LATEST ARTICLES

Microsoft 365 confirms new premium tier with a premium price • The Register

0

Microsoft has finally confirmed that its AI-centric E7 subscription tier – where it licenses AI agent agents like employees – will debut on May 1 for an eye-watering $99 per user per month (pupm).

The E7 tier of Microsoft 365 is not unexpected – last week reports indicated an enterprise license bundling Copilot and agent management tools into one expensive package was on its way. Microsoft kept quiet until now.

copilot

DWP finds Copilot saves civil servants a whopping 19 minutes a day

READ MORE

Dubbed “the First Frontier Suite” by Microsoft, a company that never saw some hyperbole it didn’t like, E7 brings together the existing Microsoft 365 E5 subscription, with Microsoft 365 Copilot and Agent 365. Agent 365, a control plane for AI agents, is also due to hit general availability on May 1, and costs $15 per user per month. Add that, Copilot, and Microsoft 365 E5 together (along with the Entra suite, advanced Defender, and Purview), and E7 is “priced below purchasing these capabilities à la carte.”

However, Gartner crunched the numbers and found the E7 discount, compared to buying the elements “à la carte,” was not particularly impressive, coming in at 13.2 percent. The analyst said: “Bigger bundles should get bigger discounts,” and noted that larger discounts were on offer when comparing Microsoft 365 E3 and E5 to their component parts.

The consultancy was no more enthusiastic about Agent 365 itself, calling it “a work in progress with limited net new functionality to justify its $15 pupm price point.”

“Gartner believes organizations will find the value of ME7 to be questionable for the majority of knowledge workers today… Upgrading to the ME7 bundle for Agent 365 is not advised until Microsoft adds value.”

Enterprises must tread carefully and check their contracts, it added. “If ME7 and Agent 365 uptake do not meet its expectations, Microsoft could revise the offerings. Avoid nonreduction clauses that would prevent taking advantage of changes.”

It is not the rapturous response Microsoft might have hoped for. Judson Althoff, CEO of Microsoft’s Commercial Business, wrote: “Customers have told us E5 alone is no longer enough; they do not want multiple tools stitched together, they want one trusted solution.”

We asked Microsoft if it could provide evidence for Althoff’s assertion, but it has yet to respond. ®



Source link

How US-Israel war on Iran deepens Gaza crisis | US-Israel war on Iran

0

Gaza City, Gaza Strip – As soon as the first US-Israeli attacks hit Iran on February 28, concerns began to surge in the Gaza Strip over how the latest conflict might affect a population already suffering from a genocidal war that has lasted for more than two years.

With tensions expanding across the region, the situation in Gaza has been growing increasingly complex. Israel has tightened its grip on the territory’s crossings, further restricting the entry of vital humanitarian aid. Meanwhile, violations of a “ceasefire” agreement reached with the Palestinian group Hamas in October continue unabated.

But as global focus turns to the unfolding regional war, many fear that Gaza will be relegated to a secondary issue – even as more than two million Palestinians in the besieged territory remain trapped in an extremely fragile humanitarian and political situation.

“The war with Iran has given Israel broader space to intensify its crimes in Gaza, while the humanitarian situation has deteriorated rapidly due to severe restrictions on the crossings,” Ramy Abdu, head of the Euro-Med Human Rights Monitor, told Al Jazeera.

Israel closed the crossings into the Strip on the first day of the war with Iran, disrupting the entry of trucks carrying humanitarian aid and essential supplies.

The move also halted the travel of patients and wounded people, prompting widespread concern as thousands of patients had been waiting to travel abroad for treatment after Israel’s war decimated Gaza’s healthcare system.

After several days of closure, Israel partially reopened the Kerem Abu Salem (Kerem Shalom) crossing, allowing a limited number of trucks carrying aid and basic commodities to enter. The limited reopening, however, has had little impact, as the volume of aid entering Gaza remains far below the 600 trucks per day needed to cover the population’s needs.

Significant restrictions also remain in place on the entry of fuel and heavy machinery needed to remove rubble and restore vital infrastructure, making recovery efforts in the bombarded territory slow and complex.

Economic affairs specialist Mohammad Abu Jiyab said the US-Israel war on Iran has had a direct impact on Gaza’s economic and humanitarian conditions. He cited the decline of crossing operations and the reduction in imports of aid and commercial goods as a result of Israeli security decisions linked to the regional conflict.

“This has led to a sharp rise in prices and shortages of goods in the markets, along with a decline in the ability of international organisations to distribute humanitarian aid adequately to the population,” he added.

Abu Jiyab warned that the continuation of this situation would deepen the living and economic crises in the territory as supplies decline and residents struggle to secure their daily needs.

A spokesperson for the United Nations Children’s Fund said the prices of some basic commodities, including food and cleaning products, have risen dramatically, in some cases by 200 to 300 percent.

‘Ceasefire’ violations

Meanwhile, Israeli air attacks and artillery shelling on various parts of Gaza continue in violation of the October “ceasefire”.

Medical sources said six Palestinians, including two children, were killed and some 10 were wounded in Israeli attacks on Gaza City and the Nuseirat refugee camp late on Sunday and early on Monday.

According to the Ministry of Health in Gaza, Israeli attacks since the start of the “ceasefire” have killed at least 648 people and wounded nearly 18,000.

Analysts say the shift in international attention has given Israel greater space to carry out limited military operations in Gaza without triggering major reactions.

Euro-Med Monitor’s Abdu warned that Israel continues to carry out what he described as “systematic acts of genocide” in Gaza, exploiting every opportunity to deepen conditions that make life increasingly impossible for an exhausted population faced with extremely harsh living conditions.

He also cautioned about growing fears of renewed famine and malnutrition, particularly among children. Abdu pointed to the rapid deterioration of health services amid shortages of medicines and medical equipment.

“Hospitals are shutting down or operating at minimal capacity due to shortages of fuel and medical supplies. Patients are increasingly unable to travel for treatment, and many are deprived of essential medicines,” he said.

Delaying the next phase of the ‘ceasefire’

Separately, Abdu highlighted Gaza’s political vacuum, noting that Israel continues to obstruct the work of a committee tasked with administering the territory and prevents its members from entering it.

The Palestinian National Committee for the Administration of Gaza was formed in January as a transitional civilian body comprising 15 technocrats as part of arrangements linked to the next phase of the “ceasefire” agreement.

Its mandate includes managing civil affairs and essential services in Gaza, coordinating the entry of humanitarian aid, restarting government institutions and overseeing recovery and reconstruction efforts.

The Rafah land crossing is a central issue linked to the committee’s work, but it has remained closed for the 10th consecutive day, further complicating the committee’s ability to carry out its tasks.

“It is clear that Israel is exploiting the world’s focus on the war with Iran to expand its repressive policies in Gaza at a time when international pressure and accountability are declining,” Abdu added, stressing that many of these measures are taking place even without active combat, as civilians are killed, homes destroyed and crossings restricted in ways that appear aimed at collective punishment and starvation.

The “ceasefire” agreement outlines a three-phase plan intended to gradually halt military operations, release prisoners and create conditions for the withdrawal of Israeli forces from Gaza and the start of the territory’s reconstruction.

In the first phase, the agreement envisioned a halt to military operations, a partial Israeli withdrawal from populated areas, and the entry of hundreds of aid and fuel trucks daily alongside prisoner exchanges.

However, implementation remained partial and limited from October through early 2026, as Israeli forces continued to maintain control over large parts of the territory and key crossings.

The second phase, scheduled to begin in January 2026, was supposed to include a broader Israeli withdrawal from Gaza, the launch of reconstruction and the establishment of a transitional civilian administration.

Yet the phase quickly stalled due to political and security disagreements, as Israel introduced additional conditions related to the future governance of Gaza and the disarmament of armed factions.

Abu Jiyab, the economist, believes Israel is using the regional war to maintain instability in Gaza and keep the situation unchanged without any political progress.

