Microsoft is warning of a major IRS‑themed phishing wave that hit 29,000 users in a single day, using tax‑season panic to steal credentials and deploy remote access malware. The campaigns piggyback on the urgency of the U.S. tax season,…
Russian initial access broker helped ransomware gangs extort millions, sentenced to 81 months
A Russian citizen, Aleksei Volkov, was sentenced to 81 months in prison for helping ransomware groups carry out attacks causing over $9 million in actual losses and over $24 million in intended losses, after being arrested in Italy and extradited…
Mimecast expands Incydr with runtime data security for AI and human risk
Mimecast has announced a major expansion of its Incydr offering with new data security capabilities and a preview of the Agent Risk Center. These enhancements deliver runtime data security through a unified approach to detect, govern, and remediate data exposure…
Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber Frontline at Infosecurity Europe
Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience This article has been indexed from www.infosecurity-magazine.com Read the original article: Former Ukrainian Foreign Minister Dmytro Kuleba to Address the New Cyber…
IT Security News Hourly Summary 2026-03-24 15h : 6 posts
6 posts were published in the last hour 13:32 : DarkSword Exploit Chain That Can Hack Millions of iPhones Leaked Online 13:32 : APT Hackers Attacking RDP Servers to Deploy Malicious Payloads and Establish Persistence 13:32 : HackerOne slams supplier…
DarkSword Exploit Chain That Can Hack Millions of iPhones Leaked Online
A powerful iOS exploit toolkit known as DarkSword has been publicly leaked on GitHub, dramatically lowering the barrier for cybercriminals to target hundreds of millions of iPhones and iPads still running outdated software. Security researchers are sounding the alarm as…
APT Hackers Attacking RDP Servers to Deploy Malicious Payloads and Establish Persistence
One of the world’s most dangerous state-backed hacking groups is actively targeting Remote Desktop Protocol (RDP) servers across critical infrastructure, defense organizations, and government agencies. The threat actor, known as APT-C-13 and widely tracked as Sandworm, APT44, Seashell Blizzard, and…
HackerOne slams supplier for delayed breach notice after staff data exposed
Nearly 300 employees caught up in intrusion at benefits provider Navia Almost 300 HackerOne employees are caught up in a data breach, with the bug bounty biz slamming a third-party benefits provider for a weeks-long delay in notification.… This article…
Novee introduces autonomous AI red teaming to hunt LLM vulnerabilities
Novee today introduced AI Red Teaming for LLM Applications for its AI penetration testing platform, designed to uncover security vulnerabilities in LLM-powered applications before attackers can exploit them. Enterprises are deploying AI-enabled software, from customer-facing chatbots to internal copilots and…
Darktrace expands MSSP offering with AI-driven managed email security
Darktrace has launched its managed security service for MSSPs, enabling partners to deliver AI-native email security with real-time detection, investigation, and response across the email ecosystem. The launch is supported by updates to the Darktrace Defenders Partner Program designed to…
Enterprise Cybersecurity Software Fails 20% of the Time, Warns Absolute Security
Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk from cyber threats, says the Absolute Security 2026 Resilience Risk Index This article has been indexed from www.infosecurity-magazine.com Read the original article: Enterprise…
DarkSword Exploit Chain Leaked Online, Posing Risk to Millions of iPhones
Security researchers have confirmed that the sophisticated iOS exploit chain known as DarkSword is now accessible outside of its original threat actor groups. Recently, security researcher @matteyeux successfully achieved kernel read/write access on an iPad mini 6th generation running iOS…
Insight Partners scrubs investment post about Delve amid ‘fake compliance’ allegations
After a whistleblower alleged that the startup fabricated audit evidence, its prominent Series A investor removed an article detailing why it led the deal. This article has been indexed from Security News | TechCrunch Read the original article: Insight Partners…
Scam compounds hiring “AI models” to seal the deal in deepfake video calls
Forced labor doesn’t play well on camera, so scam compounds are hiring women to deepfake their faces on video calls. This article has been indexed from Malwarebytes Read the original article: Scam compounds hiring “AI models” to seal the deal…
How Watchdog Cyber Scaled DMARC Services and Client Growth with EasyDMARC
Originally published at How Watchdog Cyber Scaled DMARC Services and Client Growth with EasyDMARC by Sona Mirzoyan. About the Partner Company: Watchdog Cyber Headquarters: Spring … The post How Watchdog Cyber Scaled DMARC Services and Client Growth with EasyDMARC appeared…
Detectify uncovers hidden assets and risks across entire IP ranges
Detectify has launched IP Range Scanning, enabling continuous discovery and monitoring of entire IP address blocks to help security teams identify forgotten assets and hidden risks before attackers exploit them. Many organizations are sitting on forgotten IP addresses that have…
Tycoon2FA Operators Resume Cloud Account Phishing Following Infrastructure
Tycoon2FA operators have resumed large-scale cloud account phishing just days after law enforcement and industry partners disrupted the platform’s core infrastructure, underscoring the resilience of phishing-as-a-service (PhaaS) ecosystems and the limits of infrastructure-only takedowns. Authorities in Latvia, Lithuania, Portugal, Poland,…
Insight Partners scrubs Delve investment post amid ‘fake compliance’ allegations
After a whistleblower alleged that the startup fabricated audit evidence, its prominent Series A investor removed an article detailing why it led the deal. This article has been indexed from Security News | TechCrunch Read the original article: Insight Partners…
New routers? Made abroad? Yeah, that’s going to be a no from Uncle Sam
Unfortunately, there aren’t many options unless you’re Starlink Citing national security fears, America is effectively banning any new consumer-grade network routers made abroad.… This article has been indexed from The Register – Security Read the original article: New routers? Made…
Iran Built a Vast Camera Network to Control Dissent. Israel Turned It Into a Targeting Tool
The role of Israel’s hijacking of Iran’s street cameras in the killing of the country’s supreme leader underscores how surveillance systems are increasingly being targeted by adversaries in wartime. The post Iran Built a Vast Camera Network to Control Dissent.…
3.1 Million Impacted by QualDerm Data Breach
Hackers stole personal, medical, and health insurance information from the company’s internal systems. The post 3.1 Million Impacted by QualDerm Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: 3.1 Million Impacted…
Webinar Today: Putting CIS Controls and Benchmarks into Practice
Learn how the CIS Critical Security Controls and the CIS Benchmarks can be used together to support secure configuration at scale. The post Webinar Today: Putting CIS Controls and Benchmarks into Practice appeared first on SecurityWeek. This article has been…
32% of top-exploited vulnerabilities are over a decade old
Exploitation timelines continued to compress in enterprise environments, with newly disclosed flaws reaching active use almost immediately and older weaknesses remaining active years after disclosure. (Source: Cisco Talos) Findings from Cisco Talos’ 2025 Year in Review show how attackers combined…
5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents
On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an important milestone for this emerging category. For those unfamiliar with the various Gartner report types, “a Market Guide defines a market and explains what clients…