SocksEscort, a residential proxy network used to exploit thousands of compromised home routers worldwide and facilitate large-scale fraud that cost victims millions of dollars, has been disrupted in an international law enforcement operation led by the U.S. Department of Justice.…
Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning
Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide This article has been indexed from www.infosecurity-magazine.com Read the original article: Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning
Iran War Bait Fuels TA453, TA473 Phishing Campaigns
TA453, TA473, and several emerging threat clusters are exploiting breaking news about the Iran war to run highly targeted phishing campaigns against governments and policy organizations across the Middle East and beyond. These operations blend traditional espionage with opportunistic credential…
Fake Temu Coin airdrop uses ClickFix trick to install stealthy malware
A fake $TEMU crypto airdrop uses the ClickFix trick to make victims run malware themselves and quietly installs a remote-access backdoor. This article has been indexed from Malwarebytes Read the original article: Fake Temu Coin airdrop uses ClickFix trick to…
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel’s AppArmor module that could be exploited by unprivileged users to circumvent kernel protections, escalate to root, and undermine container isolation guarantees. The nine confused deputy vulnerabilities have been collectively…
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in the wild. The list of vulnerabilities is as follows – CVE-2026-3909 (CVSS score: 8.8) – An out-of-bounds…
Onyx Security Launches With $40 Million in Funding
The startup is building a control pane to help organizations oversee autonomous AI agents and rapidly adopt them. The post Onyx Security Launches With $40 Million in Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Making the Internet Safer for Children: The Case for Automated, Privacy-Preserving Solutions
AI tools may better protect children online by detecting harmful content without the privacy risks of strict age verification laws. The post Making the Internet Safer for Children: The Case for Automated, Privacy-Preserving Solutions appeared first on Security Boulevard. This…
McKinsey Internal AI System Breached By Researcher’s AI
CodeWall AI bot breaches McKinsey’s internal AI chatbot, gaining broad access, in embarrassment for consulting firm This article has been indexed from Silicon UK Read the original article: McKinsey Internal AI System Breached By Researcher’s AI
Apple Releases Emergency iOS 15.8.7 Update to Block ‘Coruna’ Exploit Kit
Apple has rolled out an emergency security update, iOS 15.8.7 and iPadOS 15.8.7, to protect users of older iPhones and iPads from a sophisticated threat known as the Coruna exploit kit. Released on March 11, 2026, this critical patch backports…
AI in the SOC: Why Explainability is the New Security Control
AI is transforming the SOC, but without explainability analysts can’t trust it. Why transparency is becoming a critical security control. The post AI in the SOC: Why Explainability is the New Security Control appeared first on Security Boulevard. This article…
How Threat Intelligence Protects Player Experience for Betting and Gaming Customers
Threat intelligence and bot mitigation strategies help gaming and betting platforms stop credential stuffing, scraping and automated fraud. The post How Threat Intelligence Protects Player Experience for Betting and Gaming Customers appeared first on Security Boulevard. This article has been…
BioCatch DeviceIQ helps banks spot risky devices before login
BioCatch has announced the launch of DeviceIQ, a comprehensive new device identification and intelligence product that transforms how financial institutions evaluate the trustworthiness of devices used for digital banking. Traditional device identification has grown increasingly unreliable. Criminals utilize sophisticated evasion…
China Users Pay To Uninstall OpenClaw
After paying third-parties to install the open source AI agent, Chinese users now paying to uninstall it, amid security warnings This article has been indexed from Silicon UK Read the original article: China Users Pay To Uninstall OpenClaw
Salesforce Warns of ShinyHunters Group Exploiting Experience Cloud Sites
A critical warning has been issued about an active threat campaign targeting misconfigured Experience Cloud sites. The notorious threat actor group ShinyHunters has claimed responsibility for a massive data theft operation exploiting overly permissive guest user configurations, reportedly impacting hundreds…
Chrome Zero-Day Vulnerabilities Actively Exploited in the Wild to Execute Malicious Code
Google has released an urgent security update for its Chrome browser after confirming that two high-severity zero-day vulnerabilities are being actively exploited in the wild. The stable channel has been updated to version 146.0.7680.75/76 for Windows and macOS, and 146.0.7680.75…
Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet
Law enforcement agencies in the US and Europe targeted the cybercrime service that has impacted 360,000 devices since 2020. The post Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet appeared first on SecurityWeek. This article has been indexed from…
Iran boosts cyberattacks, VENON targets Brazilian banks, England Hockey investigates breach
Iran boosts cyberattacks VENON targets Brazilian banks England Hockey investigates breach Get links to all the stories in our show notes: https://cisoseries.com/cybersecurity-news-iran-boosts-cyberattacks-venon-targets-brazilian-banks-england-hockey-investigates-breach/ Huge thanks to our sponsor, Dropzone AI If you are heading to RSAC next week, here are three…
Banking App Customers Shown Other People’s Transactions
App customers of Lloyds, Bank of Scotland, Halifax shown transactions including school, DVLA, National Insurance details This article has been indexed from Silicon UK Read the original article: Banking App Customers Shown Other People’s Transactions
PsExec and Renamed Backup Tools Enabled Data Theft Before INC Ransomware Attack
A ransomware intrusion in which attackers used legitimate Windows tools and a renamed backup utility to quietly stage and exfiltrate sensitive data before deploying INC ransomware. The incident highlights how threat actors increasingly rely on “living off the land” techniques…
Two Newly Discovered Chrome Zero-Days Exploited in the Wild to Run Malicious Code
Google has released an urgent security update for its Chrome desktop browser to address two critical zero-day vulnerabilities. Tracked as CVE-2026-3909 and CVE-2026-3910, both flaws are categorized as high-severity and are confirmed to be actively exploited by attackers in the…
Chrome 146 Update Patches Two Exploited Zero-Days
The flaws can be exploited to manipulate data and bypass security restrictions, potentially leading to code execution. The post Chrome 146 Update Patches Two Exploited Zero-Days appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Apple Releases Security Update for Older iPhones and iPads After Coruna Exploit
Apple has released security updates for older iPhones and iPads to address vulnerabilities targeted by the Coruna exploit kit, which has been used in cyberespio Thank you for being a Ghacks reader. The post Apple Releases Security Update for Older…
IT Security News Hourly Summary 2026-03-13 09h : 3 posts
3 posts were published in the last hour 7:32 : A React-based phishing page with credential exfiltration via EmailJS, (Fri, Mar 13th) 7:31 : From Legacy Logins to Federated Identity: A Step-by-Step Modernization Framework 7:31 : Red Access firewall-native SSE…