“The clearest indication of this is the political neglect by the United States, the so-called Peace Council, and the mediating states regarding the rapid transfer of governance and enabling the administrative committee to manage the Gaza Strip,” he added.

This deadlock has directly affected the reconstruction process, which remains largely frozen since the entry of building materials, fuel and heavy equipment depends on Israeli approvals and complex crossing procedures.

As regional tensions intensified following the outbreak of the US-Israel war on Iran, observers say international momentum to push forward the second phase of the agreement has significantly weakened.

Political analyst Ahed Farwana believes Israeli Prime Minister Benjamin Netanyahu is exploiting the shift of global attention to “prolong the first phase of the agreement without moving to the second phase”.

He said, “The Israeli army continues to carry out strikes and assassinations, while restricting certain goods and allowing others under a policy of rationing, including fuel and cooking gas.”

With Israeli forces controlling about 60 percent of the Gaza Strip, Farwana believes Israel aims to keep the territory in a permanent state of instability.

“Israel does not want stability in Gaza. Instead, it seeks to keep the front under its control through military restrictions, economic pressure and various forms of punishment.”



Source link

Iran’s authorities showcase continuity as they back new leader during war | News

0

Tehran, Iran – Commanders, politicians and religious authorities in Iran are rallying around the flag and hinting at a prolonged war after Mojtaba Khamenei was selected as supreme leader as the country is under fire from the United States and Israel.

The 88-member Assembly of Experts, made up of religious leaders, approved the second son of Ayatollah Ali Khamenei as his successor after he was killed on February 28, the first day of the war. The younger Khamenei was tasked with steering the “holy establishment of the Islamic Republic”, state television said overnight into Monday.

Recommended Stories

list of 3 itemsend of list

The 56-year-old Mojtaba Khamenei has hardly made any public appearances or remarks but is believed to have acted as a powerbroker with deep connections to the Islamic Revolutionary Guard Corps (IRGC). His ascension signals continuity for the theocratic establishment that came to power after the 1979 Islamic revolution.

The IRGC, which was originally created to operate in parallel to the country’s regular army to safeguard the establishment but has since turned into a major military and economic force, was among the first to pledge allegiance to the new leader.

It said its forces are prepared to “fully obey and sacrifice for the divine commands” of Khamenei to “maintain the values of the Islamic revolution and safeguard the legacies” of the first two supreme leaders, Ali Khamenei and Ruhollah Khomeini.

The aerospace, ground, naval and other major forces of the IRGC issued separate statements of support.

The Iranian army, the high command of police and the Defence Council also said they were prepared to take orders from Mojtaba Khamenei, and Intelligence Minister Esmaeil Khatib said his selection shows that “Islamic Iran knows no dead ends and always has a bright outlook of victory.”

The powerful 12-member constitutional watchdog known as the Guardian Council called the selection of Mojtaba Khamenei a “balm for the pain” of losing his father while influential seminaries across the country and the heads of government, the judiciary and parliament issued similar statements.

Ali Larijani, the secretary of the Supreme National Security Council, appeared relatively less enthusiastic but emphasised that the process was done legally so he backs it.

“During the recent period, many negative narratives and campaigns were carried out, but the transparent and lawful process undertaken by the Assembly of Experts provided a clear response to those narratives,” he told state media in an apparent reference to media reports that he and some others were opposed to the choice.

Larijani stressed that the office of the supreme leader must be assisted by all as a “symbol of national unity” and expressed hope that during Mojtaba Khamenei’s time, “Iran is aligned with the path of development, economic conditions are improved, and more calm and welfare is provided for the people”.

All who praised the new leader referred to him as “ayatollah”, indicating that his religious standing has been upgraded from the lower rank of hojatoleslam as part of his ascension to the highest political and religious office in the country.

Hardline state-affiliated media and supporters went as far as calling him “imam”, a title used to describe significant religious figures and regularly used by state media to describe his father and Khomeini, the first supreme leader.

State television broadcast images of the news of Khamenei’s selection being announced at important mosques in Tehran, Mashhad, Isfahan and other cities across the country.

Mass text messages sent by the state to Iranians invited people to gather at Enghelab (Revolution) Square in downtown Tehran and spots in other cities on Monday afternoon to “renew the covenant with the martyred imam of the Muslim nation and pledge allegiance to the supreme leader selected by the Assembly of Experts”.

Israeli and US warplanes bombed Tehran and Isfahan in the afternoon, two days after sweeping attacks on the capital’s oil reserves and refineries left thick black smoke hanging over the city.

Rocky road ahead

The younger Khamenei faces myriad challenges, most prominently the threat of assassination in the foreseeable future as the US and Israel have promised to keep taking out Iranian leaders.

Some local and Israeli media have claimed he may have been wounded in a strike, but details were unclear. There was no clarity from officials on whether Khamenei is expected to make an appearance anytime soon.

US President Donald Trump has repeatedly said he is unhappy with the selection and will aim to kill the new leader because he wants the US to play a role in deciding Iran’s future leadership.

The younger Khamenei’s ascension suggests more hardline factions in Iran’s establishment retain power and could indicate that the government has little desire to agree to new negotiations with the US in the short term.

The commanders of the IRGC and the army have continued shooting projectiles since his selection with one IRGC commander telling state television that the country is capable of keeping up considerable attacks for at least six months.

US officials have also expressed eagerness to continue the war in pursuit of their objectives, including dismantling Iran’s nuclear and missile programmes and cutting off support to regional allies in the “axis of resistance”.

Its members – including Hezbollah in Lebanon, the Houthis in Yemen and armed groups in Iraq – released statements backing Khamenei’s selection.

Khamenei is also leading Iran at a time when the US is trying to curb its oil exports, a key revenue stream, while tightening sanctions that have heavily damaged the Iranian economy.

The Strait of Hormuz is expected to remain a flashpoint area as shipping is disrupted. Iran is also experiencing one of its highest inflation rates in decades at about 70 percent with annual food inflation rates shooting above 100 percent, according to the Statistical Centre of Iran.

The national currency is among the least valuable and most isolated in the world. The government continues to promise that Iran’s population of about 92 million people does not need to worry about shortages of essential goods like food and fuel because contingency plans are in motion.



Source link

FBI warns of phishing attacks impersonating US city, county officials

0

FBI

The Federal Bureau of Investigation (FBI) warns that criminals are impersonating U.S. officials in phishing attacks targeting businesses and individuals who request city and county planning and zoning permits.

In a public service announcement published on Monday, the bureau said that the criminals behind this campaign are identifying potential victims using publicly available information, which also makes their malicious messages seem legitimate and helps them trick suspicious targets.

“Individuals and businesses with active applications for land-use permits are being targeted by criminals impersonating city and county planning and zoning board officials, fraudulently requesting fees associated with these permits,” the FBI warned.

“Victims receive unsolicited emails citing their permit information, zoning application numbers, and/or property addresses. Victims are instructed to pay invoices for fees related to their permits and directed to make payments via wire transfer, peer-to-peer payment, or cryptocurrency.”

The FBI says there are several common indicators that can help detect such schemes, including messages sent from non-governmental domains (such as @usa.com), attachments that ask recipients to request more details via email, and various tactics to push for quicker payments to avoid permit delays.

Scammers may also time their phishing messages to match the timing of official communications with details about zoning permits.

The law enforcement agency advised businesses and individuals to carefully check whether messages they receive from U.S. officials are legitimate by verifying the domain and email address and calling the city or county government to confirm outstanding fees.

Those who were targeted or fell victim to this scam should file a complaint with the FBI’s Internet Crime Complaint Center (IC3) and share the email address, date of email, and/or phone number used by the scammers, the date of the project’s scheduled hearing, the amount listed in the fraudulent invoice, as well as any other financial information provided by the criminals.

