Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

03/03/2026 0 Comments 0 tags

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

03/03/2026 0 Comments 0 tags

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks. The new

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

03/03/2026 0 Comments 0 tags

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

03/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It’s advertised as a cybercrime platform by

AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged

03/03/2026 0 Comments 0 tags

The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

03/03/2026 0 Comments 0 tags

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers. The activity, the company

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

03/03/2026 0 Comments 0 tags

The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh. The activity, per

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

03/03/2026 0 Comments 0 tags

Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

02/03/2026 0 Comments 0 tags

Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers. “To ensure the scalability and

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

02/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system.