Cyber Briefing: 2026.03.17

Cybercriminals are exploiting supply chains, SEO poisoning, hijacked SDKs, and malicious apps to steal credentials, deploy crypto-stealing code, and spread ransomware This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.03.17

Iranian Hackers Use Compromised Cameras for Regional Surveillance

Iranian cyber actors are expanding operations targeting US organizations while also exploiting internet-connected cameras across the Middle East for intelligence collection and battlefield awareness. Recent incidents tied to APT group MuddyWater, camera‑focused infrastructure, and hacktivist collective Handala point to an…

LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here

Andrew MacPherson exposes how crypto thieves exploit DeFi architecture, from the $1.5 billion Bybit heist to drainers-as-a-service and fund laundering. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…

CL-STA-1087 targets military capabilities since 2020

China-linked APT group CL-STA-1087 has targeted Southeast Asian militaries since 2020 using AppleChris and MemFun. A suspected China-linked espionage campaign, tracked as CL-STA-1087, has targeted Southeast Asian military organizations since at least 2020, using AppleChris and MemFun malware. “The activity…

174 Vulnerabilities Targeted by RondoDox Botnet

The botnet has increased its activity, peaking at 15,000 exploitation attempts per day, and taking a more targeted approach. The post 174 Vulnerabilities Targeted by RondoDox Botnet appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Google Warns Ransomware Groups Shift to Data Theft as Profits Decline

Google is warning that ransomware gangs are reinventing their business model as traditional encryption‑for‑ransom attacks become less profitable and data‑theft extortion surges.​ Better cybersecurity controls, improved backup strategies, and stronger recovery capabilities mean more victims can restore their systems without…