Introduction Google Threat Intelligence Group (GTIG) has identified a new iOS full-chain exploit that leveraged multiple zero-day vulnerabilities to fully compromise devices. Based on toolmarks in recovered payloads, we believe the exploit chain to be called DarkSword. Since at least…
North Korea’s 100,000-strong fake IT worker army rake in $500M a year for Kim Jong Un
Researchers map full org chart of the scam from dodgy recruiters to helpful Western collaborators Researchers at IBM X‑Force and Flare Research have uncovered data that sheds light on how North Korea’s fake IT worker schemes operate and infiltrate companies…
Manifold Raises $8 Million for AI Detection and Response
Focused on securing autonomous AI on endpoints, the startup will invest in product development. The post Manifold Raises $8 Million for AI Detection and Response appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches
From Chaos to Control examines the chaos that often comes from shadow AI hidden in SaaS apps and urges better visibility and control over agentic AI. The post Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches appeared…
Threat Detection with MITRE ATT&CK and D3FEND AI Agent
The post Threat Detection with MITRE ATT&CK and D3FEND AI Agent appeared first on AI Security Automation. The post Threat Detection with MITRE ATT&CK and D3FEND AI Agent appeared first on Security Boulevard. This article has been indexed from Security…
Enterprise AI Agent Governance: A Layered Approach (Build, Deployment and Runtime)
Emerging Governance Challenges As organizations implement AI agents on a large scale, they are likely to encounter governance challenges. The current focus in AI security primarily centers on several key concerns: prompt injection, model misuse, and unsafe responses. These issues…
AkzoNobel Confirms Cyberattack at U.S. Site Following Anubis Ransomware Data Leak
kDutch multinational paints and coatings company AkzoNobel has confirmed that a cyberattack impacted one of its facilities in the United States, according to a statement shared with BleepingComputer. The incident came to light after the Anubis ransomware gang published…
Global Crackdown Dismantles LeakBase Data Breach Forum, Dozens Targeted in Europol Operation
A large-scale international law enforcement effort has reportedly led to multiple arrests as authorities moved to shut down a well-known underground data leak marketplace. Europol revealed details of a coordinated operation that successfully dismantled LeakBase, a platform it described…
Microsoft Releases Hotpatch to Fix Windows 11 RRAS Remote Code Flaw
Microsoft has issued an out-of-band (OOB) security update to remediate critical vulnerabilities affecting a specific subset of Windows 11 Enterprise systems that rely on hotpatch updates instead of the conventional monthly Patch Tuesday cumulative updates. The update, identified as KB5084597,…
Graylog advances explainable AI and automated workflows for faster threat detection
Graylog has revealed advances in explainable AI and automated investigation workflows that help small-to-mid-sized security teams detect threats faster, investigate with confidence, and cut the manual documentation work that consumes analyst time. “Lean security teams don’t have the luxury of…
IT Security News Hourly Summary 2026-03-18 15h : 21 posts
21 posts were published in the last hour 13:38 : Scans for “adminer”, (Wed, Mar 18th) 13:38 : FancyBear Server Leak Exposes Stolen Credentials, 2FA Secrets, NATO Targets 13:38 : Top 6 Network Access Control (NAC) Solutions in 2026 13:38…
Scans for “adminer”, (Wed, Mar 18th)
A very popular target of attackers scanning our honeypots is “phpmyadmin”. phpMyAdmin is a script first released in the late 90s, before many security concepts had been discovered. It's rich history of vulnerabilities made it a favorite target. Its alternative, “adminer”,…
FancyBear Server Leak Exposes Stolen Credentials, 2FA Secrets, NATO Targets
FancyBear’s latest operational security failure has exposed a live Russian espionage server packed with stolen credentials, 2FA secrets, and detailed insight into the ongoing targeting of European government and military networks. The exposed infrastructure, tied to APT28/FancyBear and previously reported…
Top 6 Network Access Control (NAC) Solutions in 2026
Explore the top NAC solutions of 2026 to ensure your network is only accessed by trusted users and avoid unwanted risks. The post Top 6 Network Access Control (NAC) Solutions in 2026 appeared first on eSecurity Planet. This article has…
Top 10 Governance, Risk & Compliance (GRC) Tools in 2026
Discover the top governance, risk and compliance (GRC) tools in 2026. The post Top 10 Governance, Risk & Compliance (GRC) Tools in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
From Hot CVEs to the Full Attack Surface: How AI Is Reshaping Threat Intelligence
AI is pushing attackers beyond a handful of popular CVEs and toward exploiting the full vulnerability landscape. Fortinet’s Aamir Lakhani explains what that means for patch strategy, threat hunting, and the future of threat intelligence. This article has been…
Firefox is getting a free built-in VPN
Mozilla is adding a free built-in VPN to Firefox, with the feature arriving in Firefox 149 on March 24. Privacy concerns often follow free VPN services, especially when unclear data practices put user information at risk. Mozilla says its version…
UIDAI Introduces Bug Bounty Program to Strengthen Aadhaar Defenses
The Unique Identification Authority of India (UIDAI) has officially launched its first structured bug bounty program to fortify the Aadhaar system. As the foundation of a massive national identity database, securing Aadhaar requires continuous innovation and rigorous testing. This new…
Telegram’s Crackdown in 2026 and Why Cyber Criminals Are Still Winning
If you’ve been following the Telegram crackdown news, then you’ll know that Telegram entered 2026 under significant pressure. After years of being a largely permissive environment, the platform dramatically increased enforcement following the arrest of CEO Pavel Durov in late 2024…
Iran-Linked Cyber Campaigns Converge With Electronic and Psychological Warfare as Regional Conflict Escalates
On February 28, 2026, a joint US-Israeli military operation launched strikes inside Iran, opening a conflict that rapidly extended into cyberspace. Iran responded with ballistic missiles and drone strikes across Bahrain, Kuwait, Iraq, Saudi Arabia, the UAE, Israel, and Qatar.…
ForceMemo Hijacks GitHub Accounts, Backdoors Hundreds of Python Repos via Force-Push
A new malware campaign tracked as ForceMemo is quietly compromising hundreds of GitHub accounts and injecting hidden malicious code into Python repositories, leaving almost no visible trace. The earliest confirmed infections date back to March 8, 2026, and the campaign…
Critical Telnetd Vulnerability Enables Remote Attacker to Execute Arbitrary Code via Port 23
A critical buffer overflow vulnerability in the GNU Inetutils telnetd daemon. Tracked as CVE-2026-32746, this flaw allows an unauthenticated remote attacker to execute arbitrary code and gain root access to affected systems. The vulnerability requires zero user interaction and possesses…
Britain’s satellite-watching gap to be plugged with £17.5M eyeball in Cyprus
No 1 Space Operations Squadron will get a persistent stare capability The Ministry of Defence (MoD) plans to spend £17.5 million on a remotely-operated satellite monitoring facility in Cyprus, partly to protect the UK’s secure communications system Skynet.… This article…
Apple Debuts Background Security Improvements With Fresh WebKit Patches
The lightweight updates are meant to deliver security protections between security updates. The post Apple Debuts Background Security Improvements With Fresh WebKit Patches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Apple Debuts…