Azure Kubernetes Service (AKS) has evolved from a simple managed orchestrator into a sophisticated platform that serves as the backbone for modern enterprise applications. However, as clusters grow in complexity, the challenge shifts from initial deployment to long-term operational excellence.…
DPRK-Related Campaigns with LNK and GitHub C2
Analysis of DPRK-linked LNK-based attacks using GitHub as covert C2 infrastructure, detailing multi-stage PowerShell execution, persistence mechanisms, and data exfiltration techniques targeting Windows environments. This article has been indexed from FortiGuard Labs Threat Research Read the original article: DPRK-Related…
Malwarebytes Privacy VPN receives full third-party audit
We commissioned a third-party audit for the infrastructure behind our VPNs. Here are the results. This article has been indexed from Malwarebytes Read the original article: Malwarebytes Privacy VPN receives full third-party audit
How to Improve Google Workspace Phishing Protection for Schools Without Adding IT Burden
Phishing attacks remain one of the most common, and most successful, cyber threats targeting K–12 schools. As districts continue to rely on Google Workspace for communication, collaboration, and file sharing, it has become a prime entry point for attackers looking…
New Red Hat subscription simplifies long-term enterprise Linux support
Red Hat has announced Red Hat Enterprise Linux Extended Life Cycle Premium, a new subscription that provides a predictable 14-year life cycle for major Red Hat Enterprise Linux releases. This stand-alone subscription consolidates extended support, simplifying the management of multiple…
[Video] The TTP Ep 21: When Attackers Become Trusted Users
An episode of the Talos Threat Perspective on the 2025 Year in Review trends. We explore how identity is being used to gain, extend, and maintain access inside environments. This article has been indexed from Cisco Talos Blog Read the…
Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts
New research from Varonis Threat Labs reveals Storm infostealer, a malicious subscription service that bypasses Google Chrome encryption.… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Storm Infostealer Sold…
Cisco Patches Critical and High-Severity Vulnerabilities
The bugs could lead to authentication bypass, remote code execution, information disclosure, and privilege escalation. The post Cisco Patches Critical and High-Severity Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Cisco Patches…
Anthropic Responds To Claude Code Leak
Anthropic is currently working to mitigate the impact of a leak involving the foundational instructions for Claude Code, its popular AI agent for developers. This article has been indexed from CyberMaterial Read the original article: Anthropic Responds To Claude Code…
Proton Launches Privacy Meet Platform
Proton has launched Meet, a privacy-centric video conferencing tool designed to compete with major platforms by offering end-to-end encryption for all calls. This article has been indexed from CyberMaterial Read the original article: Proton Launches Privacy Meet Platform
Apple Expands iOS Update To Block Exploit
Apple has expanded the distribution of iOS 18.7.7 and iPadOS 18.7.7 to a wider selection of hardware to protect users against the DarkSword exploit kit. This article has been indexed from CyberMaterial Read the original article: Apple Expands iOS Update…
IT Security News Hourly Summary 2026-04-02 15h : 12 posts
12 posts were published in the last hour 12:34 : Casbaneiro Phishing Targets Europe 12:34 : Chrome Zero Day CVE Under Exploit 12:34 : Vertex AI Flaw Exposes Cloud Data 12:34 : Cyberattack Disrupts Phones In MA Towns 12:34 :…
Casbaneiro Phishing Targets Europe
A multi-pronged phishing campaign by a Brazilian threat actor is targeting Spanish-speaking organizations in Latin America and Europe to deploy banking trojans. This article has been indexed from CyberMaterial Read the original article: Casbaneiro Phishing Targets Europe
Chrome Zero Day CVE Under Exploit
Google recently launched security patches for Chrome to fix 21 different security issues, including a critical zero-day vulnerability that is already being used by attackers. This article has been indexed from CyberMaterial Read the original article: Chrome Zero Day CVE…
Vertex AI Flaw Exposes Cloud Data
Cybersecurity researchers have identified a flaw in Google Cloud’s Vertex AI platform where default service agent permissions allow for potential data exfiltration and unauthorized environment access. This article has been indexed from CyberMaterial Read the original article: Vertex AI Flaw…
Cyberattack Disrupts Phones In MA Towns
A cybersecurity attack discovered early Tuesday has disrupted several Massachusetts towns connected to the Patriot Regional Emergency Communications Center, impacting administrative systems and business phone lines for local police and fire departments. This article has been indexed from CyberMaterial Read…
Mercor Hit By Supply Chain Cyberattack
Mercor, a ten billion dollar artificial intelligence recruiting firm, recently confirmed a major data breach originating from a supply chain attack on the open-source LiteLLM project. This article has been indexed from CyberMaterial Read the original article: Mercor Hit By…
Iranian Hacker Group Handal Claims Breach of Israeli Defense Firm
The international cybersecurity community was alerted to a major data breach involving Israeli military infrastructure. Handala, a recognized Iranian nation-state threat actor, claims to have successfully breached PSK Wind Technologies, a key Israeli defense contractor. The incident has resulted in…
250,000 Affected by Data Breach at Nacogdoches Memorial Hospital
In January 2026, a threat actor hacked the hospital’s internal network and stole personal and health information. The post 250,000 Affected by Data Breach at Nacogdoches Memorial Hospital appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Shut the Front Door on Email Attacks: How to Scale Security Services Without Increasing Workload
Email remains the primary entry point for cyberattacks, driven largely by phishing and account compromise. For attackers, it is often the simplest and most scalable way to gain access: send enough emails, and eventually, someone clicks. What’s changing is not…
IMO Health: 5 Reasons security culture starts with trust
I recently had the opportunity to sit down with Lori Kevin, VP of Security and Compliance at IMO Health, for another installment of the Strategic CISOs conversations series. We covered a topic that many security leaders care about right now:…
OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance
Learn how to protect OT systems, ICS, and SCADA infrastructure from ransomware with backup strategies built for legacy, air-gapped industrial environments. The post OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance appeared first on Security Boulevard.…
The State of Trusted Open Source Report
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption across our catalog of container image projects, versions, images, language libraries, and builds. These insights shed…
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023. “Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per Action) fraud, directing victims to content locker pages under the…