BREACH WATCH

Live threat intelligence from multiple sources. Updated every 6 hours.

Try 5 Vendors for Free →📡 RSS Feed
21
Last 24h
79
Last 7 Days
9
Critical (7d)
🔍
Showing 21 of 275 results
THREAT INTEL 🏛️
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware. Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different

Government & Public SectorOtherMalwareUnknown
High · Mar 05, 2026 · The Hacker News
THREAT INTEL 🏦
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company

This activity began in early February and has continued in recent days. What organizations should expect next from Iran-aligned groups and the steps they should take to guard against cyberattacks.

Financial Services & FinTechOtherUnknownUnknown
High · Mar 05, 2026 · Broadcom Symantec Blogs
THREAT INTEL 🦠
UAT-9244 targets South American telecommunication providers with three new malware implants

Cisco Talos is disclosing UAT-9244, who we assess with high confidence is a China-nexus advanced persistent threat (APT) actor closely associated with Famous Sparrow.

TelecommunicationsOtherMalwareUnknown
High · Mar 05, 2026 · Cisco Talos Intelligence
THREAT INTEL 🤖
62 people indicted by Taiwanese prosecutors over ties to cyber scam company Prince Group

The Taipei District Prosecutors Office initiated its investigation in October after Chen Zhi, the founder of the Prince Group, was indicted by U.S. prosecutors on money laundering charges.

Other / UnknownOtherUnknownUnknown
Low · Mar 05, 2026 · The Record
VULNERABILITY ☁️
Cisco flags more SD-WAN flaws as actively exploited in attacks

​Cisco has flagged two more Catalyst SD-WAN Manager security flaws as actively exploited in the wild, urging administrators to upgrade vulnerable devices. [...]

Technology & SaaSZero-Day ExploitVulnerability ExploitUnknown
High · Mar 05, 2026 · BleepingComputer
THREAT INTEL 🎣
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals

Government & Public SectorOtherPhishingUnknown
High · Mar 05, 2026 · The Hacker News
RANSOMWARE 💀
Phobos ransomware admin pleads guilty to wire fraud conspiracy

A Russian national pleaded guilty to a wire fraud conspiracy charge related to his role in administering the Phobos ransomware operation, which breached hundreds of victims worldwide. [...]

Other / UnknownRansomwareMalwareUnknown
High · Mar 05, 2026 · BleepingComputer
THREAT INTEL 🎣
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies. The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing

Other / UnknownOtherPhishingUnknown
High · Mar 05, 2026 · The Hacker News
THREAT INTEL 🔑
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access the forum's website ("leakbase[.]la") are now

Other / UnknownOtherUnknownUnknown
Medium · Mar 05, 2026 · The Hacker News
ADVISORY 📧
Engineering trust: A security blueprint for autonomous AI agents

AI agents have evolved from just chatbots, answering questions to executing actions using various integrated tools, often autonomously, and as such the traditional security models have become less efficient. I have seen that firsthand as a security lead for the Fitbit personal health coach. Consider an agent that can access or update health records on behalf of a user. A single malicious instruction hidden in a webpage (that the agent processes), can manipulate that agent … More → The post Engineering trust: A security blueprint for autonomous AI agents appeared first on Help Net Security .

Technology & SaaSOtherUnknownUnknown
Informational · Mar 05, 2026 · Help Net Security
ADVISORY 📰
Differentiating Between a Targeted Intrusion and an Automated Opportunistic Scanning [Guest Diary], (Wed, Mar 4th)

[This is a Guest Diary by Joseph Gruen, an ISC intern as part of the SANS.edu BACS program] 

🌐 sans.edu
Other / UnknownOtherUnknownUnknown
Low · Mar 05, 2026 · SANS Internet Storm Center
ADVISORY 🏦
AI Should Be the First Defense for Stablecoin Payment Fraud

Millisecond Detection and Layered Controls Will Shape Future Payment Security Stablecoins can remove chargebacks and make transactions irreversible in fraud cases. This trend is forcing banks to analyze risks before a payment executes. AI models must work within milliseconds while maintaining accuracy and minimizing friction for legitimate users.

Other / UnknownOtherUnknownUnknown
Informational · Mar 05, 2026 · DataBreachToday
VULNERABILITY 🐛
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

A maximum severity vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication. [...]

Technology & SaaSZero-Day ExploitVulnerability ExploitUnknown
Critical · Mar 04, 2026 · BleepingComputer
THREAT INTEL 🎣
Fake Zoom, Teams Meeting Invites Use Compromised Certificates to Drop Malware

A new phishing campaign is using stolen certificates from TrustConnect Software PTY LTD to sign malware. By impersonating updates for Zoom and Microsoft Teams, hackers install RMM tools to gain persistent, privileged access to networks

Technology & SaaSOtherPhishingUnknown
High · Mar 04, 2026 · HackRead
ADVISORY 👤
Windows 10 KB5075039 update fixes broken Recovery Environment

Microsoft has released the KB5075039 Windows Recovery Environment update for Windows 10 to fix a long-standing issue that prevented some users from accessing the Recovery environment. [...]

Other / UnknownOtherUnknownUnknown
Informational · Mar 04, 2026 · BleepingComputer
THREAT INTEL 🎣
Fake LastPass support email threads try to steal vault passwords

Password management software provider LastPass is warning users of a phishing campaign targeting its users with fake unauthorized account access alerts. [...]

Technology & SaaSCredential CompromisePhishingAuth Credentials
High · Mar 04, 2026 · BleepingComputer
VULNERABILITY ☁️
Cisco warns of max severity Secure FMC flaws giving root access

Cisco has released security updates to patch two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software. [...]

Technology & SaaSZero-Day ExploitVulnerability ExploitUnknown
Critical · Mar 04, 2026 · BleepingComputer
THREAT INTEL 🏦
Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks

A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. [...]

Technology & SaaSZero-Day ExploitVulnerability ExploitUnknown
High · Mar 04, 2026 · BleepingComputer
THREAT INTEL 📧
Hacker mass-mails HungerRush extortion emails to restaurant patrons

Customers of restaurants using the HungerRush point-of-sale (POS) platform say they received emails from a threat actor attempting to extort the company, warning that restaurant and customer data could be exposed if HungerRush fails to respond. [...]

Retail & E-CommerceOtherPhishingPersonally Identifiable Info
Medium · Mar 04, 2026 · BleepingComputer
ADVISORY 🔑
Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files

Researchers say a vulnerability in Perplexity’s Comet AI browser could expose local files and credentials through malicious calendar invites. The post Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files appeared first on TechRepublic .

Technology & SaaSVulnerability ExploitAuth Credentials
Medium · Mar 04, 2026 · TechRepublic Security
THREAT INTEL 🔑
FBI seizes LeakBase cybercrime forum, data of 142,000 members

The FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals buy and sell hacking tools and stolen data. [...]

Other / UnknownOtherUnknownUnknown
Informational · Mar 04, 2026 · BleepingComputer
Page 1 of 14

Know When Your Vendors Are Breached

LiveThreat monitors this intelligence against your vendor portfolio and alerts you automatically.

Try 5 Vendors for Free →📡 Subscribe via RSS

Daily Breach Intelligence Digest

Get critical and high-severity threats delivered to your inbox every morning. Unsubscribe anytime.

RSS Feed One email per day · No spam · Unsubscribe anytime

DON'T BE A LARRY. TRY LIVETHREAT FREE.

Assess your first vendors free — no credit card, no contract, no gym membership required.

Try 5 Vendors for Free →