Security Risk Advisors Releases “The Purple Perspective 2026” Report
09
Mar
2026

Security Risk Advisors Releases “The Purple Perspective 2026” Report

Philadelphia, PA, United States, March 9th, 2026, CyberNewswire Security Risk Advisors (SRA) is proud to announce the release of its…

09
Mar
2026

Russian hackers crack into officials’ Signal and WhatsApp accounts

Russian state hackers are trying to break into Signal and WhatsApp accounts used by diplomats, military staff, and government officials…

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
09
Mar
2026

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known as ScarCruft has been attributed to a fresh…

LABScon25 Replay | Hacktivism and War: A Clarifying Discussion
09
Mar
2026

LABScon25 Replay | Hacktivism and War: A Clarifying Discussion

This LABScon talk explores how hacktivist activity is strategically leveraged by nation-states and mercenary groups to obscure intent, destabilize targets,…

multihop compromise
09
Mar
2026

Rising Supply Chain Attacks on Cybersecurity Ecosystems

Cybersecurity has always relied on trust. Every software update, hardware purchase, and cloud integration depends on the implicit belief that…

Specops control panel
09
Mar
2026

Why Password Audits Miss the Accounts Attackers Actually Want

Password audits are a standard part of most security programs. They help organizations demonstrate compliance, reduce obvious risk, and confirm…

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS
09
Mar
2026

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

A serious security flaw has been found in ExifTool, a popular open-source tool used to read and edit image file…

The single-packet attack: making remote race-conditions 'local'
09
Mar
2026

The single-packet attack: making remote race-conditions ‘local’

The single-packet attack is a new technique for triggering web race conditions. It works by completing multiple HTTP/2 requests with…

Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threats
09
Mar
2026

Iran-Linked Hackers Target U.S. Critical Infrastructure Amid Rising Cyber Threats

Iran-linked threat actors are escalating cyber operations against U.S. and allied networks, with Seedworm recently deploying new backdoors against critical…

Iran's MuddyWater Hackers Target US Firms with New Dindoor Backdoor
09
Mar
2026

Iran’s MuddyWater Hackers Target US Firms with New Dindoor Backdoor

Cyber security researchers at Threat Hunter Team say a long-running Iranian cyber espionage group has breached several U.S. organizations in…

man taking online quiz on laptop
09
Mar
2026

Quiz sites trick users into enabling unwanted browser notifications

Our support team flagged a number of customers who suspected their device might be infected with malware, but Malwarebytes scans…

Rekoobe Backdoor
09
Mar
2026

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

Ravie LakshmananFeb 27, 2026Malware / Linux Security Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to…