Telegram’s Crackdown Changed How Threat Actors Act, But Not Where They Act | Cybersecurity

Telegram entered 2025 under unprecedented pressure. Public scrutiny, regulatory attention, and leadership turmoil forced the platform to do something it had long resisted, enforce at scale. Moderation volumes surged, automation…

Read more

This is all it takes to stop a train (Lock and Code S07E06) | Malware

This week on the Lock and Code podcast… Forget the runaway train thrillingly shot in Buster Keaton’s 1926 film “The General,” and never mind the charging locomotive rescued by actors…

Read more

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks | Cybersecurity

Ravie LakshmananMar 21, 2026Cyber Espionage / Threat Intelligence Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like WhatsApp and Signal to…

Read more

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager | Cybersecurity

Ravie LakshmananMar 21, 2026Vulnerability / Threat Intelligence Oracle has released security updates to address a critical security flaw impacting Identity Manager and Web Services Manager that could be exploited to…

Read more

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets | Cybersecurity

Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets. The…

Read more

Could your face change what you pay? NYC wants limits on biometric tracking | Malware

New York City lawmakers are pushing to ban private businesses from using biometric tools like voice and facial recognition software to track the public. While the desire to use surveillance…

Read more

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure | Cybersecurity

A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabilities. The security…

Read more

That “job brief” on Google Forms could infect your device | Malware

We’ve identified a campaign using business-related lures, such as job interviews, project briefs, and financial document, to distribute malware, including the PureHVNC Remote Access Trojan (RAT). It’s not the malware…

Read more

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams | Cybersecurity

Ravie LakshmananMar 20, 2026Data Privacy / Mobile Security Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait period to install apps from…

Read more

Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks | Cybersecurity

Ravie LakshmananMar 20, 2026Mobile Security / Malware Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried…

Read more

Your tax forms sell for $20 on the dark web | Malware

Tax season is also peak season for identity theft. Criminals use stolen personal data to file fake tax returns and claim refunds before the real taxpayer does. Here’s how the…

Read more

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers | Cybersecurity

Ravie LakshmananMar 19, 2026Cyber Espionage / Threat Intelligence Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard….

Read more

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data | Cybersecurity

Ravie LakshmananMar 19, 2026Malware / Mobile Security Cybersecurity researchers have disclosed a new Android malware family called Perseus that’s being actively distributed in the wild with an aim to conduct…

Read more

A DarkSword hangs over unpatched iPhones | Malware

Researchers at Google have identified an iOS exploit chain, named DarkSword, that has been used since late last year by multiple actors to infect iPhones with malware in targeted attacks. DarkSword…

Read more

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover | Cybersecurity

A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least November 2025, according to reports from…

Read more

Google cracks down on Android apps abusing accessibility | Malware

Google just dropped a bombshell for app developers with the latest version of its Android mobile operating system. The company can now prevent apps from installing if they try to…

Read more

Apple patches WebKit bug that could let sites access your data | Malware

Apple has released a Background Security Improvement to patch a flaw that could allow malicious websites to bypass browser protections and access data from other sites. What is it? The…

Read more

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs | Cybersecurity

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People’s Republic of Korea (DPRK)…

Read more

Researchers found font-rendering trick to hide malicious commands | Malware

Researchers have published a proof-of-concept (PoC) that uses custom fonts to fool many popular Artificial Intelligence (AI) assistants, including ChatGPT, Claude, Copilot, Gemini, Leo, Grok, Perplexity, Sigma, Dia, Fellou, and…

Read more

Getting the Threat Model Right | Cybersecurity

When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your…

Read more

Inside a network of 20,000+ fake shops | Malware

We mapped a sprawling fake shop operation of over 20,000 domains, dozens of shared IP addresses and identical storefronts with different names pasted on top. They exist for one purpose:…

Read more

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS | Cybersecurity

Ravie LakshmananMar 18, 2026Vulnerability / Zero-Day Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS….

Read more

How searching for a VPN could mean handing over your work login details | Malware

This blog is about how trying to do the “right thing” can lead you straight into a trap. People searching for a VPN ended up downloading credential-stealing malware. From the…

Read more

Fake Pudgy World site steals your crypto passwords | Malware

A phishing site impersonating the newly-launched Pudgy World browser game is targeting crypto users with a technique that goes well beyond a convincing logo and matching color scheme. Pudgy World…

Read more

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE | Cybersecurity

Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries. In a report published…

Read more

90% of people don’t trust AI with their data | Malware

AI didn’t sneak into our lives. It burst through the door, took a seat at the table, and started finishing our sentences. Instead of a helpful list of links, Google…

Read more

AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds | Cybersecurity

The Hacker NewsMar 17, 2026Artificial Intelligence / Security Leadership A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the…

Read more

The Biggest Defense Against Shai-Hulud 3.0 | Cybersecurity

When Shai-Hulud 2.0 hit in late 2025, it was a brutal, expensive wake-up call for DevSecOps teams. It showed that the industry’s direction of shifting left, where teams pass security…

Read more

Delete doesn’t mean gone. Here’s how File Shredder fixes that | Malware

You have done it a thousand times. Right-click. Delete. Empty Trash. Done. Except it’s not done. That file, your tax return, your private photos, that EmbezzlementPlan.doc… it’s all still sitting…

Read more

Hacked sites deliver Vidar infostealer to Windows users | Malware

In recent years, ClickFix and fake CAPTCHA techniques have become a popular way for cybercriminals to distribute malware. Instead of exploiting a technical vulnerability, these attacks rely on convincing people…

Read more
Update cookies preferences