Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

CVE-2025-64328 Exploitation Campaign: A Global Threat to Sangoma FreePBX Systems


A sophisticated attack campaign exploiting CVE-2025-64328 has compromised over 900 Sangoma FreePBX systems worldwide, leaving hundreds of instances still infected with web shells. The attackers delivered a PHP web shell dubbed "EncystPHP" that granted them remote command execution and persistence capabilities. Affected systems must be updated to version 17.0.3 or later to patch the vulnerability.

Published: Sun Mar 1 05:03:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape Shifts: Recent Malware Campaigns and Exploitations Expose Critical Vulnerabilities

Recent malware campaigns and exploits have exposed critical vulnerabilities in various industries, leaving numerous organizations vulnerable to attacks. This article provides an overview of the current global cybersecurity landscape, highlighting key threats and trends, as well as expert advice on how to stay ahead of emerging threats.

Published: Sun Mar 1 06:13:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Claude Code Exploited: A Cautionary Tale of the Dark Side of Generative AI

Hackers have abused Anthropic's AI assistant, Claude Code, to carry out a devastating cyberattack on Mexican government systems, resulting in the theft of over 150GB of sensitive data. The incident highlights the potential dangers posed by generative AI and emphasizes the need for more stringent safeguards against AI exploitation.

Published: Sun Mar 1 09:24:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unknowns of War: Unpacking the Consequences of Donald Trump's Iran Policy

Donald Trump's Iran policy has left many questions unanswered, including the long-term consequences of his actions and the effectiveness of his strategy in achieving its stated objectives. As tensions between the US and Iran escalate, it remains to be seen whether Trump's gamble will pay off or prove disastrous.

Published: Sun Mar 1 12:43:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ClawJacked Nightmare: A Vulnerability Allows Malicious Websites to Hijack AI Agent OpenClaw



A critical vulnerability has been discovered in popular AI agent OpenClaw, allowing malicious websites to hijack the platform and steal sensitive data. The "ClawJacked" vulnerability exploits a flaw in WebSocket security checks, enabling attackers to brute-force access to locally running instances. Organizations and users must take immediate action to update their systems and protect themselves against this potentially catastrophic attack.

Published: Sun Mar 1 16:55:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unprecedented Odido Dataset Breach: A Global Cybersecurity Crisis

ShinyHunters has leaked the full Odido dataset, compromising personal data from over 10.8 million Dutch telecom customers. The breach raises serious concerns about cybersecurity measures in place at Odido and serves as a stark reminder of the importance of prioritizing data protection.

Published: Sun Mar 1 17:08:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

South Korea's Tax Office Embroiled in Controversy After Leaking Passwords to Stolen Crypto


South Korea's National Tax Service has apologized for leaking passwords to a stash of stolen cryptocurrency, which parties unknown used to make off with an estimated $4.8 million worth of tokens. The incident raises questions about the effectiveness of the agency's cybersecurity measures and highlights the potential risks associated with using blockchain technology.

Published: Sun Mar 1 19:22:49 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK Government's Vulnerability Monitoring System Revolutionizes Cybersecurity Efforts


The UK government's Vulnerability Monitoring System (VMS) has made significant strides in enhancing its cybersecurity capabilities, boasting impressive results in identifying and addressing vulnerabilities within public sector sites. By leveraging cutting-edge technology and a proactive approach, VMS has demonstrated its potential to revolutionize the way vulnerabilities are identified and addressed, serving as an important milestone in the nation's commitment to safeguarding public services from cyber threats.

Published: Sun Mar 1 22:34:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korean Hackers Publish 26 Npm Packages with Malicious Payloads



North Korean hackers have published 26 malicious npm packages containing a powerful pastebin C2 server for cross-platform remote access trojans. The Contagious Interview campaign, tracked by Socket and kmsec.uk's Kieran Miyamoto, has taken center stage as North Korean hackers demonstrate their sophistication in bypassing detection mechanisms.

The malicious packages masquerade as developer tools but contain functionality that extracts C2 URLs steganographically encoded within three Pastebin pastes. The payload serves as a text steganography decoder by contacting a Pastebin URL and extracting its contents to retrieve the actual C2 Vercel URLs.

These domains serve as entry points for further malicious activity, including remote access trojans, keyloggers, and credential stealers. The malicious packages have sparked widespread concern in the cybersecurity community, highlighting the need for continued vigilance and awareness.

Published: Mon Mar 2 03:51:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise and Fall of OnlyFake: Unveiling the AI-Driven Identity Crisis


A Ukrainian national has been charged with operating OnlyFake, an AI-driven platform that generated over 10,000 counterfeit IDs globally. Yurii Nazarenko pleaded guilty to conspiracy to commit fraud involving fake IDs, facing up to 15 years in prison and forfeiting $1.2 million from the platform's operations.

Published: Mon Mar 2 04:00:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Europol's Operation Compass Brings Down "The Com" Cybercrime Network

Europol’s latest operation, codenamed Project Compass, has resulted in 30 arrests targeting "The Com" network, a cybercrime organization known for exploiting children and teenagers. The operation has also identified 62 victims and protected four children from harm, highlighting the importance of cross-border cooperation in combating transnational cybercrime.

Published: Mon Mar 2 05:08:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

OpenClaw AI Agent Framework Vulnerable to High-Severity ClawJacked Attack, Leaving Users Open to Data Theft


A critical vulnerability in the OpenClaw AI agent framework has been discovered, leaving users exposed to data theft and potential full workstation compromise initiated from a simple browser visit. The "ClawJacked" attack allows malicious websites to brute-force and take control of local AI agent instances, highlighting the need for robust governance around AI agents and strict policy controls.

Published: Mon Mar 2 05:21:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT28 Exploits MSHTML 0-Day Vulnerability CVE-2026-21513 in Pre-Patch Tuesday Attack

APT28 Exploits MSHTML 0-Day Vulnerability CVE-2026-21513 in Pre-Patch Tuesday Attack

Published: Mon Mar 2 06:29:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A World of Cyber Threats: The Unseen Battle for SaaS Security


In this article, we explore the dangers of bot attacks on SaaS applications and provide practical advice on how to protect against them. We examine the different types of threats that these malicious programs pose and introduce SafeLine WAF as a solution to prevent these attacks. Our step-by-step guide will help you understand how to deploy SafeLine WAF effectively and ensure the security of your SaaS application.