Four years ago, the FBI also warned of widespread attacks in which scammers impersonated government or law enforcement officials by spoofing authentic phone numbers to extort money from potential victims or steal their personally identifiable information.

In April 2025, the bureau said that criminals were also impersonating FBI IC3 employees, while offering to “help” fraud victims recover money lost to other scammers.

One month later, the FBI also warned of cybercriminals using AI-generated audio deepfakes to target U.S. officials in voice phishing attacks.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



Source link

Turkiye says Iranian ballistic missile intercepted by NATO air defences | US-Israel war on Iran News

0

Ministry of National Defence says no casualties or damage after missile shot down over southern city of Gaziantep.

The Turkish Ministry of National Defence says NATO air defences have intercepted a ballistic missile launched from Iran towards Turkiye as concerns grow that the United States-Israel war against Iran will escalate.

The missile was intercepted on Monday over the Sahinbey district of Gaziantep in southern Turkiye, the ministry said in a statement. No casualties or damage were reported.

Recommended Stories

list of 3 itemsend of list

“Ankara emphasized its capability and determination to protect national airspace and border security, while warning that further escalation in the region must be avoided,” the statement said.

The ministry also urged all sides, especially Tehran, “to refrain from actions that could endanger civilians or undermine regional stability”.

Monday’s incident was the second time an Iranian ballistic missile was fired towards Turkiye since the US and Israel launched a war against Iran on February 28, according to local authorities.

The US-Israeli attacks have prompted a wave of Iranian missile and drone strikes across the wider region, including on targets in Arab Gulf countries.

Iran did not immediately comment on the Turkish ministry’s statement.

NATO spokesperson Allison Hart confirmed that the military alliance had intercepted “a missile heading to Turkiye”. “NATO stands firm in its readiness to defend all Allies against any threat,” Hart said in a post on X.

Iran denied firing a ballistic missile towards Turkiye on Wednesday after Turkish authorities said NATO air defences shot down a projectile over the Eastern Mediterranean.

NATO condemned that launch, expressing its “full solidarity” with Turkiye.

“This is a tangible demonstration of the Alliance’s ability to defend our populations against all threats, including those posed by ballistic missiles,” NATO said of the interception.

Article 5 of the alliance’s North Atlantic Treaty says an attack on one NATO country will be considered an attack on all. It also commits each NATO member state to taking action deemed necessary “to restore and maintain” security.

In an interview with the Reuters news agency last week after the first ballistic missile heading towards Turkiye was shot down, NATO chief Mark Rutte said there was no talk of invoking Article 5.

Iranian authorities have said they are firing at US military bases and other US- and Israel-linked targets across the region in self-defence, but civilian infrastructure has also been attacked.

“Iran’s targets are not just US bases; they are, in fact, primarily large-scale infrastructure and civilian targets as well,” said Rob Geist Pinfold, a lecturer in defence studies at King’s College London.

“This is not a mistake. This is by design,” Pinfold told Al Jazeera, explaining that Tehran is seeking to “unleash as much chaos as possible to destabilise the region and global markets” in an effort to force Washington to abandon the war.

“We’ve seen that Iran is targeting every single [Gulf Cooperation Council] state. It’s prepared to burn its bridges with all of them to pursue this very uncertain and high-risk strategy,” he said.

“It really shows you how Iran feels like it’s facing an existential threat. For them, this is a real do-or-die moment.”



Source link

MICHAEL OREN: Iran’s regime chose conflict — America is choosing security

0


NEWYou can now listen to Fox News articles!

The reason a state goes to war — its casus belli — is an essential component of its campaign. Wars with a strong casus belli, such as the Civil War and World War II, are usually more popular and consistently more victorious than those with weak justifications — Vietnam, for example, and Iraq. The Trump administration’s reasons for mounting Operation Epic Fury are being attacked by both the isolationist right and the progressive left in the United States. The war in Iran, they claim, is unnecessary, unwarranted and even illegal. It serves Israel’s interests more than America’s, some say. Refuting those arguments, then, will be crucial to the operation’s success.

Criticism of the war falls into three categories. The first assails the war’s objectives. While admitting that the Iranian regime is heinous and ideally should be overthrown, detractors insist that the Islamic Republic never truly threatened America. By Trump’s own admission, they recall, Iran’s major nuclear facilities were obliterated last summer, while its ballistic missiles cannot yet reach Europe, much less the United States. By comparison, North Korea poses a much greater danger to the United States, yet no one is advocating bombing Pyongyang. And though administration officials have occasionally cited regime change as Epic Fury’s preferred outcome, no regime has ever been brought down by air power alone.

Strategically, the war will deplete American arsenals, critics warn, and embolden Russia to redouble its aggression against Ukraine and enable China to attack Taiwan. The White House has never clearly identified the war’s objectives, opponents claim, or formulated a day-after plan. As such, the war could result in the emergence of an even more radical leadership in Iran. The Middle East, meanwhile, will be destabilized.

Finally, on a legal level, by not seeking Congressional approval for the war, the White House is acting unconstitutionally–so the critics charge. Some go further by maintaining that the attack on Iran is criminal. “A preventive strike, in which the powerful hit the weaker state,” wrote The New York Times’s David Sanger, “is considered illegal.”

While seemingly compelling, none of these arguments can withstand serious scrutiny. No, Iran does not present an imminent threat to America’s security, no more than Nazi Germany did to Britain’s in the 1930s. But, as Churchill foresaw, if left unchecked, Germany’s rapid military buildup would soon endanger Britain, as, in fact, it did. In this sense, North Korea represents the perfect cautionary example. Would the war critics prefer the United States wait until Iran had the bomb as well as the long-range missiles capable of reaching American targets? For that reason, precisely, nobody is recommending attacking Pyongyang. And while North Korea’s organizing principle is regime survival and food to feed its starving population, Iran’s is regional and ultimately global domination. The North Korean threat to America pales beside that of a nuclear-armed and ballistically-enabled Iran.

True, no regime has ever been brought down by air power, but a sustained bombing campaign by jets and sea-to-ground missiles can severely degrade the Iranian government and facilitate a successful popular uprising. Such an approach worked outstandingly well in Serbia, where, in 1999, American and allied aerial bombardments forced the withdrawal of Slobodan Milošević’s forces from Kosovo and directly contributed to his government’s collapse the following year.

CLICK HERE FOR MORE FOX NEWS OPINION

Rather than emptying America’s arsenals, the war is already speeding up America’s production of a wide range of ordnance, especially anti-missile interceptors. And instead of being encouraged by the U.S. military’s expenditure of munitions, Russia and China will likely be deterred by the display of American proficiency and resolve. After depriving China of its rich source of energy from Venezuela, Trump could also deny China its vital flow of Iranian oil.

REP BRIAN MAST: DEMOCRATS DON’T WANT WAR POWERS, THEY WANT TO WAVE A WHITE FLAG

War, according to the military philosopher Carl Von Clausewitz, is always defined by uncertainty. The administration could surely have done a better job of clarifying its goals before launching its attack, but determining its exact outcome at this stage in the campaign is meaningless. Suffice it to say, as the White House already has, that the military action can help create the conditions under which the Iranian people can reclaim their liberty. Short of that, Operation Epic Fury aims to eliminate the gravest Iranian threats, present and future. And as for the destabilization of the Middle East — the most ludicrous of the critics’ claims — Iran has been the primary source of violence in the region for almost half a century. Neutralizing that source will open game-changing opportunities for achieving security and peace from the Mediterranean to the Persian Gulf and beyond.

The debate over the right of any president to make war is hardly new and will not be settled in this conflict. Congress will, in any case, now vote against restricting that right. And irrespective of its constitutionality, the war in Iran is in no way illegal. According to international law expert Natasha Hausdorff, the relative strength and weakness of the warring parties are completely irrelevant. “Under real international law,” she writes, “the Israeli-US strikes are lawful if they continue to comply with the laws of armed conflict on necessity, distinction, proportionality and precaution. The indicators are that now, as previously, these principles are being applied.”

