Mar 2Tech Intel

Cybersecurity

Breaches, CVEs, CISA advisories, and threat intelligence

Threat Severity Distribution

4
15
7
0
24
Critical
High
Medium
Low
Info
50 total cyber intel items
Flash Alerts19 items
criticalabout 21 hours ago

Hackers Weaponize Claude Code in Mexican Government Cyberattack

Hackers exploited Claude AI to automate cyberattack operations against the Mexican government, using it to write exploits and exfiltrate over 150GB of sensitive data. This represents a significant escalation in AI-assisted cyber warfare capabilities.

high1 day ago

QuickLens Chrome extension steals crypto, shows ClickFix attack

The QuickLens Chrome extension was compromised and used to distribute malware targeting cryptocurrency theft from thousands of users before being removed from the Chrome Web Store.

high1 day ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw has patched a high-severity vulnerability (ClawJacked) that allowed malicious websites to hijack locally running AI agents via WebSocket connections. The flaw existed in the core system without requiring any plugins or extensions.

high2 days ago

Who is the Kimwolf Botmaster “Dort”?

KrebsOnSecurity has identified the operator of Kimwolf, the world's largest botnet, as a Canadian individual who exploited vulnerabilities in residential proxy services to infect IoT devices. The botmaster has escalated to physical threats including swatting attacks against security researchers who disclosed the vulnerability, demonstrating the real-world dangers of botnet operations and the importance of responsible vulnerability disclosure.

critical2 days ago

Canadian Tire Data Breach Impacts 38 Million Accounts

Canadian Tire suffered a major data breach affecting 38 million accounts, exposing customer names, addresses, email addresses, phone numbers, and encrypted passwords.

All Cyber Intelligence (50)

mediumabout 18 hours ago

Samsung TVs to stop collecting Texans’ data without express consent

Samsung reached a settlement with Texas over unauthorized collection of viewing data from smart TVs without proper user consent. The company will now require express consent before collecting content-viewing information from Texas residents.

criticalabout 21 hours ago

Hackers Weaponize Claude Code in Mexican Government Cyberattack

Hackers exploited Claude AI to automate cyberattack operations against the Mexican government, using it to write exploits and exfiltrate over 150GB of sensitive data. This represents a significant escalation in AI-assisted cyber warfare capabilities.

high1 day ago

QuickLens Chrome extension steals crypto, shows ClickFix attack

The QuickLens Chrome extension was compromised and used to distribute malware targeting cryptocurrency theft from thousands of users before being removed from the Chrome Web Store.

high1 day ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw has patched a high-severity vulnerability (ClawJacked) that allowed malicious websites to hijack locally running AI agents via WebSocket connections. The flaw existed in the core system without requiring any plugins or extensions.

medium2 days ago

$4.8M in crypto stolen after Korean tax agency exposes wallet seed

South Korea's National Tax Service exposed a cryptocurrency wallet's recovery phrase in a public press release, resulting in $4.8M theft by hackers. This incident highlights critical operational security failures in government handling of digital assets and underscores the importance of secure key management practices that extend beyond traditional cybersecurity controls.

high2 days ago

Who is the Kimwolf Botmaster “Dort”?

KrebsOnSecurity has identified the operator of Kimwolf, the world's largest botnet, as a Canadian individual who exploited vulnerabilities in residential proxy services to infect IoT devices. The botmaster has escalated to physical threats including swatting attacks against security researchers who disclosed the vulnerability, demonstrating the real-world dangers of botnet operations and the importance of responsible vulnerability disclosure.

critical2 days ago

Canadian Tire Data Breach Impacts 38 Million Accounts

Canadian Tire suffered a major data breach affecting 38 million accounts, exposing customer names, addresses, email addresses, phone numbers, and encrypted passwords.

high2 days ago

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

Truffle Security discovered nearly 3,000 exposed Google Cloud API keys that could be exploited to authenticate to Gemini endpoints and access private data, revealing a significant security vulnerability in how API keys are handled in client-side code.

high2 days ago

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

The Pentagon has designated AI company Anthropic as a supply chain risk after the company refused to allow its Claude AI model to be used for mass domestic surveillance of Americans and fully autonomous weapons systems.

