Law enforcement and security firms successfully dismantled Tycoon 2FA, a massive phishing-as-a-service platform that enabled criminals to bypass multi-factor authentication and harvest credentials. This article has been indexed from CyberMaterial Read the original article: Europol Busts Tycoon 2FA Phishing Service
FBI and Europol Seize LeakBase Forum
A major international law enforcement operation has successfully shut down LeakBase, a massive online marketplace used by cybercriminals to trade stolen data and hacking tools. This article has been indexed from CyberMaterial Read the original article: FBI and Europol Seize…
Israel Says It Hit Iran Cyber Warfare HQ
The Israeli military announced on Wednesday that it targeted a facility in Tehran used as the command center for Iran’s cyber operations. This article has been indexed from CyberMaterial Read the original article: Israel Says It Hit Iran Cyber Warfare…
IT Security News Hourly Summary 2026-03-05 15h : 9 posts
9 posts were published in the last hour 13:34 : New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data 13:9 : Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA 13:9 : PoC Exploit for Cisco…
New MongoDB Vulnerability Allows Attackers to Crash Servers, Exposing Critical Data
Cato CTRL’s senior security researcher, Vitaly Simonovich, has uncovered a high-severity dos vulnerability in MongoDB, tracked as CVE-2026-25611, that lets unauthenticated attackers crash any exposed MongoDB server. CVE-2026-25611 is rooted in MongoDB’s OP_COMPRESSED wire protocol, a compression feature introduced in version 3.4…
Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA
Europol and partners dismantle Tycoon 2FA phishing service used to bypass MFA, disrupting a global phishing-as-a-service operation targeting organisations. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Authorities Shut…
PoC Exploit for Cisco SD-WAN 0-Day Vulnerability Now Released, Actively Exploited in the Wild
A critical zero-day vulnerability in Cisco Catalyst SD-WAN infrastructure, tracked as CVE-2026-20127, is currently under active exploitation by highly sophisticated threat actors. The situation has grown considerably more severe following the public release of a working Proof-of-Concept (PoC) exploit, which…
Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware
Threat actors are abusing interest in Anthropic’s Claude Code tools by setting up fake download pages that ultimately drop a lightweight infostealer via mshta.exe. The campaign shows how a single living‑off‑the‑land binary (LOLBIN) can power an effective data‑theft chain without any…
Threat Actors Intensify Targeting of IP Cameras Across Middle East Amid Ongoing Conflict
Cyberattacks linked to Iranian threat actors are taking on a new and alarming form in the ongoing Middle East conflict. Since late February 2026, a coordinated campaign to compromise internet-connected IP cameras has been underway across multiple countries in the…
Russian Ransomware Operator Pleads Guilty in US
Evgenii Ptitsyn was extradited to the United States from South Korea in November 2024. The post Russian Ransomware Operator Pleads Guilty in US appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Russian Ransomware…
Shift Left Has Shifted Wrong: Why AppSec Teams – Not Developers – Must Lead Security in the Age of AI Coding
Narrow “shift left” has failed at AI scale. Move from developer-led fixes to AppSec-managed automation that triages findings and delivers tested pull-request fixes so teams can safely manage AI-generated code. The post Shift Left Has Shifted Wrong: Why AppSec Teams…
That attractive online ad might be a malware trap
Malware increasingly travels through the infrastructure that delivers online advertising. The Media Trust’s Global Report on Digital Trust, Ad Integrity, and the Protection of People describes a digital ad ecosystem where scam campaigns, malicious redirects, and malware delivery appear alongside…
Threat Hunting: Certifications and Career Paths
Explains threat hunting career development, SOC roles, certification planning, telemetry competencies, governance alignment, and performance metrics. This article has been indexed from CyberMaterial Read the original article: Threat Hunting: Certifications and Career Paths
ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Thursday, March 5th, 2026…
RingH23 Threat Actors Target MacCMS and CDN Infrastructure with New Arsenal
Threat actors are abusing a new Linux-based toolkit dubbed RingH23 to silently compromise MacCMS-based video sites and hijack CDN infrastructure at scale, redirecting millions of users to gambling, pornography, and fraud platforms. Evidence shows Funnull has re-emerged with a fully…
UK watchdog eyes Meta’s smart glasses after workers say they ‘see everything’
Contractors tasked with improving AI reportedly had access to intimate footage captured through wearables Britain’s privacy watchdog is asking questions about Meta’s AI-powered smart glasses after reports that human contractors reviewing recordings from the devices were exposed to extremely private…
Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
The networking giant has added the recently patched CVE-2026-20128 and CVE-2026-20122 to the list of exploited vulnerabilities. The post Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild appeared first on SecurityWeek. This article has been indexed from…
New in Classroom Manager: Greater Google Classroom Management, Built on What Customers Already Trust
Cloud Monitor users consistently praise its intuitive, domain-wide visibility, especially when managing Google Classrooms. A centralized, organized view makes monitoring simpler, faster, and more actionable. Based on that feedback, we’ve brought the same trusted functionality into Classroom Manager. With this…
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen malware. Zscaler ThreatLabz, which observed the activity in January 2026,…
Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
Exploit kit “Coruna” targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft This article has been indexed from www.infosecurity-magazine.com Read the original article: Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns
AWS Middle East (UAE) Region Hit by Drone Strikes, 109 Services Disrupted
A series of drone strikes on Amazon Web Services data center facilities in the United Arab Emirates and Bahrain triggered one of the most severe cloud outages in AWS history, knocking out or degrading more than 109 services across the…
Cisco Secure Firewall Management Vulnerability Enables Remote Code Execution
Cisco has issued an urgent security advisory for a critical vulnerability affecting its Secure Firewall Management Center (FMC) software. This flaw, rated with the maximum possible CVSS score of 10.0, allows remote, unauthenticated attackers to execute arbitrary code and gain…
DPRK Hackers Target Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
Suspected DPRK-linked threat actors have been observed compromising cryptocurrency firms through a coordinated campaign that blends web-app exploitation, cloud abuse, and secrets theft to position for large‑scale digital asset theft. The intrusions show a full kill chain from initial access…
Hacked App Part of US/Israeli Propaganda Campaign Against Iran
Wired has the story: Shortly after the first set of explosions, Iranians received bursts of notifications on their phones. They came not from the government advising caution, but from an apparently hacked prayer-timing app called BadeSaba Calendar that has been…