Categories Breaking News

Breaking News – Cyber Threats – 2026-03-12 08:00 PDT

Breaking News – Cyber Threats (last 6h)

Generated: 2026-03-12 08:00 PDT

  • Telus Digital confirms breach after hacker claims 1 petabyte data theft
    BleepingComputer • 2026-03-12 07:40 • www.bleepingcomputer.com
    Canadian business process outsourcing giant Telus Digital has confirmed it suffered a security incident after threat actors claimed to have stolen nearly 1 petabyte of data from the company in a multi-month breach. […]
    https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/
  • Going the Extra Mile: Travel Rewards Turn into Underground Currency.
    BleepingComputer • 2026-03-12 07:05 • www.bleepingcomputer.com
    Stolen airline miles are converted into flights and hotel stays, then resold as discounted travel. Flare shows how cybercriminals and underground markets treat loyalty accounts like tradable currency. […]
    https://www.bleepingcomputer.com/news/security/going-the-extra-mile-travel-rewards-turn-into-underground-currency/
  • Apple patches older iPhones and iPads against Coruna exploits
    BleepingComputer • 2026-03-12 06:43 • www.bleepingcomputer.com
    ​Apple has released security updates to patch older iPhones and iPads against a set of vulnerabilities targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. […]
    https://www.bleepingcomputer.com/news/apple/apple-patches-older-iphones-and-ipads-against-coruna-exploits/
  • How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
    The Hacker News • 2026-03-12 06:30 • thehackernews.com
    Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted infrastructure, legitimate-looking authentication flows, and encrypted traffic that conceals malicious behavior from traditional detection layers. For CISOs, the priority is now clear: scale phishing detection in a way that helps
    https://thehackernews.com/2026/03/how-to-scale-phishing-detection-in-your.html
  • ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
    The Hacker News • 2026-03-12 06:14 • thehackernews.com
    Another Thursday, another pile of weird security stuff that somehow happened in just seven days. Some of it is clever. Some of it is lazy. A few bits fall into that uncomfortable category of “yeah… this is probably going to show up in real incidents sooner than we’d like.”
    The pattern this week feels familiar in a slightly annoying way. Old tricks are getting polished. New research shows how
    https://thehackernews.com/2026/03/threatsday-bulletin-oauth-trap-edr.html
  • Your Signal account is safe – unless you fall for this trick
    Graham Cluley • 2026-03-12 05:12 • www.bitdefender.com
    Signal, the encrypted messaging app trusted by security-savvy users around the world, has confirmed that hackers have managed to takeover accounts – with government officials and journalists among those being targeted.

    Read more in my article on the Hot for Security blog.
    https://www.bitdefender.com/en-us/blog/hotforsecurity/signal-account-safe-unless-fall-for-this-trick

  • US charges another ransomware negotiator linked to BlackCat attacks
    BleepingComputer • 2026-03-12 04:31 • www.bleepingcomputer.com
    The U.S. Department of Justice charged another former DigitalMint employee for his involvement in an insider scheme in which ransomware negotiators secretly partnered with the BlackCat (ALPHV) ransomware operation. […]
    https://www.bleepingcomputer.com/news/security/us-charges-another-ransomware-negotiator-linked-to-blackcat-attacks/
  • Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload
    The Hacker News • 2026-03-12 04:30 • thehackernews.com
    The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of five minutes, the outcome can shift from a contained incident to a breach.
    For years, the cybersecurity industry has focused on the front door of phishing defense: employee training, email gateways that
    https://thehackernews.com/2026/03/attackers-dont-just-send-phishing.html
  • Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
    The Hacker News • 2026-03-12 02:58 • thehackernews.com
    Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit.
    The vulnerability, tracked as CVE-2023-43010, relates to an unspecified vulnerability in WebKit that could result in memory corruption when processing maliciously crafted web content. The iPhone maker said the issue was
    https://thehackernews.com/2026/03/apple-issues-security-updates-for-older.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like