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

The arguments against the war are feeble at best and further weakened by their refusal to acknowledge the far stronger case for supporting it. This begins with the irrefutable fact that the Islamic Republic started this war 47 years ago by occupying the U.S. embassy in Tehran and holding 52 Americans hostage for hundreds of days. Iran started the war by torturing and executing Americans in Lebanon in the 1980s, by blowing up the Marine barracks and the U.S. embassy in Beirut, and killing American soldiers during the Iraq war. The Ayatollahs started the war when their terrorist proxies launched hundreds of drone and rocket attacks against U.S. bases and ships throughout the region. Throughout, Iranian drug merchants, in league with South American cartels, have flooded the United States with deadly narcotics. Iranian assassins have targeted the Saudi and Israeli ambassadors in Washington, senior American officials, and, purportedly, the president.

The Iranian regime started this war by vowing openly and ardently each day since coming to power to destroy the United States and by assiduously developing the weapons to do so. Though Israel most certainly has an interest in defending itself from Iranian attacks, that interest is consonant with, not superior to, America’s, which is independent and critical. In what logical universe, a clearly-thinking person might well ask, does the United States not have a clear-cut casus belli against Iran?



Source link

Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

0

Ravie LakshmananMar 09, 2026Cybersecurity / Hacking

Another week in cybersecurity. Another week of “you’ve got to be kidding me.”

Attackers were busy. Defenders were busy. And somewhere in the middle, a whole lot of people had a very bad Monday morning. That’s kind of just how it goes now.

The good news? There were some actual wins this week. Real ones. The kind where the good guys showed up, did the work, and made a dent. It doesn’t always happen, so when it does, it’s worth noting.

The bad news? For every win, there’s a fresh headache waiting right behind it. New tricks, old tricks dressed up in new clothes, and a few things that’ll make you want to go touch grass and never log back in. But you will. We all do. So here’s everything that mattered this week — the wins, the warnings, and the stuff you really shouldn’t ignore.

⚡ Threat of the Week

Tycoon 2FA and LeakBase Operations Dismantled — The infrastructure hosting the Tycoon2FA service, which Europol said was among the largest adversary-in-the-middle (AitM) phishing operations worldwide, has been dismantled by a coalition of security companies and law enforcement agencies. “Taking down infrastructure associated with Tycoon 2FA and identifying the individual allegedly responsible for creating this prolific hacking tool will have a significant impact on overall MFA credential phishing, and hopefully strike a blow to the world’s most prolific AitM phishing-as-a-service,” Proofpoint said in a statement shared with The Hacker News. Phishing kits and PhaaS platforms have become an Achilles’ heel in recent years, streamlining and democratizing phishing attacks for less technically savvy hackers by providing them with a suite of tools to create convincing emails and phishing pages that unsuspecting victims will engage with. For a relatively modest fee, aspiring cybercriminals can subscribe to these services and carry out phishing attacks at scale. In a similar development, authorities also took down LeakBase, one of the world’s largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. While the disruption is a positive development, it’s known that such takedowns typically create only short-term disruptions, as the ecosystem adapts by migrating to other forums or more resilient distribution channels, like Telegram. 

🔔 Top News

  • Anthropic Finds 22 Firefox Vulnerabilities in Firefox — Anthropic said it discovered 22 new security vulnerabilities in the Firefox web browser using its Claude Opus 4.6 large language model (LLM)as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity. The issues were addressed in Firefox 148, released late last month. The vulnerabilities were identified over a two-week period in January 2026. The company noted that the cost of identifying vulnerabilities is cheaper than creating an exploit for them, and the model is better at finding issues than at exploiting them.
  • Qualcomm Flaw Exploited in the Wild — A high-severity security flaw impacting Qualcomm chips used in Android devices has been exploited in the wild. The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component that could result in memory corruption and arbitrary code execution. There are currently no details on how the vulnerability is being exploited in the wild. However, Google acknowledged in its monthly Android security bulletin that “there are indications that CVE-2026-21385 may be under limited, targeted exploitation.”
  • Coruna iOS Exploit Kit Uses 23 Exploits Against Older iOS Devices — Google disclosed details of a new and powerful exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chains and a total of 23 exploits, the company said. What makes it different is that it started with a commercial surveillance vendor in February 2025, got picked up by what seems like a Russian espionage group targeting Ukrainians in July 2025, and ended up in the hands of financially motivated attackers in China going after crypto wallets by the end of the year. Coruna began its life as a surveillance exploit kit, but by the time it reached the Chinese cybercrime gang, it was heavily focused on financial theft. It’s not known how the exploit kit got passed between multiple threat actors of varied motivations. This has raised the possibility of a secondhand market where it’s resold to other threat actors, who end up repurposing them for their own objectives.
  • Transparent Tribe Unleases Vibeware Against Indian Entities — In a new attack campaign detected by Bitdefender, the Pakistan-aligned threat actor known as Transparent Tribe has leveraged artificial intelligence (AI)-powered coding tools to vibe-code malware and use them to target the Indian government and its embassies in multiple foreign countries. These tools are written in niche programming languages like Nim, Zig, and Crystal so as to evade detection. “Rather than a breakthrough in technical sophistication, we are seeing a transition toward AI-assisted malware industrialization that allows the actor to flood target environments with disposable, polyglot binaries,” the company said.
  • Iranian Hackers Target U.S. Entities Amid Conflict — The Iranian hacking group tracked as MuddyWater (aka Seedworm) targeted several U.S. companies, including banks, airports, non-profit, and the Israeli arm of a software company, as part of a campaign that began in early February 2026, and continued after the joint U.S.-Israel military strikes on Iran towards the end of the month. The development comes against the backdrop of hacktivist-fueled cyber attacks, with wiper campaigns targeting Israeli energy, financial, government, and utilities sectors. “The trajectory is clear: what began as nation-state-level ICS capability in 2012 [with Shamoon wiper] has become, by 2026, something any motivated actor can attempt with free tools and an internet connection,” CloudSEK said in a report last week. “The technical barrier has collapsed. The threat pool has expanded. And the US attack surface has never been larger.” Another targeted campaign has distributed a trojanized version of the Red Alert rocket warning Android app to Israeli users via SMS messages impersonating official Home Front Command communications. Once installed, the malware monitors and abuses the granted permissions to collect sensitive data, including SMS messages, contacts, location data, device accounts, and installed applications. The campaign is believed to be the work of a Hamas-affiliated actor known as Arid Viper. There are currently no details available on the scope of the campaign and whether any of the infections were successful. Acronis said it highlights how trusted emergency services can be weaponized during periods of geopolitical tension using social engineering.

‎️‍🔥 Trending CVEs

New vulnerabilities show up every week, and the window between disclosure and exploitation keeps getting shorter. The flaws below are this week’s most critical — high-severity, widely used software, or already drawing attention from the security community.

Check these first, patch what applies, and don’t wait on the ones marked urgent — CVE-2026-2796 (Mozilla Firefox), CVE-2026-21385 (Qualcomm), CVE-2026-2256 (MS-Agent), CVE-2026-26198 (Ormar), CVE-2026-27966 (langflow), CVE-2025–64712 (Unstructured.io), CVE-2026-24009 (Docling), CVE-2026-23600 (HPE AutoPass License Server), CVE-2026-27636, CVE-2026-28289 (aka Mail2Shell) (FreeScout), CVE-2025-67736 (FreePBX), CVE-2025-34288 (Nagios XI), CVE-2025-14500 (IceWarp), CVE-2026-20079 (Cisco Secure Firewall Management Center), CVE-2025-13476 (Viber app for Android), CVE-2026-3336, CVE-2026-3337, CVE-2026-3338 (Amazon AWS-LC), CVE-2026-25611 (MongoDB), CVE-2026-3536, CVE-2026-3537, CVE-2026-3538 (Google Chrome), CVE-2026-27970 (Angular), CVE-2026-29058 (AVideo) a privilege escalation flaw in IPVanish VPN for macOS (no CVE), and and a remote code execution vulnerability in Ghost CMS (no CVE).