informational2 days ago

Friday Squid Blogging: Squid Fishing in Peru

Peru has increased its squid catch limit in what appears to be a regular Friday squid-themed blog post. The post serves as an open thread for security discussions not covered elsewhere on the blog.

high3 days ago

Trump Orders All Federal Agencies to Phase Out Use of Anthropic Technology

Trump administration has ordered all federal agencies to discontinue use of Anthropic's AI technology, while OpenAI, Google, and xAI maintain government contracts. This represents a significant shift in federal AI procurement policy.

high3 days ago

Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

A ransomware attack has impacted a Mississippi healthcare system, coinciding with HBO's series 'The Pitt' depicting a similar hospital ransomware scenario, highlighting the real-world prevalence of healthcare cyberattacks.

medium3 days ago

Cities Hosting Major Events Need More Focus on Wireless, Drone Defense

Security experts emphasize that major events like the FIFA World Cup require enhanced focus on wireless and drone defense capabilities, extending beyond conventional physical and cybersecurity measures to address active and passive wireless threats.

medium3 days ago

Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy

AI-powered security vulnerability detection tools are showing promise but current products are not meeting the speed and accuracy requirements of enterprises and software developers.

medium3 days ago

Microsoft testing Windows 11 batch file security improvements

Microsoft is testing security and performance improvements for batch file and CMD script execution in Windows 11 Insider Preview builds, addressing potential vulnerabilities in legacy scripting environments.

critical3 days ago

APT37 hackers use new malware to breach air-gapped networks

North Korean APT37 hackers have deployed new malware tools designed to breach air-gapped networks by leveraging removable drives to transfer data between isolated and internet-connected systems while conducting covert surveillance.

high3 days ago

Europol-led crackdown on The Com hackers leads to 30 arrests

Europol's yearlong 'Project Compass' operation resulted in 30 arrests linked to 'The Com,' a cybercrime collective targeting children and teenagers, with 179 total suspects identified.

high3 days ago

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

The U.S. Department of Justice seized $61 million in Tether cryptocurrency linked to pig butchering scams, where criminals laundered proceeds stolen from cryptocurrency investment fraud victims.

high3 days ago

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Over 900 Sangoma FreePBX instances remain compromised with web shells following exploitation of a command injection vulnerability since December 2025, with the U.S. accounting for 401 infected systems.

high3 days ago

Samsung updates ACR privacy practices after Texas sues TV manufacturers

Texas sued five major smart TV manufacturers (Samsung, Sony, LG, Hisense, TCL) in December for allegedly collecting ACR data without proper consumer consent. Samsung has since updated its privacy practices in response to the lawsuit.

medium3 days ago

Instagram to start alerting parents when children search for terms relating to self-harm

Instagram is implementing parental alerts in four countries that will notify parents when their children repeatedly search for self-harm or suicide-related content on the platform. This safety feature targets youth protection concerns on social media.

high3 days ago

The Case for Why Better Breach Transparency Matters

Organizations routinely provide minimal information about data breaches or fail to disclose them entirely, highlighting a systemic transparency problem in breach reporting practices.

high3 days ago

EU lawmakers propose that youth under 16 be barred from social media without parental consent

EU lawmakers are proposing legislation to prohibit social media access for children under 13 entirely, and require parental consent for users aged 13-15. This represents a significant regulatory shift in how social media platforms must handle youth access in the European Union.

critical3 days ago

CISA warns that RESURGE malware can be dormant on Ivanti devices

CISA has issued a warning about RESURGE malware that can remain dormant on Ivanti Connect Secure devices, exploiting CVE-2025-0282 in zero-day attacks. Organizations using Ivanti devices face potential persistent compromise even after initial detection.

high3 days ago

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A malicious Go module impersonating legitimate crypto libraries has been discovered stealing passwords and deploying the Rekoobe Linux backdoor. The module targets developers through typosquatting, exfiltrating credentials and establishing persistent SSH access.

high3 days ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Security news roundup covering Russian cyberattacks coordinating with missile strikes, Predator spyware bypassing iOS security indicators, MITRE ATT&CK Advisory Council updates, and data breaches including ShinyHunters' Odido claim.

