CISA warns of Apple flaws exploited in spyware, crypto-theft attacks
Sergiu Gatlan / bleepingcomputer - CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]
Back to Top / Friday, March 6, 2026, 3:21 pm / permalink 20286 / 4 stories in 6 hrs
Algorithmic Warfare in the Iran Conflict: Operation Epic Fury and Dawn of the AI Battlefield
Frédéric Lemieux / hstoday - On 28 February 2026, the United States and Israel launched Operation Epic Fury / Operation Roaring Lion, a joint military campaign against Iran that fundamentally altered the strategic landscape of the Middle East.
- Camera hacks, trojan apps and intrusions test national cyber defenses. (8)
- Hyperscalers and Gulf AI projects hit as data centers targeted. (4)
- Oil, markets and trade disrupted as Gulf conflict snarls commerce. (16)
- War widens; post‑war plan skepticism and live strike timeline. (3)
- All Other Stories
Camera hacks, trojan apps and intrusions test national cyber defenses.
Hyperscalers and Gulf AI projects hit as data centers targeted.
Oil, markets and trade disrupted as Gulf conflict snarls commerce.
War widens; post‑war plan skepticism and live strike timeline.
All Other Stories
Back to Top / Friday, March 6, 2026, 3:20 am / permalink 20253 / 41 stories in 18 hrs
Son of U.S. government contractor, accused of stealing millions in seized crypto, arrested in France
Olivier Acuna / coindesk - John “Lick” Daghita was arrested in a joint FBI-France operation after allegations he siphoned tens of millions of dollars in crypto from government seizure wallets managed by his father’s company.
Back to Top / Thursday, March 5, 2026, 12:21 pm / permalink 20210 / 7 stories in 33 hrs
Amazon's Bahrain data center targeted by Iran for support of U.S. military, state media says
cnbc - Amazon said the Bahrain facility was damaged due to a nearby drone strike, and two data centers in the UAE were directly hit by drones.
Back to Top / Wednesday, March 4, 2026, 9:21 pm / permalink 20165 / 7 stories in 2 days
US and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
Zack Whittaker / techcrunch - Authorities say LeakBase was "one of the world’s largest online forums for cybercriminals," and maintained an archive of hacked databases containing hundreds of millions of passwords.
Back to Top / Wednesday, March 4, 2026, 5:21 pm / permalink 20155 / 7 stories in 2 days
New Coruna Spyware Targets iPhone Users
Usman Qureshi / iphoneincanada - Google researchers have detailed Coruna, a dangerous iOS exploit kit used to install spyware on iPhones. Learn how it works and how to stay protected.The post New Coruna Spyware Targets iPhone Users first appeared on iPhone in Canada.
Back to Top / Wednesday, March 4, 2026, 2:21 pm / permalink 20145 / 7 stories in 2 days
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
Andy Greenberg / wired - A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
- Coruna's 23-exploit chains compromised tens of thousands (3)
- From spies to thieves: Coruna fuels espionage and crypto theft (3)
- Tracing Coruna: likely US‑government roots, contractor fingerprints (5)
- All Other Stories
Coruna's 23-exploit chains compromised tens of thousands
From spies to thieves: Coruna fuels espionage and crypto theft
Tracing Coruna: likely US‑government roots, contractor fingerprints
All Other Stories
Back to Top / Tuesday, March 3, 2026, 6:20 pm / permalink 20094 / 13 stories in 3 days
Iran's cyberwar has begun
Jessica Lyons / theregister - 'Expect elevated activity for the foreseeable future' Iranian hackers have launched spying expeditions, digital probes, and distributed denial of service (DDoS) attacks in the wake of the US and Israel launching missile strikes over the weekend, and secur…
- AI and phishing threats — weaponized agents, rising scams, deepfakes (8)
- Iran-linked cyber operations — espionage, DDoS, app propaganda (4)
- Maritime and infrastructure disruptions — GPS, AWS outages, internet cuts (4)
- OTHER — warnings, VPN workarounds, industry hires, communications advice (4)
- All Other Stories
AI and phishing threats — weaponized agents, rising scams, deepfakes
Iran-linked cyber operations — espionage, DDoS, app propaganda
Maritime and infrastructure disruptions — GPS, AWS outages, internet cuts
OTHER — warnings, VPN workarounds, industry hires, communications advice
All Other Stories
Back to Top / Monday, March 2, 2026, 3:22 pm / permalink 20018 / 28 stories in 4 days
Former Mt. Gox CEO proposed a rewrite of bitcoin's code to recover $5 billion in stolen funds. Gets quickly shutdown
Shaurya Malwa / coindesk - Mark Karpelès submitted a pull request to Bitcoin Core that would redirect coins that have remained untouched since 2011 to a recovery address controlled by the MtGox trustee, reigniting the oldest debate in Bitcoin.
