Latest Cybersecurity News and Articles
05 March 2026
Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow.
"The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals
05 March 2026
Cisco has rolled out patches for 48 vulnerabilities in Firewall ASA, Secure FMC, and Secure FTD products.
The post Cisco Patches Critical Vulnerabilities in Enterprise Networking Products appeared first on SecurityWeek.
05 March 2026
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies.
The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing
05 March 2026
A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools.
The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access the forum's website ("leakbase[.]la") are now
04 March 2026
Google and iVerify analysis reveals a powerful exploit kit originally used by Russian state actors that is now appearing in broader criminal campaigns.
The post Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks appeared first on SecurityWeek.
04 March 2026
The phishing-as-a-service platform was used to send fraudulent emails to over 500,000 organizations every month.
The post Tycoon 2FA Phishing Platform Dismantled in Global Takedown appeared first on SecurityWeek.
04 March 2026
The hackers claim to have stolen 2GB of files, including 400,000 personal information records.
The post New LexisNexis Data Breach Confirmed After Hackers Leak Files appeared first on SecurityWeek.
04 March 2026
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion.
"The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2," Radware said in a Tuesday
04 March 2026
What to expect as the conflict between the United States and Iran unfolds.
04 March 2026
The deal awaits final shareholder and regulatory approvals and is expected to be completed in the second half of 2026.
The post Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance appeared first on SecurityWeek.
04 March 2026
A Belgian national, De Ceukelaire’ did not set out to be a hacker. Like many hackers he was born with the potential to become one and only gradually realized he is one.
The post Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively appeared first on SecurityWeek.
04 March 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 4, 2026 – Read the full story in Finextra It is estimated that one third to a half of North Korea’s budget comes from cyberfraud and extortion. Finextra reports that most of these
The post Examining North Korea’s Cybercrime Economy appeared first on Cybercrime Magazine.
04 March 2026
Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1.
The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It's not effective against the latest version of iOS. The findings were first reported by WIRED.
"The
04 March 2026
Employees seeking free versions of paid software may unknowingly install malware-laced “cracked” apps that can steal credentials, deploy cryptominers, or open the door to ransomware.
The post How Pirated Software Turns Helpful Employees Into Malware Delivery Agents appeared first on SecurityWeek.
04 March 2026
The startup aims to provide organizations with visibility into how AI operates across their environment.
The post AI Security Firm JetStream Launches With $34 Million in Seed Funding appeared first on SecurityWeek.
04 March 2026
The attackers are sending out fake alerts claiming unauthorized access or master password changes.
The post LastPass Warns of New Phishing Campaign appeared first on SecurityWeek.
04 March 2026
Join the webinar as we explore a blueprint for an OT SOC leveraging an integrated OT Security Platform to safeguard operations and maintain business continuity.
The post Webinar Today: Designing an OT SOC for Safety, Reliability, and Business Continuity appeared first on SecurityWeek.
04 March 2026
Starting September 2026, new Chrome iterations will be released twice as fast, part of a two-week cycle.
The post Google Plans Two-Week Release Schedule for Chrome appeared first on SecurityWeek.
04 March 2026
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need "AI Governance," but they have no idea what they are actually looking for.
The CISO’s Dilemma: You Have the AI Budget, but Do You Have the Requirements?
As AI
04 March 2026
The principles cover security, resilience against attacks and disasters, AI, and openness and interoperability.
The post Global Coalition Publishes 6G Security and Resilience Principles appeared first on SecurityWeek.