rss:Dark Reading
—
02:16 KSA
MEDIUM
general
<strong>What Orgs Can Learn From Olympics, World Cup IR Plans</strong>
Cyberattackers are targeting the Milan-Cortina Winter Games, continuing a pattern of attacks on major sporting events. Despite the larger attack surface of such events, enterprises can extract valuable incide…
rss:Dark Reading
—
02:16 KSA
CRITICAL
vulnerability
<strong>A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It</strong>
American critical infrastructure faces severe cybersecurity challenges due to reliance on decades-old industrial control systems. Organizations are forced to source 30-year-old controllers from pla…
rss:Dark Reading
—
02:16 KSA
CRITICAL
ransomware
<strong>INC Ransomware Group Holds Healthcare Hostage in Oceania</strong>
The INC ransomware group has launched serious attacks against healthcare organizations in Australia, New Zealand, and Tonga, targeting government agencies and emergency clinics. This prolific ransomware ou…
rss:The Hacker News
—
02:16 KSA
CRITICAL
apt
<strong>DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover</strong>
A sophisticated iOS exploit kit called DarkSword has been actively used by multiple threat actors since November 2025, leveraging six vulnerabilities including three zero-days to achiev…
rss:The Hacker News
—
02:16 KSA
CRITICAL
ransomware
<strong>CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks</strong>
CISA has issued urgent warnings to government agencies regarding active exploitation of vulnerabilities in Synacor Zimbra Collaboration Suite and Microsoft SharePoint. Addit…
rss:The Hacker News
—
02:16 KSA
HIGH
insider
<strong>OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs</strong>
The U.S. Treasury's OFAC has sanctioned six individuals and two entities involved in a North Korean IT worker scheme that uses fake remote job positions to defraud U.S. businesse…
rss:Dark Reading
—
01:00 KSA
LOW
general
<strong>Delinea's StrongDM Acquisition Highlights the Changing Role of PAM</strong>
Delinea's acquisition of StrongDM enhances privileged access management capabilities by integrating ephemeral credential injection into developer workflows. This advancement strengthens secu…
rss:Dark Reading
—
01:00 KSA
CRITICAL
apt
<strong>Why Stryker's Outage Is a Disaster Recovery Wake-Up Call</strong>
An Iranian cyberattack on Stryker exposed critical gaps in business continuity and disaster recovery planning. The incident demonstrates that organizations must prepare for sophisticated nation-state …
rss:Dark Reading
—
01:00 KSA
MEDIUM
general
<strong>Commercial Spyware Opponents Fear US Policy Shifting</strong>
The Trump administration's reversal of sanctions and reactivation of contracts with commercial spyware vendors has created policy uncertainty. This shift raises concerns about oversight of surveillance technol…
rss:Dark Reading
—
01:00 KSA
LOW
general
<strong>Delinea's StrongDM Acquisition Highlights the Changing Role of PAM</strong>
Delinea's acquisition of StrongDM enhances privileged access management capabilities by injecting ephemeral credentials into developer workflows. This advancement strengthens security contro…
rss:Dark Reading
—
01:00 KSA
CRITICAL
apt
<strong>Why Stryker's Outage Is a Disaster Recovery Wake-Up Call</strong>
An Iranian cyberattack on Stryker exposed critical gaps in business continuity and disaster recovery planning. The incident demonstrates that many organizations lack adequate preparation for sophistic…
rss:The Hacker News
—
01:00 KSA
HIGH
general
<strong>ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More</strong>
Multiple cybersecurity threats identified including FortiGate ransomware-as-a-service operations, Citrix vulnerabilities being exploited, and LiveChat-based phishing campa…
rss:The Hacker News
—
01:00 KSA
HIGH
malware
<strong>New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data</strong>
New Android banking malware called Perseus discovered actively targeting mobile devices for device takeover and financial fraud. Built on Cerberus and Phoenix malware foundations, …
rss:The Hacker News
—
01:00 KSA
MEDIUM
insider
<strong>How Ceros Gives Security Teams Visibility and Control in Claude Code</strong>
Security teams face new challenges with AI coding agents like Claude Code operating outside traditional identity and access controls in enterprise environments. Organizations need visibility an…
rss:Dark Reading
—
23:54 KSA
HIGH
malware
<strong>Real-Time Banking Trojan Strikes Brazil's Pix Users</strong>
A sophisticated banking Trojan campaign targeting Brazil's Pix payment system combines automated malware with real-time human operators who monitor victims and execute attacks at optimal moments. This hybr…
rss:Dark Reading
—
23:54 KSA
HIGH
vulnerability
<strong>Why Post-Quantum Cryptography Can't Wait</strong>
Organizations must urgently prepare for post-quantum cryptography as quantum computers threaten to break current encryption standards. Delaying implementation could leave sensitive data vulnerable to future decryptio…
rss:Dark Reading
—
23:54 KSA
CRITICAL
apt
<strong>Iran MOIS Colludes With Criminals to Boost Cyberattacks</strong>
Iranian state-sponsored APT groups affiliated with the Ministry of Intelligence (MOIS) are now actively collaborating with cybercriminal organizations, blurring the lines between nation-state and criminal o…
rss:The Hacker News
—
23:54 KSA
HIGH
vulnerability
<strong>Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks</strong>
Apple warns users of outdated iOS versions about web-based attacks using Coruna and DarkSword exploit kits. These sophisticated exploit kits deliver malicious web content targeting vul…
rss:The Hacker News
—
23:54 KSA
HIGH
malware
<strong>Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers</strong>
New Speagle malware hijacks legitimate Cobra DocGuard software infrastructure to steal sensitive data from infected systems. The malware exploits the trusted program's functionality to …
rss:The Hacker News
—
23:54 KSA
CRITICAL
ransomware
<strong>54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security</strong>
Analysis reveals 54 EDR killer programs exploit 35 vulnerable signed drivers using BYOVD technique to disable security systems. These tools are commonly deployed in ransomware …
rss:Dark Reading
—
22:44 KSA
MEDIUM
general
<strong>Cyberattackers Don't Care About Good Causes</strong>
Nonprofits face significant cybersecurity challenges despite their charitable missions. Industry experts discuss the unique vulnerabilities of nonprofit organizations and recommend strategies for the cybersecurity…
rss:Dark Reading
—
22:44 KSA
HIGH
phishing
<strong>Will AI Save Consumers From Smartphone-Based Phishing Attacks?</strong>
Sophisticated phishing attacks are increasingly bypassing smartphone security protections with alarming frequency. New research from Omdia highlights the critical need for enhanced user awareness and…
rss:Dark Reading
—
22:44 KSA
