Categories Breaking News

Breaking News – Cyber Threats – 2026-03-05 07:00 PST

Breaking News – Cyber Threats (last 6h)

Generated: 2026-03-05 07:00 PST

  • ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
    The Hacker News • 2026-03-05 05:44 • thehackernews.com
    Some weeks in cybersecurity feel routine. This one doesn’t.
    Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity, security teams shared new findings, and a few unexpected moves from major tech companies also drew attention.
    Together, these updates offer a useful snapshot of what is happening
    https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html
  • Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
    The Hacker News • 2026-03-05 05:13 • thehackernews.com
    Most organizations assume encrypted data is safe.
    But many attackers are already preparing for a future where today’s encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can be decrypted later using quantum computers.
    This tactic—known as “harvest now, decrypt later”—means sensitive data transmitted today could become
    https://thehackernews.com/2026/03/preparing-for-quantum-era-post-quantum.html
  • Police dismantles online gambling ring exploiting Ukrainian women
    BleepingComputer • 2026-03-05 04:39 • www.bleepingcomputer.com
    Spanish and Ukrainian law enforcement authorities dismantled a criminal ring that exploited war-displaced Ukrainian women to run an online gambling scheme that laundered nearly €4.75 million in illicit proceeds. […]
    https://www.bleepingcomputer.com/news/security/police-dismantles-online-gambling-ring-exploiting-ukrainian-women/
  • Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
    The Hacker News • 2026-03-05 04:01 • thehackernews.com
    A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country’s Ministry of Foreign Affairs to deliver a set of never-before-seen malware.
    Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different
    https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html
  • ISC Stormcast For Thursday, March 5th, 2026 https://isc.sans.edu/podcastdetail/9836, (Thu, Mar 5th)
    SANS ISC Diary (full) • 2026-03-05 03:50 • isc.sans.edu
    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
    https://isc.sans.edu/diary/rss/32770
  • Hacked App Part of US/Israeli Propaganda Campaign Against Iran
    Schneier on Security • 2026-03-05 03:28 • www.schneier.com

    Wired has the story:

    Shortly after the first set of explosions, Iranians received bursts of notifications on their phones. They came not from the government advising caution, but from an apparently hacked prayer-timing app called BadeSaba Calendar that has been downloaded more than 5 million times from the Google Play Store.

    The messages arrived in quick succession over a period of 30…
    https://www.schneier.com/blog/archives/2026/03/hacked-app-part-of-us-israeli-propaganda-campaign-against-iran.html

  • Where Multi-Factor Authentication Stops and Credential Abuse Starts
    The Hacker News • 2026-03-05 03:00 • thehackernews.com
    Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage. 
    Enforced through an identity provider (IdP) such as Microsoft Entra ID, Okta, or
    https://thehackernews.com/2026/03/where-multi-factor-authentication-stops.html
  • Cisco flags more SD-WAN flaws as actively exploited in attacks
    BleepingComputer • 2026-03-05 02:32 • www.bleepingcomputer.com
    ​Cisco has flagged two Catalyst SD-WAN Manager security flaws as actively exploited in the wild, urging administrators to upgrade vulnerable devices. […]
    https://www.bleepingcomputer.com/news/security/cisco-flags-more-sd-wan-flaws-as-actively-exploited-in-attacks/
  • APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
    The Hacker News • 2026-03-05 02:10 • thehackernews.com
    Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow.
    “The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals
    https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like