Tycoon 2FA Phishing Kit Disrupted by Microsoft, Europol and Partners

Microsoft, Europol, and partners have dismantled the Tycoon 2FA phishing-as-a-service (PhaaS) platform, seizing 330 domains used for credential theft and MFA bypass. This coordinated...

Enhanced access denied error messages with policy ARNs

To help you troubleshoot access denied errors, we recently added the Amazon Resource Name (ARN) of the denying policy to access denied...

Coalition of Western Countries Launches 6G Cybersecurity Guidelines

A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards - Read more

Microsoft Azure Data Explorer Cross-Tenant Data Leak with Custom Dashboard

Microsoft Azure Data Explorer Cross-Tenant Data Leak with Custom Dashboard Tenable Research has identified and responsibly disclosed a critical cross-tenant data exfiltration vulnerability in...

Rapid7 and Our Global Partners Are Elevating Security Together

There is a particular kind of energy that fills the room when partners gather with a shared mission. It is part strategy session, part...

Iranian hacktivists muster their forces but state APTs lay low

Hacktivist activity surrounding the Iran war is sky-high but Iran's state-backed cyber espionage actors have yet to show their hands, giving security teams a...

Mobile malware evolution in 2025

Starting from the third quarter of 2025, we have updated our statistical methodology based on the Kaspersky Security Network. These changes affect all sections...

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Key Findings During the ongoing conflict, we identified intensified targeting of IP cameras from two manufacturers starting on February 28, originating from infrastructure we...

The Iran War: What You Need to Know

Last updated on 4 March 2026 at 2000 GMT. Recorded Future's Insikt Group® is actively monitoring the rapidly evolving situation following coordinated US-Israeli...

Latest article

Deploy AWS applications and access AWS accounts across multiple Regions with IAM Identity Center

If your organization relies on AWS IAM Identity Center for workforce access, you can now extend that access across multiple AWS Regions...

CVE-2026-26017 CoreDNS ACL Bypass

Information published. - Read more

Malicious npm Packages Posing as Solara Executor Target Discord, Browsers, and Crypto Wallets

JFrog security researchers Guy Korolevski and Meitar Palas uncovered a sophisticated supply chain attack on the npm ecosystem on March 12, 2026, in which...

Ivanti Connect Secure Zero-Day Vulnerability

What are the Vulnerabilities? Ivanti disclosed two vulnerabilities, CVE-2025-0282 and CVE-2025-0283,...