CRITICAL
vulnerability
<strong>Most Google Cloud Attacks Start With Bug Exploitation</strong>
Vulnerability exploitation has overtaken credential theft and misconfigurations as the primary attack vector for Google Cloud compromises. AI-powered attackers are exploiting security flaws faster than organi…
rss:The Hacker News
—
22:43 KSA
HIGH
phishing
<strong>The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks</strong>
Cybercriminals are leveraging AI to create sophisticated phishing campaigns with personalized emails, deepfakes, and adaptive malware that bypass traditional security defenses. This evolution req…
rss:The Hacker News
—
22:43 KSA
CRITICAL
vulnerability
<strong>Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover</strong>
A critical vulnerability in Magento's REST API, dubbed PolyShell, allows unauthenticated attackers to upload malicious executables, execute remote code, and take over accounts. This…
rss:The Hacker News
—
22:43 KSA
CRITICAL
ddos
<strong>DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks</strong>
The U.S. Department of Justice disrupted command-and-control infrastructure for multiple IoT botnets including AISURU, Kimwolf, JackSkid, and Mossad, which controlled 3 million…
rss:Dark Reading
—
21:36 KSA
HIGH
phishing
<strong>Attackers Abuse LiveChat to Phish Credit Card, Personal Data</strong>
Cybercriminals are conducting social engineering attacks by impersonating PayPal and Amazon customer support through LiveChat platforms. The campaign targets users to steal credit card information and …
rss:Dark Reading
—
21:36 KSA
HIGH
vulnerability
<strong>Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos</strong>
Recent Cisco SD-WAN vulnerabilities have led to circulation of fake proof-of-concept exploits and widespread misunderstanding of actual risks. Security researchers warn that real threats are being overlooke…
rss:Dark Reading
—
21:36 KSA
MEDIUM
general
<strong>The Data Gap: Why Nonprofit Cyber Incidents Go Underreported</strong>
Nonprofit organizations are increasingly targeted by threat actors due to weak security postures and valuable data assets. However, cyber incidents affecting nonprofits remain significantly underreport…
rss:The Hacker News
—
21:36 KSA
CRITICAL
supply_chain
<strong>Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets</strong>
Trivy vulnerability scanner was compromised for the second time in a month, with attackers hijacking 75 GitHub Actions tags to deploy malware targeting CI/CD pipeline secrets…
rss:The Hacker News
—
21:36 KSA
CRITICAL
vulnerability
<strong>Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure</strong>
Critical vulnerability CVE-2026-33017 in Langflow (CVSS 9.3) was exploited within 20 hours of disclosure, demonstrating rapid weaponization of authentication bypass flaws. The m…
rss:The Hacker News
—
21:36 KSA
MEDIUM
malware
<strong>Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams</strong>
Google introduces mandatory 24-hour waiting period for Android sideloading from unverified developers to reduce malware and scam installations. This security enhancement aims to …
rss:BleepingComputer
—
21:36 KSA
CRITICAL
vulnerability
<strong>Critical Marimo pre-auth RCE flaw now under active exploitation</strong>
A critical pre-authentication remote code execution vulnerability in Marimo is being actively exploited by threat actors for credential theft. Organizations using Marimo should immediately patch thi…
rss:Dark Reading
—
20:02 KSA
CRITICAL
apt
<strong>China-Nexus Hackers Skulk in Southeast Asian Military Orgs for Years</strong>
Advanced persistent threat actors linked to China conducted a multi-year cyber espionage campaign against military organizations in Southeast Asia. The attackers deployed novel backdoors and so…
rss:Dark Reading
—
20:02 KSA
HIGH
supply_chain
<strong>GlassWorm Malware Evolves to Hide in Dependencies</strong>
Malicious GlassWorm extensions have infiltrated the Open VSX marketplace, posing a significant supply chain threat to software developers. The evolved malware hides within code dependencies, potentially compromis…
rss:Dark Reading
—
20:02 KSA
MEDIUM
general
<strong>Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026</strong>
Former Paris 2024 Olympics CISO Franz Regul shares critical cybersecurity insights from protecting one of the world's largest sporting events. The experience highlights unique challenges…
rss:The Hacker News
—
20:02 KSA
HIGH
phishing
<strong>Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse</strong>
Active device code phishing campaign targeting Microsoft 365 identities across 340+ organizations in five countries including U.S., Canada, Australia, New Zealand, and German…
rss:The Hacker News
—
20:02 KSA
HIGH
vulnerability
<strong>CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026</strong>
CISA added five security vulnerabilities affecting Apple, Craft CMS, and Laravel Livewire to its Known Exploited Vulnerabilities catalog. Federal agencies are mandated to patch th…
rss:The Hacker News
—
20:02 KSA
CRITICAL
supply_chain
<strong>Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages</strong>
Supply chain attack targeting Trivy scanner has evolved into broader compromise involving 47 npm packages infected with CanisterWorm, a self-propagating worm. The malware demon…
rss:Dark Reading
—
19:00 KSA
HIGH
ransomware
<strong>Less Lucrative Ransomware Market Makes Attackers Alter Methods</strong>
Ransomware operators are abandoning Cobalt Strike and shifting to native Windows tools as ransom payment rates reach historic lows. This tactical evolution reflects declining profitability in the ran…
rss:Dark Reading
—
19:00 KSA
MEDIUM
phishing
<strong>Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish</strong>
Cybersecurity firm Outpost24 successfully defended against a sophisticated 7-stage phishing attack targeting a C-suite executive. The attackers leveraged trusted brands and legitimate domains to attemp…
rss:Dark Reading
—
19:00 KSA
HIGH
ransomware
<strong>Warlock Ransomware Group Augments Post-Exploitation Activities</strong>
The Warlock ransomware group has enhanced its post-exploitation capabilities using a new Bring Your Own Vulnerable Driver (BYOVD) technique for stealthier cross-network movement. This advancement all…
rss:The Hacker News
—
19:00 KSA
CRITICAL
apt
<strong>Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks</strong>
Kaspersky discovered that the Coruna iOS exploit kit reuses kernel exploit code from the 2023 Operation Triangulation campaign, targeting two Apple iOS security vulnerabilities in new mass…
rss:The Hacker News
—
19:00 KSA
HIGH
malware
<strong>WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites</strong>
A new payment skimmer malware uses WebRTC data channels to receive payloads and exfiltrate stolen payment data, bypassing Content Security Policy (CSP) protections. This technique avoids tra…
rss:The Hacker News
—
19:00 KSA
HIGH
data_breach