medium3 days ago

Third-Party Patching and the Business Footprint We All Share

Third-party software like PDF readers and email clients create significant attack surfaces through inconsistent patching. Action1 highlights how software drift across endpoints increases exploit risk and emphasizes the need for systematic third-party patch management.

informational3 days ago

Claude Code Security Shows Promise, Not Perfection

Claude Code's introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back the layers.

informational3 days ago

38 Million Allegedly Impacted by ManoMano Data Breach

Hackers stole personal information such as names, email addresses, phone numbers, and other information. The post 38 Million Allegedly Impacted by ManoMano Data Breach appeared first on SecurityWeek .

informational3 days ago

900 Sangoma FreePBX Instances Infected With Web Shells

The attacks exploited a post-authentication command injection vulnerability in the endpoint manager’s interface. The post 900 Sangoma FreePBX Instances Infected With Web Shells appeared first on Secur

informational3 days ago

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more pa

informational3 days ago

Chilean Carding Shop Operator Extradited to US

The 24-year-old suspect has been accused of trafficking over 26,000 cards from a single brand. The post Chilean Carding Shop Operator Extradited to US appeared first on SecurityWeek .

informational3 days ago

Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline

Anthropic said it sought narrow assurances from the Pentagon that Claude won’t be used for mass surveillance of Americans or in fully autonomous weapons. The post Anthropic Refuses to Bend to Pentagon

informational3 days ago

Ukrainian man pleads guilty to running AI-powered fake ID site

A Ukrainian man has pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold more than 10,000 photos of fake identification documents to customers worldwide. [...]

informational3 days ago

Why Tehran’s Two-Tiered Internet Is So Dangerous

Iran is slowly emerging from the most severe communications blackout in its history and one of the longest in the world. Triggered as part of January’s government crackdown against citizen prote

informational3 days ago

Phishing Attacks Against People Seeking Programming Jobs

This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malwar

informational3 days ago

Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Aeternum operates on smart contracts, making its command-and-control (C&C) infrastructure difficult to disrupt. The post Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resili

informational3 days ago

Juniper Networks PTX Routers Affected by Critical Vulnerability

An out-of-band security update for Junos OS Evolved patches the remote code execution vulnerability CVE-2026-21902. The post Juniper Networks PTX Routers Affected by Critical Vulnerability appeared fi

informational3 days ago

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). "A malicious downl

informational3 days ago

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam. As part of the effor

informational3 days ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

CISA has released an advisory to warn about four vulnerabilities discovered by a researcher in Gardyn Home and Gardyn Studio. The post Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking app

informational3 days ago

Marquis v. SonicWall Lawsuit Ups the Breach Blame Game

When a company gets breached through a third-party security vendor, who should bear responsibility? For one FinTech company, the answer is the firewall provider.

informational4 days ago

Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.

informational4 days ago

Former Air Force officer arrested for conspiring with hacker to provide flight training to Chinese military

Gerald Eddie Brown, 65, was arrested in Jeffersonville, Indiana on Thursday after spending nearly three years living in China and allegedly providing combat aircraft training to pilots in the Chinese

informational4 days ago

Wyden blocks Rudd confirmation to lead Cyber Command, NSA

Rudd “does not have the background that would allow him to immediately step into” the role of leading Cyber Command, Wyden wrote in a letter that was included in the Congressional Record on Wednesday.

informational4 days ago

Previously harmless Google API keys now expose Gemini AI data

Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data. [...]

informational4 days ago

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts

informational4 days ago

Trend Micro warns of critical Apex One code execution flaws

Trend Micro has patched two critical Apex One vulnerabilities that allow attackers to gain remote code execution (RCE) on vulnerable Windows systems. [...]

informational4 days ago

European DYI chain ManoMano data breach impacts 38 million customers

DIY store chain ManoMano is notifying customers of a data breach personal data, which was caused by hackers compromising a third-party service provider. [...]

informational4 days ago

Threat modeling AI applications

Proactively identifying, assessing, and addressing risk in AI systems We cannot anticipate every misuse or emergent behavior in AI systems. We can , however, identify what can go wrong, assess how bad