Today's Core Dump is brought to you by ThreatPerspective

Biz & IT - Ars Technica

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

The long, strange trip of a large assembly of advanced iOS exploits. The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical

Published: 2026-03-06T19:41:33



The Register - Software

Anthropic sues US government after unprecedented national security designation

Brands Trump administration decision 'legally unsound' and has 'no choice but to challenge it in court' AI giant Anthropic says that it has "no choice" but to sue the US government after being officially designated a supply chain risk to national sec

Published: 2026-03-06T14:37:50



The Register - Software

Malware-laced OpenClaw installers get Bing AI search boost

Think before you download OpenClaw, the AI agent that can manage just about anything, is risky all by itself, but now fake installers for it are wreaking havoc. Users who searched Bing's AI results for OpenClaw Windows were directed to a malicious

Published: 2026-03-04T20:50:49



The Register - Software

Google feels the need for security speed, so will ship Chrome updates every two weeks

Retains eight-weekly Extended Stable releases but warns fortnightly updates are the best way to stay safe Google will halve the time between releases of its Chrome browser to two weeks, across versions of the software for desktop operating systems, A

Published: 2026-03-04T02:01:55



The Register - Software

Until last month, attackers could've stolen info from Perplexity Comet users just by sending a calendar invite

AI browsing agent left local files open for the taking If you wanted to steal local files from someone using Perplexity's Comet browser, until last month you could just schedule the theft by sending your victim a calendar event.

Published: 2026-03-03T14:01:09



Security | The Verge

Anthropic makes last-ditch effort to salvage deal with Pentagon after blowup

Anthropic CEO Dario Amodei is reportedly back at the negotiating table with the Department of Defense in an attempt to salvage the company's relationship with the US military and prevent it from being iced out of defense work for being a "supply chain risk." Talks between the two parties imploded on Friday after weeks of […] Anthropic CEO Dario Amodei is reportedly back at the negotiating table with the Department of Defense in an attempt to salvage the company's relationship with the US military and prevent it from being iced out of defense work for being a "supply ch...

Published: 2026-03-05T06:46:46



Security | The Verge

CISA is getting a new acting director after less than a year

The US Cybersecurity and Infrastructure Security Agency (CISA), which is part of the Department of Homeland Security, is getting a new acting director, as reported by ABC, less than a year after Madhu Gottumukkala took charge of the agency as deputy director and acting director in May 2025. CISA's executive assistant director for cybersecurity, Nick […] The Cybersecurity and Infrastruture Security Agency seal on a graphic blue background. The US Cybersecurity and Infrastructure Security Agency (CISA), which is part of the Department of Homeland Security, is getting a new acting director, as reported by ABC, less than a year after Madhu Gottumukkala took charge of the agency as deput...

Published: 2026-02-27T14:06:25



Security | The Verge

NATO says iPhones are secure enough to handle classified data

The iPhone and iPad have been approved to hold NATO-restricted information, according to an announcement on Thursday. That means off-the-shelf devices running iOS 26 and iPadOS 26 can handle classified information "without requiring special software or settings," Apple says. The NATO-restricted designation is the lowest level of classified information, and it applies to information that […] The iPhone and iPad have been approved to hold NATO-restricted information, according to an announcement on Thursday. That means off-the-shelf devices running iOS 26 and iPadOS 26 can handle classified information "without requiring special softwar...

Published: 2026-02-26T14:08:03



BleepingComputer

Termite ransomware breaches linked to ClickFix CastleRAT attacks

Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor. [...]

Published: 2026-03-07T11:14:32



BleepingComputer

Microsoft: Hackers abusing AI at every stage of cyberattacks

Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack. [...]

Published: 2026-03-07T10:15:25



BleepingComputer

Cognizant TriZetto breach exposes health data of 3.4 million patients

TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 million people. [...]

Published: 2026-03-06T14:50:21



BleepingComputer

CISA warns feds to patch iOS flaws exploited in crypto-theft attacks

CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit. [...]

Published: 2026-03-06T10:57:16



BleepingComputer

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

EC-Council, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education, today launched its Enterprise AI Credential Suite, with four new role-based AI certifications debuting alongs

Published: 2026-03-06T10:00:10



BleepingComputer

FBI investigates breach of surveillance and wiretap systems

The U.S. Federal Bureau of Investigation (FBI) confirmed on Thursday that it's investigating a breach that affected systems used to manage surveillance and wiretap warrants. [...]

Published: 2026-03-06T03:44:53



BleepingComputer

Chinese state hackers target telcos with new malware toolkit

A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge devices. [...]

Published: 2026-03-05T18:19:49



BleepingComputer

Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware

Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing's AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware. [...]

Published: 2026-03-05T17:37:34



BleepingComputer

WordPress membership plugin bug exploited to create admin accounts

Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than 60,000 WordPress sites. [...]

Published: 2026-03-05T13:44:58



BleepingComputer

Google says 90 zero-days were exploited in attacks last year

Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances. [...]

Published: 2026-03-05T10:03:43



Threat Intelligence

Look What You Made Us Patch: 2025 Zero-Days in Review

Written by: Casey Charrier, James Sadowski, Zander Work, Clement Lecigne, Beno t Sevens, Fred Plan Executive Summary Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities exploited in-the-wild in 2025. Although that volume of

Published: 2026-03-05T14:00:00



Threat Intelligence

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Introduction Google Threat Intelligence Group (GTIG) has identified a new and powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (released in September 2019) up to version 17.2.1 (released in December 2023). The exploit kit

Published: 2026-03-03T14:00:00



Threat Intelligence

Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Introduction Last week, Google Threat Intelligence Group (GTIG), Mandiant, and partners took action to disrupt a global espionage campaign targeting telecommunications and government organizations in dozens of nations across four continents. The thr

Published: 2026-02-25T14:00:00








© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us