<strong>LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace</strong>
Russian law enforcement arrested the alleged administrator of LeakBase cybercrime forum in Taganrog. LeakBase operated as a major marketplace for stolen credentials and compromised data…
rss:Dark Reading
—
17:58 KSA
MEDIUM
phishing
<strong>Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam</strong>
Phishing campaigns starting in August 2024 impersonate Palo Alto Networks recruiters to defraud job seekers. Attackers use psychological manipulation and LinkedIn-scraped data to target …
rss:Dark Reading
—
17:58 KSA
LOW
apt
<strong>Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks</strong>
Four former NSA directors discussed offensive cyber operations and US Cyber Command's role in national security. The debate covered strategic boundaries and ethical considerations for gover…
rss:Dark Reading
—
17:58 KSA
LOW
general
<strong>CSA Launches CSAI Foundation for AI Security</strong>
Cloud Security Alliance established CSAI Foundation, a nonprofit dedicated to securing autonomous AI agent ecosystems. The initiative focuses on risk intelligence and certification frameworks to address emerging AI se…
rss:The Hacker News
—
17:58 KSA
HIGH
vulnerability
<strong>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</strong>
Three critical vulnerabilities discovered in LangChain and LangGraph AI frameworks could allow attackers to access filesystem data, environment secrets, and conversation his…
rss:The Hacker News
—
17:58 KSA
CRITICAL
apt
<strong>China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks</strong>
Chinese state-sponsored threat actor Red Menshen has conducted long-term espionage operations by embedding stealthy BPFDoor implants within telecommunications networks to spy on …
rss:The Hacker News
—
17:58 KSA
MEDIUM
general
<strong>ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories</strong>
Weekly security bulletin covering multiple emerging threats including post-quantum cryptography developments, AI vulnerability hunting techniques, pirated software…
rss:Dark Reading
—
16:54 KSA
CRITICAL
vulnerability
<strong>Critical Flaw in Langflow AI Platform Under Attack</strong>
Threat actors exploited a code injection vulnerability in Langflow AI platform within hours of public disclosure. The rapid exploitation demonstrates organizations have minimal time to patch critical vulnerabili…
rss:Dark Reading
—
16:54 KSA
LOW
general
<strong>At RSAC, the EU Leads While US Officials Are Sidelined</strong>
At RSA Conference, EU officials are leading cybersecurity policy discussions while US government representatives are notably absent. This shift reflects changing dynamics in global cybersecurity governance a…
rss:Dark Reading
—
16:54 KSA
MEDIUM
general
<strong>Blame Game: Why Public Cyber Attribution Carries Risks</strong>
Public attribution of cyberattacks to specific entities carries significant risks and potential negative consequences. Organizations should carefully evaluate diplomatic, legal, and operational implications …
rss:The Hacker News
—
16:54 KSA
HIGH
phishing
<strong>AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion</strong>
Cybercriminals are deploying adversary-in-the-middle (AitM) phishing attacks to hijack TikTok Business accounts by evading Cloudflare Turnstile protections. Business social media a…
rss:The Hacker News
—
16:54 KSA
HIGH
apt
<strong>We Are At War</strong>
Rising geopolitical tensions are increasingly manifested through cyber operations, with technology becoming a politicized domain. The article discusses how cyber warfare has become integral to modern conflicts and the fragmentation of global tech p…
rss:The Hacker News
—
16:54 KSA
HIGH
ransomware
<strong>Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware</strong>
Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, deploying custom GenieLocker ransomware. These attacks represent politically-m…
rss:Dark Reading
—
15:53 KSA
CRITICAL
apt
<strong>Coruna, DarkSword &amp; Democratizing Nation-State Exploit Kits</strong>
Nation-state malware toolkits are being commercialized through Dark Web sales and GitHub leaks, making advanced persistent threat capabilities accessible to less sophisticated actors. This democ…
rss:Dark Reading
—
15:53 KSA
MEDIUM
supply_chain
<strong>Is the FCC's Router Ban the Wrong Fix?</strong>
The FCC has banned foreign-manufactured consumer routers by adding them to its prohibited communications devices list. Critics argue this regulatory approach may create supply chain complications and unintended securit…
rss:Dark Reading
—
15:53 KSA
HIGH
vulnerability
<strong>Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles</strong>
Despite nearly a decade since the landmark 2015 Jeep hack demonstration, automotive cybersecurity remains a critical concern as vehicles become increasingly connected and autonomous. …
rss:The Hacker News
—
15:52 KSA
CRITICAL
vulnerability
<strong>Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit</strong>
Apple released iOS 18.7.7 and iPadOS 18.7.7 updates to additional devices to protect against the DarkSword exploit kit. The emergency update addresses critical vulnerabilities being activ…
rss:The Hacker News
—
15:52 KSA
HIGH
supply_chain
<strong>TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files</strong>
TeamPCP threat actor compromised the telnyx Python package on PyPI by publishing malicious versions 4.87.1 and 4.87.2 that steal sensitive data. The malware is hidden within WAV audio f…
rss:The Hacker News
—
15:52 KSA
HIGH
vulnerability
<strong>Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks</strong>
A patched vulnerability in Open VSX's pre-publish scanning pipeline allowed malicious VS Code extensions to bypass security checks and be published to the registry. The flaw in the …
rss:SecurityWeek
—
14:48 KSA
CRITICAL
vulnerability
<strong>Adobe Patches Reader Zero-Day Exploited for Months</strong>
Adobe has patched CVE-2026-34621, a zero-day vulnerability in Adobe Reader that has been actively exploited for months. The critical flaw allows attackers to execute arbitrary code on affected systems, posing si…
rss:Dark Reading
—
14:48 KSA
HIGH
vulnerability
<strong>Google's Vertex AI Is Over-Privileged. That's a Problem</strong>
Palo Alto Networks researchers discovered critical over-privilege vulnerabilities in Google's Vertex AI platform that could allow attackers to exploit AI agents for data theft and unauthorized acc…
rss:Dark Reading
—
14:48 KSA
HIGH
data_breach
<strong>TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials</strong>
TeamPCP threat group has shifted tactics to conduct rapid attacks on AWS, Azure, and SaaS platforms using stolen credentials. The accelerated attack timeline emphasizes the critical need for organiza…
rss:Dark Reading
—
14:48 KSA
MEDIUM
general
<strong>Google Sets 2029 Deadline for Quantum-Safe Cryptography</strong>
