Government institutions were the most heavily targeted sector in 2025, according to newly published research from HPE Threat Labs, which documented 1,186 active cyberattack campaigns throughout the year. The dataset reflects activity tracked between January 1 and December 31,…
ShinyHunters claims the hack of the European Commission
The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers. The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers and internal communications systems.…
MiniMax Unveils Self-Evolving M2.7 AI: Handles 50% of RL Research
Chinese AI startup MiniMax has unveiled its latest proprietary model, M2.7, touted as the industry’s first “self-evolving” AI capable of independently handling 30% to 50% of reinforcement learning research workflows. According to a VentureBeat report, this breakthrough positions M2.7…
Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other documents to the internet. Handala Hack…
IT Security News Hourly Summary 2026-03-28 18h : 2 posts
2 posts were published in the last hour 16:7 : CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks 16:7 : Cybersecurity Companies’ Stocks Fall as Anthropic Tests Powerful New Model
CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly disclosed vulnerability affecting F5 BIG-IP systems to its Known Exploited Vulnerabilities (KEV) catalog, warning that the flaw is being actively leveraged in real-world attacks. The vulnerability, tracked as…
Cybersecurity Companies’ Stocks Fall as Anthropic Tests Powerful New Model
Cybersecurity stocks declined sharply on Friday following revelations that Anthropic has begun testing “Mythos,” an extraordinarily powerful new AI model with advanced vulnerability-discovery capabilities. Anthropic is actively trialing a new tier of artificial intelligence models codenamed “Capybara,” with the flagship…
BSidesSLC 2025 – Good Models Gone Bad – Visualizing Data Poisoning With Gephi
Author, Creator & Presenter: Maria Khodak, GWAPT Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesSLC 2025 – Good Models Gone Bad – Visualizing Data…
From Data to Intelligence: Why More Signals Don’t Equal Better Security
The misconception: more data intelligence equals better security In cybersecurity, there’s a common assumption: More data = more visibility = better protection But in reality, more data often creates more problems. Security teams today are overwhelmed with: Alerts Feeds Data…
TeamPCP Supply Chain Campaign: Update 003 – Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours, (Sat, Mar 28th)
This is the third update to the TeamPCP supply chain campaign threat intelligence report, “When the Security Scanner Became the Weapon” (v3.0, March 25, 2026). Update 002 covered developments through March 27, including the Telnyx PyPI compromise and Vect ransomware…
Lloyds Group to Compensate 450,000 Customers After App Glitch
Lloyds Banking Group to compensate 450,000 customers after app glitch exposed data. Find out how the glitch affected… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Lloyds Group to…
ConnectWise Warns of Critical ScreenConnect Flaw Enabling Unauthorized Access
A security alert now circulates among ScreenConnect users – critical exposure lurks within older builds. Versions released before 26.1 carry a defect labeled CVE-2026-3564. Unauthorized entry becomes possible through this gap, alongside elevated permissions. ConnectWise urges immediate awareness around…
DarkSword Exploit Kit Targets iPhones, Steals Crypto Wallet and Personal Data
A newly identified exploit kit named “DarkSword” is being used to target iOS devices and extract a wide range of sensitive user information, including data from cryptocurrency wallet applications. The threat specifically impacts iPhones running iOS versions 18.4 to…
Large Scale Ransomware Attack at Marquis Compromises Data of 672000 People
Marquis, a Texas-based provider of analytics and visualization solutions to hundreds of U.S. banks, recently disclosed a ransomware intrusion that took place in August 2025 resulted in a large-scale compromise of highly sensitive customer information, demonstrating the systemic vulnerability…
Passwordless for Service SMB Software: Where Friction Actually Kills Revenue
Discover how passwordless authentication reduces friction in SMB software, speeds payments, and prevents revenue loss in service businesses. The post Passwordless for Service SMB Software: Where Friction Actually Kills Revenue appeared first on Security Boulevard. This article has been indexed…
Secure Authentication Starts With Secure Software Development
Learn how secure software development strengthens authentication, prevents breaches, and protects user data with modern security best practices. The post Secure Authentication Starts With Secure Software Development appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Malicious Browser Extensions Hijack Users’ AI Chats in New “Prompt Poaching” Attack
A new wave of malicious browser extensions is quietly harvesting sensitive user interactions with AI tools, in a growing threat now dubbed “prompt poaching.” The rise of AI assistants in everyday browsing has created a usability gap. Most users interact…
Iran-linked group Handala hacked FBI Director Kash Patel’s personal email account
Iran-linked group Handala claims it hacked FBI Director Kash Patel’s personal email, leaking files. The FBI says no government data was exposed. Iran-linked hacking group Handala claims it breached FBI Director Kash Patel’s personal Gmail account and shared alleged data,…
IT Security News Hourly Summary 2026-03-28 12h : 2 posts
2 posts were published in the last hour 10:34 : Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs 10:34 : Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs
The infection chain includes a fake CAPTCHA page, a Bash script, a Nuitka loader, and the Python-based infostealer. The post Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The vulnerability, CVE-2026-3055 (CVSS score: 9.3), refers to a case of insufficient input validation leading to…
Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)
A critical unauthenticated remote code execution vulnerability (CVE-2025-53521) in F5’s BIG-IP Access Policy Manager (APM) solution is under active exploitation, the US Cybersecurity and Infrastructure Security Agency warned on Friday. CISA added the flaw to its Known Exploited Vulnerabilities catalog…
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attributed with high confidence to the Russian…
Fake Certificate Loader Hides BlankGrabber Malware Chain
BlankGrabber’s operators are now abusing a fake “certificate” loader to hide a multi‑stage Rust and Python infection chain, making this commodity stealer significantly harder to spot on Windows endpoints. The new technique relies on built‑in tools such as certutil.exe, heavily…