🎥 Cybersecurity Webinars

  • Automating Real-World Security Testing to Prove What Actually Works → Running a security test once a year and hoping for the best? That’s not a strategy anymore. This webinar shows you how to continuously test your defenses using real attack techniques — so you actually know what holds up and what quietly breaks when no one’s looking.
  • When AI Agents Become Your New Attack Surface → AI tools aren’t just answering questions anymore — they’re browsing the web, hitting APIs, and touching your internal systems. That changes everything about how you think about risk. This webinar breaks down what that means for security, and what you actually need to do before something goes wrong.

📰 Around the Cyber World

  • New AirSnitch Attack Shows Wi-Fi Client Isolation May Not Be Enough — A group of academics has developed a new attack called AirSnitch that breaks the encryption that separates Wi-Fi clients. Xin’an Zhou, the lead author of the research paper, told Ars Technica that AirSnitch bypasses worldwide Wi-Fi encryption and that it “might have the potential to enable advanced cyber attacks.” The attack, at its core, leverages three weaknesses in client isolation implementations: (1) It abuses the group key(s) that are shared between all clients in the same Wi-Fi network, (2) It bypasses client isolation by tricking the gateway into forwarding packets to the victim at the IP layer by taking advantage of the fact that many networks only enforce client isolation at the MAC/Ethernet layer, and (3) It allows an adversary to manipulate internal switches and bridges to forward the victim’s uplink and downlink traffic to the adversary. As a result, they enable the attacker to restore AitM capabilities even if client isolation protections exist. “We found that Wi-Fi client isolation can often be bypassed,” Mathy Vanhoef said. “This allows an attacker who can connect to a network, either as a malicious insider or by connecting to a co-located open network, to attack others.”
  • Google Tracked 90 Exploited 0-Days in 2025 — Google said it tracked 90 zero-day vulnerabilities exploited in-the-wild in 2025, up from 78 in 2024 and down from 100 in 2023. “Both the raw number (43) and proportion (48%) of vulnerabilities impacting enterprise technologies reached all-time highs, accounting for almost 50% of total zero-days exploited in 2025,” the company said. Of these, vulnerabilities in security and networking appliances made up about half (21) of the enterprise-related zero-days in 2025. Mobile zero-days rebounded from nine in 2024 to 15 in 2025, with commercial surveillance vendors (15, plus likely another three) leading the charge in exploiting zero-day vulnerabilities than state-sponsored cyber espionage groups (12) for the first time. The names of the commercial spyware companies were not disclosed. Microsoft had the largest number of actively exploited flaws at 25, followed by Google (11), Apple (8), Cisco (4), Fortinet (4), Ivanti (3), and Broadcom VMware (3). Memory safety issues accounted for 35% of all exploited zero-day vulnerabilities last year. Financially motivated threat groups, including ransomware gangs, also targeted enterprise technologies and accounted for nine zero-days in 2025, double the five attributed to them in 2024.
  • Velvet Tempest Deploys ClickFix Attack Velvet Tempest (aka DEV-0504) has been observed using a ClickFix lure, followed by hands-on-keyboard activity consistent with Termite ransomware tradecraft. According to a report by Deception.Pro, the attack used the social engineering technique to drop payloads like DonutLoader and CastleRAT. “Follow-on activity included Active Directory reconnaissance (domain trusts, server discovery, user listing) and attempted browser credential harvesting via a PowerShell script downloaded from 143.198.160[.]37,” it said. “Telemetry and infrastructure in this chain align with a modern initial-access playbook: rapid staging, heavy use of living-off-the-land binaries (LOLBins), and long-lived command-and-control (C2) traffic that blends into normal browser noise.” No ransomware was deployed in the attack that took place between February 3 and 16, 2026.
  • Ghanaian National Pleads Guilty to Role in $100M Romance Scam — A Ghanaian national pleaded guilty to his role in a massive fraud ring that stole over $100 million from victims across the U.S. through business email compromise attacks and romance scams. 40-year-old Derrick Van Yeboah pleaded guilty to conspiracy to commit wire fraud and agreed to pay more than $10 million in restitution. “Van Yeboah personally perpetrated many of the romance scams by impersonating fake romantic partners in communications with victims,” the U.S. Justice Department said. “Many of the conspiracy’s victims were vulnerable older men and women who were tricked into believing that they were in online romantic relationships with persons who were, in fact, fake identities assumed by members of the conspiracy.” The conspirators, part of a criminal organization primarily based in Ghana, also committed business email compromises to deceive businesses into wiring funds to the enterprise. In total, the scheme stole and laundered more than $100 million from dozens of victims. After stealing the money, the fraud proceeds were laundered to West Africa. The defendant is scheduled to be sentenced in June 2026.
  • Taiwan Indicts 62 People for Cyber Scams — Prosecutors in Taipei indicted 62 people and 13 companies for their involvement in cyber scam operations organized throughout Asia by the Prince Group. Chen Zhi, the founder of the Prince Group, was indicted by U.S. prosecutors last year on money laundering charges. Taipei prosecutors said those associated with Prince Group laundered at least $339 million into Taiwan and used the stolen funds to buy 24 properties, 35 vehicles, and other assets amounting to approximately $1.7 million. In all, authorities seized about $174 million in cash and assets. Prince Group “effectively controlled 250 offshore companies in 18 countries, holding 453 domestic and international financial accounts. By creating fictitious transaction contracts between these offshore companies, the group laundered money through foreign exchange channels,” they added.
  • Ransomware Actors Use AzCopy — Ransomware operators are ditching the usual tools like Rclone for Microsoft’s own AzCopy, turning a trusted Azure utility into a stealthy data exfiltration mechanism and blending into normal activity. “The adoption of AzCopy and other familiar tools by attackers represents a similar logic to living-off-the-land in the final and most critical phase of an operation: exfiltrating data out of an organization,” Varonis said. “Spinning up an Azure storage account takes minutes and requires only a credit card or compromised credentials. The attacker gains the benefits of Microsoft’s global infrastructure while security teams struggle to distinguish between malicious uploads and legitimate traffic.”
  • Threat Actors Exploit Critical Flaw in WPEverest Plugin — Threat actors are exploiting a critical security flaw in WPEverest’s User Registration & Membership plugin (CVE-2026-1492, CVSS score: 9.8) to create rogue administrator accounts. The vulnerability affects all versions of User Registration & Membership through 5.1.2. The issue has been addressed in version 5.1.3. Wordfence said the plugin is susceptible to improper privilege management, which enables the creation of bogus admin accounts. “This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist,” it said. “This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration.”
  • MuddyWater Evolves Its Tactics — The Iranian hacking group known as MuddyWater has been observed leveraging Shodan and Nuclei to identify potential vulnerable targets, as well as using subfinder and ffuf to perform enumeration of target web applications. The findings come from an analysis of the threat actor‘s VPS server hosted in the Netherlands. MuddyWater is also said to be attempting to scan and/or exploit recently disclosed CVEs related to BeyondTrust (CVE-2026-1731), Ivanti (CVE-2026-1281), n8n (CVE-2025-68613), React (CVE-2025-55182), SmarterMail (CVE-2025-52691), Laravel Livewire (CVE-2025-54068), N-Central (CVE-2025-9316), Citrix NetScaler (CVE-2025-5777), Langflow (CVE-2025-34291), and Fortinet (CVE-2024-55591, CVE-2024-23113, CVE-2022-42475), along with SQL injection vulnerabilities in BaSalam and an unspecified Postgres development platform for initial access. One of the custom tools identified in the server is KeyC2, a command-and-control (C2) framework that allows operators to remotely control compromised Windows machines over a custom binary protocol on port 1269 from a Python script. Two C2 tools used by the adversary are PersianC2, which relies on standard HTTP polling to receive commands and files via JSON API endpoints, and ArenaC2, a Python-based program that operates over HTTP POST requests. Also detected is a PowerShell loader that leads to the execution of obfuscated Node.js payloads that appear similar to Tsundere Botnet. The infrastructure is assessed to have been used to target entities in Israel, Egypt, Jordan, the U.A.E., and the U.S. Some aspects of the activity overlap with Operation Olalampo.
  • 2,622 Valid Certificates Exposed — A new study undertaken by Google and GitGuardian found over a million unique private keys leaked across GitHub and Docker Hub, out of which 40,000 were mapped to 140,000 real TLS certificates. “As of September 2025, 2,600 of these certificates were valid, with more than 900 actively protecting Fortune 500 companies, healthcare providers, and government agencies,” GitGuardian said. “Our disclosure campaign achieved 97% remediation, but at the cost of 4,300 emails sent, 1,706 entities contacted, 9 bug bounty submissions, countless follow-ups, and days of meticulous attribution work employing multiple OSINT techniques. The high success rate masks the extraordinary effort required to protect organizations that fail to protect themselves.”
  • Context7 MCP Server Suffers from ContextCrush — A critical security flaw in Upstash’s Context7 MCP Server, a widely used tool for delivering documentation to AI coding assistants, has been discovered. Dubbed ContextCrush, the vulnerability could allow attackers to inject malicious instructions into AI development tools through a trusted documentation channel. Noma Security, which disclosed details of the flaw, said it’s rooted within the platform’s “Custom Rules” feature, which allows library maintainers to provide AI-specific instructions to help assistants better interpret documentation. “Context7 operates both as the registry, where anyone can publish and manage library documentation, and as the trusted delivery mechanism that pushes content directly into the AI agent’s context,” security researcher Eli Ainhorn said. “The attacker never needs to reach the victim’s machine. Instead, the attacker can plant malicious custom rules in Context7’s registry, and Context7’s infrastructure delivers them through the MCP server to the AI agent running in the developer’s IDE. As agents are execution machines and run whatever is loaded into their context, all the victim’s agent does is execute the attacker’s instructions on the victim’s machine, using its own tool access (Bash, file read/write, network). In this scenario, the agent has no way to distinguish between legitimate documentation and attacker-controlled content because they arrive through the same trusted channel and from the same trusted source.”