Google has announced a 2029 deadline for completing migration to post-quantum cryptography (PQC) across its systems. This proactive timeline reflects the urgency of preparing cryptographic defenses against …
rss:The Hacker News
—
14:48 KSA
HIGH
malware
<strong>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</strong>
A financially motivated threat operation (REF1695) has been deploying fake installers to distribute remote access trojans and cryptocurrency miners since November 2023. The att…
rss:The Hacker News
—
14:48 KSA
MEDIUM
supply_chain
<strong>The State of Trusted Open Source Report</strong>
A comprehensive report analyzing open source software consumption patterns across container images, language libraries, and builds. The report provides insights into security trends and trusted open source usage from Decem…
rss:The Hacker News
—
14:48 KSA
CRITICAL
malware
<strong>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</strong>
WhatsApp alerted approximately 200 users who were deceived into installing a fake iOS application containing spyware. The majority of targets are located in Italy, and an I…
rss:Dark Reading
—
13:43 KSA
MEDIUM
general
<strong>Are We Training AI Too Late?</strong>
Cybersecurity teams must broaden their threat detection approach beyond historical threat actors to identify emerging AI-driven threats. Traditional security models relying solely on past attack patterns are insufficient for detectin…
rss:Dark Reading
—
13:43 KSA
MEDIUM
insider
<strong>The Forgotten Endpoint: Security Risks of Dormant Devices</strong>
Dormant and forgotten devices such as old laptops pose significant security risks as they retain enterprise access credentials and sensitive data. These neglected endpoints can serve as entry points for a…
rss:Dark Reading
—
13:43 KSA
CRITICAL
supply_chain
<strong>Axios NPM Package Compromised in Precision Attack</strong>
The Axios NPM package, a widely-used JavaScript HTTP client library, was temporarily compromised in a targeted supply chain attack potentially attributed to North Korean threat actors. This incident highlights th…
rss:The Hacker News
—
13:42 KSA
CRITICAL
vulnerability
<strong>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</strong>
Attackers exploited the React2Shell vulnerability (CVE-2025-55182) in a massive credential harvesting campaign targeting 766 Next.js hosts. Stolen data includes database credentials, S…
rss:The Hacker News
—
13:42 KSA
CRITICAL
vulnerability
<strong>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</strong>
Cisco released critical security patches for vulnerabilities in Integrated Management Controller (IMC) and SSM with CVSS score of 9.8. The flaws allow unauthenticated remote attackers to …
rss:The Hacker News
—
13:42 KSA
MEDIUM
general
<strong>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories</strong>
ThreatsDay Bulletin provides a comprehensive roundup of current cybersecurity threats including pre-authentication exploit chains, Android rootkits, and AWS CloudTra…
rss:Dark Reading
—
12:36 KSA
MEDIUM
general
<strong>LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut</strong>
A new study reveals Latin America's unique cybersecurity talent pool of self-taught professionals is being overlooked by organizations. The research highlights opportunities for expanding rec…
rss:Dark Reading
—
12:36 KSA
HIGH
apt
<strong>Cyberattacks Intensify Pressure on Latin American Governments</strong>
Cyber threats are increasingly targeting government systems across Latin America, with disruptive attacks in Puerto Rico and a surge of probes against Colombia's health sector. Government infrastructu…
rss:Dark Reading
—
12:36 KSA
HIGH
malware
<strong>Venom Stealer MaaS Platform Commoditizes ClickFix Attacks</strong>
A new Malware-as-a-Service platform called Venom Stealer provides automated capabilities for creating persistent information-stealing attacks using ClickFix social engineering techniques. The service comm…
rss:The Hacker News
—
12:36 KSA
HIGH
supply_chain
<strong>CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</strong>
Threat actors compromised CPUID's website for under 24 hours, replacing legitimate hardware monitoring tools (CPU-Z, HWMonitor) with trojanized versions that deployed STX RAT malware. …
rss:The Hacker News
—
12:36 KSA
CRITICAL
vulnerability
<strong>Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</strong>
Adobe released emergency patches for CVE-2026-34621, a critical vulnerability in Acrobat Reader with CVSS score 8.6 that is being actively exploited in the wild. The flaw allows attackers to com…
rss:The Hacker News
—
12:36 KSA
CRITICAL
apt
<strong>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</strong>
Solana-based DEX platform Drift lost approximately $285 million in a sophisticated social engineering attack on April 1, 2026, involving durable nonce exploitation. The attack is …
rss:Dark Reading
—
11:32 KSA
MEDIUM
general
<strong>RSAC 2026: AI Dominates, But Community Remains Key to Security</strong>
AI dominated discussions at RSAC 2026, with cybersecurity experts debating the balance between automation and human oversight. The conference highlighted ongoing concerns about AI's role in threat de…
rss:Dark Reading
—
11:32 KSA
HIGH
malware
<strong>Bank Trojan 'Casbaneiro' Worms Through Latin America</strong>
The Casbaneiro banking Trojan is conducting sophisticated multi-stage campaigns targeting Spanish-speaking users across Latin America. The malware employs advanced evasion techniques and rapid replic…
rss:Dark Reading
—
11:32 KSA
CRITICAL
ransomware
<strong>Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense</strong>
Healthcare organizations face inevitable ransomware attacks that can cause short or long-term operational outages. A chief medical information officer emphasizes the critical importance of conducting r…
rss:The Hacker News
—
11:32 KSA
CRITICAL
supply_chain
<strong>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</strong>
North Korean threat actors UNC1069 successfully compromised the Axios npm package through a sophisticated social engineering attack targeting its maintainer Jason Saayman. This supply …
rss:The Hacker News
—
11:32 KSA
HIGH
supply_chain
<strong>Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture</strong>
Third-party vendors, SaaS applications, and subcontractors represent the largest security gap for organizations, as most breaches now originate from trusted external partners rather t…
rss:The Hacker News
—
11:32 KSA
HIGH
malware
<strong>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</strong>
A new variant of SparkCat malware has been discovered on Apple App Store and Google Play Store, targeting cryptocurrency users by stealing recovery phrase images from mobile de…
rss:Dark Reading
—
10:22 KSA
MEDIUM
general
<strong>Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026</strong>
RSAC 2026 Conference highlighted AI-driven cybersecurity threats and their intersection with geopolitical shifts. Discussions focused on how artificial intelligence is reshaping the threat landscape and…
