• Google fast-tracks post-quantum cryptography with a 2029 deadline as researchers warn quantum computers could break current encryption sooner than expected.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data. The two versions, 4.87.1 and 4.87.2, published to the Python Package Index (PyPI) repository on March 27, 2026, concealed their credential harvesting capabilities within a .WAV file. Users are

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers at WatchGuard have identified a new phishing campaign targeting companies in Venezuela. Using malicious SVG image files…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX’s pre-publish scanning pipeline to cause the tool to allow a malicious Microsoft Visual Studio Code (VS Code) extension to pass the vetting process and go live in the registry. “The pipeline had a single boolean return value that meant both ‘no scanners are configured’ and ‘all scanners failed to run,'” Koi

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Internet Systems Consortium (ISC) has released critical security advisories addressing three new vulnerabilities in the widely used BIND 9 Domain Name System (DNS) software suite. If left unpatched, remote attackers could exploit these weaknesses to bypass access control lists, consume excessive system resources, or crash DNS servers entirely. Network administrators must apply the provided […]

    The post BIND 9 Security Flaws Allow Attackers to Bypass Security Controls and Crash Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Mar. 27, 2026

    Read the full story from CANOPY

    Cybercrime damage was on pace to hit $10.5 trillion in 2025, according to Cybersecurity Ventures. A single U.S. data breach averages $10.2 million, according to IBM. Yet most of the companies flooding into flexible offices don’t have a security team—when they sign a traditional five-to-seven-year office lease, they inherit every one of these risks alone: firewalls, VPN infrastructure, monitoring tools, access control hardware, and the expertise to manage it all.

    Cushman & Wakefield’s Global Flexible Office Trends 2025 report found that 55 percent of global occupiers now use flex space, with another 17 percent planning to increase. JLL projects that 30 percent of all U.S. office space will be consumed flexibly by 2030.

    Here are seven ways leading coworking operators are reframing enterprise-grade protection as an amenity—attracting members, justifying premium pricing, and making the traditional office lease harder to defend:

    1. Replace Keycards With Smart Access Controls

    2. Deploy AI-Powered Threat Detection

    3. Turn Workspace Design Into a Security Feature

    4. Build Zero-Trust Networks Into the Membership

    5. Align Cybersecurity With Sustainability Governance

    6. Make the Financial Case Impossible to Ignore

    7. Open In Markets That Most Need Security As A Service

    Cybersecurity Ventures projects that global spending on cybersecurity will exceed $520 billion by 2026. Much of that spend will come from companies that don’t have a CISO—and whose first line of defense is the workspace they walk into every morning.

    Read the Full Story



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Security As A Service: 7 Ways Coworking Spaces Can Upgrade Digital Trust In 2026 appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report from Push Security. Business accounts associated with social media platforms are a lucrative target, as they can be weaponized by bad actors for malvertising and distributing malware. “TikTok has been historically abused to distribute

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Rising geopolitical tensions are reflected (or in some cases preceded) by cyber operations, while technology itself has become politicized. Let’s admit it: we are in the middle of it.  Introduction: One tech power to rule them all is a thing of the past  The relative safety, peace and prosperity that much of the world has enjoyed since 1945 was not accidental. It emerged from the ashes

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Iran is using Russian drone-warfare tactics to target U.S. forces and other operations in the Middle East, Ukrainian military personnel said Thursday in Washington, D.C.

    Last June, Iran responded to U.S. strikes on Iranian nuclear facilities with drones and missile attacks that were largely thwarted by U.S. and Israeli defenses. 

    But Iranian tactics have “changed from July last year to now,” one of the visiting Ukrainian military members told a small group of former government officials, analysts, and media at the German Marshall Fund on Thursday. “Now, those tactics are very similar to the Russians we’re fighting.”

    Instead of large “existential” attacks, Iran is launching smaller numbers of drones and missiles, but more often, and at a wider variety of targets—including civilian and economic infrastructure that is a lower priority for U.S. forces to protect, as documented by the Institute for the Study of War.

    Tehran has largely decentralized its operations and instructed commanders to "fire at will," ISW said. And while ISW suggests that U.S. efforts to incapacitate Iran’s missile and drone capabilities will likely work eventually, Iranian tactics have caused U.S. casualties, damaged bases, and created other disruptions.

    The Ukrainian troops said this new strategy mirrors the “attrition” strategy Russia has used against Ukraine: aiming at civilian and infrastructure targets to impose economic and political costs.

    ISW reported a similar finding on March 15, saying that Iran seeks to “outlast Washington rather than to militarily defeat it outright.”

    The visiting Ukrainians reiterated what top E.U. officials and U.S. intelligence sources have previously stated: that Russia is providing Iran with targeting intelligence. On March 15, Ukrainian President Volodymyr Zelenskyy noted that Russia had supplied Iran with Shahed-136 drones before the U.S. and Israeli launched their surprise attacks in February.

    Meanwhile, the war with Iran is having other negative effects on the U.S., Europe, and Ukraine. The United States has suspended sanctions against Russian oil interests and some Iranian oil producers, effectively boosting the finances of two nations aligned against it, even as Washington carries out military strikes against one of them.

    However, the White House, has been reluctant to call out Russian President Vladimir Putin's regime for assisting Iran. Instead, President Donald Trump this month snubbed Ukraine’s offer to help the U.S. better defend itself against Russian and Iranian drones.

    Some U.S. and NATO military leaders are more open to Ukraine’s assistance. The visiting military officials said that over the last few days, they met with military officials involved in the Defense Department’s “drone dominance” effort launched in July, as well as officials tasked with counter-UAS operations. 

    During a Tuesday hearing, Space Force Director of Force Structure Lt. Gen. Steven Whitney praised Ukrainian innovation as “out of this world.” Military officers across all ranks also routinely attest to the value partnership with Ukraine is bringing to U.S. military readiness.

    That partnership is particularly important now, said the visiting Ukrainian military personnel, as autocratic states increasingly align to weaken the United States and Europe. 

    “Iran, North Korea, China, and Russia—that's all one war,” said one.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the threat landscape in January 2025, with recent attacks leveraging a custom Windows ransomware strain codenamed GenieLocker. “Bearlyfy (also known as Labubu) operates as a dual-purpose group aimed at inflicting maximum damage upon Russian businesses;

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