Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

05/03/2026 0 Comments 0 tags

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen

Where Multi-Factor Authentication Stops and Credential Abuse Starts

05/03/2026 0 Comments 0 tags

Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

05/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. “The attack chain initiates

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

05/03/2026 0 Comments 0 tags

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

05/03/2026 0 Comments 0 tags

A joint law enforcement operation has dismantled LeakBase, one of the world’s largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

04/03/2026 0 Comments 0 tags

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. “The hacktivist threat in the

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

04/03/2026 0 Comments 0 tags

Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five

New RFP Template for AI Usage Control and AI Governance 

04/03/2026 0 Comments 0 tags

As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

04/03/2026 0 Comments 0 tags

Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

04/03/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since