Published: Mon Mar 2 07:42:03 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT37's Ruby Jumper Campaign: A Sophisticated Toolkit for Air-Gapped Network Infiltration



APT37's Ruby Jumper campaign showcases a complex toolkit designed to infiltrate air-gapped networks using cloud storage services and USB implants. The campaign, attributed to North Korea-linked ScarCruft, leverages legitimate cloud providers for covert C2 communications and demonstrates the evolving nature of cyber threats. With its use of multiple malware families and novel tactics, the Ruby Jumper campaign serves as a reminder of the importance of continuous monitoring and security awareness in today's digital landscape.

Published: Mon Mar 2 07:56:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iranian Cyberattack Risks Loom Large for UK Amid Middle East Conflict

Iranian cyberattack risks are on the rise amid the ongoing conflict in the Middle East, with the UK National Cyber Security Centre (NCSC) warning British organizations of potential threats. Organizations with assets or supply chains in the region are advised to prepare for attacks and prioritize their security posture.

Published: Mon Mar 2 10:09:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Memory Scourge: How Bots are Plundering DRAM Inventories for Resale


Cybercrime groups are turning to sophisticated web scraping bots to scour online marketplaces for scarce DDR5 memory inventory, driving up prices and exacerbating the global shortage. The use of AI-powered tools in these operations highlights the escalating sophistication of cyber threats and underscores the need for greater vigilance among tech industry players.

Published: Mon Mar 2 10:26:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Scammers Seize on Global Chaos: Dubai Citizens Targeted Amidst Iranian Missile Strikes


Dubai citizens are facing a new wave of cybercrime threats as scammers attempt to gain access to their bank accounts under false pretenses. The Dubai Police has warned residents about SIM-swap scams, urging them to remain cautious and secure their personal data to avoid falling victim to these malicious activities.

Published: Mon Mar 2 10:36:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Consequences of a Conflict-Driven Oil Price Spike: Unpacking the Uncertainty Surrounding Iran's Strait of Hormuz

As tensions between Iran and its adversaries escalate, global oil markets are bracing for another major shock. A potential closure of the Strait of Hormuz could send crude prices soaring to triple digits, posing significant challenges for US oil producers and consumers worldwide. WIRED explores the unfolding uncertainty surrounding this critical waterway and what it might mean for energy supplies globally.

Published: Mon Mar 2 10:45:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Silent Threat: How Vulnerabilities in AI Systems are Exposing Organisations to Unprecedented Cybersecurity Risks


The threat landscape of modern cyber attacks is rapidly evolving, with new and sophisticated threats emerging every day. The growing vulnerability of AI systems is exposing organisations to unprecedented cybersecurity risks. This article provides an in-depth analysis of the recent incidents and highlights the need for organisations to take proactive steps to protect their AI systems.

Published: Mon Mar 2 10:55:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Dark Side of Cyber Warfare: APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch


A Russia-linked APT28 group has successfully exploited a newly discovered zero-day vulnerability in Microsoft's MSHTML browser component, leaving numerous organizations vulnerable to attack before Microsoft had issued a patch. The incident highlights the importance of timely patching and the need for organizations to remain vigilant in protecting themselves against evolving cyber threats.

Published: Mon Mar 2 11:03:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability Exposed: How Malicious Extensions Can Escalate Privileges via Google Chrome's Gemini Panel

A critical vulnerability has been discovered in Google Chrome that could allow malicious extensions to escalate privileges and gain access to local files on the system. Researchers at Palo Alto Networks Unit 42 have identified the issue as a case of insufficient policy enforcement in the WebView tag.

Published: Mon Mar 2 12:14:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Develops Quantum-Resistant Merkle Tree Certificates for Enhanced Browser Security

Google has developed new Merkle Tree Certificates that will provide enhanced security to its Chrome browser, aiming to protect users from the growing threat posed by quantum computers. The approach is designed to be more scalable and efficient while ensuring the long-term security of online communications.

Published: Mon Mar 2 12:22:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Alabama Man Pleads Guilty to Hacking, Extorting Hundreds of Young Women

Alabama Man Pleads Guilty to Hacking, Extorting Hundreds of Young Women, a chilling case that exposes the darker side of online exploitation, has sent shockwaves through the nation's capital. A 22-year-old Alabama man pleaded guilty to hijacking social media accounts, using tactics such as impersonation and social engineering to extort private images and videos from his victims.

Published: Mon Mar 2 13:31:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

National Cyber Security Centre Warns UK Businesses to Prepare for Potential Digital Blowback Amid Escalating Tensions with Iran


The National Cyber Security Centre (NCSC) has issued a warning to British organizations, urging them to take immediate action to strengthen their cybersecurity defenses amid the escalating tensions between Iran and its regional adversaries. The warning comes as internet connectivity inside Iran has been severely disrupted, largely due to internal restrictions and shutdown measures, while reports emerged of cyber operations targeting Iranian state media and other infrastructure.

Published: Mon Mar 2 13:52:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

GPS Interference on a Global Scale: The Escalating Consequences of the US-Israeli War on Iran


GPS Interference on a Global Scale: The Escalating Consequences of the US-Israeli War on Iran
As the situation in the Middle East continues to deteriorate, concerns are growing about the impact of GPS interference on global shipping and navigation systems. With over 1,100 ships affected since the start of the US-Israeli war on Iran, experts warn that the consequences could be catastrophic.



Published: Mon Mar 2 13:59:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fake Google Security Site Exploits PWA App to Steal Credentials and Siphon Data Through Victims' Browsers


A complex phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims’ browsers. The attackers have used Progressive Web App (PWA) features and social engineering to deceive users into installing the malware. This attack highlights the importance of users being cautious when interacting with suspicious security-related websites and verifying the authenticity of such sites before providing sensitive information.