  • German Court Sentences Key Person Behind Call Center Scam — A German court has sentenced a suspected central figure in the so-called Milton Group call-center fraud network to seven-and-a-half years in prison. Although the court did not publicly name the defendant, court records reviewed by the Organized Crime and Corruption Reporting Project (OCCRP) indicate the person convicted was Mikheil Biniashvili, a citizen of Georgia and Israel. In addition to the prison sentence, the court ordered the confiscation of €2.4 million ($2.8 million) linked to the operation. Between 2017 and 2019, the defendant ran a call-center operation in Albania that used trained agents to persuade victims to invest in fraudulent online trading schemes. The scheme caused losses of about €8 million ($9.4 million) to victims, mostly in German-speaking countries. The operation employed up to 600 people at its peak. Call-center agents allegedly posed as investment advisers, building trust with targets before persuading them to deposit funds into fake trading platforms controlled by the network by promising large investment returns. Biniashvili was arrested in Armenia in 2023 and extradited to Germany in 2024.
  • Multiple Flaws in Avira Internet Security — Three vulnerabilities have been disclosed in Avira Internet Security that could allow for arbitrary file deletion (CVE-2026-27748) in the Software Updater component, an insecure deserialization (CVE-2026-27749) in System Speedup, and an arbitrary folder deletion over TOCTOU (CVE-2026-27748) in the Optimizer. “The file delete primitive is useful on its own,” Quarkslab said. “The other two both result in Local Privilege Escalation to SYSTEM.”
  • Russian Ransomware Operator Pleads Guilty in U.S. — Evgenii Ptitsyn, a 43-year-old Russian national, has pleaded guilty in a U.S. court to running the Phobos ransomware outfit that targeted more than 1,000 victims globally and extorted ransom payments worth over $39 million. Ptitsyn was extradited from South Korea in November 2024. “Beginning in at least November 2020, Ptitsyn and others conspired to engage in an international computer hacking and extortion scheme that victimized public and private entities through the deployment of Phobos ransomware,” the Justice Department said. “As part of the scheme, Ptitsyn and his co-conspirators developed and offered access to Phobos ransomware to other criminals or ‘affiliates’ to encrypt victims’ data and extort ransom payments from victims. The administrators operated a darknet website to coordinate the sale and distribution of Phobos ransomware to co-conspirators and used online monikers to advertise their services on criminal forums and messaging platforms.” Ptitsyn faces a maximum penalty of 20 years in prison for wire fraud charges.
  • Fake Google Security Check Leads to RAT — A bogus website resembling the Google Account security page is being used to deliver a Progressive Web App (PWA) capable of harvesting one-time passcodes and cryptocurrency wallet addresses, and proxying attacker traffic through victims’ browsers. “Disguised as a routine security checkup, it walks victims through a four-step flow that grants the attacker push notification access, the device’s contact list, real-time GPS location, and clipboard contents – all without installing a traditional app,” Malwarebytes said. “For victims who follow every prompt, the site also delivers an Android companion package introducing a native implant that includes a custom keyboard (enabling keystroke capture), accessibility-based screen reading capabilities, and permissions consistent with call log access and microphone recording.”
  • Phishing Campaign Abuses Google Infrastructure — A new email phishing campaign is leveraging legitimate Google infrastructure to bypass standard security filters. The activity uses Google Cloud Storage (GCS) to host initial phishing URLs that, when clicked, redirect unsuspecting users to a malicious site designed to capture their financial information or deploy malware. “By hosting the initial link on Google’s servers, the attackers ensure the email passes authentication checks like SPF and DKIM,” security researcher Anurag Gawande said.
  • Client-Side Injection Conducts Ad Fraud — A new malicious client-side injection originating from a malicious browser extension impersonating Microsoft Clarity has been found to overwrite referral tokens to redirect affiliate revenue to unknown threat actors. “A browser extension is injecting obfuscated JavaScript from msclairty[.]com, a typosquatted domain impersonating Microsoft Clarity,” c/side’s Simon Wijckmans said. “The domain is not serving analytics. It is delivering an obfuscated JavaScript payload that performs affiliate cookie stuffing, tracking cookie deletion, and Fetch API hijacking inside the visitor’s browser. This prevents a competing tracking service from recording the real traffic source. The attacker does not just want credit for the visit. They actively block other trackers from capturing any attribution data that would conflict with their fraudulent cookie.” The script has affected sites across multiple unrelated sectors, including transportation, SaaS platforms, sports management, and government payment portals. Impacted visitors primarily span Chrome versions 132, 138, and 145, and originate from U.S.-based IP addresses on the East and West coasts.
  • Illinois Man Charged with Hacking Snapchat Accounts to Steal Nudes — U.S. prosecutors have charged a 26-year-old Illinois man, Kyle Svara, with conducting a phishing operation that made it possible to break into the Snapchat accounts of approximately 570 women to steal private photos and sell them online. “From at least May 2020 to February 2021, Svara used social engineering and other resources to collect his targets’ emails, phone numbers, and/or Snapchat usernames,” the Justice Department said. “He then used those means of identification to access his targets’ Snapchat accounts, which prompted Snap Inc. to send account security codes to those women. Using anonymized phone numbers, Svara posed as a representative of Snap Inc. and sent more than 4,500 text messages to hundreds of women, requesting those Snapchat access codes.” Svara is alleged to have accessed the Snapchat accounts of at least 59 women without permission to download their nude or semi-nude images and sell them on internet forums.
  • Meta Sued Over AI Smart Glasses’ Privacy Concerns — Meta is facing a new class action lawsuit over its AI-powered Ray-Ban Meta glasses, following a report from Swedish newspapers Svenska Dagbladet and Goteborgs-Posten that employees at a Kenya-based subcontractor are reviewing intimate, personal footage filmed from customers’ glasses. Meta said subcontracted workers might sometimes review content captured by its AI smart glasses for the purpose of improving the “experience,” as stated in its Privacy Policy. It also claimed that data is filtered to protect people’s privacy. But the investigation found that this step did not always consistently work. “Unless users choose to share media they’ve captured with Meta or others, that media stays on the user’s device,” Meta told BBC News. “When people share content with Meta AI, we sometimes use contractors to review this data for the purpose of improving people’s experience, as many other companies do.”
  • Total Ransomware Payments Stagnated in 2025 — The total ransomware payments in 2025 stagnated, even if the number of attacks increased. According to blockchain analysis firm Chainalysis, total on-chain ransomware payments fell by approximately 8% to $820 million in 2025, even as claimed attacks rose 50%. “While aggregate revenue stagnated, the median ransom payment grew 368% year-over-year to nearly $60,000,” the company said. “The 2025 total is likely to approach or exceed $900 million as we attribute more events and payments, just as our 2024 total grew from our initial $813 million estimate this time last year.” The decline in payment rates from 63% in 2024 to just 29% last year indicates that fewer victims are yielding to attackers’ ransom demands, it added. The development comes amid increased fragmentation of the ransomware ecosystem and threat actors shifting towards more stealthy methods, such as defense evasion and persistence techniques, to prioritize data theft and prolonged, low-noise access.
  • Mobile Blockchain Wallet Found Vulnerable to Severe Flaws — An unnamed mobile blockchain wallet app for Android has been found susceptible to two independent severe vulnerabilities, allowing untrusted deep links to trigger sensitive wallet flows and trick users into approving phishing-driven transactions, as well as retain cryptographic private keys from the device despite deleting an account. This meant that an attacker with later device access could re-import the account using its public address and regain full signing authority without re-entering the keys. According to LucidBit Labs, the vulnerabilities have been patched by the developer. “The main strength of crypto wallets lies in their cryptographic foundations,” security researcher Assaf Morag said. “However, when these wallets are implemented as user-facing applications, the overall orchestration of the system becomes just as critical as the cryptography itself. As the saying goes, a system’s security posture is defined by its weakest link. In this case, the two vulnerabilities demonstrate how flaws at the application layer can undermine the entire security model, despite the strength of the underlying cryptography.”
  • Kubernetes RCE Via Nodes/Proxy GET Permission — New research has identified an authorization bypass in Kubernetes Role-based access control (RBAC) that allows a service account with nodes/proxy GET permissions to execute commands in any Pod in the cluster. The issue exploits a bug in how Kubernetes API servers handle WebSocket connections. “Nodes/proxy GET allows command execution when using a connection protocol such as WebSockets,” security researcher Graham Helton said. “This is due to the Kubelet making authorization decisions based on the initial WebSocket handshake’s request without verifying CREATE permissions are present for the Kubelet’s /exec endpoint, requiring different permissions depending solely on the connection protocol. The result is anyone with access to a service account assigned nodes/proxy GET that can reach a Node’s Kubelet on port 10250 can send information to the /exec endpoint, executing commands in any Pod, including privileged system Pods, potentially leading to a full cluster compromise.” The Kubernetes project has declined to address the issue, stating its intended behavior. However, it’s expected to release Fine-Grained Kubelet API Authorization (KEP-2862) next month to address the attack. “A targeted patch would require coordinated changes across multiple components with special-case logic,” Edera said. “This is the kind of complexity that could lead to future vulnerabilities. Once KEP-2862 reaches GA and sees adoption, nodes/proxy can be deprecated for monitoring use cases.”
  • Other Key Stories on the Radar — The Israeli government is working on the country’s first cybersecurity law, the U.S. National Security Agency (NSA) published Zero Trust Implementation Guidelines (ZIGs) to help organizations safeguard sensitive data, systems, and services against sophisticated cyber threats, Google Project Zero found multiple vulnerabilities that could be used to bypass a new Windows 11 feature called Administrator Protection and obtain admin privileges, threat actors are continuing to abuse Microsoft Teams functionality by leveraging guest invitations and phishing-themed team names to impersonate billing and subscription notifications, and a loader named PhantomVAI has been used in the wild over the past year to deploy other payloads, such as Remcos RAT, XWorm, AsyncRAT, DarkCloud, and SmokeLoader.

