🛡️ Latest Cyber Security News

Microsoft: Hackers abuse OAuth error flows to spread malware

BleepingComputer — Tue, 03 Mar 2026 15:59:19 -0500

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

The Hacker News — Tue, 03 Mar 2026 22:45:00 +0530

Google Chrome shifts to two-week release cycle for increased stability

BleepingComputer — Tue, 03 Mar 2026 12:00:00 -0500

LexisNexis confirms data breach as hackers leak stolen files

BleepingComputer — Tue, 03 Mar 2026 10:40:48 -0500

Compromised Site Management Panels are a Hot Item in Cybercrime Markets

BleepingComputer — Tue, 03 Mar 2026 10:01:11 -0500

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

The Hacker News — Tue, 03 Mar 2026 20:00:00 +0530

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

The Hacker News — Tue, 03 Mar 2026 19:59:00 +0530

Amazon: Drone strikes damaged AWS data centers in Middle East

BleepingComputer — Tue, 03 Mar 2026 06:44:44 -0500

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged

The Hacker News — Tue, 03 Mar 2026 17:00:00 +0530

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

The Hacker News — Tue, 03 Mar 2026 16:40:00 +0530

Star Citizen game dev discloses breach affecting user data

BleepingComputer — Tue, 03 Mar 2026 05:50:26 -0500

UH Cancer Center data breach affects nearly 1.2 million people

BleepingComputer — Tue, 03 Mar 2026 04:48:51 -0500

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

The Hacker News — Tue, 03 Mar 2026 14:50:00 +0530

Android gets patches for Qualcomm zero-day exploited in attacks

BleepingComputer — Tue, 03 Mar 2026 03:19:53 -0500

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

The Hacker News — Tue, 03 Mar 2026 12:38:00 +0530

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

The Hacker News — Tue, 03 Mar 2026 12:23:00 +0530

CyberStrikeAI tool adopted by hackers for AI-powered attacks

BleepingComputer — Mon, 02 Mar 2026 19:06:39 -0500

Fake Google Security site uses PWA app to steal credentials, MFA codes

BleepingComputer — Mon, 02 Mar 2026 15:23:41 -0500

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

The Hacker News — Mon, 02 Mar 2026 22:38:00 +0530

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

The Hacker News — Mon, 02 Mar 2026 22:22:00 +0530

Alert: NCSC advises UK organisations to take action following conflict in the Middle East

All Feed — Mon, 02 Mar 2026 12:00:00 +0000

Exploitation of Cisco Catalyst SD-WAN

All Feed — Wed, 25 Feb 2026 12:00:00 +0000

Can you help the NCSC with the next phase of EASM research?

All Feed — Thu, 12 Feb 2026 12:00:00 +0000

Improving your response to vulnerability management

All Feed — Tue, 10 Feb 2026 12:00:00 +0000

Cloud Security Posture Management: silver bullet or another piece in the cloud puzzle?

All Feed — Tue, 03 Feb 2026 12:00:00 +0000

One small step for Cyber Resilience Test Facilities, one giant leap for technology assurance

All Feed — Thu, 29 Jan 2026 12:00:00 +0000

NCSC issues warning over hacktivist groups disrupting UK organisations and online services

All Feed — Mon, 19 Jan 2026 12:00:00 +0000

Pro-Russia hacktivist activity continues to target UK organisations

All Feed — Mon, 19 Jan 2026 12:00:00 +0000

Designing safer links: secure connectivity for operational technology

All Feed — Wed, 14 Jan 2026 12:00:00 +0000

The Government Cyber Action Plan: strengthening resilience across the UK

All Feed — Thu, 08 Jan 2026 12:00:00 +0000