Published: Mon Mar 2 15:09:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iran's Cyber War: A Global Threat Looms Over Regional Tensions


Iran's cyberwar has begun, with Iranian hackers conducting a series of high-profile attacks on regional governments, critical infrastructure, and organizations with ties to the US and Israel. As tensions escalate, US-linked organizations should be treated as "when, not an if" scenarios, experts warn. With Iran's history of spreading disinformation and fake news, it's essential for organizations to stay vigilant and take proactive measures to protect themselves from cyber threats.

Published: Mon Mar 2 15:26:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's National Cyber Security Centre Issues Warning on Potential Iranian Cyber Threats Amid Rising Tensions in the Middle East


The UK's National Cyber Security Centre (NCSC) has issued a warning to organizations operating in or with supply chains in the Middle East, amid rising tensions in the region and potential Iranian cyber activity. This advisory aims to inform businesses of the heightened risk of cyber threats from Iran-linked hacktivists, who may exploit vulnerabilities in their defenses.

Published: Mon Mar 2 16:35:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI-Powered Cyber Attacks: The Case of CyberStrikeAI

CyberStrikeAI: A Tool that is Poised to Change the Face of Cyber Attacks Forever

Published: Mon Mar 2 18:45:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micronet Malfeasance: The Dark Side of OAuth Scams



OAuth scams abuse redirects for malware delivery: Microsoft warns of ongoing phishing threat targeting government and public-sector organizations.


Published: Mon Mar 2 18:56:03 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Qualcomm Zero-Day Vulnerability Exposed: Android Gets Patches


Google has released patches for a critical zero-day vulnerability in Qualcomm's display component, which could be exploited by attackers to trigger memory corruption. The vulnerability, identified as CVE-2026-21385, was discovered by Google and patched as part of their March 2025 Android Security Bulletin. This incident highlights the importance of keeping Android devices up-to-date with the latest security patches and underscores the need for manufacturers to be more proactive in identifying and addressing vulnerabilities in their products.

Published: Tue Mar 3 03:11:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Gamers Left Fuming as Cloud Imperium Admits to Data Breach, Sparking Concerns Over Personal Data Exposure

Gamers are furious after Cloud Imperium, a British games studio behind Star Citizen, quietly admitted to a data breach, sparking concerns over personal data exposure. The company's handling of the incident has been criticized by many in the gaming community, who feel that they should have received more detailed information about what went wrong and how the studio plans to prevent such incidents in the future.

Published: Tue Mar 3 03:21:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Frontier in Cybersecurity Threats: The Exploitation of CVE-2026-21385 and its Implications


A new high-severity vulnerability in an open-source Qualcomm component has been exploited in Android devices, raising concerns about the potential for widespread attacks. With a CVSS score of 7.8, this vulnerability could potentially grant malicious actors extensive access to device resources.

Published: Tue Mar 3 03:34:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Threat Landscape: SloppyLemming's Dual Malware Chain Attacks on Pakistan and Bangladesh


SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
The threat actor SloppyLemming has been linked to a series of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh, using dual malware chains that include the BurrowShell backdoor and a Rust-based keylogger. This latest campaign marks an evolution in the threat actor's tooling, with the use of the Rust programming language representing a significant shift from traditional compiled languages.


Published: Tue Mar 3 03:47:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ai-Browser Vulnerability Exposed: The Risks of Gemini Live Hijacking


A critical vulnerability in Google's Gemini Live AI assistant integrated into Chrome has been discovered by researchers at Palo Alto Networks. This finding highlights the risks associated with overly permissive extension access and the potential for malicious actors to exploit these vulnerabilities for nefarious purposes. The vulnerability, tracked as CVE-2026-0628, was patched in early January 2026, but it is essential for users and developers to be aware of its existence to avoid similar exploits in the future.

Published: Tue Mar 3 03:55:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Data Breach at Cloud Imperium Games: A Cautionary Tale for Gamers and Developers


Cloud Imperium Games has disclosed a significant data breach affecting users' personal information. The breach, which was discovered in January 2026, has raised concerns about the security of user data. With over 700 employees and five game studios under its umbrella, CIG has access to vast amounts of sensitive data. The company's response to the breach has been met with skepticism by some, who argue that a more transparent and proactive approach would have mitigated the damage. As the gaming industry continues to evolve, we can expect to see more data breaches like this in the future.

Published: Tue Mar 3 05:04:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The University of Hawaii's Epic Data Breach: A Cautionary Tale of Ransomware and Irreparable Harm


The University of Hawaii Cancer Center has suffered one of its most devastating data breaches in history, leaving nearly 1.2 million individuals' sensitive information compromised. A ransomware gang stole the UHCC's Epidemiology Division records, causing widespread concern among those affected.

Published: Tue Mar 3 05:13:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cegedim Santé Breach: 15.8 Million Medical Records Stolen from French Health Ministry

The French health ministry has fallen victim to a significant data breach, with attackers stealing sensitive information pertaining to approximately 1.2 million individuals. The breach highlights the ongoing threat landscape in the cybersecurity realm and underscores the critical importance of robust cybersecurity measures and data sovereignty in protecting sensitive information.

Published: Tue Mar 3 05:29:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Digital Frontline: As Middle East Tensions Escalate, Cybersecurity Experts Warn of Indirect Threats to UK Businesses

As the situation in the Middle East continues to escalate, cybersecurity experts are warning UK businesses of the potential risks associated with indirect digital spillover. Organizations linked to the region through offices or supply chains are particularly vulnerable, and must take steps to bolster their security posture to mitigate this threat.

Published: Tue Mar 3 05:35:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unseen Battle for Information: The Human Cost of Iran's Digital Surveillance


In Iran, journalists, activists, and ordinary citizens are fighting a desperate battle for information as the government tightens its grip on digital surveillance. With internet blackouts and restrictions in place, those trying to document what is happening on the ground face immense challenges. This story explores the human cost of Iran's digital surveillance machine and the lengths to which journalists will go to bring attention to the situation.

Published: Tue Mar 3 05:46:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malware via OAuth Redirect: A New Threat Vector Targeting Government Targets

Microsoft has issued a warning about phishing campaigns that use OAuth redirect mechanisms to bypass conventional phishing defenses and deliver malware to government targets. The attackers are using manipulated parameters and associated malicious applications to redirect users to attacker-controlled landing pages, resulting in the download of malware on infected devices.

