90Articles
8Categories
2026-03-04Date
🚨
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. The high-severity vulnerabi…
KEV
🐛
VMware Aria Operations Vulnerability Exploited in the Wild
KEV
🐛
CISA Warns of VMware Aria Operations Vulnerability Actively Exploited in Attacks
KEV
🐛
CVE-2026-25541 Bytes is vulnerable to integer overflow in BytesMut::reserve
🐛
CISA Warns Qualcomm Chipsets Memory Corruption Vulnerability Is Actively Exploited in Attacks
KEV
⚠️
AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning
⚠️
Malicious Laravel Packages Deploy PHP RAT, Grant Remote Access to Attackers
⚠️
Thousands of iPhones Compromised in Massive Hack via Coruna Exploit Kit with 23 Vulnerabilities
⚠️
AI Driven Warare
⚠️
Silver Dragon APT Group Exploits Google Drive for Covert Attacks on Europe, Asia
⚠️
Microsoft Alerts Customers to New Phishing Attack Exploiting OAuth in Entra ID to Bypass Detection
⚠️
How to know you’re a real-deal CSO — and whether that job opening truly seeks one
⚠️
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
⚠️
IPVanish VPN for macOS Flaw Enables Privilege Escalation and Code Execution
⚠️
Critical FreeScout Vulnerability Leads to Full Server Compromise
⚠️
Anthropic AI ultimatums and IP theft: The unspoken risk
⚠️
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
⚠️
Want More XWorm?, (Wed, Mar 4th)
⚠️
Perplexity’s Comet Browser Breached Through Calendar Invite Attack
⚠️
Manipulating AI Summarization Features
⚠️
New Threat Report: AI Accelerates High-Velocity Cyber Attacks
⚠️
Honeywell Controllers Widely Exposed Without Authentication
⚠️
Iranian cyberattacks fail to materialize but threat remains acute
⚠️
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
⚠️
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network
⚠️
Europol-coordinated action disrupts Tycoon2FA phishing platform
⚠️
Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations
⚠️
Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks
⚠️
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
⚠️
Enhanced access denied error messages with policy ARNs
⚠️
Risky Business #827 -- Iranian cyber threat actors are down but not out
📋
Cisco warns of max severity Secure FMC flaws giving root access
📢
Windows 11 23H2 to 25H2 Upgrade Reportedly Disrupts Internet Connectivity for Users
📢
AzCopy Utility Misused for Data Exfiltration in Ongoing Ransomware Attacks
📢
Iran‑Linked “Dust Specter” APT Deploys AI‑Aided Malware Against Iraqi Officials
📢
Google Chrome security advisory (AV26-194)
📢
Tenable security advisory (AV26-195)
📢
HPE security advisory (AV26-196)
📢
Cisco security advisory (AV26-197)
📢
Drupal security advisory (AV26-198)
🔥
Hacktivist group “Department of Peace” claims to have breached a DHS tech‑procurement office, leaking ICE contract records involving over 6,000 vendors, including major defense and surveillance firms
🔥
Hacktivist group “Department of Peace” claims to have breached a DHS tech‑procurement office, leaking ICE contract records involving over 6,000 vendors, including major defense and surveillance firms
🔥
LexisNexis Faces Data Breach After 2.04 GB of Data Allegedly Stolen
🔥
Iranian APT Groups Intensify Cyberattacks on Critical Infrastructure Amid Rising Geopolitical Tensions
🔥
VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave
🔥
LastPass Warns of New Phishing Campaign
🔥
Ransomware attack exposes 1.2 million University of Hawaii Cancer Center records | news | SC Media
🔥
How Pirated Software Turns Helpful Employees Into Malware Delivery Agents
🔥
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
🔥
LexisNexis says hackers accessed legacy data in contained breach | The Record from Recorded Future News
🔥
Mississippi medical center reopens clinics hit by ransomware attack
🔥
FBI seizes LeakBase cybercrime forum, data of 142,000 members
🔥
New LexisNexis Data Breach Confirmed After Hackers Leak Files
🔥
AI Agents and the Revival of Hacking
🔥
U.S. and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
🔥
Why AI, Zero Trust, and modern security require deep visibility
🔥
AI Is Supercharging Phishing
🕵️
ISC Stormcast For Wednesday, March 4th, 2026 https://isc.sans.edu/podcastdetail/9834, (Wed, Mar 4th)
🕵️
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
🕵️
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
🕵️
Phishing Campaign Uses Google Cloud to Host Malicious Redirects via GCS Bucket
🕵️
Building Trusted Automation as Leaders Struggle with AI Adoption and CISOs Hire - BSW #437
🕵️
Global Coalition Publishes 6G Security and Resilience Principles
🕵️
Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity
🕵️
Google Plans Two-Week Release Schedule for Chrome
🕵️
Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks - Infosecurity Magazine
🕵️
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
🕵️
AI Security Firm JetStream Launches With $34 Million in Seed Funding
🕵️
Threat actors weaponize OAuth redirection logic to deliver malware - Help Net Security
🕵️
How to Identify a Phishing Website
🕵️
What are You Working on Wednesday
🕵️
Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively
🕵️
Weird server requests
🕵️
Who’s Really in Control of AI?
🕵️
Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance
🕵️
MY TAKE: ChatGPT is turning into Microsoft Office — and power users are paying the price
🕵️
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
🕵️
Revolutionizing Linux Maintenance with Update Scripts
🕵️
Phishing Simulation: How It Works to Reduce Risk
🕵️
Hacker mass-mails HungerRush extortion emails to restaurant patrons
🕵️
Tycoon 2FA Phishing Platform Dismantled in Global Takedown
🕵️
The 10-hour problem: How visibility gaps are burning out the SOC
🕵️
TurboTax SMS Scam
🕵️
Protecting education: How MDR can tip the balance in favor of schools
📡
New RFP Template for AI Usage Control and AI Governance
📡
What a browser-in-the-browser attack is, and how to spot a fake login window | Kaspersky official blog
📡
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
📡
Fake LastPass support email threads try to steal vault passwords
📡
Windows 10 KB5075039 update fixes broken Recovery Environment
📡
Bitwarden adds support for passkey login on Windows 11