# Top Stories

March 07, 2026

  1. 1
    0
    SecurityWeek general Mar 07
    FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information

    FBI investigators are examining suspicious cyber activity on a system containing sensitive surveillance information, with the bureau working to determine the scope and impact according to congressional notifications. This incident highlights vulnerabilities in critical intelligence infrastructure and could affect ongoing national security operations and surveillance capabilities.

  2. 2
    0
    BleepingComputer general Mar 06
    Cognizant TriZetto breach exposes health data of 3.4 million patients

    TriZetto Provider Solutions, a Cognizant-owned healthcare IT company, disclosed a data breach exposing sensitive information of over 3.4 million patients. The breach affects a company that develops software and services used by health insurers and healthcare providers, potentially compromising medical records, personal identifiers, and insurance information across the healthcare ecosystem.

  3. 3
    0
    BleepingComputer general Mar 06
    CISA warns feds to patch iOS flaws exploited in crypto-theft attacks

    CISA added three iOS security flaws to its Known Exploited Vulnerabilities catalog after they were targeted in cyberespionage and cryptocurrency theft attacks using the Coruna exploit kit. The vulnerabilities have been actively exploited against high-value targets, prompting federal agencies to patch their iOS devices by a mandated deadline.

  4. 4
    0
    Graham Cluley general Mar 06
    How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down

    International law enforcement dismantled Tycoon 2FA, a $120 phishing-as-a-service platform that enabled cybercriminals to bypass multi-factor authentication through adversary-in-the-middle attacks. The platform was linked to over 64,000 phishing attacks globally before the coordinated takedown involving Europol and cybersecurity companies.

  5. 5
    0
    CyberScoop general Mar 06
    Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI

    Microsoft researchers report North Korean threat groups are using generative AI as a "force multiplier" to scale up fake IT worker infiltration schemes at global companies. The AI tools assist with creating convincing personas, face-swapping for video calls, and generating daily work communications to maintain long-term employment at target organizations.

  6. 6
    0
    The Hacker News general Mar 06
    Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

    Pakistan-linked APT group Transparent Tribe is using AI-powered coding tools to mass-produce malware implants written in lesser-known languages like Nim, Zig, and Crystal. The campaign targets Indian entities with a "high-volume, mediocre mass" of AI-generated implants that rely on trusted services to evade detection.

  7. 7
    0
    The Hacker News general Mar 06
    China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

    China-linked APT group UAT-9244 deployed three new malware families (TernDoor, PeerTime, and BruteEntry) against South American telecommunications infrastructure since 2024. The campaign targeted Windows, Linux systems, and edge devices, with Cisco Talos linking the activity to the known FamousSparrow threat group.

  8. 8
    0
    BleepingComputer general Mar 05
    FBI arrests suspect linked to $46M crypto theft from US Marshals

    FBI arrested the son of a U.S. government contractor on Saint Martin island, accused of stealing over $46 million in cryptocurrency from the U.S. Marshals Service. The arrest represents one of the largest cryptocurrency thefts from a federal agency and highlights vulnerabilities in government digital asset management.

  9. 9
    0
    threat-intel Mar 05
    Phobos ransomware leader facing 20 years in prison after pleading guilty to hacking charges

    Russian national Evgenii Ptitsyn pleaded guilty to conspiracy charges related to operating the Phobos ransomware, which attacked over 1,000 organizations worldwide and netted more than $39 million in extortion payments since November 2020. Ptitsyn was extradited from South Korea and faces up to 20 years in prison.

  10. 10
    0
    The Hacker News general Mar 05
    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    Cisco confirmed active exploitation of two vulnerabilities in Catalyst SD-WAN Manager: CVE-2026-20122 (CVSS 7.1) allowing arbitrary file overwrite and another unspecified flaw. The company urged immediate patching as attackers are actively exploiting these flaws to compromise SD-WAN infrastructure in enterprise networks.