Critical Ivanti EPMM Vulnerabilities Expose Systems to Arbitrary Code Execution Attacks

In February 2026, threat actors actively exploited two critical remote code execution (RCE) vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). A recent incident response investigation by WithSecure’s STINGR Group revealed that attackers used highly automated methods to exfiltrate sensitive data…

Ajax Breach Exposes 300K Fans’ Data

Ajax Amsterdam has confirmed a significant data breach resulting from a system vulnerability that allowed unauthorized access to sensitive information. This article has been indexed from CyberMaterial Read the original article: Ajax Breach Exposes 300K Fans’ Data

Navia Breach Impacts HackerOne Data

A breach at third-party provider Navia Benefit Solutions has compromised the personal information of approximately 300 HackerOne employees. This article has been indexed from CyberMaterial Read the original article: Navia Breach Impacts HackerOne Data

State Dept Counters Iran Cyber, AI Threats

The State Department has established the Bureau of Emerging Threats to counter the weaponization of advanced technologies like artificial intelligence by adversaries such as Iran and China. This article has been indexed from CyberMaterial Read the original article: State Dept…

Russia Arrests Alleged LeakBase Admin

Russian authorities have apprehended a resident of Taganrog suspected of managing LeakBase, a prominent marketplace for illicitly obtained personal information. This article has been indexed from CyberMaterial Read the original article: Russia Arrests Alleged LeakBase Admin

RedLine Malware Admin Extradited To US

Hambardzum Minasyan, an Armenian citizen, has been extradited to the United States to face charges for his alleged role in managing the infrastructure of the notorious RedLine infostealer. This article has been indexed from CyberMaterial Read the original article: RedLine…

An AI gateway designed to steal your data

Dissecting the supply-chain attack on LiteLLM – a multifunctional gateway used in many AI agents. Explaining the dangers of the malicious code and how to protect yourself. This article has been indexed from Securelist Read the original article: An AI…

1-15 March 2026 Cyber Attacks Timeline

In the first half of March 2026 I collected 95 events (6.34 events/day) with a threat landscape dominated by malware once ahead of account takeovers and ransomware. This article has been indexed from HACKMAGEDDON Read the original article: 1-15 March…