OpenAI launches Codex Security, an AI agent designed to detect vulnerabilities in software projects
Matthias Bastian / the-decoder - OpenAI's new Codex Security agent automatically hunts for vulnerabilities in code and has already found gaps in OpenSSH and Chromium.The article OpenAI launches Codex Security, an AI agent designed to detect vulnerabilities in software projects appeared f…
Back to Top / Friday, March 6, 2026, 5:21 pm / permalink 20289 / 4 stories in 3 hrs
CISA warns of Apple flaws exploited in spyware, crypto-theft attacks
Sergiu Gatlan / bleepingcomputer - CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]
Back to Top / Friday, March 6, 2026, 3:21 pm / permalink 20286 / 4 stories in 5 hrs
Algorithmic Warfare in the Iran Conflict: Operation Epic Fury and Dawn of the AI Battlefield
Frédéric Lemieux / hstoday - On 28 February 2026, the United States and Israel launched Operation Epic Fury / Operation Roaring Lion, a joint military campaign against Iran that fundamentally altered the strategic landscape of the Middle East.
- Camera hacks, trojan apps and intrusions test national cyber defenses. (8)
- Hyperscalers and Gulf AI projects hit as data centers targeted. (4)
- Oil, markets and trade disrupted as Gulf conflict snarls commerce. (16)
- War widens; post‑war plan skepticism and live strike timeline. (3)
- All Other Stories
Camera hacks, trojan apps and intrusions test national cyber defenses.
Hyperscalers and Gulf AI projects hit as data centers targeted.
Oil, markets and trade disrupted as Gulf conflict snarls commerce.
War widens; post‑war plan skepticism and live strike timeline.
All Other Stories
Back to Top / Friday, March 6, 2026, 3:20 am / permalink 20253 / 41 stories in 17 hrs
Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester
Joseph Cox / 404media - A court record reviewed by 404 Media shows privacy-focused email provider Proton Mail handed over payment data related to a Stop Cop City email account to the Swiss government, which handed it to the FBI.
Back to Top / Thursday, March 5, 2026, 8:21 pm / permalink 20245 / 3 stories in 24 hrs
Pentagon says it is labeling Anthropic a supply chain risk 'effective immediately'
abcnews - The Trump administration is following through with its threat to designate artificial intelligence company Anthropic as a supply chain risk in an unprecedented move that could force other government contractors to stop using the AI chatbot Claude
- Anthropic challenges designation, promises legal battle (9)
- Industry reaction: Microsoft keeps Claude; Nvidia speaks (4)
- Other: tools, user conversations, analysis, and opinion pieces (7)
- Pentagon formally designates Anthropic a supply‑chain risk (10)
- All Other Stories
Anthropic challenges designation, promises legal battle
Industry reaction: Microsoft keeps Claude; Nvidia speaks
Other: tools, user conversations, analysis, and opinion pieces
Pentagon formally designates Anthropic a supply‑chain risk
All Other Stories
Back to Top / Thursday, March 5, 2026, 8:21 pm / permalink 20242 / 34 stories in 24 hrs
Son of U.S. government contractor, accused of stealing millions in seized crypto, arrested in France
Olivier Acuna / coindesk - John “Lick” Daghita was arrested in a joint FBI-France operation after allegations he siphoned tens of millions of dollars in crypto from government seizure wallets managed by his father’s company.
Back to Top / Thursday, March 5, 2026, 12:21 pm / permalink 20210 / 7 stories in 32 hrs
Google says 90 zero-days were exploited in attacks last year
Bill Toulas / bleepingcomputer - Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances. [...]
Back to Top / Thursday, March 5, 2026, 10:22 am / permalink 20198 / 6 stories in 34 hrs
Critical Cisco Catalyst SD-WAN Vulnerabilities Allow Attackers to Gain Root Access
AnuPriya / cyberpress - Cisco released critical patches on March 5, 2026, for multiple flaws in Catalyst SD-WAN Manager (formerly vManage). These bugs let attackers skip authentication, grab root privileges, and run commands. The advisory, first posted February 25, now warns of …
Back to Top / Thursday, March 5, 2026, 7:21 am / permalink 20184 / 4 stories in 37 hrs
Evervault raises $25M to scale its ‘secure-by-default’ approach to payment data encryption
Mike Wheatley / siliconangle - Payment data encryption startup Evervault Inc. said today it’s aiming to become the internet’s “clearing house for sensitive data” after raising $25 million in a Series B round of funding. The round was led by Ribbit Capital and saw participation from Seq…
Back to Top / Thursday, March 5, 2026, 7:20 am / permalink 20183 / 4 stories in 37 hrs
Amazon's Bahrain data center targeted by Iran for support of U.S. military, state media says
cnbc - Amazon said the Bahrain facility was damaged due to a nearby drone strike, and two data centers in the UAE were directly hit by drones.
Back to Top / Wednesday, March 4, 2026, 9:21 pm / permalink 20165 / 7 stories in 47 hrs
US and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools
Zack Whittaker / techcrunch - Authorities say LeakBase was "one of the world’s largest online forums for cybercriminals," and maintained an archive of hacked databases containing hundreds of millions of passwords.
