Category: TheHackerNews

New RFP Template for AI Usage Control and AI Governance 
08
Mar
2026

New RFP Template for AI Usage Control and AI Governance 

The Hacker NewsMar 04, 2026Artificial Intelligence / SaaS Security As AI becomes the central engine for enterprise productivity, security leaders…

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
08
Mar
2026

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS…

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
08
Mar
2026

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed…

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
08
Mar
2026

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Ravie LakshmananMar 05, 2026Malware / Dark Web A joint law enforcement operation has dismantled LeakBase, one of the world’s largest…

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
08
Mar
2026

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at…

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
08
Mar
2026

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Ravie LakshmananMar 05, 2026Cyber Espionage / Threat Intelligence Cybersecurity researchers have disclosed details of a new Russian cyber campaign that…

Where Multi-Factor Authentication Stops and Credential Abuse Starts
08
Mar
2026

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows…

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
08
Mar
2026

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

Ravie LakshmananMar 05, 2026Malware / Threat Intelligence A suspected Iran-nexus threat actor has been attributed to a campaign targeting government…

SD-WAN Manager Vulnerabilities
08
Mar
2026

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

Ravie LakshmananMar 05, 2026Vulnerability / Enterprise Security Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN…

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
08
Mar
2026

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

Ravie LakshmananMar 06, 2026Vulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security…

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
08
Mar
2026

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

Ravie LakshmananMar 06, 2026Cyber Espionage / Threat Intelligence A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications…

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
08
Mar
2026

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

New research from Broadcom’s Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding…