ICYMI: 2026-03-03
Latest Headlines
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters
Fig Security Launches With $38 Million to Bolster SecOps Resilience
Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability
New ‘AirSnitch’ Attack Shows Wi-Fi Client Isolation Could Be a False Sense of Security
1.2 Million Affected by University of Hawaii Cancer Center Data Breach
Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low
Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise
LexisNexis Data Breach — Threat Actor Allegedly Claims 2.04 GB Stolen
Microsoft Warns of New Phishing Attack Exploiting OAuth in Entra ID to Evade Detection
Zerobot Malware Exploiting Tenda Command Injection Vulnerabilities to Deploy Malware
Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM
New ‘StegaBin’ Campaign Uses Malicious 26 npm Packages to Deploy Multi-Stage Credential Stealer
Hackers Leverage Telegram for Initial Access to Corporate VPN, RDP, and Cloud Environments
CISA flags VMware Aria Operations RCE flaw as exploited in attacks
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
Microsoft: Hackers abuse OAuth error flows to spread malware
Google Chrome shifts to two-week release cycle for increased stability
LexisNexis confirms data breach as hackers leak stolen files
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
Amazon: Drone strikes damaged AWS data centers in Middle East
UH Cancer Center data breach affects nearly 1.2 million people
Android gets patches for Qualcomm zero-day exploited in attacks
CyberStrikeAI tool adopted by hackers for AI-powered attacks
– MTZ