Published: Tue Mar 3 05:56:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Android Devices Vulnerable to Exploited Qualcomm Flaw: A Growing Concern for Mobile Security

Android devices have been hit by an exploited Qualcomm flaw, identified as CVE-2026-21385. This vulnerability affects an open-source component used in various Android devices and can lead to memory corruption. To protect your device, ensure you stay up-to-date with the latest software updates and use a reputable antivirus app.

Published: Tue Mar 3 06:05:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A High-Severity Bug in Google Chrome's Gemini Live AI Panel Exposes Extensions to System Resources

Google's Gemini Live AI panel has been compromised by a high-severity bug that exposes malicious extensions to system resources, providing unprecedented access to sensitive files, webcams, and microphones.

Published: Tue Mar 3 07:20:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI-Powered Identity Dark Matter: How Model Context Protocol (MCP) Agents Threaten Enterprise Security


The Rise of AI-Powered Identity Dark Matter: How Model Context Protocol (MCP) Agents Threaten Enterprise Security
Summary:
A recent report by Citizen Lab highlights a critical vulnerability in the adoption of Model Context Protocol (MCP) agents, which are being used to automate various tasks across enterprises. As these AI-powered agents become increasingly ubiquitous, they pose significant risks to enterprise security due to their ability to bypass traditional identity management systems and exploit "dark matter" identities. This article delves into the world of MCP agents and explores the implications of their widespread adoption on enterprise security.



Published: Tue Mar 3 07:28:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Phishing Suite Utilizes AitM Reverse Proxy to Bypass Multi-Factor Authentication: Starkiller Phishing Suite Exposes Vulnerabilities


Starkiller Phishing Suite Utilizes AitM Reverse Proxy to Bypass Multi-Factor Authentication
New phishing suite leverages AitM reverse proxy technique to bypass even the most robust MFA protections, marking a significant development in evolving cyber threats.

Published: Tue Mar 3 07:40:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

OAuth Phishing Campaigns: A New Layer of Deception in Cyber Warfare



OAuth phishing campaigns: a new layer of deception in cyber warfare.

A recent phishing campaign has been discovered that exploits OAuth redirections to bypass defenses and deliver malware to unsuspecting victims. Microsoft researchers have warned of the threat, highlighting the need for organizations to tightly govern OAuth applications and implement strong identity protection measures.

Published: Tue Mar 3 07:50:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Perplexity Comet Browser Hole: A Vulnerability That Exposes Users to Malicious Activities via Calendar Invitations



Perplexity's Comet browser has been found to have a significant security vulnerability that allows attackers to steal sensitive user data and gain unauthorized access to users' local file systems through calendar invitations. The discovery of this vulnerability highlights the importance of security awareness and the need for users to be vigilant when using AI-powered solutions like Comet browser.

Published: Tue Mar 3 09:15:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Commodification of Compromised cPanel Credentials: A Growing Concern for Cybersecurity

Compromised cPanel credentials have become a hot commodity in cybercrime markets due to their versatility and ease of use. Organizations must take proactive measures to protect themselves against these types of threats by enabling MFA on all hosting control panel accounts, enforcing strong passwords, and restricting administrative access.

Published: Tue Mar 3 09:30:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unveiling the Coruna Exploit Kit: A Comprehensive Look at the Latest iOS Exploitation Tool



In this article, we delve into the details of the Coruna exploit kit, a malicious tool designed specifically for exploiting vulnerabilities in Apple's iOS operating system. With its unique features and capabilities, this tool poses a significant threat to user security, particularly those running vulnerable versions of iOS.

Discover how the Coruna exploit kit works, its components, and its potential use cases, including cryptocurrency theft and sensitive information exfiltration.

Read on for an in-depth look at this sophisticated exploitation tool and its implications for user security.

Published: Tue Mar 3 09:43:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Reality Behind Cybercrime: Shattering the Myth of the "Teenage Hacker"

According to a new analysis of publicly announced law enforcement actions between 2021 and mid-2025, middle-aged adults are the primary culprits behind serious cybercrime, shattering the long-held notion that these crimes are perpetrated by teenagers. The study highlights significant shifts in the types of crime and age demographics involved, suggesting a more sophisticated and experience-driven approach to addressing this complex issue.

Published: Tue Mar 3 09:52:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Paradox at the Gate: How Tier 1 Analysts are the Key to Unlocking a High-Impact Security Operations Center



The cybersecurity landscape is constantly evolving, with new threats emerging every day. In order to stay ahead of these threats, security operations centers (SOCs) must be equipped with the right tools and personnel. One critical component of any SOC is Tier 1 analysts, who are responsible for processing high volumes of alerts and making quick decisions about whether or not they require further investigation. However, many Tier 1 analysts lack the necessary training, experience, and resources to perform their jobs effectively.

To address these issues, The Hacker News (THN) has outlined three steps for building a high-impact Tier 1:

1. Trustworthy Cybersecurity News Platform
2. Core Engine Room: Monitoring and Triage as Business-Critical Workflows
3. Intelligence as Oxygen: The Foundation of Tier 1 Effectiveness

By following these steps, organizations can build a high-impact Tier 1 that is capable of detecting and responding to security threats in real-time, improving the performance of the SOC and reducing business risk.

Published: Tue Mar 3 10:03:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Proliferation of AI-Assisted Cyber Attacks: A Growing Threat to Global Network Security


Recent research has highlighted the growing threat of AI-assisted cyber attacks, with a suspected Russian-speaking threat actor deploying an open-source AI-native security testing platform called CyberStrikeAI to execute attacks on Fortinet FortiGate appliances across 55 countries. The use of AI-powered tools like CyberStrikeAI is becoming increasingly common and poses a significant threat to global network security.

Published: Tue Mar 3 10:16:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

LexisNexis Data Breach: A Global Incident with Far-Reaching Implications


LexisNexis has confirmed that it suffered a significant data breach, resulting in the theft of approximately 2GB of customer and business information. The breach, which occurred on February 24, was caused by hackers exploiting an unpatched React frontend app hosted on AWS. This incident highlights the importance of proactive security measures and regular software updates to prevent such incidents from occurring.

