Aggregator
Global Takedown Neutralizes Tycoon2FA Phishing Service
SecWiki News 2026-03-04 Review
更多最新文章,请访问SecWiki
Operation Leak Dismantles LeakBase Cybercriminal Forum – User Data, IP Logs Secured by Authorities
The FBI, in coordination with multiple international law enforcement agencies, has officially seized LeakBase, a prominent cybercriminal forum notorious for hosting and trading stolen databases, under a coordinated global operation dubbed “Operation Leak.” Both primary domains, leakbase[.]ws and leakbase[.]la, now redirect visitors to an FBI seizure banner, with name servers switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov. The takedown was […]
The post Operation Leak Dismantles LeakBase Cybercriminal Forum – User Data, IP Logs Secured by Authorities appeared first on Cyber Security News.
23个IOS漏洞打包的Coruna工具包,已完成从国家级到黑产的三级扩散
Iran‑Nexus APT ‘Dust Specter’ Hits Iraqi Officials with AI‑Assisted Malware and Novel RATs
In January 2026, a targeted cyberattack emerged against government officials in Iraq. The threat group, tracked as Dust Specter, impersonated Iraq’s Ministry of Foreign Affairs to trick high-value targets into downloading malicious files. The campaign introduced four previously undocumented malware tools — SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM — each reflecting the precision of a seasoned, […]
The post Iran‑Nexus APT ‘Dust Specter’ Hits Iraqi Officials with AI‑Assisted Malware and Novel RATs appeared first on Cyber Security News.
Khyber: Иран ударил по офису Нетаньяху ракетой-загадкой и заставил ПВО Израиля сдавать дорогой экзамен
Mississippi medical center reopens clinics hit by ransomware attack
To Reduce MTTR and Business Risk, Start with Better SOC Collaboration
In modern SOCs, it all boils down to two things: time and impact. How quickly are incidents contained? How accurate are the decisions? These questions define not only operational efficiency, but overall business resilience. Yet many organizations tend to invest heavily in tooling while overlooking structural weaknesses. The missing link is often the collaboration between alert triage and incident response teams. Reducing MTTR is more than a technical objective, and it begins with […]
The post To Reduce MTTR and Business Risk, Start with Better SOC Collaboration appeared first on Cyber Security News.
Attackers are using your network against you, according to Cloudflare
Blind spots in complex cloud environments allow identity-based attacks to achieve the same outcome as complex malware or zero-day exploits. Sophistication need not apply.
The post Attackers are using your network against you, according to Cloudflare appeared first on CyberScoop.
苹果推出起售价 4599 元的低价笔记本电脑 MacBook Neo
Ransomware Breach at University of Hawaii Cancer Center Affects 1.2M People
LastPass warns of spoofed alerts aimed at stealing master passwords
Самое дорогое фото салата в вашей жизни. Почему не стоит качать приложения из чатов спортклубов
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network
Always-on detections: eliminating the WAF “log versus block” trade-off
Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
Win11Debloat: A 40k-Star PowerShell Script for Stripping Bloatware, Telemetry, and AI Features from Windows
New Threat Report Warns of AI is Automating High-Velocity Attacker Operations
The gap between human-led attacks and machine-driven intrusions is closing faster than most organizations expected. Cloudforce One, Cloudflare’s dedicated threat intelligence team, released the inaugural 2026 Cloudflare Threat Report on March 3, 2026, issuing a clear warning: artificial intelligence has become a core engine behind modern cyber attacks. Built from trillions of network signals gathered […]
The post New Threat Report Warns of AI is Automating High-Velocity Attacker Operations appeared first on Cyber Security News.