cybersec

#TitleDate
1Windows 11 KB5079473 & KB5078883 cumulative updates releasedMar 10, 6:10 pm
2Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flawsMar 10, 6:10 pm
3KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy BotnetMar 10, 5:10 pm
4Microsoft brings phishing-resistant Windows sign-ins via Entra passkeysMar 10, 4:10 pm
5The New Turing Test: How Threats Use Geometry to Prove 'Humanness'Mar 10, 3:10 pm
6New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy networkMar 10, 3:10 pm
7New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL QueriesMar 10, 2:10 pm
8APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian MilitaryMar 10, 12:10 pm
9The Zero-Day Scramble is Avoidable: A Guide to Attack Surface ReductionMar 10, 12:10 pm
10CISA: Recently patched Ivanti EPM flaw now actively exploitedMar 10, 12:10 pm
11How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic WorkflowsMar 10, 12:10 pm
12Microsoft to enable Windows hotpatch security updates by defaultMar 10, 11:10 am
13APT28 hackers deploy customized variant of Covenant open-source toolMar 10, 10:10 am
14Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector ToolMar 10, 9:10 am
15CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively ExploitedMar 10, 8:10 am
16ISC Stormcast For Tuesday, March 10th, 2026 https://isc.sans.edu/podcastdetail/9842, (Tue, Mar 10th)Mar 10, 2:10 am
17Microsoft Teams phishing targets employees with A0Backdoor malwareMar 10, 12:10 am
18Microsoft Teams phishing targets employees with backdoorsMar 9, 11:10 pm
19Dutch govt warns of Signal, WhatsApp account hijacking attacksMar 9, 10:10 pm
20Google: Cloud attacks exploit flaws more than weak credentialsMar 9, 10:10 pm
21Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS CredentialsMar 9, 7:10 pm
22Ericsson US discloses data breach after service provider hackMar 9, 7:10 pm
23ShinyHunters claims ongoing Salesforce Aura data theft attacksMar 9, 6:10 pm
24Microsoft Teams will tag third-party bots trying to join meetingsMar 9, 6:10 pm
25UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work DeviceMar 9, 4:10 pm
26FBI warns of phishing attacks impersonating US city, county officialsMar 9, 4:10 pm
27⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded MalwareMar 9, 3:10 pm
28Microsoft still working to fix Windows Explorer white flashesMar 9, 3:10 pm
29Why Password Audits Miss the Accounts Attackers Actually WantMar 9, 3:10 pm
30Encrypted Client Hello: Ready for Prime Time?, (Mon, Mar 9th)Mar 9, 3:10 pm
31Can the Security Platform Finally Deliver for the Mid-Market?Mar 9, 12:10 pm
32Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data TheftMar 9, 11:10 am
33Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical InfrastructureMar 9, 8:10 am
34ISC Stormcast For Monday, March 9th, 2026 https://isc.sans.edu/podcastdetail/9840, (Mon, Mar 9th)Mar 9, 2:10 am
35How AI Assistants are Moving the Security GoalpostsMar 9, 12:10 am
36EU court adviser says banks must immediately refund phishing victimsMar 8, 4:10 pm
37Hackers abuse .arpa DNS and ipv6 to evade phishing defensesMar 8, 3:10 pm
38OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity IssuesMar 7, 6:10 pm
39Termite ransomware breaches linked to ClickFix CastleRAT attacksMar 7, 5:10 pm
40Microsoft: Hackers abusing AI at every stage of cyberattacksMar 7, 4:10 pm
41Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI ModelMar 7, 1:10 pm
42YARA-X 1.14.0 Release, (Sat, Mar 7th)Mar 7, 10:10 am
43Cognizant TriZetto breach exposes health data of 3.4 million patientsMar 6, 8:10 pm
44CISA warns feds to patch iOS flaws exploited in crypto-theft attacksMar 6, 5:10 pm
45Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RATMar 6, 4:10 pm
46Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting IndiaMar 6, 4:10 pm
47CISA warns of Apple flaws exploited in spyware, crypto-theft attacksMar 6, 4:10 pm
48Microsoft 365 Backup to add file-level restore for faster recoveryMar 6, 3:10 pm
49Fake Claude Code install guides push infostealers in InstallFix attacksMar 6, 3:10 pm
50EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and SecurityMar 6, 3:10 pm
51Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor BackdoorMar 6, 11:10 am
52The MSP Guide to Using AI-Powered Risk Management to Scale CybersecurityMar 6, 11:10 am
53China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom AttacksMar 6, 10:10 am
54Ghanain man pleads guilty to role in $100 million fraud ringMar 6, 10:10 am
55FBI investigates breach of surveillance and wiretap systemsMar 6, 9:10 am
56Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV CatalogMar 6, 8:10 am
57Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma StealerMar 6, 8:10 am
58ISC Stormcast For Friday, March 6th, 2026 https://isc.sans.edu/podcastdetail/9838, (Fri, Mar 6th)Mar 6, 2:10 am
59Chinese state hackers target telcos with new malware toolkitMar 6, 12:10 am
60Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malwareMar 5, 11:10 pm
61Wikipedia hit by self-propagating JavaScript worm that vandalized pagesMar 5, 9:10 pm
62FBI arrests suspect linked to $46M crypto theft from US MarshalsMar 5, 7:10 pm
63WordPress membership plugin bug exploited to create admin accountsMar 5, 7:10 pm
64Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager VulnerabilitiesMar 5, 5:10 pm
652026 Browser Data Reveals Major Enterprise Security Blind SpotsMar 5, 3:10 pm
66Google says 90 zero-days were exploited in attacks last yearMar 5, 3:10 pm
67Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security LeadersMar 5, 2:10 pm
68ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & MoreMar 5, 2:10 pm
69Police dismantles online gambling ring exploiting Ukrainian womenMar 5, 1:10 pm
70Where Multi-Factor Authentication Stops and Credential Abuse StartsMar 5, 12:10 pm
71ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)Mar 5, 12:10 pm
72Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM MalwareMar 5, 12:10 pm
73APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in UkraineMar 5, 11:10 am
74Cisco flags more SD-WAN flaws as actively exploited in attacksMar 5, 11:10 am
75Phobos ransomware admin pleads guilty to wire fraud conspiracyMar 5, 9:10 am
76FBI and Europol Seize LeakBase Forum Used to Trade Stolen CredentialsMar 5, 8:10 am
77Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 AttacksMar 5, 8:10 am
78Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)Mar 5, 3:10 am
79Bitwarden adds support for passkey login on Windows 11Mar 4, 11:10 pm
80Mail2Shell zero-click attack lets hackers hijack FreeScout mail serversMar 4, 10:10 pm
81Fake LastPass support email threads try to steal vault passwordsMar 4, 9:10 pm
82Windows 10 KB5075039 update fixes broken Recovery EnvironmentMar 4, 9:10 pm
83Cisco warns of max severity Secure FMC flaws giving root accessMar 4, 8:10 pm
84Hacker mass-mails HungerRush extortion emails to restaurant patronsMar 4, 7:10 pm
85Spyware-grade Coruna iOS exploit kit now used in crypto theft attacksMar 4, 7:10 pm
86149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East ConflictMar 4, 6:10 pm
87FBI seizes LeakBase cybercrime forum, data of 142,000 membersMar 4, 6:10 pm
88Europol-coordinated action disrupts Tycoon2FA phishing platformMar 4, 5:10 pm
89Mississippi medical center reopens clinics hit by ransomware attackMar 4, 4:10 pm
90How a Brute Force Attack Unmasked a Ransomware Infrastructure NetworkMar 4, 3:10 pm
91Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1Mar 4, 2:10 pm
92New RFP Template for AI Usage Control and AI Governance Mar 4, 1:10 pm
93Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and LinuxMar 4, 10:10 am
94Want More XWorm?, (Wed, Mar 4th)Mar 4, 10:10 am
95APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2Mar 4, 9:10 am
96CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV CatalogMar 4, 6:10 am
97ISC Stormcast For Wednesday, March 4th, 2026 https://isc.sans.edu/podcastdetail/9834, (Wed, Mar 4th)Mar 4, 2:10 am
98CISA flags VMware Aria Operations RCE flaw as exploited in attacksMar 4, 12:10 am
99Facebook accounts unavailable in worldwide outageMar 3, 11:10 pm
100Paint maker giant AkzoNobel confirms cyberattack on U.S. siteMar 3, 11:10 pm
101Microsoft: Hackers abuse OAuth error flows to spread malwareMar 3, 9:10 pm
102Google Chrome shifts to two-week release cycle for increased stabilityMar 3, 6:10 pm
103Fake Tech Support Spam Deploys Customized Havoc C2 Across OrganizationsMar 3, 6:10 pm
104LexisNexis confirms data breach as hackers leak stolen filesMar 3, 4:10 pm
105Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 CountriesMar 3, 3:10 pm
106Building a High-Impact Tier 1: The 3 Steps CISOs Must FollowMar 3, 3:10 pm
107Compromised Site Management Panels are a Hot Item in Cybercrime MarketsMar 3, 3:10 pm
108Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)Mar 3, 3:10 pm
109Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor AuthenticationMar 3, 12:10 pm
110AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and UnmanagedMar 3, 12:10 pm
111Amazon: Drone strikes damaged AWS data centers in Middle EastMar 3, 12:10 pm
112Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government TargetsMar 3, 11:10 am
113Star Citizen game dev discloses breach affecting user dataMar 3, 11:10 am
114UH Cancer Center data breach affects nearly 1.2 million peopleMar 3, 10:10 am
115SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware ChainsMar 3, 9:10 am
116Google Confirms CVE-2026-21385 in Qualcomm Android Component ExploitedMar 3, 9:10 am
117Android gets patches for Qualcomm zero-day exploited in attacksMar 3, 9:10 am
118⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and MoreMar 3, 6:42 am
119How Deepfakes and Injection Attacks Are Breaking Identity VerificationMar 3, 6:42 am
120UK warns of Iranian cyberattack risks amid Middle-East conflictMar 3, 6:42 am
121Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in ChromeMar 3, 6:42 am
122New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini PanelMar 3, 6:42 am
123Florida woman imprisoned for massive Microsoft license fraud schemeMar 3, 6:42 am
124Alabama man pleads guilty to hacking, extorting hundreds of womenMar 3, 6:42 am
125Fake Google Security site uses PWA app to steal credentials, MFA codesMar 3, 6:42 am
126CyberStrikeAI tool adopted by hackers for AI-powered attacksMar 3, 6:42 am
127ISC Stormcast For Tuesday, March 3rd, 2026 https://isc.sans.edu/podcastdetail/9832, (Tue, Mar 3rd)Mar 3, 6:42 am
AI Testing

Autonomous AI API, a cutting-edge platform that leverages advanced AI technologies to enable self-modification and self-repair of its core files. This innovative site utilizes machine learning algorithms to detect and correct errors, ensuring maximum uptime and performance. With its autonomous capabilities, the AI API can adapt to changing requirements, learn from user interactions, and continuously improve its functionality.