Back to Top / Saturday, February 28, 2026, 9:20 am / permalink 19942 / 4 stories in 6 days
Meta Sues Advertisers Over Alleged Celebrity Impersonation Scams
PYMNTS / pymnts - Meta is suing advertisers who have allegedly impersonated celebrities to defraud consumers. The tech giant announced Thursday (Feb. 26) that it had taken “technical enforcement actions” against the accused scammers, such as suspending their payment method…
Back to Top / Thursday, February 26, 2026, 3:20 pm / permalink 19829 / 3 stories in 8 days
Google catches Beijing spies using Sheets to spread espionage across 4 continents
Jessica Lyons / theregister - UNC2814 historically targets governments and telcos A China-linked crew found a unique formula for attacking telcos and government orgs across the Americas, Asia, and Africa in its latest round of intrusions. Google's threat intelligence, along with unnam…
Back to Top / Wednesday, February 25, 2026, 3:21 pm / permalink 19746 / 4 stories in 9 days
CarGurus data breach affects 12.5 million accounts
Kirsten Korosec / techcrunch - Automotive marketplace CarGurus was the target of a data breach in which the names, email addresses, phone numbers, and physical addresses of millions of customers were stolen.
Back to Top / Tuesday, February 24, 2026, 7:21 pm / permalink 19701 / 3 stories in 10 days
U.S. sanctions Russian firm Operation Zero following crypto-funded trade secret theft
Sarah Wynn / theblock - The Treasury’s OFAC has sanctioned the Russian company Operation Zero following the guilty plea of a man who admitted to stealing software.
Back to Top / Tuesday, February 24, 2026, 4:21 pm / permalink 19687 / 9 stories in 10 days
Wisconsin Reveals Conduent Breach Affected 25 Million Americans
PYMNTS / pymnts - A data breach at Conduent Business Services, an operator of back-end systems for state governments, has affected more than 25 million people across the country, according to data breach information posted this month by the Wisconsin Department of Agricult…
Back to Top / Tuesday, February 24, 2026, 2:21 pm / permalink 19679 / 3 stories in 10 days
Solana DeFi Project Step Finance to Wind Down Weeks After $29M Hack
Callan Quinn / decrypt - The Solana projects made the "difficult decision" to cease operations after January's treasury breach and subsequent failed rescue efforts.
Back to Top / Tuesday, February 24, 2026, 9:21 am / permalink 19641 / 3 stories in 10 days
Wikipedia Blacklists Archive.today, Starts Removing 695,000 Archive Links
BeauHD / slashdot - An anonymous reader quotes a report from Ars Technica: The English-language edition of Wikipedia is blacklisting Archive.today after the controversial archive site was used to direct a distributed denial of service (DDoS) attack against a blog. In the cou…
Back to Top / Friday, February 20, 2026, 5:20 pm / permalink 19486 / 7 stories in 14 days
$20 million lost in 'jackpotting' ATM malware attacks in 2025, FBI reports — scheme forces machines to spit out cash, targets banks and ATM operators
tomshardware - The FBI released a public warning, saying that ATM "jackpotting" incidents have exponentially increased in 2025.
Back to Top / Friday, February 20, 2026, 10:21 am / permalink 19467 / 4 stories in 14 days
Ex-Google engineers accused of helping themselves to chip security secrets
Carly Page / theregister - Feds say trio conspired to siphon processor and cryptography IP, allegedly routing some data overseas Two former Google engineers and a third alleged accomplice are facing federal charges after prosecutors accused them of swiping sensitive chip and securi…
Back to Top / Friday, February 20, 2026, 5:20 am / permalink 19454 / 11 stories in 14 days
LLM-Generated Passwords Look Strong but Crack in Hours, Researchers Find
msmash / slashdot - AI security firm Irregular has found that passwords generated by major large language models -- Claude, ChatGPT and Gemini -- appear complex but follow predictable patterns that make them crackable in hours, even on decades-old hardware. When researchers …
Back to Top / Thursday, February 19, 2026, 1:21 pm / permalink 19429 / 4 stories in 15 days
New benchmark shows AI agents can exploit most smart contract vulnerabilities on their own
Maximilian Schreiner / the-decoder - OpenAI and crypto investment firm Paradigm have built EVMbench, a benchmark that measures how well AI agents can find, fix, and exploit security vulnerabilities in Ethereum smart contracts.The article New benchmark shows AI agents can exploit most smart c…
Back to Top / Thursday, February 19, 2026, 9:21 am / permalink 19414 / 3 stories in 15 days