Published: Tue Mar 3 11:24:01 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cyber Role in the US-Iran Conflict: A New Era of Hybrid Warfare


The US military has officially acknowledged the key role that cyber operations played in its attacks on Iran, marking a new era of hybrid warfare. This shift marks a significant escalation of the profile of cyber operations and highlights the growing importance of non-kinetic effects in modern military conflicts.

Published: Tue Mar 3 12:42:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Oracle EBS 2025 Campaign: A Global Cybersecurity Threat Exposed - Madison Square Garden Among the Victims

Oracle EBS 2025 campaign impacts Madison Square Garden, exposing sensitive data from over 100 organizations worldwide, including the renowned multi-purpose indoor arena.

Published: Tue Mar 3 12:59:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Web of Deceit: The Rise of Coruna and the Looming Threat of iPhone Hacking


In a shocking revelation, a highly advanced iPhone hacking toolkit known as Coruna has emerged from the shadows, its origins shrouded in mystery but its impact undeniable. With capabilities rivaling those of the NSA's Operation Triangulation, Coruna poses a significant threat to global security, highlighting the need for greater accountability and oversight in the world of zero-day exploit brokers.

Published: Tue Mar 3 14:09:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ariomex Crypto Exchange Data Leak Exposes User and Transaction Data from 2022 to 2025


Ariomex, an Iran-based crypto exchange platform, has suffered a data leak exposing user and transaction data from 2022 to 2025. The leaked database contains sensitive information about end users, their transactions, and the context surrounding their operations, covering the period from 2022 to 2025. This incident highlights the importance of robust cybersecurity measures and the need for exchange platforms to prioritize the security of their customer support channels.

Published: Tue Mar 3 14:22:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit OAuth Redirect Mechanism to Spread Malware


Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers, ultimately spreading malware among government and public-sector organizations. Microsoft researchers have warned that these attacks use parameters such as scope or prompt=none to force silent error redirects, exploiting a vulnerability in the OAuth framework.


Published: Tue Mar 3 15:30:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Brokers are Selling Access to Sensitive Personal Data Captured During Chatbot Conversations


Data brokers are selling access to sensitive personal data captured during chatbot conversations, raising concerns about user privacy and security. A recent report highlights the potential risks of using free VPNs and other browser extensions that may be harvesting personal data, and calls for greater awareness and education among users. The industry's need for regulation and transparency has never been more pressing.

Published: Tue Mar 3 15:41:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Alerts Public to Exploited VMware Aria Operations RCE Flaw: Understanding the Risks and Implications


CISA has flagged a severe vulnerability in VMware Aria Operations, revealing that malicious actors have exploited this command injection flaw to access systems. The US Cybersecurity and Infrastructure Security Agency urges organizations using VMware Aria Operations to address the issue promptly and apply necessary security patches to prevent potential breaches.

Published: Tue Mar 3 17:52:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AkzoNobel's Cyberattack Conundrum: Unpacking the Complexity of a Major Corporation's Data Breach


AkzoNobel has confirmed that hackers breached its network at a U.S.-based site, compromising over 170GB of sensitive data. The leak, attributed to the Anubis ransomware gang, includes confidential agreements with prominent clients and internal technical specification sheets.

Published: Tue Mar 3 18:06:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A $82K API Key Nightmare: The Great Gemini Heist

A $82K API Key Nightmare: The Great Gemini Heist - A developer's company has been left reeling after a stolen Google Gemini API key racked up massive usage costs over just 48 hours. With the incident highlighting the need for greater awareness about potential vulnerabilities in cloud-based services, it is essential that organizations take proactive steps to secure their API credentials.

Published: Tue Mar 3 18:20:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fear of Facebook: A Global Outage Wreaks Havoc on Social Media and Beyond


A global outage has crippled Facebook, leaving millions of users unable to access their accounts. What triggered this widespread disruption, and what implications does it have for data security and social media platforms? Read more about the incident and its ongoing impact.

Published: Tue Mar 3 18:28:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Gamers Unite: Cloud Imperium's Data Breach Exposed, Leaving Fans Fuming

Gamers Unite: Cloud Imperium's Data Breach Exposed, Leaving Fans Fuming. British games studio Cloud Imperium has quietly admitted to a data breach that has left its fans reeling, with concerns about transparency and communication from the company on full display.

Published: Wed Mar 4 00:51:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: Broadcom VMware Aria Operations Vulnerability Sparks Concern Over Remote Code Execution


Cybersecurity Alert: Broadcom VMware Aria Operations Vulnerability Sparks Concern Over Remote Code Execution

A recently disclosed security flaw impacting Broadcom VMware Aria Operations has been added to the Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild. This high-severity vulnerability poses significant risks for remote code execution and could be exploited by malicious actors. Federal agencies are required to apply patches by March 24, 2026. Organizations must prioritize timely patching, monitoring, and incident response measures to mitigate potential risks associated with this vulnerability.

Published: Wed Mar 4 01:07:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach at University of Hawai ªi Cancer Center: A Canine Culinary Conundrum for 1.2 Million


A recent cyber attack has exposed sensitive personal information of over 1.2 million individuals at the University of Hawai ªi Cancer Center, highlighting the need for robust cybersecurity measures to protect sensitive data.

Published: Wed Mar 4 03:17:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux: A Looming Threat to PHP Applications


Recently discovered fake Laravel packages on Packagist have been found to deploy a remote access trojan (RAT) that can compromise Windows, macOS, and Linux systems. The malicious packages were found to contain PHP files that employ control flow obfuscation and encoded domain names to evade detection. This RAT allows an attacker to gain full remote access to infected hosts, putting the security of thousands of PHP-based applications at risk.

Published: Wed Mar 4 05:29:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exploiting Vulnerabilities: The Rising Threats to Cybersecurity

Recent additions to the Known Exploited Vulnerabilities (KEV) catalog highlight the growing threat landscape in the cybersecurity domain, emphasizing the need for organizations to prioritize cybersecurity and invest in robust defense mechanisms.

