…
rss:Malwarebytes Lab
—
05:21 KSA
MEDIUM
malware
<strong>Advanced Flow will make Android sideloading safer</strong>
Google introduces Advanced Flow security feature for Android to enhance sideloading safety by implementing delays that disrupt scam-driven application installations. This measure aims to protect users from malici…
rss:Malwarebytes Lab
—
05:21 KSA
LOW
general
<strong>A week in security (March 16 &#8211; March 22)</strong>
Weekly cybersecurity roundup covering various security topics and incidents from March 16-22, 2026. Provides consolidated overview of recent threats, vulnerabilities, and security developments.
Source: https://…
rss:Krebs on Securit
—
05:21 KSA
HIGH
vulnerability
<strong>Microsoft Patch Tuesday, March 2026 Edition</strong>
Microsoft released security patches addressing 77 vulnerabilities in Windows and other software products. While no zero-day exploits were patched this month, unlike February's five critical zero-days, some updates may …
rss:Krebs on Securit
—
05:21 KSA
MEDIUM
general
<strong>How AI Assistants are Moving the Security Goalposts</strong>
AI-powered assistants and autonomous agents with access to user systems, files, and online services are gaining popularity among developers and IT workers. Recent incidents highlight significant security concer…
rss:Krebs on Securit
—
05:21 KSA
CRITICAL
ddos
<strong>Who is the Kimwolf Botmaster “Dort”?</strong>
Following disclosure of a vulnerability used to create Kimwolf, the world's largest and most disruptive botnet, the operator known as 'Dort' has orchestrated widespread distributed attacks. The investigation focuses on identi…
rss:Dark Reading
—
05:21 KSA
HIGH
supply_chain
<strong>GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead</strong>
A sophisticated AI-assisted campaign has distributed over 300 malicious packages disguised as legitimate software including developer tools and game cheats through GitHub. The trojanized packages …
rss:Dark Reading
—
05:21 KSA
MEDIUM
general
<strong>How a Large Bank Uses AI Digital Twins for Threat Hunting</strong>
JPMorgan Chase has implemented AI-powered digital twins and digital fingerprinting technology for advanced threat hunting capabilities. This approach enables the bank to identify malicious actors and susp…
rss:Dark Reading
—
05:21 KSA
MEDIUM
general
<strong>Microsoft Proposes Better Identity, Guardrails for AI Agents</strong>
Microsoft has introduced new security features to address emerging threats from agentic AI systems. The proposed controls focus on enhanced identity management and protective guardrails to help organiz…
rss:CISA Advisories
—
05:20 KSA
HIGH
vulnerability
<strong>Schneider Electric EcoStruxure Automation Expert</strong>
Schneider Electric disclosed a vulnerability in its EcoStruxure Automation Expert plant automation software used for digital control systems in industrial processes. The vulnerability affects critical infrastructu…
rss:CISA Advisories
—
05:20 KSA
MEDIUM
vulnerability
<strong>Mitsubishi Electric CNC Series</strong>
Mitsubishi Electric CNC Series contains a vulnerability that allows remote attackers to cause an out-of-bounds read, resulting in denial-of-service conditions. Affected versions include M800VW and M80 series used in computer numeri…
rss:CISA Advisories
—
05:20 KSA
CRITICAL
vulnerability
<strong>CISA Adds One Known Exploited Vulnerability to Catalog</strong>
CISA added CVE-2026-20131 to its Known Exploited Vulnerabilities Catalog due to active exploitation. The vulnerability affects Cisco Secure Firewall Management Center and Cisco Security Cloud Control, involv…
rss:CISA Advisories
—
05:20 KSA
CRITICAL
vulnerability
<strong>Schneider Electric Plant iT/Brewmaxx</strong>
Critical vulnerabilities discovered in Schneider Electric Plant iT/Brewmaxx version 9.60 and above could allow privilege escalation leading to remote code execution. These flaws pose significant risks to industrial control sy…
rss:CISA Advisories
—
05:20 KSA
HIGH
vulnerability
<strong>CISA Adds Five Known Exploited Vulnerabilities to Catalog</strong>
CISA added five actively exploited vulnerabilities to its KEV Catalog, including critical flaws in Apple products and Craft CMS. Organizations must prioritize patching these vulnerabilities as they are be…
rss:CISA Advisories
—
05:20 KSA
HIGH
phishing
<strong>Russian Intelligence Services Target Commercial Messaging Application Accounts</strong>
CISA and FBI warn of ongoing phishing campaigns by Russian Intelligence Services targeting commercial messaging applications to bypass encryption and compromise accounts. These sophis…
rss:BleepingComputer
—
05:20 KSA
LOW
general
