ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

05/03/2026 0 Comments 0 tags

Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity,

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

05/03/2026 0 Comments 0 tags

Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild. The vulnerabilities in question are listed below –

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

05/03/2026 0 Comments 0 tags

Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s encryption can be broken. Instead of trying to decrypt information now, they

Where Multi-Factor Authentication Stops and Credential Abuse Starts

05/03/2026 0 Comments 0 tags

Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

05/03/2026 0 Comments 0 tags

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

05/03/2026 0 Comments 0 tags

A joint law enforcement operation has dismantled LeakBase, one of the world’s largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

05/03/2026 0 Comments 0 tags

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

05/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. “The attack chain initiates

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

04/03/2026 0 Comments 0 tags

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. “The hacktivist threat in the

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

04/03/2026 0 Comments 0 tags

Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five