Breaking News – Cyber Threats (last 6h)
Generated: 2026-03-06 12:00 PST
- Cognizant TriZetto breach exposes health data of 3.4 million patients
BleepingComputer • 2026-03-06 11:50 • www.bleepingcomputer.com
TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 million people. […]
https://www.bleepingcomputer.com/news/security/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/ - How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down
Graham Cluley • 2026-03-06 09:58 • www.bitdefender.com
In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners, Tycoon 2FA – one of the world’s most prolific phishing-as-a-service platforms – has been dismantled.Read more in my article on the Hot for Security blog.
https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-bypassed-mfa-120-phishing-kit-global-takedown-shut-down - Anthropic and the Pentagon
Schneier on Security • 2026-03-06 09:07 • www.schneier.comOpenAI is in and Anthropic is out as a supplier of AI technology for the US defense department. This news caps a week of bluster by the highest officials in the US government towards some of the wealthiest titans of the big tech industry, and the overhanging specter of the existential risks posed by a new technology powerful enough that the Pentagon claims it is essential to national security. At issue …
https://www.schneier.com/blog/archives/2026/03/anthropic-and-the-pentagon.html - CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
BleepingComputer • 2026-03-06 07:57 • www.bleepingcomputer.com
CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. […]
https://www.bleepingcomputer.com/news/security/cisa-warns-of-apple-flaws-exploited-in-spyware-crypto-theft-attacks/ - Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
The Hacker News • 2026-03-06 07:11 • thehackernews.com
The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants.
The activity is designed to produce a “high-volume, mediocre mass of implants” that are developed using lesser-known programming languages like Nim, Zig, and Crystal and rely on trusted services like
https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html - EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
BleepingComputer • 2026-03-06 07:00 • www.bleepingcomputer.com
EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite, with four new role-based AI certifications debuting alongside Certified CISO v4, an overhauled executive cyber leadership program. […]
https://www.bleepingcomputer.com/news/security/ec-council-expands-ai-certification-portfolio-to-strengthen-us-ai-workforce-readiness-and-security/ - Fake Claude Code install guides push infostealers in InstallFix attacks
BleepingComputer • 2026-03-06 07:00 • www.bleepingcomputer.com
Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command line interface (CLI) tools. […]
https://www.bleepingcomputer.com/news/security/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/ - Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
The Hacker News • 2026-03-06 06:33 • thehackernews.com
Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT.
The stealthy attack chain has been codenamed VOID#GEIST by Securonix Threat Research.
At a high level, the obfuscated batch script is used to deploy a second
https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html - Microsoft 365 Backup to add file-level restore for faster recovery
BleepingComputer • 2026-03-06 06:21 • www.bleepingcomputer.com
Microsoft will soon begin rolling out a significant upgrade to Microsoft 365 Backup to speed up recovery by allowing administrators to restore individual files and folders. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-365-backup-to-add-file-level-restore-for-faster-recovery/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
