Alleged $46M Insider Crypto Theft at US Marshals Contractor Highlights Risks of Managing Confiscated Digital Assets

Man holding cash and a device, surrounded by money and Bitcoin symbols.

The arrest of US government contractor John Daghita, known online as Lick, on suspicion of stealing more than $46 million in cryptocurrency from wallets controlled by the US Marshals Service (USMS) has become a textbook example of how dangerous an insider threat can be in digital asset operations. The arrest operation was conducted jointly by … Read more

Android March 2026 Security Update Fixes 129 Vulnerabilities and Active Qualcomm 0‑Day

Team of cybersecurity experts working against a Qualcomm threat in a dramatic setting.

The Android Security Bulletin for March 2026 delivers patches for 129 vulnerabilities across the operating system stack and proprietary vendor components. The most notable issue is the actively exploited 0‑day vulnerability CVE-2026-21385 in a Qualcomm graphics component, which has already been observed in targeted attacks. Android March 2026 security bulletin: scope and patch levels Google … Read more

Iran-Linked Dust Specter Targets Iraqi Government with .NET Backdoors and Fileless PowerShell

Computer hardware layout featuring a note, circuit board, and Iranian flag.

A suspected Iran-aligned threat group known as Dust Specter is conducting a targeted cyber espionage campaign against Iraqi government officials and ministry staff, according to new research by Zscaler ThreatLabz. The actors impersonate Iraq’s Ministry of Foreign Affairs (MFA) and deploy previously undocumented .NET backdoors codenamed SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. Targeted cyber espionage against … Read more

Why MFA Alone Cannot Secure Windows and Active Directory Authentication

Two professionals engaged in cybersecurity operations with high-tech interfaces.

Many organizations assume that once multi-factor authentication (MFA) is deployed, the risk of account compromise drops to an acceptable level. For cloud services, this is largely true: according to Microsoft, enabling MFA for cloud identities prevents the vast majority of automated account takeover attempts. However, in Windows and Active Directory (AD) environments, attackers still gain … Read more

Chrome’s New Two‑Week Stable Release Cycle: Security and Enterprise Impact

** Split scene showcasing a transition from dark to bright technology and productivity.

Google is overhauling the release model for its Chrome browser, shifting the stable channel from a four‑week to a two‑week release cycle. Starting with Chrome 153, planned for 8 September 2026, users will receive stable updates twice per month. This change is more than a scheduling tweak: it directly strengthens browser cybersecurity by reducing the … Read more

Critical Google Chrome Gemini Live Vulnerability (CVE-2026-0628) Exposed AI Panel to Malicious Extensions

Split-screen showing a friendly virtual avatar and a menacing hacker silhouette.

Researchers from Palo Alto Networks Unit 42 have disclosed a critical vulnerability in Google Chrome that allowed malicious browser extensions to take control of the Gemini Live AI panel and gain elevated access to the user’s camera, microphone, and local files. The flaw, tracked as CVE-2026-0628 with a CVSS score of 8.8, has been patched … Read more

DHS and ICE Contracts Data Breach Exposes Deep Cyber Supply Chain Risks

Aerial view of government buildings near the Potomac River and Washington Monument.

A hacktivist collective calling itself Department of Peace has claimed responsibility for compromising information systems of the U.S. Department of Homeland Security (DHS) and stealing a large dataset related to contracts involving DHS and U.S. Immigration and Customs Enforcement (ICE). The material was released through the transparency platform Distributed Denial of Secrets (DDoSecrets), drawing renewed … Read more

Max Android Messenger Telemetry: VPN Detection and Privacy Implications

Ethernet cable connected with a warning light indicating VPN detected.

Analysis of the Android client of the messenger Max has raised serious questions in the information security community. Reverse engineering and traffic inspection showed that the app not only determines the user’s external IP address, but also detects VPN usage and tests connectivity to Telegram and WhatsApp infrastructure. While Max states these mechanisms exist solely … Read more

Tycoon 2FA Takedown: Inside a Leading Phishing-as-a-Service Platform That Bypassed MFA

Europol officers surround a man working intently at a computer in a dimly lit room.

An international coalition of law-enforcement agencies and cybersecurity companies has dismantled Tycoon 2FA, one of the most prolific phishing-as-a-service (PhaaS) platforms on the underground market. The service specialized in Adversary-in-the-Middle (AitM) phishing and large-scale multi-factor authentication (MFA) bypass, enabling thousands of criminals to steal credentials and session cookies with minimal technical skill. What Was Tycoon … Read more

Cloud Imperium Games Confirms Star Citizen Data Breach and Warns of Phishing Risks

** Building on fire with smoke billowing, surrounded by cityscape and traffic.

Cloud Imperium Games (CIG), the studio behind the space sim Star Citizen and the single-player title Squadron 42, has disclosed a cybersecurity incident in which attackers gained unauthorized access to internal backup systems and obtained personal data belonging to some users. The breach was detected on 21 January 2026 and is now the subject of … Read more