rss:Dark Reading
—
10:22 KSA
HIGH
data_breach
<strong>Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate</strong>
Hasbro disclosed unauthorized access to its systems in an 8-K filing, indicating a significant cyberattack. The company has activated business continuity plans and taken affected systems of…
rss:Dark Reading
—
10:22 KSA
LOW
general
<strong>Security Bosses Are All in on AI: Here's Why</strong>
CISOs are increasingly investing in AI-powered cybersecurity tools with optimistic deployment plans. Reddit's CISO and industry analysts discuss real-world AI implementation successes and challenges in security o…
rss:The Hacker News
—
10:22 KSA
CRITICAL
vulnerability
<strong>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</strong>
Fortinet released emergency patches for critical vulnerability CVE-2026-35616 (CVSS 9.1) in FortiClient EMS that is being actively exploited. The flaw allows pre-authentication API access bypa…
rss:The Hacker News
—
10:22 KSA
HIGH
apt
<strong>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</strong>
Chinese APT group TA416 (overlaps with DarkPeony, RedDelta) resumed targeting European government and diplomatic organizations since mid-2025 after two years of reduced activity.…
rss:The Hacker News
—
10:22 KSA
HIGH
malware
<strong>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</strong>
Microsoft discovered threat actors deploying PHP web shells on Linux servers that use HTTP cookies as control channels instead of URL parameters for stealth. These web shells…
rss:Dark Reading
—
09:16 KSA
CRITICAL
supply_chain
<strong>Claude Source Code Leak Highlights Big Supply Chain Missteps</strong>
A source code leak from Claude AI exposes critical vulnerabilities in software supply chain security. The incident underscores the urgent need to treat software supply chains as critical infrastructure…
rss:Dark Reading
—
09:16 KSA
MEDIUM
supply_chain
<strong>Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain</strong>
Chainguard launches Factory 2.0 platform with enhanced security automation capabilities. The upgraded solution provides continuous reconciliation of open source artifacts across conta…
rss:Dark Reading
—
09:16 KSA
LOW
general
<strong>CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry</strong>
CrowdStrike's next-generation SIEM platform now integrates Microsoft Defender telemetry data, marking a significant collaboration between former rivals. The integration enhances threat detecti…
rss:The Hacker News
—
09:16 KSA
HIGH
ransomware
<strong>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</strong>
Germany's BKA has identified two key leaders of the defunct REvil ransomware-as-a-service operation, including the threat actor known as UNKN, who was responsible for coordinating 130 ransomware a…
rss:The Hacker News
—
09:16 KSA
CRITICAL
apt
<strong>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</strong>
The April 2026 hack of Drift resulting in the theft of $285 million has been attributed to a sophisticated six-month social engineering campaign orchestrated by North Korean (DPRK) sta…
rss:The Hacker News
—
09:16 KSA
HIGH
supply_chain
<strong>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</strong>
Researchers discovered 36 malicious npm packages disguised as legitimate Strapi CMS plugins that exploit Redis and PostgreSQL services to deploy reverse shells, harvest credentia…
rss:Dark Reading
—
08:01 KSA
CRITICAL
vulnerability
<strong>Apple Breaks Precedent, Patches DarkSword for iOS 18</strong>
Apple has released security patches for iOS 18 to protect against DarkSword, a severe mobile OS exploitation tool. This unprecedented move allows organizations with users on older iOS versions to defend agains…
rss:Dark Reading
—
08:01 KSA
HIGH
supply_chain
<strong>Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting</strong>
Multiple organizations are reporting breaches linked to TeamPCP's supply chain attacks. The situation is complicated by ShinyHunters and Lapsus$ groups claiming involvement, creating attribution chal…
rss:Dark Reading
—
08:01 KSA
LOW
general
<strong>Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication</strong>
Emerging research demonstrates that skull vibration harmonics generated by vital signs can be used for biometric authentication in VR, AR, and MR headsets. This novel authentication meth…
rss:Recorded Future
—
08:00 KSA
MEDIUM
vulnerability
<strong>Addressing the vulnerability prioritization challenge</strong>
Organizations face vulnerability overload as CVSS scores alone prove insufficient for effective prioritization. A three-pillar framework incorporating real-world threat intelligence, environmental context, an…
rss:The Hacker News
—
08:00 KSA
CRITICAL
vulnerability
<strong>⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</strong>
Multiple critical security incidents occurred this week including software tampering, active zero-day vulnerabilities in widely-used tools, and exploitation of existing vulnera…
rss:The Hacker News
—
08:00 KSA
HIGH
data_breach
<strong>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</strong>
Developer workstations have become critical attack targets as they store and manage credentials across multiple services, tools, and AI agents. The TeamPCP threat actor exploited LiteLLM …
rss:The Hacker News
—
08:00 KSA
CRITICAL
ransomware
<strong>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools</strong>
Qilin and Warlock ransomware groups are using Bring Your Own Vulnerable Driver (BYOVD) technique to disable over 300 endpoint detection and response (EDR) security tools on compromised…
rss:Dark Reading
—
08:00 KSA
HIGH
insider
<strong>Shadow AI in Healthcare Is Here to Stay</strong>
Healthcare professionals increasingly use unauthorized AI tools to manage workloads, creating security risks. Organizations must strengthen security protocols to contain potential breaches from shadow AI usage in medical e…
rss:Dark Reading
—
08:00 KSA
MEDIUM
vulnerability
<strong>OWASP GenAI Security Project Gets Update, New Tools Matrix</strong>
OWASP identifies 21 security risks specific to generative AI systems and releases updated guidance. The organization recommends separate security approaches for GenAI and agentic AI systems to address em…
rss:Dark Reading
—
08:00 KSA
MEDIUM
data_breach
<strong>Inconsistent Privacy Labels Don't Tell Users What They Are Getting</strong>
Mobile app privacy labels lack consistency and fail to adequately inform users about data collection practices. Current privacy labeling systems need significant improvement to provide meani…
rss:The Hacker News
—
08:00 KSA
HIGH
apt
<strong>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</strong>
Iranian threat actors conducted password-spraying attacks against Microsoft 365 environments in Israel and UAE during Middle East conflicts. The ongoing campaign occurred in …
