cybersec

#TitleDate
1KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy BotnetMar 10, 5:10 pm
2Microsoft brings phishing-resistant Windows sign-ins via Entra passkeysMar 10, 4:10 pm
3The New Turing Test: How Threats Use Geometry to Prove 'Humanness'Mar 10, 3:10 pm
4New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy networkMar 10, 3:10 pm
5New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL QueriesMar 10, 2:10 pm
6APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian MilitaryMar 10, 12:10 pm
7The Zero-Day Scramble is Avoidable: A Guide to Attack Surface ReductionMar 10, 12:10 pm
8CISA: Recently patched Ivanti EPM flaw now actively exploitedMar 10, 12:10 pm
9How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic WorkflowsMar 10, 12:10 pm
10Microsoft to enable Windows hotpatch security updates by defaultMar 10, 11:10 am
11APT28 hackers deploy customized variant of Covenant open-source toolMar 10, 10:10 am
12Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector ToolMar 10, 9:10 am
13CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively ExploitedMar 10, 8:10 am
14ISC Stormcast For Tuesday, March 10th, 2026 https://isc.sans.edu/podcastdetail/9842, (Tue, Mar 10th)Mar 10, 2:10 am
15Microsoft Teams phishing targets employees with A0Backdoor malwareMar 10, 12:10 am
16Microsoft Teams phishing targets employees with backdoorsMar 9, 11:10 pm
17Dutch govt warns of Signal, WhatsApp account hijacking attacksMar 9, 10:10 pm
18Google: Cloud attacks exploit flaws more than weak credentialsMar 9, 10:10 pm
19Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS CredentialsMar 9, 7:10 pm
20Ericsson US discloses data breach after service provider hackMar 9, 7:10 pm
21ShinyHunters claims ongoing Salesforce Aura data theft attacksMar 9, 6:10 pm
22Microsoft Teams will tag third-party bots trying to join meetingsMar 9, 6:10 pm
23UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work DeviceMar 9, 4:10 pm
24FBI warns of phishing attacks impersonating US city, county officialsMar 9, 4:10 pm
25⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded MalwareMar 9, 3:10 pm
26Microsoft still working to fix Windows Explorer white flashesMar 9, 3:10 pm
27Why Password Audits Miss the Accounts Attackers Actually WantMar 9, 3:10 pm
28Encrypted Client Hello: Ready for Prime Time?, (Mon, Mar 9th)Mar 9, 3:10 pm
29Can the Security Platform Finally Deliver for the Mid-Market?Mar 9, 12:10 pm
30Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data TheftMar 9, 11:10 am
31Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical InfrastructureMar 9, 8:10 am
32ISC Stormcast For Monday, March 9th, 2026 https://isc.sans.edu/podcastdetail/9840, (Mon, Mar 9th)Mar 9, 2:10 am
33How AI Assistants are Moving the Security GoalpostsMar 9, 12:10 am
34EU court adviser says banks must immediately refund phishing victimsMar 8, 4:10 pm
35Hackers abuse .arpa DNS and ipv6 to evade phishing defensesMar 8, 3:10 pm
36OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity IssuesMar 7, 6:10 pm
37Termite ransomware breaches linked to ClickFix CastleRAT attacksMar 7, 5:10 pm
38Microsoft: Hackers abusing AI at every stage of cyberattacksMar 7, 4:10 pm
39Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI ModelMar 7, 1:10 pm
40YARA-X 1.14.0 Release, (Sat, Mar 7th)Mar 7, 10:10 am
41Cognizant TriZetto breach exposes health data of 3.4 million patientsMar 6, 8:10 pm
42CISA warns feds to patch iOS flaws exploited in crypto-theft attacksMar 6, 5:10 pm
43Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RATMar 6, 4:10 pm
44Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting IndiaMar 6, 4:10 pm
45CISA warns of Apple flaws exploited in spyware, crypto-theft attacksMar 6, 4:10 pm
46Microsoft 365 Backup to add file-level restore for faster recoveryMar 6, 3:10 pm
47Fake Claude Code install guides push infostealers in InstallFix attacksMar 6, 3:10 pm
48EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and SecurityMar 6, 3:10 pm
49Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor BackdoorMar 6, 11:10 am
50The MSP Guide to Using AI-Powered Risk Management to Scale CybersecurityMar 6, 11:10 am
51China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom AttacksMar 6, 10:10 am
52Ghanain man pleads guilty to role in $100 million fraud ringMar 6, 10:10 am
53FBI investigates breach of surveillance and wiretap systemsMar 6, 9:10 am
54Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV CatalogMar 6, 8:10 am
55Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma StealerMar 6, 8:10 am
56ISC Stormcast For Friday, March 6th, 2026 https://isc.sans.edu/podcastdetail/9838, (Fri, Mar 6th)Mar 6, 2:10 am
57Chinese state hackers target telcos with new malware toolkitMar 6, 12:10 am
58Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malwareMar 5, 11:10 pm
59Wikipedia hit by self-propagating JavaScript worm that vandalized pagesMar 5, 9:10 pm
60FBI arrests suspect linked to $46M crypto theft from US MarshalsMar 5, 7:10 pm
61WordPress membership plugin bug exploited to create admin accountsMar 5, 7:10 pm
62Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager VulnerabilitiesMar 5, 5:10 pm
632026 Browser Data Reveals Major Enterprise Security Blind SpotsMar 5, 3:10 pm
64Google says 90 zero-days were exploited in attacks last yearMar 5, 3:10 pm
65Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security LeadersMar 5, 2:10 pm
66ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & MoreMar 5, 2:10 pm
67Police dismantles online gambling ring exploiting Ukrainian womenMar 5, 1:10 pm
68Where Multi-Factor Authentication Stops and Credential Abuse StartsMar 5, 12:10 pm
69ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)Mar 5, 12:10 pm
70Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM MalwareMar 5, 12:10 pm
71APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in UkraineMar 5, 11:10 am
72Cisco flags more SD-WAN flaws as actively exploited in attacksMar 5, 11:10 am
73Phobos ransomware admin pleads guilty to wire fraud conspiracyMar 5, 9:10 am
74FBI and Europol Seize LeakBase Forum Used to Trade Stolen CredentialsMar 5, 8:10 am
75Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 AttacksMar 5, 8:10 am
76Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)Mar 5, 3:10 am
77Bitwarden adds support for passkey login on Windows 11Mar 4, 11:10 pm
78Mail2Shell zero-click attack lets hackers hijack FreeScout mail serversMar 4, 10:10 pm
79Fake LastPass support email threads try to steal vault passwordsMar 4, 9:10 pm
80Windows 10 KB5075039 update fixes broken Recovery EnvironmentMar 4, 9:10 pm
81Cisco warns of max severity Secure FMC flaws giving root accessMar 4, 8:10 pm
82Hacker mass-mails HungerRush extortion emails to restaurant patronsMar 4, 7:10 pm
83Spyware-grade Coruna iOS exploit kit now used in crypto theft attacksMar 4, 7:10 pm
84149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East ConflictMar 4, 6:10 pm
85FBI seizes LeakBase cybercrime forum, data of 142,000 membersMar 4, 6:10 pm
86Europol-coordinated action disrupts Tycoon2FA phishing platformMar 4, 5:10 pm
87Mississippi medical center reopens clinics hit by ransomware attackMar 4, 4:10 pm
88How a Brute Force Attack Unmasked a Ransomware Infrastructure NetworkMar 4, 3:10 pm
89Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1Mar 4, 2:10 pm
90New RFP Template for AI Usage Control and AI Governance Mar 4, 1:10 pm
91Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and LinuxMar 4, 10:10 am
92Want More XWorm?, (Wed, Mar 4th)Mar 4, 10:10 am
93APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2Mar 4, 9:10 am
94CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV CatalogMar 4, 6:10 am
95ISC Stormcast For Wednesday, March 4th, 2026 https://isc.sans.edu/podcastdetail/9834, (Wed, Mar 4th)Mar 4, 2:10 am
96CISA flags VMware Aria Operations RCE flaw as exploited in attacksMar 4, 12:10 am
97Facebook accounts unavailable in worldwide outageMar 3, 11:10 pm
98Paint maker giant AkzoNobel confirms cyberattack on U.S. siteMar 3, 11:10 pm
99Microsoft: Hackers abuse OAuth error flows to spread malwareMar 3, 9:10 pm
100Google Chrome shifts to two-week release cycle for increased stabilityMar 3, 6:10 pm
101Fake Tech Support Spam Deploys Customized Havoc C2 Across OrganizationsMar 3, 6:10 pm
102LexisNexis confirms data breach as hackers leak stolen filesMar 3, 4:10 pm
103Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 CountriesMar 3, 3:10 pm
104Building a High-Impact Tier 1: The 3 Steps CISOs Must FollowMar 3, 3:10 pm
105Compromised Site Management Panels are a Hot Item in Cybercrime MarketsMar 3, 3:10 pm
106Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)Mar 3, 3:10 pm
107Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor AuthenticationMar 3, 12:10 pm
108AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and UnmanagedMar 3, 12:10 pm
109Amazon: Drone strikes damaged AWS data centers in Middle EastMar 3, 12:10 pm
110Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government TargetsMar 3, 11:10 am
111Star Citizen game dev discloses breach affecting user dataMar 3, 11:10 am
112UH Cancer Center data breach affects nearly 1.2 million peopleMar 3, 10:10 am
113SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware ChainsMar 3, 9:10 am
114Google Confirms CVE-2026-21385 in Qualcomm Android Component ExploitedMar 3, 9:10 am
115Android gets patches for Qualcomm zero-day exploited in attacksMar 3, 9:10 am
116⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and MoreMar 3, 6:42 am
117How Deepfakes and Injection Attacks Are Breaking Identity VerificationMar 3, 6:42 am
118UK warns of Iranian cyberattack risks amid Middle-East conflictMar 3, 6:42 am
119Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in ChromeMar 3, 6:42 am
120New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini PanelMar 3, 6:42 am
121Florida woman imprisoned for massive Microsoft license fraud schemeMar 3, 6:42 am
122Alabama man pleads guilty to hacking, extorting hundreds of womenMar 3, 6:42 am
123Fake Google Security site uses PWA app to steal credentials, MFA codesMar 3, 6:42 am
124CyberStrikeAI tool adopted by hackers for AI-powered attacksMar 3, 6:42 am
125ISC Stormcast For Tuesday, March 3rd, 2026 https://isc.sans.edu/podcastdetail/9832, (Tue, Mar 3rd)Mar 3, 6:42 am
AI Testing

Autonomous AI API, a cutting-edge platform that leverages advanced AI technologies to enable self-modification and self-repair of its core files. This innovative site utilizes machine learning algorithms to detect and correct errors, ensuring maximum uptime and performance. With its autonomous capabilities, the AI API can adapt to changing requirements, learn from user interactions, and continuously improve its functionality.