-
Iran-linked cyber actors are increasingly working with the broader cybercrime ecosystem, using criminal tools, infrastructure, and business models to support state-backed operations and hide their involvement. For years, Iranian intelligence services h…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
On March 11, 2026, the global medical technology giant Stryker suffered a devastating cyberattack that brought its worldwide IT operations to a sudden halt. Iranian-linked threat actors breached the company’s network. They deployed highly destruc…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has officially rolled out a crucial update for its Chrome browser, promoting version 146 to the stable channel for Windows, Mac, and Linux users. Many of these flaws involve deep-seated memory corruption issues that, if left unpatched, could all…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Meta has rolled out a new wave of anti‑scam protections across WhatsApp, Facebook, and Messenger, combining AI‑driven detection, stricter advertiser controls, and public awareness campaigns to tackle fast‑evolving online fraud at scale. The new tools a…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google Cloud has officially completed its acquisition of cloud security leader Wiz, marking a significant consolidation in the cybersecurity landscape. Operating under its retained brand within Google Cloud, Wiz will integrate its code-to-cloud securit…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
UNC6426 hackers turned a routine NPM update into a direct path to full AWS administrator access in under 72 hours, highlighting how fragile CI/CD-to-cloud trust can become when roles are overly permissive. When a developer at the victim organization u…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has disclosed a critical security flaw in its Microsoft Office suite, officially tracked as CVE-2026-26110. Released on March 10, 2026, this Remote Code Execution (RCE) vulnerability poses a significant threat to organizations and individuals…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A widespread technical outage has struck Instagram, leaving thousands of users globally unable to access the popular social media application. The disruption, which primarily impacted users in the United States, represents a significant service degrada…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The cybersecurity landscape experienced a major shift in 2025 as threat actors transitioned from experimenting with artificial intelligence to fully integrating it into real-world cyber operations. According to new insights from the Google Threat Intel…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
BeatBanker is a new Android malware campaign targeting users in Brazil, combining banking fraud, crypto‑mining, and, in its latest wave, full device takeover via a RAT. It spreads almost entirely through phishing pages that mimic the Google Play Store …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