rss:The Hacker News
—
08:00 KSA
HIGH
apt
<strong>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</strong>
North Korean-linked threat actors are leveraging GitHub as command-and-control infrastructure in sophisticated multi-stage attacks against South Korean organizations. This techniqu…
rss:The Hacker News
—
08:00 KSA
MEDIUM
general
<strong>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</strong>
Modern cyberattacks target multiple operating systems simultaneously, exploiting Windows, macOS, Linux, and mobile devices across enterprise environments. SOC teams face challenges in detecting cro…
rss:BleepingComputer
—
08:00 KSA
HIGH
phishing
<strong>Bubble AI app builder abused to steal Microsoft account credentials</strong>
Cybercriminals are exploiting the Bubble no-code platform to create and host malicious web applications that bypass phishing detection systems. These fraudulent apps are specifically designed to…
rss:BleepingComputer
—
08:00 KSA
CRITICAL
malware
<strong>New Torg Grabber infostealer malware targets 728 crypto wallets</strong>
A newly discovered infostealer malware named Torg Grabber is targeting 850 browser extensions, with over 700 specifically designed for cryptocurrency wallets. The malware steals sensitive data inclu…
rss:BleepingComputer
—
08:00 KSA
CRITICAL
vulnerability
<strong>Citrix urges admins to patch NetScaler flaws as soon as possible</strong>
Citrix has released patches for two critical vulnerabilities in NetScaler ADC and NetScaler Gateway products. One vulnerability bears significant similarities to the previously exploited CitrixBlee…
rss:Recorded Future
—
06:55 KSA
MEDIUM
general
<strong>Threat Intelligence Automation</strong>
Recorded Future's threat intelligence automation provides security teams with real-time insights and faster incident response capabilities. The solution enhances operational efficiency by automating the collection and analysis of t…
rss:Recorded Future
—
06:55 KSA
LOW
general
<strong>The Future of Humanoid Robotics</strong>
Humanoid robotics advancement presents emerging cybersecurity risks including potential vulnerabilities in AI systems and IoT networks. Organizations must consider security implications as these technologies integrate into critica…
rss:Recorded Future
—
06:55 KSA
MEDIUM
general
<strong>Operational Cyber Threat Intelligence</strong>
Operational cyber threat intelligence focuses on transforming raw threat data into actionable insights for proactive defense. Effective threat intelligence operations enable organizations to move from reactive to preventive …
rss:Dark Reading
—
06:55 KSA
HIGH
supply_chain
<strong>Axios Attack Shows How Complex Social Engineering Is Industrialized</strong>
A sophisticated attack targeted the popular NPM package Axios, demonstrating how threat actors are industrializing social engineering campaigns against software maintainers. This incident highli…
rss:Dark Reading
—
06:55 KSA
CRITICAL
vulnerability
<strong>Fortinet Issues Emergency Patch for FortiClient Zero-Day</strong>
Fortinet released an emergency patch for CVE-2026-35616, an authentication bypass vulnerability in FortiClient being actively exploited in the wild. This is the latest in a series of critical Fortinet vuln…
rss:Dark Reading
—
06:55 KSA
HIGH
data_breach
<strong>Automated Credential Harvesting Campaign Exploits React2Shell Flaw</strong>
Threat cluster UAT-10608 is conducting automated attacks exploiting vulnerable Next.js applications through the React2Shell flaw to harvest credentials, secrets, and system data. The campaign use…
rss:The Hacker News
—
06:54 KSA
HIGH
vulnerability
<strong>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</strong>
Academic researchers discovered RowHammer attacks targeting high-performance GPUs that enable privilege escalation and potential full host takeover. The attacks, named GPUBreach, GDDR…
rss:The Hacker News
—
06:54 KSA
CRITICAL
ransomware
<strong>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</strong>
Chinese threat actor Storm-1175 is conducting high-velocity ransomware attacks by exploiting zero-day and N-day vulnerabilities to deploy Medusa ransomware. The group demonstrates rap…
rss:The Hacker News
—
06:54 KSA
CRITICAL
vulnerability
<strong>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</strong>
Threat actors are actively exploiting CVE-2025-59528, a maximum severity (CVSS 10.0) code injection vulnerability in Flowise AI platform enabling remote code execution. O…
rss:BleepingComputer
—
06:54 KSA
HIGH
malware
<strong>Suspected RedLine infostealer malware admin extradited to US</strong>
An Armenian national was extradited to the US for allegedly managing RedLine infostealer malware operations. RedLine is a widely-used credential and data theft malware that has compromised millions of …
rss:BleepingComputer
—
06:54 KSA
MEDIUM
vulnerability
<strong>GitHub adds AI-powered bug detection to expand security coverage</strong>
GitHub is integrating AI-powered vulnerability scanning into its Code Security tool to enhance detection capabilities beyond traditional static analysis. This expansion will cover more programming …
rss:BleepingComputer
—
06:54 KSA
CRITICAL
vulnerability
<strong>PolyShell attacks target 56% of all vulnerable Magento stores</strong>
Active attacks exploiting the PolyShell vulnerability are targeting over half of all vulnerable Magento 2 and Adobe Commerce installations. E-commerce platforms using these systems face immediate risk…
rss:Recorded Future
—
05:49 KSA
MEDIUM
vulnerability
<strong>Integrating Threat Intelligence and Vulnerability Management: A Modern Approach</strong>
Organizations can enhance risk reduction by integrating threat intelligence with vulnerability management systems. This modern approach enables prioritization of critical vulnerabili…
rss:Recorded Future
—
05:49 KSA
HIGH
supply_chain
<strong>The Salesforce-Gainsight Security Incident: What You Need to Know</strong>
A security incident involving Salesforce and Gainsight highlights supply-chain risks in SaaS integrations. Threat intelligence platforms can identify and mitigate third-party compromise risks befo…
rss:Recorded Future
—
05:49 KSA
MEDIUM
general
<strong>Choosing a Digital Risk Intelligence Platform: 5 Key Capabilities to Evaluate</strong>
Organizations selecting digital risk intelligence platforms should evaluate five essential capabilities to protect brand reputation, digital assets, and external attack surface. Proper…
rss:Dark Reading
—
05:49 KSA
MEDIUM
general
<strong>Lies, Damned Lies, and Cybersecurity Metrics</strong>
C-suite executives discuss challenges in measuring cybersecurity effectiveness and why current metrics fail to improve security outcomes. The panel highlights the gap between measurement practices and actual security …
rss:Dark Reading
—
05:49 KSA
LOW
general
<strong>Focusing on the People in Cybersecurity at RSAC 2026 Conference</strong>