🔧 Cybersecurity Tools

  • DetectFlow → It is an open-source detection pipeline from SOC Prime that matches streaming log events against Sigma rules in real time — before they ever reach your SIEM. Instead of relying on your SIEM to do the heavy lifting, it tags and enriches events in-flight using Apache Kafka and Flink, then passes the results downstream to wherever you need them. Built on 11 years of detection intelligence, it’s designed for teams who want faster detection, more rule coverage, and less dependency on SIEM-imposed limits.
  • ADTrapper → It is an open-source platform that analyzes Windows Active Directory authentication logs and flags threats using 54+ built-in detection rules — covering everything from brute force to AD CS attacks. It runs in Docker, deploys with one command, and supports SharpHound data for deeper AD analysis.

Disclaimer: For research and educational use only. Not security-audited. Review all code before use, test in isolated environments, and ensure compliance with applicable laws.

Conclusion

That’s your week. A lot happened. Some of it was bad, some of it was worse, and a little bit of it was actually good. The scoreboard is messy, like it always is.

Same time next week — and if history is any guide, we’ll have plenty more to talk about. Stay patched, stay skeptical, and maybe don’t click that link.



Source link

What defence support could Ukraine offer Middle East states amid Iran war? | US-Israel war on Iran News

0

Ukrainian President Volodymyr Zelenskyy has said that Kyiv could provide defensive systems as well as assistance to civilians and American soldiers “deployed in certain countries” in the Middle East as the war in Iran continues.

He has reportedly proposed an exchange of Ukrainian defensive technology to combat Iranian drones in return for advanced US defensive systems to use in the war against Russia.

The US-Israel-Iran conflict, which started 10 days ago when the United States and Israel launched strikes on Iran and killed Iran’s supreme leader, Ayatollah Ali Khamenei, has continued to escalate. Iran has responded with strikes on Israel and US military assets and other infrastructure in Kuwait, Bahrain, Qatar, Saudi Arabia and the United Arab Emirates.

As Gulf and other Middle Eastern states continue to attempt to intercept incoming drones and missiles with US-supplied air defences, the US has asked Ukraine to contribute some of its own air-defence systems.

Here is what we know.

What has the US requested from Ukraine and why?

The US has asked for Ukraine’s help in defending Washington’s allies in the Middle East against Iranian missile attacks on infrastructure and US military assets, Ukraine’s president confirmed last week.

At the moment, the US is using air defence systems such as the Patriot, Terminal High Altitude Area Defense (THAAD) batteries and Airborne Warning and Control System (AWACS) aircraft, to intercept Iranian drones and missiles targeting its military assets in the region. The Patriot Advanced Capability-2 (PAC-2) and PAC-3 are advanced surface-to-air missile defence systems.

However, these types of systems are extremely expensive, costing millions of dollars for each interceptor missile fired, and there are concerns that supplies of US interceptor missiles could run low.

“We received a request from the United States for specific support in protection against ‘shaheds’ in the Middle East region,” Zelenskyy wrote in an X post on March 5.

Shahed drones, particularly the Shahed-136, are Iranian-designed “kamikaze” or loitering munitions which are very low cost compared to the interceptors being used by the US. Costing roughly $20,000-$35,000 each, these GPS-guided drones are about 3.5m (11.5 feet) long and fly autonomously to pre-programmed coordinates to strike fixed targets with explosive payloads. They blow up as they hit their targets.