<strong>Firefox now has a free built-in VPN with 50GB monthly data limit</strong>
Mozilla Firefox 149 introduces a built-in VPN feature providing 50GB monthly data allowance for enhanced user privacy. This privacy tool aims to protect browsing activities and encrypt internet tra…
rss:BleepingComputer
—
05:20 KSA
LOW
general
<strong>Microsoft fixes bug causing Classic Outlook sync issues with Gmail</strong>
Microsoft resolved a bug affecting email synchronization between Classic Outlook and Gmail/Yahoo services. The fix addresses connection and sync problems that impacted business email communicatio…
rss:BleepingComputer
—
05:20 KSA
MEDIUM
general
<strong>Zero Trust: Bridging the Gap Between Authentication and Trust</strong>
Multi-factor authentication alone is insufficient as attackers can hijack session tokens and bypass identity verification. Zero Trust architecture requires continuous verification of both user identit…
rss:US-CERT Alerts
—
05:10 KSA
HIGH
apt
<strong>Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure</strong>
Pro-Russia hacktivist groups are conducting opportunistic cyberattacks targeting critical infrastructure in the US and globally. CISA has issued joint guidance foc…
rss:US-CERT Alerts
—
05:10 KSA
MEDIUM
general
<strong>CISA Shares Lessons Learned from an Incident Response Engagement</strong>
CISA conducted incident response at a US federal civilian agency after malicious activity was detected through EDR security alerts. The advisory shares lessons learned and best practices from this …
rss:US-CERT Alerts
—
05:10 KSA
CRITICAL
apt
<strong>Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System</strong>
Chinese state-sponsored cyber actors are conducting global espionage campaigns targeting telecommunications, government, transportation, lodging, and milit…
rss:Threatpost
—
05:10 KSA
HIGH
data_breach
<strong>Student Loan Breach Exposes 2.5M Records</strong>
A data breach affecting student loan records has exposed personal information of 2.5 million individuals. The incident poses significant risks for identity theft and follow-on attacks targeting affected victims.
Source: …
rss:Threatpost
—
05:10 KSA
HIGH
apt
<strong>Watering Hole Attacks Push ScanBox Keylogger</strong>
APT group TA423 is conducting watering hole attacks to deploy ScanBox, a JavaScript-based reconnaissance framework. The attacks compromise legitimate websites to harvest credentials and conduct surveillance on targete…
rss:Threatpost
—
05:10 KSA
CRITICAL
phishing
<strong>Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms</strong>
The 0ktapus threat group conducted a large-scale phishing campaign targeting over 130 organizations by spoofing multi-factor authentication systems. The campaign aims to bypass MFA protections and steal cor…
rss:The Hacker News
—
05:10 KSA
HIGH
supply_chain
<strong>FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns</strong>
The U.S. FCC has banned imports of new foreign-manufactured consumer routers due to unacceptable cybersecurity and national security risks. This action aims to protect American communica…
rss:The Hacker News
—
05:10 KSA
CRITICAL
supply_chain
<strong>TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise</strong>
Threat actor TeamPCP compromised the popular Python package LiteLLM (versions 1.82.7-1.82.8) through CI/CD pipeline attacks on Trivy and KICS. The malicious versions contain credential h…
rss:The Hacker News
—
05:10 KSA
HIGH
malware
<strong>Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR</strong>
A large-scale malvertising campaign since January 2025 targets U.S. users searching for tax documents, delivering malicious ConnectWise ScreenConnect installers. The malware deploys …
rss:SecurityWeek
—
05:09 KSA
HIGH
supply_chain
<strong>HackerOne Employee Data Exposed in Massive Navia Breach</strong>
HackerOne, a cybersecurity firm, suffered a data breach affecting hundreds of employees through an attack on third-party vendor Navia. Personal information of employees was stolen in the incident, highlight…
rss:SecurityWeek
—
05:09 KSA
MEDIUM
general
<strong>DoE Publishes 5-Year Energy Security Plan</strong>
The US Department of Energy's CESER launched Project Armor, a five-year initiative to strengthen critical energy infrastructure security. The plan focuses on hardening energy systems against cyber threats and improving r…
rss:SecurityWeek
—
05:09 KSA
MEDIUM
general
<strong>Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw</strong>
Agentic AI systems are evolving from passive tools to autonomous agents with direct system access, raising significant governance and security concerns. The OpenClaw case demonstrates the need…