The mystery of a globetrotting iPhone-hacking toolkit
Tools used in a series of hacking campaigns by hackers in Russia, Ukraine, and China may have originated inside U.S. government contractor L3Harris, TechCrunch has learned.
SCOOP: The iPhone mass hacking toolkit used by Russian spies was developed at U.S. military contractor L3Harris, former employees said.
The Coruna toolkit was used against Ukrainians and by Chinese cybercriminals, according to Google. But the toolkit was initially developed for Western governments.
10.03.2026 02:01
๐ 201
๐ 112
๐ฌ 5
๐ 13
Finland's intelligence service has released its yearly national security overview report. On the cyber side of things, SUPO warns startups that foreign espionage can rob them of their future.
supo.fi/en/espionage...
10.03.2026 18:10
๐ 11
๐ 3
๐ฌ 0
๐ 0
๐ฃ #PIVOTcon26 Agenda is here ๐ค We are thrilled to announce the lineup for this year's edition!
2โฃ days and 19 talks from leading #ThreatResearch experts.
The agenda link is in the first comment๐, and the talks and speakers are in the thread.๐งต
#CTI #ThreatIntel
1/15
10.03.2026 17:22
๐ 10
๐ 7
๐ฌ 1
๐ 1
BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris.
Their zero-click exploits went to Russian spies too.
Unbelievable harm to our collective security.
Scoop: @lorenzofb.bsky.social, here's why it matters 1/
techcrunch.com/2026/03/09/a...
10.03.2026 04:15
๐ 261
๐ 129
๐ฌ 4
๐ 15
Bird names in Coruna iOS exploit framework
YouTube video by Three Buddy Problem
What's with the bird names in a .gov iOS exploit framework? @craiu.bsky.social @jags.bsky.social www.youtube.com/watch?v=-QNf...
09.03.2026 18:10
๐ 2
๐ 2
๐ฌ 1
๐ 1
We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously. 1/7
09.03.2026 16:12
๐ 1832
๐ 960
๐ฌ 24
๐ 107
๐๐ฟ๐ฎ๐ป ๐ฎ๐ป๐ฑ ๐๐ต๐ฒ ๐ฐ๐๐ฏ๐ฒ๐ฟ ๐ฑ๐ผ๐บ๐ฎ๐ถ๐ป: our selected analysis providing useful context on the different ways cyber tools have been used in and around #Iran. (1/5)
09.03.2026 16:18
๐ 3
๐ 3
๐ฌ 1
๐ 0
(5/5) Ransomware, espionage, & sabotage.
A. Milenkoski, J. Minier, @julianferdinand.bsky.social, M. Smeets, and @tgrossman.bsky.social examine state uses of ransomware, including Iranโs capacity for disruptive & politically motivated cyber operations.
๐ Read article: bindinghook.com/state-backed...
09.03.2026 16:18
๐ 1
๐ 1
๐ฌ 0
๐ 0
-Mammoth trojan comes to MAX
-Phishing campaign targets Armenian civil society leaders ahead of elections
-Coruna technical analysis
-LuaJIT malware on GitHub
-Red Alert malware in Israel
-DPRK (ab)uses AI for everything
-New CL-UNK-1068 APT
-APT36 adopts vibeware
-Claude found 22 Firefox bugs
09.03.2026 11:04
๐ 9
๐ 4
๐ฌ 1
๐ 1
-White House releases new Cyber Strategy
-New Trump EO prioritizes fight against scams and cybercrime
-Chinese hackers breach FBI wiretap network
-Romania's largest meat exporter enters insolvency after ransomware attack
Podcast: risky.biz/RBNEWS535/
Newsletter: news.risky.biz/risky-bullet...
09.03.2026 10:57
๐ 15
๐ 6
๐ฌ 1
๐ 1
Along with our open call for talks, we have also opened registration for Hague TIX 2026!
The ticket link and everything practical you need to know about #HagueTIX2026 is right here: www.thehagueprogram.nl/the-hague-ti...
@thehagueprogram.bsky.social @fggaleiden.bsky.social @monicakello.bsky.social
09.03.2026 08:08
๐ 3
๐ 3
๐ฌ 0
๐ 0
New video footage shows a US Tomahawk missile hitting an IRGC facility in Minab, Iran, on Feb 28, showing for the first time that the US struck the area. The footage also shows smoke already rising from the vicinity of the girlsโ school, where 175 people were reportedly killed, including children.
08.03.2026 17:20
๐ 3238
๐ 1686
๐ฌ 89
๐ 188
Huntress researchers Jamie Levy & Harlan Carvey have identified and detailed the full timeline of an intrusion in a customer environment that aligns with what others have identified as MuddyWater. www.huntress.com/blog/muddywa...
09.03.2026 10:03
๐ 2
๐ 4
๐ฌ 0
๐ 0
The #DefCon #Singapore March Chill Out will be happening March 27th at Georges in Tai Seng. Everyone is welcome!
