Tycoon2FA Phishing-as-a-Service Resurfaces, Bypassing MFA with AitM Kits

Background and Timeline: On March 23, 2026, security researchers confirmed that the Tycoon2FA phishing-as-a-service (PhaaS) platform has resumed full operations. This follows a major international law enforcement effort earlier in the year that had supposedly disabled the group’s infrastructure. The rapid resurrection of the service highlights the extreme resilience of decentralized and automated cybercrime platforms. […]

UAE Detains 100 People for Filming Drone and Missile Strikes Amid Security Concerns

Background and Timeline: Reported on March 14 and updated on March 16, 2026, police in the United Arab Emirates carried out a series of large-scale detentions. The crackdown followed a wave of regional conflict involving drone and missile attacks targeting sensitive areas. The operation was initiated to prevent the dissemination of “harmful digital content” that […]

Iranian Hackers Handala Claim Remote Wipe Attack on US Medical Tech Giant Stryker

Background and Timeline: On March 11, 2026, U.S. medical technology giant Stryker suffered a massive cyberattack that shut down its computer systems. By March 19/20, the Iran-linked activist collective “Handala” officially claimed responsibility for the operation. The attack resulted in global disruption to the company’s Microsoft environment, forcing several corporate offices to close temporarily. Modus […]

Pro-Ukraine Bearlyfy Hackers Deploy Custom GenieLocker Ransomware Against Russian Firms

Background and Timeline: Reported on March 26, 2026, a pro-Ukrainian hacker group known as Bearlyfy has escalated its campaign against Russian commercial interests. The group first appeared in January 2025 and has carried out more than 70 cyberattacks over the past year. In March 2026, researchers found that the group has moved from using leaked […]

Ludhiana Police Trace Cyber Scams to Bihar-Jharkhand Border After Jamtara Decline

Background and Timeline: Reported on March 26, 2026, investigations by the Ludhiana Commissionerate have identified a new epicentre for digital fraud. While Jamtara was once the primary concern, police noted that active fraud clusters are now operating from shanties along the Bihar-Jharkhand border. This disclosure follows a surge in fraudulent calls received by Ludhiana residents […]

Google Issues Emergency Patch for Chrome Zero-Day CVE-2026-3909 Exploited in the Wild

Background and Timeline: On March 16, 2026, Google announced the rollout of an emergency update to protect billions of global Chrome users. This followed a critical error earlier in the week where Google incorrectly reported that an actively exploited vulnerability had been fixed. The flaw, tracked as CVE-2026-3909, was identified as a target of ongoing […]

EU Imposes Sanctions on Chinese and Iranian Firms Over Cyber Espionage Campaign

Background and Timeline: On March 16, 2026, the European Union announced a significant security escalation by imposing sanctions on three foreign entities. This action is a direct response to a series of coordinated cyberattacks targeting EU member states’ government and aviation networks. The sanctions represent the EU’s move to impose “real-world diplomatic costs” on state-aligned […]

2026 Middle East Crisis: Comprehensive Analysis of US-Israel Strikes on Iran (Operation Epic Fury)

The geopolitical landscape of the Middle East underwent a fundamental and likely irreversible transformation beginning on February 28, 2026. The United States and Israel transitioned from a decades-long strategy of containment and shadow warfare to a policy of direct, high-intensity kinetic engagement aimed at the total dismantlement of the Islamic Republic of Iran’s strategic capabilities. […]

Ransoomed Ransomware Emerges as New AES‑RSA Lockout Threat, Demands 2.5 Bitcoin

Background and Timeline: On February 13, 2026, the CYFIRMA research team issued an advisory regarding “Ransoomed,” a new extortion-focused ransomware strain. The malware has been identified as an emerging threat that has been active since late 2025 and is currently being promoted on various underground forums. This group follows a professional “Ransomware-as-a-Service” (RaaS) model to […]

Odyssey Stealer Malware Targets Mac Users Worldwide, Steals Credentials & Crypto Keys

Background and Timeline: Reported on February 10, 2026, a new and aggressive malware campaign identified as “Odyssey Stealer” has begun targeting Apple computers globally. The malware has seen a sharp uptick in infections during the first week of February. This follows a trend where Mac-specific threats are becoming as prevalent as those targeting Windows systems. […]