A critical zero-day vulnerability in Cisco Secure Firewall Management Center (FMC) is being actively exploited by threat actors to deploy Interlock ransomware across enterprise networks, according to recent security research. The flaw, tracked as CVE-2026-20131, has been abused in real-world attacks for over a month before public disclosure, giving attackers a significant operational advantage. The...Read More
Barracuda has reported a rise in identity-based attacks and credential-stealing malware, with suspicious login activity, supply-chain tactics and weaponised PDFs featuring in recent investigations. In February 2026, Barracuda’s Managed XDR team recorded an increase in suspicious login attempts using stolen credentials. The activity reflects a broader shift towards account takeover rather than direct exploitation of...Read More
Russian hackers using new iPhone-hacking technique DarkSword What’s the story A powerful iPhone-hacking technique called DarkSword has been discovered in use by Russian hackers. The method can compromise devices running iOS 18 just by visiting infected websites. The discovery was made by researchers at Google, cybersecurity firms iVerify and Lookout. They found that DarkSword could...Read More
The website featured for a while the words “Now we are under their control. The Zionists are handcuffed” in Farsi. The website of Yeshiva World News, the Orthodox Jewish news publication, was hacked on Wednesday, seemingly by Iran. The website featured for a while the words “Now we are under their control. The Zionists are...Read More
The surgical robotics giant Intuitive has fallen victim to a cyberattack that has resulted in a data breach. According to a statement released by the company, a targeted phishing attack allowed an unauthorized third party to access certain internal systems. The threat actor gained access through compromised employee credentials. The hacker obtained internal business and...Read More
Cybersecurity efforts have traditionally centered on perimeter defenses. From firewalls and intrusion detection to multi-layered monitoring, the objective has always been to stop intruders from stealing or corrupting data. Generative AI adoption in recent years has complicated that mission, forcing security teams to adapt to new risks. Now, with the rise of agentic AI, those challenges are escalating further...Read More
DarkSword iOS Exploit A sophisticated full-chain iOS exploit kit dubbed DarkSword, actively deployed by multiple commercial surveillance vendors and state-sponsored threat actors since at least November 2025 to steal sensitive personal data from iPhone users across four countries. DarkSword is a full-chain iOS exploit that chains six distinct vulnerabilities, four of which were leveraged as zero-days,...Read More
LAUREL, Mont. – An operation from Texas-based video creators “Predator Poachers” helped lead to the arrest of a local man and 11 counts of child sexual abuse charges brought against him. According to court documents, the Laurel Police Department received a call on August 10, 2025 stating that Predator Poachers, a Youtube group, were speaking...Read More
LANSING, Mich. (WILX) – Three child sex abuse suspects were arrested during a sting in Ingham County, officials announced Friday afternoon. According to officials, the arrests were part of a targeted operation where law enforcement posed as a 15-year-old girl online. After “extensive online communication” with undercover deputies, the three men arranged to meet with...Read More
09:49, todayAuthor: Asia-Plus On March 17, Tajikistan officially joined the international effort to combat cybercrime by signing the United Nations Convention against Cybercrime. The signing ceremony took place at the UN Headquarters in New York, according to the Ministry of Foreign Affairs of the Republic of Tajikistan. The document was signed on behalf of Tajikistan...Read More