

Cybersecurity Headlines
CISO Series
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Episodes
Mentioned books

8 snips
Mar 27, 2026 • 8min
Alleged RedLine dev extradited, Red Menshen spies with BPFDoor, is US cybersecurity slipping?
A developer extradition tied to a notorious infostealer and a telecom espionage campaign using stealthy kernel implants make the headlines. Former national security chiefs warn of weakening U.S. cyber defenses. Discussions touch on automotive vulnerabilities, API and code injection flaws, robocall crackdown proposals, and alleged state-linked scam ecosystems.

18 snips
Mar 26, 2026 • 8min
Torg Grabber targets crypto, TeamPCP backdoors LiteLLM, GitHub AI bug detection
A rundown of Torg Grabber's campaign against over 700 crypto wallets and its evasion and exfiltration tactics. A supply-chain sabotage that backdoored LiteLLM Python packages via a tainted dependency. Deep dives on payload behavior stealing keys, secrets and spreading through Kubernetes. GitHub's new AI-powered security scanner and its autofix and detection results.

28 snips
Mar 25, 2026 • 7min
FCC router ban, drone hit AWS, Crunchroll leak
A new rule targets foreign consumer routers and how agencies will handle appeals. Drone activity briefly disrupted an AWS region and spurred customer migrations. A streaming service confirmed millions of users were exposed after a large support-ticket data leak. Plus new U.S. initiatives and legal moves shaping how emerging cyber threats and access brokers are handled.

35 snips
Mar 24, 2026 • 8min
DarkSword exploit hits GitHub, Gemini AI agents scour dark web, Trivy supply chain attack expands
A leaked DarkSword iPhone toolkit appears on GitHub, raising concerns about older iOS data theft. Gemini AI agents are being used to scan dark web posts and triage threats. A Trivy supply-chain compromise keeps spreading through infected images and credential stealers. Phone-based phishing and lightning-fast attacker handoffs are on the rise.

18 snips
Mar 23, 2026 • 32min
Department of Know: SaaS apps enable breaches, real-time cyber protection, IoT botnet takedown
Chris Ray, Field CTO at GigaOm, a researcher who decodes complex threats, and Bill Harmer, CISO at Supabase, a cloud security and incident readiness expert. They dig into hidden instructions in web content, stolen OAuth tokens from SaaS apps, critical SharePoint flaws, Mirai-based IoT botnets and takedown efforts, and abuse of legitimate services like Azure Monitor for phishing.

15 snips
Mar 23, 2026 • 8min
International botnet takedown, California city ransomed, Azure Monitor phishing
A multinational takedown of IoT-based DDoS botnets built from millions of devices. Ransomware disruptions hitting a California city and Los Angeles transit administrative systems. Attackers abusing legitimate Azure Monitor alerts to carry out callback phishing via real emails. Alerts about credential-phishing targeting Signal users and critical patches for widely used enterprise appliances and software.

18 snips
Mar 20, 2026 • 8min
Critical SharePoint flaw, real-time cyberattack prevention, CISA's Intune warning
A patched SharePoint deserialization flaw is now being actively exploited. A new endpoint platform promises real-time prevention by enforcing runtime OS protections. CISA urges securing Microsoft Intune after an admin compromise caused device wipes and data theft. Other briefings include an account takeover flaw in Ubiquiti, a Zimbra-targeted campaign, and fresh Android banking malware reports.

14 snips
Mar 19, 2026 • 7min
DarkSword emerges, "ShieldGuard" dismantled, NK IT worker army rakes in money
A newly revealed iOS exploit kit is said to steal credentials and crypto wallets. A malicious crypto browser extension was dismantled after researchers traced its data-harvesting. Reports claim a massive network of fake IT workers is generating huge illicit revenue. AI tools are outpacing humans in hacking contests and raising fresh concerns about automated attacks.

17 snips
Mar 18, 2026 • 7min
Energy strategy, scammer accord, font-rendering attack
Discussion of the Energy Department’s new grid-focused cyber strategy and public-private defensive AI plans. Tech companies forming an accord to share fraud tools and improve user reporting. A font-rendering trick that hides malicious commands from LLMs using custom fonts and CSS. Coverage of new malware loaders, state-linked intrusions, sanctions, and monitoring center expansion.

21 snips
Mar 17, 2026 • 7min
Stryker hospital tools safe, models apply to power AI scams, cybercrime up 245%
Reports on hospital tools remaining safe despite system outages. Coverage of face model use to lend credibility to AI-powered deepfake scams. Big jump in cybercrime since the Iran conflict, with banks and fintech heavily targeted. Alerts about exploited server vulnerabilities and live-chat phishing stealing payment data.