Back to Top / Wednesday, March 4, 2026, 5:21 pm / permalink 20155 / 7 stories in 2 days
New Coruna Spyware Targets iPhone Users
Usman Qureshi / iphoneincanada - Google researchers have detailed Coruna, a dangerous iOS exploit kit used to install spyware on iPhones. Learn how it works and how to stay protected.The post New Coruna Spyware Targets iPhone Users first appeared on iPhone in Canada.
Back to Top / Wednesday, March 4, 2026, 2:21 pm / permalink 20145 / 7 stories in 2 days
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
Andy Greenberg / wired - A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
- Coruna's 23-exploit chains compromised tens of thousands (3)
- From spies to thieves: Coruna fuels espionage and crypto theft (3)
- Tracing Coruna: likely US‑government roots, contractor fingerprints (5)
- All Other Stories
Coruna's 23-exploit chains compromised tens of thousands
From spies to thieves: Coruna fuels espionage and crypto theft
Tracing Coruna: likely US‑government roots, contractor fingerprints
All Other Stories
Back to Top / Tuesday, March 3, 2026, 6:20 pm / permalink 20094 / 13 stories in 3 days
JetStream Security Secures $34M Seed Round
Ekemini / ventureburn - JetStream Security, a cybersecurity startup, just pulled in $34 million in seed funding. This is one of the biggest early investments for an AI governance and enterprise security company inThe post JetStream Security Secures $34M Seed Round appeared first…
Back to Top / Tuesday, March 3, 2026, 5:22 pm / permalink 20091 / 5 stories in 3 days
Oil prices surge to 18-month high as Middle East conflict escalates. Here’s what it means for your gas prices
Sam Becker / fastcompany - Oil prices are on the rise, hitting an 18-month high as of Tuesday as the conflict between the United States, Israel, and Iran continues. The war against Iran, which started in earnest over the past weekend, has disrupted oil and gas shipments in the Midd…
- Bitcoin holds as investors flock to crypto amid market chaos (14)
- Cyberwar escalates: hacks, ops, and warnings reverberate (6)
- Markets rout, FX swings, and Asian market collapses (26)
- Oil shock and shipping fears jolt global energy markets (4)
- All Other Stories
Bitcoin holds as investors flock to crypto amid market chaos
Cyberwar escalates: hacks, ops, and warnings reverberate
Markets rout, FX swings, and Asian market collapses
Oil shock and shipping fears jolt global energy markets
All Other Stories
Back to Top / Tuesday, March 3, 2026, 2:21 pm / permalink 20076 / 57 stories in 3 days
A calendar invite is all it took to hijack Perplexity's Comet browser and steal 1Password credentials
Maximilian Schreiner / the-decoder - Security researchers demonstrate how a manipulated calendar invite can trick Perplexity's agentic Comet browser into stealing local files and taking over a full 1Password account.The article A calendar invite is all it took to hijack Perplexity's Comet br…
Back to Top / Tuesday, March 3, 2026, 10:21 am / permalink 20063 / 5 stories in 3 days
New Samsung feature unlocks homes via Aliro industry standard
Kerem Gülen / dataconomy - Samsung introduced a Digital Home Key feature within the Samsung Wallet. The feature allows users to unlock compatible smart doors using a smartphone. This addition expands the wallet’s existing digital car key capabilities. Samsung stated the feature mee…
Back to Top / Tuesday, March 3, 2026, 6:21 am / permalink 20047 / 4 stories in 3 days
Android Security Update Fixes 129 Vulnerabilities, Including Actively Exploited Zero-Day
AnuPriya / cyberpress - Google released its March 2026 Android Security Bulletin, patching 129 vulnerabilities across the Android ecosystem. This update sets a record for the highest number of fixes in a single month. It splits into two patch levels: 2026-03-01 for core Android …
Back to Top / Tuesday, March 3, 2026, 4:20 am / permalink 20040 / 3 stories in 3 days
Vitalik Buterin unveils plan to curb Ethereum block builder centralization
Margaux Nijkerk / coindesk - Another focus of his post is so-called “toxic MEV,” where traders exploit visibility into pending transactions to front-run or “sandwich” users’ trades.
Back to Top / Monday, March 2, 2026, 8:20 pm / permalink 20035 / 4 stories in 4 days
Iran's cyberwar has begun
Jessica Lyons / theregister - 'Expect elevated activity for the foreseeable future' Iranian hackers have launched spying expeditions, digital probes, and distributed denial of service (DDoS) attacks in the wake of the US and Israel launching missile strikes over the weekend, and secur…
- AI and phishing threats — weaponized agents, rising scams, deepfakes (8)
- Iran-linked cyber operations — espionage, DDoS, app propaganda (4)
- Maritime and infrastructure disruptions — GPS, AWS outages, internet cuts (4)
- OTHER — warnings, VPN workarounds, industry hires, communications advice (4)
- All Other Stories
AI and phishing threats — weaponized agents, rising scams, deepfakes
Iran-linked cyber operations — espionage, DDoS, app propaganda
Maritime and infrastructure disruptions — GPS, AWS outages, internet cuts
OTHER — warnings, VPN workarounds, industry hires, communications advice
All Other Stories
Back to Top / Monday, March 2, 2026, 3:22 pm / permalink 20018 / 28 stories in 4 days