Come meet the local InfoSec, Hacker, and Researcher communities working to make the DEF CON Singapore conference a reality at the end April [โฆ]
[Original post on defcon.social]
09.03.2026 09:47
๐ 3
๐ 4
๐ฌ 0
๐ 0
A beginner's guide to analyzing the network traffic of apps and websites
In 2025, journalist Zack Whittaker found three popular apps were leaking sensitive user data. This is how he uses network analysis tools like Burp Suite to understand how apps and websites work and sh...
In this how-to for beginners, I explain how to get started with Burp and similar browser tools, we'll explore API basics, how to understand network requests, and getting started. I'll also walk you through some examples of how I found security bugs and data leaks, which I wrote up for TechCrunch.
07.03.2026 14:32
๐ 19
๐ 8
๐ฌ 0
๐ 0
๐งจ ๐จ NEW POD UP! (presented by @thinkstcanary.canary.tools) - The Coruna iOS exploit kit, the connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use @craiu.bsky.social @jags.bsky.social
LISTEN everwhere ๐
pod.link/1414525622
06.03.2026 20:16
๐ 6
๐ 4
๐ฌ 1
๐ 0
The Iran war has entered a new phase
Both sides have changed their tactics, our data analysis finds
Terrific data deep dive with animated maps, showing how US/Israeli targeting shows a shift over the course of the warโs first week: from targeting army and drone/missile sites to targeting police and regime security, to enable an uprising.
economist.com/interactive/...
07.03.2026 12:39
๐ 58
๐ 20
๐ฌ 2
๐ 2
Iran war shows data centers emerging as critical targets
From Amazon sites in the Gulf to reported strikes on Tehran data centers, digital infrastructure is increasingly becoming a casualty of war
- Anadolu Ajansฤฑ
My comment for Anadolu Agency (turkish press agency) on data centres as targets in the Iran war. The strikes on Amazon facilities in the UAE and Bahrain are the first time commercial cloud infrastructure has taken physical damage from a drone or missile attack. www.aa.com.tr/en/middle-ea...
07.03.2026 11:36
๐ 13
๐ 5
๐ฌ 1
๐ 0
Kaspersky recently produced a podcast on Operation Triangulation, basically a story of the investigation
Things that I haven't seen mentioned elsewhere:
โ Triangulation malware existed for >10 years
โ Some technical details similar to the Equation Group
www.youtube.com/watch?v=j4pC...
06.03.2026 21:07
๐ 9
๐ 2
๐ฌ 0
๐ 0
Russia is providing Iran intelligence to target U.S. forces, officials say
The targeting information has included the locations of American warships and aircraft in the Middle East, the officials said.
Exclusive: Russia is providing Iran with targeting information to attack American forces in the Middle East, the first indication that another major U.S. adversary is participating โ even indirectly โ in the war.
06.03.2026 12:30
๐ 721
๐ 364
๐ฌ 103
๐ 138
-Iranian hackers are scanning for security cameras to aid missile strikes
-Israel bombs Iran's cyber headquarters
-CISA's CIO leaves
-Authorities take down LeakBase and Tycoon 2FA
-Mexico mandates SIM registration to real IDs
Newsletter: news.risky.biz/risky-bullet...
Podcast: risky.biz/RBNEWS534/
06.03.2026 10:53
๐ 10
๐ 5
๐ฌ 1
๐ 1
Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech | TechCrunch
Enterprise software was a major focus of zero-day activity during 2025, with security and networking devices, like firewalls, VPNs, and virtualization platforms among the most targeted by malicious ha...
NEW: Google said that last year, and for the first time, it found more zero-days used by spyware makers (15) rather than government-backed espionage groups (12) in the wild.
The shift demonstrated โa slow but sure movement in the landscapeโ of how governments hack targets, the company said.
05.03.2026 18:44
๐ 12
๐ 11
๐ฌ 0
๐ 0
Assessing the impact of counter-ransomware interventions
Counter-ransomware interventions are becoming increasingly common, but judging whether those interventions โworkโ remains difficult. Understanding impact means considering more than a single outcome a...
Counter-ransomware interventions are increasing, but assessing the impact remains difficult. Our latest article by @maxwsmeets.bsky.social, @jamiemaccoll.bsky.social, S. Williams-Dunning, & @bobherc.bsky.social introduces a practical framework to evaluate them.
Read: bindinghook.com/assessing-th...
05.03.2026 11:27
๐ 3
๐ 3
๐ฌ 0
๐ 0
My oh my... I hope they didn't store all their cyberz and computers in the same building /s
www.politico.com/news/2026/03...
05.03.2026 10:21
๐ 27
๐ 5
๐ฌ 2
๐ 0
Microsoft describes how a global coalition disrupted Tycoon 2FA, a phishing-as-a-service platform behind tens of millions of fraudulent emails reaching more than 500,000 organizations each month. blogs.microsoft.com/on-the-issue...
05.03.2026 09:43
๐ 4
๐ 2
๐ฌ 0
๐ 0