Cybersecurity News
Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.
Iranian APT MuddyWater Uses New Dindoor and Fakeset Backdoors in Geopolitically Driven Cyber Operations
Recent research by Broadcom (Symantec) and the Carbon Black Threat Hunter Team has exposed a large‑scale cyber espionage campaign conducted ...
Microsoft exposes ClickFix Windows Terminal attacks delivering Lumma Stealer infostealer
Microsoft Threat Intelligence has disclosed a large-scale ClickFix social engineering campaign in which threat actors abuse Windows Terminal (wt.exe) to ...
Chinese-Linked APT UAT-9244 Targets South American Telecom Infrastructure With Multi-Platform Malware
Critical telecommunications infrastructure in multiple South American countries has been under sustained attack since 2024 by an advanced threat group ...
Transparent Tribe (APT36) Weaponizes AI to Industrialize Malware Campaigns Against India
Pakistan-linked cyber‑espionage group Transparent Tribe (APT36) has begun systematically using AI‑powered coding tools to generate large volumes of new malware ...
Alleged $46M Insider Crypto Theft at US Marshals Contractor Highlights Risks of Managing Confiscated Digital Assets
The arrest of US government contractor John Daghita, known online as Lick, on suspicion of stealing more than $46 million ...
Android March 2026 Security Update Fixes 129 Vulnerabilities and Active Qualcomm 0‑Day
The Android Security Bulletin for March 2026 delivers patches for 129 vulnerabilities across the operating system stack and proprietary vendor ...
Iran-Linked Dust Specter Targets Iraqi Government with .NET Backdoors and Fileless PowerShell
A suspected Iran-aligned threat group known as Dust Specter is conducting a targeted cyber espionage campaign against Iraqi government officials ...
Why MFA Alone Cannot Secure Windows and Active Directory Authentication
Many organizations assume that once multi-factor authentication (MFA) is deployed, the risk of account compromise drops to an acceptable level. ...
Chrome’s New Two‑Week Stable Release Cycle: Security and Enterprise Impact
Google is overhauling the release model for its Chrome browser, shifting the stable channel from a four‑week to a two‑week ...
Critical Google Chrome Gemini Live Vulnerability (CVE-2026-0628) Exposed AI Panel to Malicious Extensions
Researchers from Palo Alto Networks Unit 42 have disclosed a critical vulnerability in Google Chrome that allowed malicious browser extensions ...