Published: Wed Mar 4 05:39:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unseen Threat of Side-Channel Attacks: A Growing Concern for Cybersecurity

The Unseen Threat of Side-Channel Attacks: A Growing Concern for Cybersecurity

US lawmakers Senator Ron Wyden and Representative Shontel Brown are calling for an investigation into side-channel attacks, a threat that has been present in computer security for over 80 years. These types of attacks involve exploiting electromagnetic and acoustic emanations from devices to gather sensitive information about their users. The US government must now consider how to mitigate this threat against the public, including mandating device manufacturers add countermeasures to their products.

Published: Wed Mar 4 06:57:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI Governance: A New Era for Cybersecurity Leaders

The rise of AI governance marks a new era for cybersecurity leaders, who must navigate the complex landscape of AI-powered threats and implement effective measures to secure this rapidly evolving technology. The release of a new RFP Guide provides a comprehensive framework for evaluating AI usage control solutions, helping organizations take a proactive step towards securing their AI and protecting themselves against the growing threat of AI-powered attacks.

Published: Wed Mar 4 07:18:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT41's Silver Dragon Expands: Phishing, Google Drive C2, and Cobalt Strike



APT41's Silver Dragon Expands: Phishing, Google Drive C2, and Cobalt Strike
The threat landscape continues to evolve at a rapid pace, with new attack vectors and tactics emerging daily. In recent months, researchers have been tracking the activities of an APT group known as Silver Dragon, which has been linked to the China-linked APT41. This article will delve into the world of Silver Dragon, exploring how they expand their playbook, using phishing, Google Drive-based command-and-control (C2), and Cobalt Strike.



Published: Wed Mar 4 07:31:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coruna iPhone Exploit Kit: A Web of Suspicions Surrounding its Origins

Coruna iPhone Exploit Kit: A Web of Suspicions Surrounding its Origins

Published: Wed Mar 4 08:41:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Coruna iOS Exploit Kit: A Sophisticated Threat to iPhone Users



A new and powerful exploit kit dubbed Coruna (aka CryptoWaters) has been identified, specifically targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The Coruna exploit kit features five full iOS exploit chains and a total of 23 exploits, making it one of the most significant examples of sophisticated spyware-grade capabilities proliferating from commercial surveillance vendors into the hands of nation-state actors and ultimately mass-scale criminal operations.



Published: Wed Mar 4 08:59:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Resilience of Healthcare: Mississippi Medical Center Overcomes Ransomware Attack to Resume Operations


The University of Mississippi Medical Center has overcome a ransomware attack that crippled its IT systems and disrupted patient care services. Nine days after the cyberattack took hold, the medical center's clinics have resumed normal operations, leaving behind a trail of disruption and uncertainty for patients and staff alike.

Published: Wed Mar 4 10:09:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unmasking of a Ransomware Infrastructure: How a Brute Force Attack Revealed a Web of Deceit


A recent incident involving a brute-force attack on an exposed RDP server reveals the intricate web of deceit that cybercriminals use to operate at scale. The story highlights the importance of vigilance and continuous monitoring in preventing successful attacks.

Published: Wed Mar 4 10:22:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

LexisNexis Confirms Data Breach, Reveals Scope of Impact

LexisNexis Legal & Professional has confirmed a data breach that affected its customer records, with the cybercrime crew Fulcrumsec claiming responsibility for the hack. The incident reveals the scope of impact on customer information and highlights the importance of cybersecurity for organizations handling sensitive data.

Published: Wed Mar 4 10:32:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

LastPass Warns of Sophisticated Phishing Campaign Targeting Master Passwords

LastPass has issued an urgent warning to its users about a sophisticated phishing campaign aimed at stealing master passwords by impersonating the company using display name spoofing techniques. The attack uses fake security alerts and links to collect users' credentials, emphasizing the importance of cybersecurity awareness and education.

Published: Wed Mar 4 10:42:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Seizes Major Cybercrime Forum, LeakBase: A Case Study on International Cooperation and Cybersecurity Efforts

The FBI has seized the LeakBase cybercrime forum, marking a significant victory in the ongoing battle against cybercrime. This operation highlights the importance of international cooperation and collaboration in combating transnational threats.

Published: Wed Mar 4 11:51:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Europol-coordinated Action Disrupts Tycoon2FA Phishing Platform, Bringing an End to Tens of Millions of Phishing Messages



Europol-coordinated Action Disrupts Tycoon2FA Phishing Platform, Bringing an End to Tens of Millions of Phishing Messages

A global effort by Europol has resulted in the disruption of a notorious phishing-as-a-service (PhaaS) platform known as Tycoon2FA. The operation, carried out in collaboration with major technology companies and law enforcement agencies from several countries, had the effect of halting tens of millions of phishing messages each month.



Published: Wed Mar 4 12:03:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rise of Hacktivist Activity: A Looming Threat to Global Cybersecurity


A surge in hacktivist activity has been reported, with several groups claiming responsibility for breaching military networks, including Israel's Iron Dome missile defense system. The latest wave of attacks, which began after the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion, has left cybersecurity experts on high alert.

The hackers, who are believed to be primarily pro-Russian and pro-Iranian in nature, have been using a variety of tactics, including distributed denial-of-service (DDoS) attacks, data breaches, and malware. The attacks, which have targeted over 110 organizations across 16 countries, have caused significant disruption to critical infrastructure, including energy networks, government entities, and financial services.

The rise of hacktivist activity in recent days has been attributed to several factors, including the ongoing conflict in the Middle East and the increasing sophistication of these groups' tactics. The use of DDoS attacks, data breaches, and malware has made it increasingly difficult for organizations to defend themselves against these types of threats.

In response to this growing threat, cybersecurity experts are urging organizations to take immediate action to protect themselves. This includes activating continuous monitoring, updating threat intelligence signatures, reducing external attack surface, conducting comprehensive exposure reviews of connected assets, validating proper segmentation between information technology and operational technology networks, and ensuring proper isolation of IoT devices.

The consequences of inaction can be severe, with significant disruptions to critical infrastructure, data breaches, and even physical harm to individuals. As the global cyber threat landscape continues to expand, it is essential that organizations take a proactive approach to protecting themselves against these types of threats.

