149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

04/03/2026 0 Comments 0 tags

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. “The hacktivist threat in the

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

04/03/2026 0 Comments 0 tags

Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five

New RFP Template for AI Usage Control and AI Governance 

04/03/2026 0 Comments 0 tags

As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

04/03/2026 0 Comments 0 tags

Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

04/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

04/03/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

03/03/2026 0 Comments 0 tags

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

03/03/2026 0 Comments 0 tags

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

03/03/2026 0 Comments 0 tags

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

03/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It’s advertised as a cybercrime platform by