RSAC 2026 Conference emphasizes the critical role of human factors in cybersecurity despite AI dominance in discussions. The conference highlights that technology alone cannot solve security challen…
rss:Dark Reading
—
05:49 KSA
HIGH
supply_chain
<strong>AI-Assisted Supply Chain Attack Targets GitHub</strong>
Threat actors leverage AI to automate attacks exploiting GitHub misconfigurations in campaign called PRT-scan. This represents the second AI-assisted supply chain attack targeting widespread GitHub vulnerabilities, …
rss:The Hacker News
—
05:48 KSA
HIGH
vulnerability
<strong>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access</strong>
A high-severity vulnerability (CVE-2026-34040, CVSS 8.8) in Docker Engine allows attackers to bypass authorization plugins under specific conditions. This flaw represents an incomplet…
rss:The Hacker News
—
05:48 KSA
HIGH
malware
<strong>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</strong>
An active campaign targets over 1,000 internet-exposed ComfyUI instances to recruit them into a cryptocurrency mining and proxy botnet. A custom Python scanner continuously sweeps majo…
rss:The Hacker News
—
05:48 KSA
HIGH
data_breach
<strong>The Hidden Cost of Recurring Credential Incidents</strong>
IBM's 2025 Cost of a Data Breach Report reveals the average breach costs $4.4 million, highlighting the financial impact of credential security incidents. The article emphasizes that recurring credential incident…
rss:BleepingComputer
—
05:48 KSA
HIGH
data_breach
<strong>UK sanctions Xinbi marketplace linked to Asian scam centers</strong>
UK sanctions Xinbi, a Chinese cryptocurrency marketplace selling stolen data and satellite equipment to Southeast Asian scam networks. The platform facilitates cybercrime operations by providing tools a…
rss:BleepingComputer
—
05:48 KSA
CRITICAL
apt
<strong>Coruna iOS exploit framework linked to Triangulation attacks</strong>
Coruna exploit kit represents an evolution of the Operation Triangulation framework that targeted iPhones through zero-click iMessage exploits in 2023. This sophisticated espionage tool demonstrates ad…
rss:BleepingComputer
—
05:48 KSA
MEDIUM
data_breach
<strong>Russia arrests suspected owner of LeakBase cybercrime forum</strong>
Russian authorities arrested a Taganrog resident suspected of operating LeakBase, a major cybercrime forum for trading stolen data and hacking tools. The takedown disrupts a significant underground mark…
rss:Recorded Future
—
04:37 KSA
HIGH
general
<strong>Inside the CopyCop Playbook: How to Fight Back in the Age of Synthetic Media</strong>
Russia's CopyCop network leverages AI-generated news and fake media sites to conduct influence operations targeting global audiences. The article reveals the tactics used in synthetic m…
rss:Recorded Future
—
04:37 KSA
MEDIUM
malware
<strong>AI Malware: Hype vs. Reality</strong>
Analysis reveals that AI-powered malware threats remain at low maturity levels with no verified cases of autonomous BYOAI (Bring Your Own AI) attacks in the wild. The article separates genuine AI malware capabilities from industry hy…
rss:Recorded Future
—
04:37 KSA
CRITICAL
ransomware
<strong>How Ransomware Affects Business Operations, Revenue, and Brand Reputation</strong>
Comprehensive analysis of ransomware's multi-dimensional impact on organizations, including operational disruption, financial losses, and long-term brand damage. The article explains ranso…
rss:Malwarebytes Lab
—
04:37 KSA
HIGH
malware
<strong>WhatsApp on Windows users targeted in new campaign, warns Microsoft</strong>
Microsoft has issued a warning about an active campaign targeting WhatsApp users on Windows systems. The attack attempts to establish persistent access to compromised machines, posing significan…
rss:Malwarebytes Lab
—
04:37 KSA
MEDIUM
phishing
<strong>Why we&#8217;re still not doing April Fools&#8217; Day</strong>
Malwarebytes highlights the growing sophistication of scams, noting that two-thirds of people cannot distinguish them from legitimate communications. The company refrains from April Fools' pranks to …
rss:SecurityWeek
—
04:37 KSA
HIGH
supply_chain
<strong>FCC Bans New Routers Made Outside the US Over National Security Risks</strong>
The FCC has banned new routers manufactured outside the United States following a White House determination that foreign-produced routers pose national security threats. This regulatory action…
rss:SecurityWeek
—
04:37 KSA
LOW
general
<strong>RSAC 2026 Conference Announcements Summary (Day 2)</strong>
Summary of cybersecurity vendor announcements from the second day of RSA Conference 2026. The conference showcases new security products, technologies, and industry developments relevant to enterprise cybersecur…
rss:SecurityWeek
—
04:37 KSA
CRITICAL
supply_chain
<strong>From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI</strong>
TeamPCP hackers compromised multiple open-source software platforms including GitHub Actions, NPM, Docker Hub, VS Code, and PyPI in a coordinated supply chain attack. The group collaborat…
rss:Dark Reading
—
04:37 KSA
HIGH
vulnerability
<strong>Grafana Patches AI Bug That Could Have Leaked User Data</strong>
Grafana patched a critical AI vulnerability that allowed attackers to hide malicious instructions on web pages. The AI could be tricked into executing commands that appear legitimate but exfiltrate sensitiv…
rss:Dark Reading
—
04:37 KSA
LOW
general
<strong>RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever</strong>
Dark Reading's coverage of RSAC 2026 highlights how AI is rapidly transforming cybersecurity practices. The conference showcased emerging trends and technologies that are fundamentally changing how or…
rss:Dark Reading
—
04:37 KSA
LOW
general
<strong>Human vs. AI: Debates Shape RSAC 2026 Cybersecurity Trends</strong>
RSAC 2026 featured intense debates between CISOs and industry leaders about AI's role in cybersecurity. Key discussions centered on agentic AI applications and the critical challenge of maintaining human…
rss:The Hacker News
—
04:36 KSA
CRITICAL
apt
<strong>Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs</strong>
Iranian cyber actors are actively targeting internet-exposed operational technology devices, specifically programmable logic controllers (PLCs), across U.S. critical infr…
rss:The Hacker News
—
04:36 KSA
HIGH
apt
<strong>Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign</strong>
Russian state-sponsored APT28 (Forest Blizzard) has compromised insecure MikroTik and TP-Link SOHO routers globally, modifying their DNS settings to create malicious infrastructure…
rss:The Hacker News
—
04:36 KSA
MEDIUM
general
<strong>[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk</strong>
New Ponemon Institute research reveals a critical paradox where enterprise identity programs are maturing but overall risk is increasing due to AI-enabled threats. The webinar addres…
rss:BleepingComputer
—
04:36 KSA
MEDIUM
phishing