Published: Wed Mar 4 12:30:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coruna iOS Exploit Kit: A Sophisticated Spyware-Grade Attack Vector Used in Crypto Theft Attacks


A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. The Coruna kit contains five full iOS exploit chains leveraging non-public techniques and mitigation bypasses for iOS versions 13.0 through 17.2.1 (released in December 2023). Researchers from Google Threat Intelligence Group observed activity related to the Coruna exploit kit in February 2025, when they obtained a JavaScript delivery framework along with an exploit for CVE-2024-23222, a WebKit vulnerability that enables remote code execution on iOS 17.2.1.

Published: Wed Mar 4 13:41:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacker Mass-Mails HungerRush Extortion Emails to Restaurant Patrons


Hacker Mass-Mails HungerRush Extortion Emails to Restaurant Patrons
A threat actor sent mass emails to HungerRush customers claiming that restaurant and customer data could be exposed unless the company responded to their demands. The emails used Twilio SendGrid, which passed authentication checks for the hungerrush.com domain. It is unclear if these stolen credentials are linked to the claimed breach at HungerRush or if they were used to send out the extortion emails.


Published: Wed Mar 4 13:48:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Vulnerability so Insidious: How a Single Crafted Email Can Hijack FreeScout Mail Servers


A zero-click vulnerability has been discovered in the widely used helpdesk platform, FreeScout. This article delves into the details of this vulnerability, its severity, and the steps that organizations can take to protect themselves against potential attacks.

Published: Wed Mar 4 16:15:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Automating Remediation: The Distinction Between Automation and Orchestration


In an effort to reduce Mean Time to Remediate (MTTR), organizations must adopt a nuanced approach to automation and orchestration in their remediation processes. By understanding when to use each, security teams can create a streamlined process that reduces risk and shortens MTTR. Learn more about the distinction between automation and orchestration and how to implement an effective remediation structure.

Published: Wed Mar 4 16:23:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Passkey Login on Windows 11: A Shift towards Phishing-Resistant Authentication

Bitwarden has added support for passkey login on Windows 11, marking a significant shift towards phishing-resistant authentication. This new feature enhances user security by eliminating the need for password entry during the login process.

Published: Wed Mar 4 17:43:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco FMC Vulnerabilities: A Double Whammy for Firewalls


Cisco has issued a high-priority security advisory to address two critical vulnerabilities in its Secure Firewall Management Center (FMC) software, which could allow attackers to gain root access to managed firewalls. The vulnerabilities have been rated at 10.0 on the Common Vulnerability Scoring System (CVSS), indicating that they are highly critical and could have significant consequences for organizations that use Cisco FMC software.

Published: Wed Mar 4 17:52:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iran's Cyber Warfare Escalation: A Looming Threat to Global Surveillance Systems

Iran is ramping up its cyber warfare efforts, targeting surveillance cameras across Israel and other Middle Eastern countries with a series of sophisticated hacking attempts. The attack infrastructure used by Iranian hackers is believed to be a combination of commercial VPN exit nodes and virtual private servers. As a result, defenders are advised to take additional measures to secure their systems, such as isolating cameras on a dedicated VLAN with no lateral access to corporate or operational technology networks, and monitoring for repeated login failures or unexpected remote logins.

Published: Wed Mar 4 21:18:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Phishing Menace: Unraveling the Rise of Tycoon 2FA


Europol has led an operation to dismantle a notorious phishing-as-a-service (PhaaS) toolkit known as Tycoon 2FA, which was used by thousands of cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale. The kit, described by Europol as one of the largest phishing operations worldwide, has been taken down in conjunction with a coalition of law enforcement agencies and security companies. Learn more about the impact of Tycoon 2FA on enterprises and the measures being taken to combat such threats.

Published: Thu Mar 5 01:30:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI and Europol Seize Major Dark Web Forum Used to Trade Stolen Credentials, Disrupting Global Cybercrime Network


The FBI and Europol have successfully dismantled LeakBase, a major dark web forum used to trade stolen credentials, dealing a significant blow to global cybercrime networks. This joint operation is seen as a major victory in the fight against cybercrime.

Published: Thu Mar 5 01:42:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Phobos Ransomware Administrator's Guilty Plea: A Delicate Web of Wire Fraud and Cybercrime



The Phobos Ransomware Administrator's Guilty Plea: A Delicate Web of Wire Fraud and Cybercrime

In a recent development, Evgenii Ptitsyn, a 43-year-old Russian national, has pleaded guilty to wire fraud conspiracy charges related to his role in administering the Phobos ransomware operation. The case highlights the cunning nature of this notorious cybercrime entity and serves as an important victory for law enforcement agencies worldwide who have been working tirelessly to dismantle the operation.

Published: Thu Mar 5 03:45:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coruna iOS Exploit Kit: A Comprehensive Analysis of the Latest Threat to iPhone Users

Google has uncovered a powerful new iOS exploit kit called Coruna that targets Apple iPhones running iOS 13–17.2.1 versions, but not the latest iOS release. The Coruna Exploit Kit includes five full exploit chains and 23 exploits, making it one of the most comprehensive and sophisticated iOS exploits ever discovered.

Published: Thu Mar 5 03:54:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco's SD-WAN Troubles: Two New Flaws Identified as Actively Exploited

Cisco has identified two new security flaws in its Catalyst SD-WAN Manager software that have been actively exploited by remote attackers. Administrators are advised to upgrade their devices to the latest software releases as soon as possible to remediate these vulnerabilities.

Published: Thu Mar 5 05:03:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT28-Linked Campaign Utilizes Sophisticated Malware Families to Compromise Ukrainian Entities

A new Russian cyber campaign has been discovered utilizing two previously undocumented malware families named BadPaw and MeowMeow to compromise Ukrainian entities. The attack, attributed to the state-sponsored threat actor APT28, highlights the ongoing evolution of cyber threats and the need for robust cybersecurity measures to protect against them.

Published: Thu Mar 5 05:23:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Disruption of LeakBase: A Cybercrime Forum Brought Down by International Collaboration



In a significant operation led by Europol, authorities from 14 countries dismantled the notorious LeakBase cybercrime forum, bringing down a platform used to trade hacking tools and stolen data. The FBI played a key role in the takedown, which highlights the importance of international collaboration in combating cybercrime.

