With the current Iran crisis at its peak, cyber activity is a relevant part of the threat picture alongside kinetic and political pressure. Iran’s ecosystem includes multiple clusters aligned with state entities, the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and…
IT Security News Hourly Summary 2026-03-01 21h : 2 posts
2 posts were published in the last hour 19:32 : ShinyHunters leaked the full Odido dataset 19:13 : Let’s explore the best alternatives to Discord
ShinyHunters leaked the full Odido dataset
Cybercrime group ShinyHunters leaked the full Odido dataset, the Netherlands is facing the biggest data leak in its history. Odido is a Dutch telecommunications company and one of the largest mobile network operators in the Netherlands. It was formed when T-Mobile…
Let’s explore the best alternatives to Discord
With many users feeling uneasy about Discord’s new age verification requirement, here are some alternatives that could be worth exploring. This article has been indexed from Security News | TechCrunch Read the original article: Let’s explore the best alternatives to…
The 5 Big ‘Known Unknowns’ of Donald Trump’s New War With Iran
The all-out air assault on the Islamic Republic might be the biggest gamble of the president’s career. This article has been indexed from Security Latest Read the original article: The 5 Big ‘Known Unknowns’ of Donald Trump’s New War With…
Phishing Campaign Abuses .arpa Domain and IPv6 Tunnels to Evade Enterprise Security Defenses
Cybersecurity experts at Infoblox Threat Intel have identified a sophisticated phishing operation that manipulates core internet infrastructure to slip past enterprise security mechanisms. The campaign introduces an unusual evasion strategy: attackers are exploiting the .arpa top-level domain (TLD) while…
Publicly Exposed Google Cloud API Keys Gain Unintended Access to Gemini Services
A recent security analysis has revealed that thousands of Google Cloud API keys available on the public internet could be misused to interact with Google’s Gemini artificial intelligence platform, creating both data exposure and financial risks. Google Cloud API…
Trezor and Ledger Impersonated in Physical QR Code Phishing Scam Targeting Crypto Wallet Users
Nowadays criminals push fake crypto warnings through paper mail, copying real product packaging from firms like Trezor and Ledger. These printed notes arrive at homes without digital traces, making them feel more trustworthy than email scams. Instead of online…
Botnet Moves to Blockchain, Evades Traditional Takedowns
A newly identified botnet loader is challenging long standing methods used to dismantle cybercrime infrastructure. Security researchers have uncovered a tool known as Aeternum C2 that stores its command instructions on the Polygon blockchain rather than on traditional servers…
IT Security News Hourly Summary 2026-03-01 18h : 1 posts
1 posts were published in the last hour 16:36 : NDSS 2025 – MTZK: Testing And Exploring Bugs In Zero-Knowledge (ZK) Compilers
NDSS 2025 – MTZK: Testing And Exploring Bugs In Zero-Knowledge (ZK) Compilers
Session 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: (All Via The Hong Kong University of Science and Technology) Dongwei Xiao, Zhibo Liu, Yiteng Peng, Shuai Wang PAPER MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers Zero-knowledge (ZK)…
ClawJack Allows Malicous Sites to Control Local OpenClaw AI Agents
Peter Steinberger created OpenClaw, an AI tool that can be a personal assistant for developers. It immediately became famous and got 100,000 GitHub stars in a week. Even OpenAI founder Sam Altman was impressed, bringing Steinberger on board and calling…
Microsoft AI Chief: 18 Months to Automate White-Collar Jobs
Mustafa Suleyman, CEO of Microsoft AI, has issued a stark warning about the future of white-collar work. In a recent Financial Times interview, he predicted that AI will achieve human-level performance on most professional tasks within 18 months, automating…
Claude code abused to steal 150GB in cyberattack on Mexican agencies
Hackers abused Claude Code to build exploits and steal 150GB of data in a cyberattack targeting Mexican government systems. Hackers abused Anthropic’s Claude Code AI assistant to develop exploits, create custom tools, and automatically exfiltrate more than 150GB of data…
IT Security News Hourly Summary 2026-03-01 15h : 2 posts
2 posts were published in the last hour 14:2 : For the first time, light mimics a Nobel Prize quantum effect 14:2 : Hacker Uses Claude, ChatGPT AI Chatbots to Breach Mexican Government Systems
For the first time, light mimics a Nobel Prize quantum effect
Scientists have pulled off a feat long considered out of reach: getting light to mimic the famous quantum Hall effect. In their experiment, photons drift sideways in perfectly defined, quantized steps—just like electrons do in powerful magnetic fields. Because these…
Hacker Uses Claude, ChatGPT AI Chatbots to Breach Mexican Government Systems
An unknown hacker used jailbreaking tactics against Anthropic’s Claude and OpenAI’s ChatGPT AI chatbots to exploit multiple weaknesses in Mexico’s government networks and steal as much as 150GB of sensitive data, from 195 million taxpayer records to voting records and…
Hackers Weaponize Claude Code in Mexican Government Cyberattack
The AI was abused to write exploits, create tools, and automatically exfiltrate over 150GB of data. The post Hackers Weaponize Claude Code in Mexican Government Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
From Michigan to Silicon Valley: A Conversation With Mohamad Yassine
Lessons on humility, careers, the automotive sector, “cowboy coding” and disrupting with AI from a lifelong innovator. The post From Michigan to Silicon Valley: A Conversation With Mohamad Yassine appeared first on Security Boulevard. This article has been indexed from…
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 86
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Technical Deep Dive: The Monero Mining Campaign Operation Olalampo: Inside MuddyWater’s Latest Campaign VShell and SparkRAT Observed in Exploitation…
IT Security News Hourly Summary 2026-03-01 12h : 2 posts
2 posts were published in the last hour 10:36 : CVE-2025-64328 exploitation impacts 900 Sangoma FreePBX instances 10:13 : Face ID Security Risks and Privacy Concerns in 2026
CVE-2025-64328 exploitation impacts 900 Sangoma FreePBX instances
About 900 Sangoma FreePBX systems were infected with web shells after attackers exploited a command injection flaw. Hundreds of Sangoma FreePBX instances are still infected with web shells following attacks that began in December 2025. Sangoma FreePBX is an open-source,…
Face ID Security Risks and Privacy Concerns in 2026
Facial recognition has been a topic of fascination for much of the last century, with films projected onto cinema screens, dystopian novels and think-tank papers debating whether the technology will ever become reality. The technology was either portrayed as…
Week in review: Self-spreading npm malware hits developers, Cisco SD-WAN 0-day exploited since 2023
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Identity verification systems are struggling with synthetic fraud Fake and expired IDs keep showing up in routine customer transactions, from alcohol purchases to credit card…