Over the course of the Iran war, Shahed-136 drones have targeted Middle Eastern countries including Saudi Arabia, Bahrain, Qatar and the UAE where US military assets and troops are hosted. Experts estimate that Iran has thousands of these drones.

Iran has also been supplying Moscow with many thousands of Shahed drones during Russia’s war on Ukraine.

During the course of Russia’s four-year war on Ukraine, Ukraine’s domestic arms industry has been forced to innovate, building low-cost interceptor drones priced at roughly $1,000 to $2,000 to counter Russian attacks with imported Iranian Shahed-136s.

Kyiv is now mass-producing these low-cost interceptor drones.

“The role of Shahed-type drones in long-range attacks has become more prominent in Ukraine after Russia took Iranian technology, improved it, and built it in previously unimaginable numbers,” Keir Giles, a Eurasia expert for the UK-based think tank Chatham House, told Al Jazeera.

Shahed drone
A man rides a motorcycle past a Shahed drone in Tehran’s Baharestan Square on September 27, 2025, as part of an exhibit to mark the ‘Sacred Defence Week’ commemorating the 1980-88 Iran-Iraq War [Atta Kenare/AFP]

What has Zelenskyy said?

Zelenskyy has posted several statements on social media confirming that he is ready to help Middle Eastern countries defend their territories by providing technical expertise.

“Ukrainians have been fighting against ‘shahed’ drones for years now, and everyone recognises that no other country in the world has this kind of experience. We are ready to help,” he wrote on X on March 5.

“I gave instructions to provide the necessary means and ensure the presence of Ukrainian specialists who can guarantee the required security.

“Ukraine helps partners who help ensure our security and protect the lives of our people.”

It is understood that Ukraine is in talks with several Middle Eastern countries about this.

On Monday, Zelenskyy said Ukraine has deployed interceptor drones and a team of specialists to help protect US military bases in Jordan.

Zelenskyy wrote on X that he has also spoken directly to Saudi Crown Prince Mohammed bin Salman (MBS) about “countering threats from the Iranian regime”.

He also said he had spoken with the leaders of Bahrain, Jordan, Kuwait, Qatar and the UAE.

Zelenskyy has repeatedly stressed that Ukraine must not weaken its own air defences. However, it is mass-producing this equipment now, and may well be able to afford to share.

“The fact that there are surplus capabilities ready to be sent to the US and the Middle East is unsurprising because Ukraine has led this innovation,” Giles said.

Zelenskyy has therefore proposed an exchange of air defence systems with the US ones being used in the Middle East.

“We ourselves are at war. And I said, completely frankly, that we have a shortage of what they have. They have missiles for the Patriots, but hundreds or thousands of ‘shaheds’ cannot be intercepted with Patriot missiles – it is too costly,” Zelenskyy said.

“Meanwhile, we have a shortage of PAC-2 and PAC-3 missiles. So, when it comes to technology or weapons exchange, I believe our country will be open to it.”

Zelenskyy may also have good political reasons for extending help, analysts say.

“The US has declined support for Ukraine on the ground that it had insufficient supply of air defence munitions, and now more of those Patriots have been fired in the Middle East in a few days, than have been supplied to Ukraine in four years,” Giles said.

“Zelenskyy will be aware that in providing this assistance, he is not only shaming the US, but also directly supporting potential friends and partners in the Middle East, who before now have been ambivalent to the situation in Ukraine,” Giles said.

INTERACTIVE_THAAD_GAZA_ISRAEL_IRAN_MISSILE_INTERCEPTOR_FEB25, 2026-1772104791

Who else has sent defensive backup to the Gulf?

European countries including the United Kingdom, France, Spain, Portugal, Greece and Italy have pledged to provide defensive backup to Gulf nations over the past week. Additionally, Australia said it was deploying military assets to the region.

Wary of becoming directly involved in the US-Israeli war on Iran, European countries have nevertheless been drawn into the conflict by attacks on a British base on Cyprus in the Mediterranean and Iranian strikes on Western allies in Gulf countries that host US troops in military bases.

What will happen next?

Just as Ukraine is getting involved in the war, Russia might too, say experts.

“We should not be surprised if before long, as well as Russian technology in Iranian drones, we see Iran launching Shaheds manufactured in Russia,” Giles said.

He described Russia as a “primary beneficiary of current US actions,” pointing to how the surge in oil prices, the relaxation in US curbs on Russian energy exports to keep crude and gas prices under control, and the diversion of air defence munitions from Europe to the Middle East all helped Moscow. These, he said, “are all lifelines for Russia”.



Source link

Man who broke into Grade Il-listed church and smashed stained glass window fined £11k | UK News

0


A man has been fined more than £11,000 after he smashed a stained glass window of a Grade II-listed church.

Craig Knight, 50, left behind traces of blood when he broke into St Anne’s Church in Kew, south west London, while drunk on 10 January.

Reverend Canon Dr Giles Fraser said he saw blood on the church altar and floor, and discovered that two brass candlesticks had been taken.

Knight, of Waltham Forest, east London, also got into a mausoleum behind the altar and opened a box containing ashes, Rev Fraser said.

However, the candlesticks were later returned, the vicar added.

Wimbledon Magistrates’ Court heard on Monday that Knight was “extremely ashamed” and reported what had happened to the police.

He pleaded guilty to criminal damage and removal of human remains from a place of burial, and was sentenced to a 12-month community order.

The defendant was also fined a total of £11,415, including legal costs, and must carry out 60 hours of unpaid work.

Chairman of the magistrates’ bench, Peter Jones, said there was “recklessness and impulse”, but noted Knight’s remorse.

Read more from Sky News:
Fire shuts Scotland’s busiest train station
Misery for millions amid plummeting markets

Rev Fraser said: “I did feel quite angry when it happened.

“But the fact that the candles were returned, I think made people feel rather sorry for him.”

St Anne’s Church was founded in 114 after Queen Anne approved a chapel to be built on Kew Green.

It is the burial place of artists Thomas Gainsborough, Johann Zoffany and George Engleheart, and botanist Sir Joseph Dalton Hooker.



Source link

Sanju Samson Gautam Gambhir: World Cup hero Sanju Samson got a warm welcome at the airport, drums were played for Gautam Gambhir.

0

homegameCricket

World Cup hero gets a warm welcome at the airport, drums beat for Gambhir

Last Updated:

sanju samson welcome at thiruvananthapuram airport: T20 World Cup 2026 hero Sanju Samson reached his home i.e. Thiruvananthapuram. This star opener batsman of Team India has been given a warm welcome at the airport. Thousands of fans were desperate to get a glimpse of him. On the other hand, the team’s head coach Gautam Gambhir was welcomed with garlands at the Delhi airport. As soon as he came out of the airport, drums were played.

World Cup hero gets a warm welcome at the airport, drums beat for GambhirZoom
Warm welcome to Samson and Gambhir.

New Delhi. Indian players are returning home from Ahmedabad after winning the T20 World Cup 2026. When tournament hero Sanju Samson reached his hometown Thiruvananthapuram, he got a grand welcome at the airport. Thousands of fans were seen at the airport to welcome him. On the other hand, head coach Gautam Gambhir was welcomed by the fans at the Delhi airport with drums. Gautam Gambhir reached Delhi with his family. He also had to go through a huge crowd to reach his car.

A large number of fans had gathered at the airport to get a glimpse of their local hero. Sanju Samson played the biggest role in Team India winning the World Cup. Samson was also chosen Player of the Tournament for his strong performance in the knockout matches. Initially, Samson did not get a chance in the playing-11, but by playing an unbeaten match-winning inning of 97 runs in 50 balls against West Indies, he showed his tremendous form and batted brilliantly in the semi-finals and final and won the trophy for India. Samson played a stormy inning of 89 runs in the semi-final against England. At the same time, in the title battle against New Zealand, Samson batted explosively and scored 89 runs.