Published: Thu Mar 5 05:34:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Anthropic's Last-Ditch Effort to Salvage Deal with Pentagon Amid Scandalous Relations

Anthropic, a US-based artificial intelligence startup, is engaged in a last-ditch effort to salvage its deal with the Pentagon after being designated a "supply chain risk" due to concerns over national security risks. The controversy surrounding the company's relationship with the DoD has far-reaching implications for the AI industry as a whole.

Published: Thu Mar 5 06:41:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Policing the Dark Web: A Glimpse into a Sophisticated Online Gambling Ring Exploiting Ukrainian Women



A sophisticated online gambling ring that exploited war-displaced Ukrainian women has been dismantled by Spanish and Ukrainian law enforcement authorities, in collaboration with Europol. The operation, which utilized stolen identities from over 5,000 citizens across 17 different nationalities, generated an estimated 4,750,000 euros in illicit profits. This stark reminder of the ever-present threat of cybercrime highlights the need for continued vigilance and proactive efforts to combat these nefarious activities.

Published: Thu Mar 5 06:53:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dust Specter: A Slew of Sophisticated Malware Campaigns Target Iraqi Officials

Iran-based threat actors have been linked to a sophisticated malware campaign targeting Iraqi officials. The Dust Specter campaign utilizes never-before-seen malware dubbed SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM to impersonate Iraq's Ministry of Foreign Affairs and exfiltrate sensitive data from compromised systems. The use of generative AI tools in the development of this malware suggests a significant escalation in the sophistication of Iranian hacking groups.

Published: Thu Mar 5 07:13:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unseen Risks of MFA: Where Credential Abuse Reigns Supreme


The current state of Windows security highlights a critical vulnerability that has been overlooked by many organizations: where multi-factor authentication (MFA) stops and credential abuse starts. This article delves into the intricate world of Windows authentication paths, revealing seven key vulnerabilities that attackers exploit to gain unauthorized access to systems.

Published: Thu Mar 5 07:20:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian Cyber Warfare: Advanced Persistent Threat Actor Targets Ukraine with Sophisticated BadPaw and MeowMeow Malware


A sophisticated Russian APT actor has been uncovered targeting Ukrainian entities with new malware families, BadPaw and MeowMeow. The attack chain begins with a phishing email carrying a link to a ZIP archive, which launches an HTA file displaying a lure document written in Ukrainian concerning border crossing appeals. This initial step is followed by the download of BadPaw, a .NET-based loader that establishes command-and-control (C2) communication with a remote server. Researchers attribute the campaign with high confidence to a Russia-linked cyberespionage group, while attributing it with moderate confidence to the threat actor APT28.

Published: Thu Mar 5 09:40:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Zero-Day Vulnerability Report: A Looming Threat to Enterprise Security

Google's Zero-Day Vulnerability Report reveals 90 active exploits in attacks last year, with a significant increase in enterprise targets. Learn more about the growing threat of zero-day exploitation and how organizations can protect themselves.

Published: Thu Mar 5 11:13:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Browser Blind Spot: How Enterprise Security is Failing to Keep Up with the AI Revolution


The 2026 State of Browser Security Report reveals a shocking truth about the enterprise's most critical blind spot: its browser security. As AI-native browsers and embedded copilots become increasingly mainstream, the report highlights the dangers of adopting a "one-size-fits-all" approach to security, where traditional controls are often ineffective against modern threats.

Published: Thu Mar 5 11:23:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Year of Unrelenting Cybersecurity Threats: The 2025 Zero-Day Exploitation Report


The 2025 zero-day exploitation report paints a dire picture of the cybersecurity landscape, with big tech companies being the prime targets for malicious actors. As threat actors continue to adapt and innovate, defenders must do the same to stay ahead of the curve. With robust defensive measures in place, we can mitigate the risks associated with zero-day exploits and ensure a safer online environment for all.

Published: Thu Mar 5 11:36:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Upcoming Conclusion to The Boys: A Bloody Era Comes to an End

Prime Video's hit series "The Boys" is coming to an end with its final season. With the showrunner expressing concerns about becoming the thing they've been satirizing for five years, fans are left wondering what this will mean for the future of the franchise.

Published: Thu Mar 5 11:45:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco SD-WAN Manager Vulnerabilities: Active Exploitation by Sophisticated Threat Actors


Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild, highlighting the importance of keeping software up-to-date and applying patches in a timely manner. To learn more about this vulnerability and how to protect against it, please read our latest article on The Hacker News.

Published: Thu Mar 5 11:58:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

WordPress Membership Plugin Vulnerability: A Critical Security Threat to Thousands of Websites

A critical vulnerability has been discovered in the User Registration & Membership plugin, which is widely used across over 60,000 WordPress sites. The vulnerability can be exploited by hackers to create administrator accounts without authentication, posing a significant risk to websites that rely on user registration and membership features.

Published: Thu Mar 5 13:10:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iranian Intelligence Group Embeds Backdoors in US Bank, Airport, and Software Firm Networks

An Iranian cyber crew believed to be part of the Iranian Ministry of Intelligence and Security (MOIS) has been embedded in multiple US companies' networks - including a bank, software firm, and airport - since the beginning of February, according to security researchers. The attackers used custom-made backdoors and Rclone to gain unauthorized access to the compromised networks.

Published: Thu Mar 5 13:42:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Phobos Ransomware Admin Faces Up to 20 Years After Guilty Plea: A Closer Look at the Phosphorus-Infused Cybercrime Scheme

Phobos Ransomware Admin Faces Up to 20 Years After Guilty Plea: A Closer Look at the Phosphorus-Infused Cybercrime Scheme. Russian national Evgenii Ptitsyn has pleaded guilty in the United States to his role in the Phobos ransomware operation, carrying a maximum penalty of 20 years in prison for wire fraud count.

Published: Thu Mar 5 13:51:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Department of Homeland Security's Turbulent Tenure Under Kristi Noem: A Legacy of Controversy and Conflict

The Department of Homeland Security's turbulent tenure under Kristi Noem has been marked by controversy, criticism, and conflict. As the agency looks to the future under new leadership, it remains to be seen whether the challenges facing DHS can be effectively addressed in a way that prioritizes public safety, human rights, and responsible governance.

Published: Thu Mar 5 15:20:45 2026 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us