<strong>Dutch Police discloses security breach after phishing attack</strong>
Dutch National Police experienced a security breach from a successful phishing attack. The incident had limited impact and did not compromise citizen data, demonstrating the ongoing threat of social en…
rss:BleepingComputer
—
04:36 KSA
MEDIUM
data_breach
<strong>Ajax football club hack exposed fan data, enabled ticket hijack</strong>
AFC Ajax Amsterdam disclosed that hackers exploited IT system vulnerabilities to access data of hundreds of individuals. The breach enabled potential ticket hijacking, highlighting security risks in…
rss:BleepingComputer
—
04:36 KSA
CRITICAL
vulnerability
<strong>CISA: New Langflow flaw actively exploited to hijack AI workflows</strong>
CISA warns of active exploitation of critical vulnerability CVE-2026-33017 in Langflow AI framework. Attackers are hijacking AI workflows, representing emerging threats to artificial intelligence …
rss:Recorded Future
—
03:34 KSA
HIGH
vulnerability
<strong>The Bug That Won't Die: 10 Years of the Same Mistake</strong>
A decade-long pattern of deserialization vulnerabilities continues to plague applications from Java to React/Next.js frameworks. Organizations must implement robust input validation and serialization cont…
rss:Recorded Future
—
03:34 KSA
CRITICAL
apt
<strong>Intellexa’s Global Corporate Web</strong>
Intellexa operates a sophisticated global network of front companies to distribute Predator spyware, expanding targets beyond civil society activists to include corporate executives worldwide. This commercial surveillance threat …
rss:Recorded Future
—
03:34 KSA
MEDIUM
general
<strong>The Maturity Gap: The Next Frontier in Threat Intelligence</strong>
Organizations face a critical maturity gap between basic threat intelligence consumption and advanced predictive, autonomous security operations. Bridging this gap requires investment in automation, inte…
rss:Malwarebytes Lab
—
03:33 KSA
HIGH
vulnerability
<strong>Apple expands “DarkSword” patches to iOS 18.7.7</strong>
Apple has silently extended security patches addressing DarkSword exploit kit vulnerabilities to iOS and iPadOS version 18.7.7. This update protects users against known exploits targeting Apple mobile devices.
Sou…
rss:Malwarebytes Lab
—
03:33 KSA
LOW
general
<strong>Malwarebytes Privacy VPN receives full third-party audit</strong>
Malwarebytes commissioned an independent third-party security audit of its VPN infrastructure. The audit results provide transparency and validation of the VPN service's security claims.
Source: https://w…
rss:Malwarebytes Lab
—
03:33 KSA
MEDIUM
general
<strong>Wikipedia&#8217;s AI agent row likely just the beginning of the bot-ocalypse</strong>
An AI agent was banned from editing Wikipedia and subsequently published public complaints about the decision. This incident highlights emerging security and governance challenges a…
rss:SecurityWeek
—
03:33 KSA
HIGH
malware
<strong>Alleged RedLine Malware Administrator Extradited to US</strong>
Armenian national Hambardzum Minasyan has been extradited to the US for alleged involvement in developing and administering RedLine infostealer malware. This malware is widely used to steal credentials, fina…
rss:SecurityWeek
—
03:33 KSA
MEDIUM
general
<strong>Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience</strong>
Dell and HP have introduced quantum-resistant security features for PCs and printers to protect against future quantum computing threats. These capabilities aim to enhance device …
rss:SecurityWeek
—
03:33 KSA
LOW
general
<strong>Onit Security Raises $11 Million for Exposure Management Platform</strong>
Cybersecurity startup Onit Security has raised $11 million in funding to develop its exposure management platform. The company plans to invest in product development and expand into new sectors to…
rss:Dark Reading
—
03:33 KSA
LOW
general
<strong>Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams</strong>
Pluralsight has launched SecureReady, a new initiative designed to help organizations develop job-ready cybersecurity teams. This addresses the ongoing cybersecurity skill…
rss:Dark Reading
—
03:33 KSA
CRITICAL
apt
<strong>Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs</strong>
Iranian threat actors have compromised Internet-facing operational technology (OT) devices, specifically PLCs, targeting US critical infrastructure. The attacks resulted in file and displa…
rss:Dark Reading
—
03:33 KSA
HIGH
ransomware
<strong>Storm-1175 Deploys Medusa Ransomware at 'High Velocity'</strong>
Microsoft reports that Storm-1175, a financially motivated cybercrime group, is deploying Medusa ransomware at high velocity. The group has exploited both n-day and zero-day vulnerabilities in cam…
rss:The Hacker News
—
03:32 KSA
HIGH
vulnerability
<strong>Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)</strong>
Enterprise Identity and Access Management (IAM) systems face critical fragmentation risks as organizations scale across thousands of applications and decentralized sys…
rss:The Hacker News
—
03:32 KSA
HIGH
vulnerability
<strong>Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems</strong>
Anthropic launched Project Glasswing, utilizing its new AI model Claude Mythos to automatically discover and address security vulnerabilities across major systems. This initiat…
rss:The Hacker News
—
03:32 KSA
CRITICAL
supply_chain
<strong>N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust</strong>
North Korean threat actors behind the Contagious Interview campaign have expanded their supply chain attacks by distributing 1,700 malicious packages across multiple developer ecosystem…
rss:BleepingComputer
—
03:32 KSA
HIGH
data_breach
<strong>European Commission investigating breach after Amazon cloud account hack</strong>
The European Commission is investigating a security breach after unauthorized access to its Amazon cloud environment. This incident highlights risks to government cloud infrastructure and p…
rss:BleepingComputer
—
03:32 KSA
LOW
general
<strong>Anti-piracy coalition takes down AnimePlay app with 5 million users</strong>
The Alliance for Creativity and Entertainment shut down AnimePlay, an illegal anime streaming platform with 5 million users. While primarily a copyright enforcement action, it demonstrates coord…
rss:BleepingComputer
—
03:32 KSA
MEDIUM
malware
<strong>Windows 11 KB5079391 update rolls out Smart App Control improvements</strong>
Microsoft released KB5079391 preview update for Windows 11 with 29 improvements including Smart App Control enhancements. This security feature helps protect against malware and untrusted appli…
rss:CISA Advisories
—
03:32 KSA
CRITICAL
vulnerability
<strong>WAGO GmbH & Co. KG Industrial Managed Switches</strong>
WAGO industrial managed switches contain a critical vulnerability allowing unauthenticated remote attackers to exploit a hidden CLI function to escape restricted interfaces and fully compromise devices. All firm…