The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Langflow to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Langflow flaw, tracked as CVE-2026-33017 (CVSS score of 9.3), to its Known Exploited Vulnerabilities…
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26)
Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26) appeared first on…
VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside Linux Systems
A new and technically advanced rootkit called VoidLink has emerged as a serious threat to Linux systems, blending Loadable Kernel Modules (LKMs) with extended Berkeley Packet Filter (eBPF) programs to hide deep inside the operating system’s core. First documented by…
Leak Bazaar Turns Stolen Corporate Data Into a Structured Criminal Marketplace
A threat actor known as “Snow” from SnowTeam posted an advertisement on the Russian-speaking TierOne (T1) cybercrime forum on March 25, 2026, introducing a new criminal service called Leak Bazaar. The platform is not a traditional data leak site. Instead,…
New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware
A social engineering technique called ClickFix has resurfaced with significant force, tricking users on both Windows and macOS into manually executing malicious commands that quietly install malware on their devices. First documented in late 2023, the method has rapidly grown…
Automating Maven Dependency Upgrades Using AI
Enterprise Java applications do not often break due to business logic. The reason they break is that dependency ecosystems evolve all the time. Manual maintenance in most large systems consists of hundreds of third-party libraries, and small upgrades occur regularly…
Coruna exploit reveals evolution of Triangulation iOS exploitation framework
Kaspersky found Coruna iOS exploits reuse updated code from the 2023 Operation Triangulation attacks, suggesting a possible link. Kaspersky researchers discovered that the Coruna iOS exploit kit uses an updated version of the same kernel exploit seen in the 2023…
Chain Reaction: How One Stolen Token Tore Through Five Ecosystems
Why Your Static Credentials Are a Ticking Time Bomb The TeamPCP campaign, one of the largest credential theft campaigns of 2026, began with a compromise in Trivy. A security tool trusted to scan for vulnerabilities and leaked secrets was weaponized…
BSidesSLC 2025 – Guerrilla GRC – Helping Small Businesses Get Cyber Smart
Author, Creator & Presenter: Joshua Boyles – VP Of Cybersecurity At LHMCO) Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesSLC 2025 – Guerrilla GRC…
IT Security News Hourly Summary 2026-03-26 21h : 4 posts
4 posts were published in the last hour 19:34 : Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries 19:34 : Millions of UK iPhone Users Will Need to Verify Their Age — Here’s Why 19:34 : Ask…
Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries
A global phishing campaign targeting Microsoft 365 bypasses security codes using a legitimate login feature, impacting hundreds of organizations. The post Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries appeared first on TechRepublic. This article has been…
Millions of UK iPhone Users Will Need to Verify Their Age — Here’s Why
Apple’s latest iOS update adds some new features and fixes several bugs — but it also introduces mandatory age verification for users in the United Kingdom. The post Millions of UK iPhone Users Will Need to Verify Their Age —…
Ask Me Anything Cyber: Inside EkoParty Miami with Federico Kirschbaum
Join us with Federico Kirschbaum, co-founder of Ekoparty, to discuss the Ekoparty Call for Papers in Miami. This article has been indexed from CyberMaterial Read the original article: Ask Me Anything Cyber: Inside EkoParty Miami with Federico Kirschbaum
Ask Me Anything Cyber
Join us for Ask Me Anything Cyber, a live weekly conversation where we cut through the noise and make space for clear, practical discussion around cybersecurity. This article has been indexed from CyberMaterial Read the original article: Ask Me Anything…
How redaction software can help government agencies comply with FOIA
Government agencies face growing pressure to respond to FOIA requests quickly while protecting classified data. Modern redaction software streamlines FOIA workflows while ensuring compliance. The post How redaction software can help government agencies comply with FOIA appeared first on Security…
BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China’s Hackers Are Already Past It
Rapid7’s research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here’s what BPFdoor is, how it evolved, and what defenders need to do now. The post BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China’s Hackers…
What is PUE? A Guide to Data Center Efficiency
In the world of data centers, energy efficiency isn’t just a buzzword—it’s a vital part of running a cost-effective and sustainable operation. As technology demands grow, so does the need to monitor exactly how much energy is being used and…
TP-Link, Canva, HikVision vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence…
Kubernetes Upgrades Are Eating Engineering Time: How to Get It Back
Kubernetes powers your products, but it quietly hijacks your engineering organization. Every year, you pay senior engineers to wrestle with version bumps, API deprecations, and broken add‑ons that don’t move a single KPI your customers care about. Numbers vary by…
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting and maintaining stealthy access mechanisms within critical environments, has been…
TeamPCP Supply Chain Campaign: Update 001 – Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available, (Thu, Mar 26th)
This is the first update to the TeamPCP supply chain campaign threat intelligence report, “When the Security Scanner Became the Weapon” (v3.0, March 25, 2026). That report covers the full campaign from the February 28 initial access through the March…
A puppet made me cry and all I got was this t-shirt
In this week’s newsletter, Amy draws parallels between the collaborative themes of “Project Hail Mary” and the massive team effort behind the newly released Talos Year in Review report. This article has been indexed from Cisco Talos Blog Read the…
MIWIC26: Kerlyn Manyi, Cybersecurity Practitioner, Nucleus Systems & Founder of CyberFoundHer Initiative
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected…
Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka
A new macOS infostealer, NukeChain (now Infiniti Stealer), uses fake CAPTCHA pages to trick users into running malicious commands. This article has been indexed from Malwarebytes Read the original article: Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka