As AI agents spread, 1Password’s new tool tackles a rising security threat

AI agents increasingly need credentials to log into your systems. 1Password wants to help secure them. Here’s how.

Latest news – ​Read More

GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub

New York, NY, 17th March 2026, CyberNewswire

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

I tried ML4W and got a super-customized Hyprland desktop in minutes – it’s easy

Want to customize Hyprland without editing config files? This Linux distro makes it simple. Here’s how.

Latest news – ​Read More

Google, Meta, Microsoft Among Signatories of Pact to Combat Scams

Several major tech and retail companies have signed an industry accord against online scams and fraud.

The post Google, Meta, Microsoft Among Signatories of Pact to Combat Scams appeared first on SecurityWeek.

SecurityWeek – ​Read More

Best early Amazon Spring Sale TV deals 2026: Save big on Samsung, TCL, and more

Amazon’s Big Spring Sale 2026 is almost here, and you can already find great discounts on TVs from Samsung, TCL, and more to revamp your living room or home theater.

Latest news – ​Read More

Middle East Cyber Warfare Intensifies: Rising Attacks, Hacktivist Surge, and Global Risk Exposure 

Middle East Cyber warfare

The ongoing Middle East war has evolved into a cyber battlefield, with state-sponsored operations targeting critical infrastructure and essential services. Analysts warn that the region is witnessing an unprecedented escalation in Middle East cyber warfare, with attacks affecting governments, energy networks, finance, communications, and industrial systems. These operations, often executed through proxy groups, aim to destabilize societies, disrupt supply chains, and exert geopolitical pressure. 

Despite early disruptions to Iranian command centers, Iran and its affiliated groups retain substantial cyber capabilities. Incidents already linked to these campaigns include fuel distribution delays in Jordan and interference with navigation systems, impacting over 1,100 ships near the Strait of Hormuz, posing risks to global oil and gas trade. The integration of military strikes with cyber operations, known as hybrid warfare, has become a defining feature of the conflict, making cyber threats in the Middle East a growing concern for organizations worldwide. 

Hybrid Warfare and the Rise of Middle East Cyber Attacks 

According to recent intelligence, the region entered a critical phase of hybrid warfare following an escalation between Iran, the United States, and Israel on February 28, 2026. The joint offensive, dubbed Operation Epic Fury by the U.S. and Operation Roaring Lion by Israel, combined traditional military strikes with cyberattacks, psychological operations, and information warfare. Early operations targeted Iran’s nuclear and military infrastructure, while cyber campaigns disrupted internet access, government systems, and media networks. 

Iran retaliated with missile and drone strikes across Israel, Gulf states, and U.S. bases, while cyber operations proliferated. Over 70 hacktivist groups launched campaigns including DDoS attacks, website defacements, credential theft, and disinformation. Malware and phishing campaigns also emerged, such as a fraudulent Israeli missile-alert app designed to harvest sensitive data. These events highlight how modern conflict increasingly intertwines kinetic warfare with cyber operations, amplifying Middle East cybersecurity threats for both regional and global targets. 

Iranian Cyber Capabilities and Hacktivist Involvement 

Iran remains a formidable cyber adversary, with active threat groups including Charming Kitten (APT35), APT33, MuddyWater, OilRig, and Pioneer Kitten. These groups conduct espionage, infrastructure disruption, credential theft, and target critical sectors such as energy, aviation, government, and telecommunications. Iranian-aligned hacktivists, including CyberAv3ngers, Handala, Team 313, and DieNet, further amplify risks through DDoS campaigns, industrial control system intrusions, and data leaks. 

Advisories indicate potential cooperation between Iranian and Russia-linked hacktivists, which could heighten Middle East geopolitical cyber threats. Experts emphasize that organizations must bolster cybersecurity in the Middle East, enforce multi-factor authentication, segment critical networks, and participate in information-sharing frameworks to mitigate risks. 

Cyber Retaliation and Infrastructure Disruption 

The first 72 hours of the conflict primarily involved disruption and propaganda rather than destructive attacks on infrastructure. On February 28, 2026, Israel executed one of the largest cyberattacks against Iran, causing a near-total internet blackout, with connectivity dropping to just 1–4% of normal levels. Concurrently, Iranian-aligned groups launched spear-phishing campaigns, ransomware-style attacks, data exfiltration, and malware deployment targeting energy systems, airports, financial institutions, and government networks. 

Beyond regional targets, supply chain interconnections expose countries outside the Middle East, such as India, to indirect risks. Attackers exploit vulnerabilities in VPNs, Microsoft Exchange, and other widely used technologies while deploying AI-assisted phishing, weaponized documents, and concealed command-and-control infrastructure. Organizations are urged to enhance cloud resilience, prepare for DDoS attacks, and strengthen monitoring and incident response procedures to combat the expanding wave of Middle East cyberattacks. 

Exploitation by Cybercriminals Amid Geopolitical Instability 

Cybercriminals are leveraging the heightened attention on the conflict to launch scams, misinformation, and malware campaigns. Researchers have identified over 8,000 newly registered domains tied to the crisis, many of which could later serve as vectors for attacks. Notable campaigns include: 

  • Conflict-themed malware lures, including fake missile strike reports delivering backdoors like LOTUSLITE. 

  • Phishing portals impersonating government or payment services. 

  • Fake donation pages, fraudulent online stores, and cryptocurrency “meme-coin” schemes, sometimes containing Persian-language code comments suggesting Iran-aligned operators. 

Preparing for the Middle East Cyber War 2026 

As Middle East cyber warfare escalates, organizations must strengthen defenses, patch vulnerabilities, and enhance incident response to counter rising cyber threats in the Middle East. The events of 2026 show that modern conflicts extend beyond traditional battlefields, with cyberattacks threatening infrastructure, finance, and global supply chains. 

Cyble, the world’s #1 threat intelligence platform, provides AI-powered solutions to detect, predict, and neutralize threats in real time, helping organizations stay ahead of Middle East cybersecurity threats. 

Book a personalized demo and see how Cyble Blaze AI can protect your organization during the Middle East cyber war 2026. 

References: 

The post Middle East Cyber Warfare Intensifies: Rising Attacks, Hacktivist Surge, and Global Risk Exposure  appeared first on Cyble.

Cyble – ​Read More

Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web

Customer conversations with chatbots can include contact information and personal details that make it easier for scammers to launch phishing attacks and commit fraud.

Security Latest – ​Read More

Best early Amazon Spring Sale phone deals 2026: 20 sales out now

For Amazon’s Big Spring Sale, I’ve rounded up the best early phone deals from major brands like Apple, Samsung, Motorola, and more.

Latest news – ​Read More

I found 20+ tiny gadgets that can handle big tasks (and they’re under $50)

Early Amazon Spring Sale offers are here, and it’s a great time to grab these tiny gadgets packed with huge function.

Latest news – ​Read More

Lazarus, AI, and Trust Abuse: Top Enterprise Cybersecurity Risks 2026 

As part of a recent live expert panel, ANY.RUN together with threat researcher and ethical hacker Mauro Eldritch explored biggest security risks companies should be prepared for in 2026. 

The discussion covered several relevant cases, from the Lazarus IT Workers operation to the rapid rise of AI-driven phishing attacks, and examined the common thread behind them: trust abuse. 

Below are the key takeaways for those seeking a clearer view of modern cyber risks and how to prepare as a SOC leader. 

Watch the full panel on our YouTube channel

Key Takeaways 

  • Trust abuse is becoming a primary attack vector, driven by AI-powered phishing and identity-based infiltration. 
  • Focus on early detection through behavioral visibility, context, and process-based security
  • Combine sandbox analysis, threat intelligence, and contextual enrichment for faster, more accurate decisions. 

Trust Abuse: Top Business Risk for 2026 

In 2026, many cyberattacks don’t look like attacks at all. Instead of exploiting technical vulnerabilities, threat actors increasingly exploit human trust. This tactic is known as trust abuse, and it’s what many modern cyber threats are based on. 

Businesses inevitably rely on trust between employees, systems, vendors, and partners. Without it, organizations cannot operate efficiently. Threat actors know what, so they’ve learnt to mimic legitimate identities, infiltrate communication channels and everyday workflows, and turn employees into unwitting entry points. 

Numbers clearly show the scale of trust-exploit attacks 

AI-assisted social engineering pushes trust abuse even further. These attacks closely resemble legitimate activity and often fail to trigger traditional alerts. For security leaders, this changes how risk must be understood.  

Risk mitigation is no longer only about patching vulnerabilities or strengthening perimeter defenses. Detecting trust abuse requires visibility into behavior, context, and how trust moves inside the enterprise.  

Get enterprise-grade visibility into threats 
Equip your SOC with ANY.RUN



Integrate today 


Case #1: Implications of Lazarus APT Infiltration  

Lazarus, a North-Korean state-sponsored threat actor, has shifted its tactics. Instead of relying only on malware, the group infiltrates Western and Middle Eastern companies to conduct corporate espionage. 

The scheme was investigated by Mauro Eldritch and Heiner García from NorthScan inside ANY.RUN’s controlled infrastructure. The researchers were able to trap the attackers in a sandbox environment and observe their activity while the threat actors believed they had gained access to a corporate network. 

Overview of Lazarus scheme and its implications 

Lazarus operation is a vivid example of trust abuse in a business environment. No advanced malware was involved in the attack initially. Because of that, the potential implications for the victims can be catastrophic. Attacks like that don’t trigger alerts; there’s simply nothing suspicious to detect. 

This is why, unlike short-lived malware campaigns, trust-based infiltrations can persist much longer. Once attackers gain access, they may embed themselves deeper in the organization or even place additional operatives inside the company. 

ANY.RUN exposed this campaign before the broader market. The investigation was conducted entirely within our controlled infrastructure, which allowed researchers to observe attacker behavior in real time. 

Read more on Lazarus case investigation supported by ANY.RUN 

But most companies do not have the resources to monitor suspicious activity at this level. 

In practice, risk mitigation depends on the ability to detect and interpret unusual behavior early, before it escalates into a full incident. Trust abuse attacks make early visibility and detection critical for enterprise security. 

Case #2: Modern AI-Powered Phishing  

Modern phishing & its danger for enterprises 

Phishing attacks today look very different from the obvious scam emails many people are used to spotting. With AI-assisted tools, threat actors can now mimic completely normal email conversations, using polished language and highly personalized content. 

AI makes these attacks both believable and scalable. The core vulnerability here is human trust, which becomes an easy entry point for attackers. 

Modern phishing campaigns increasingly focus less on technical exploits and more on manipulating communication chains and legitimate domains that employees already trust. 

As a result, traditional security tools are often left with no clear indicators of compromise to detect. These attacks blend into normal business communication, making them much harder to identify before damage occurs. 

Building a SOC That Prevents Trust Abuse Attacks 

To address this challenge, modern security requires a layered approach. Early detection does not depend on a single tool but on a set of coordinated processes. In particular, effective defense relies on three core SOC activities: monitoring, triage, and threat hunting. 

Traditional security tools are important to have, but they aren’t universal. Unless they can show what happens after a user interacts with a suspicious file, link, or attachment, organizations may lack the full visibility needed to understand the threat. This gap leaves companies vulnerable to increasingly evasive attack techniques. 

ANY.RUN helps strengthen these processes by providing greater visibility, faster investigations, and reliable threat context.

Process-based approach and its benefits as reported by ANY.RUN customers 

Monitoring: Detecting Threats Early 

Effective monitoring helps identify threats before they reach internal systems, preventing breaches. ANY.RUN enhances monitoring by enabling teams to: 

  • Detect emerging threats early: By tapping into real-time intelligence from live attack data from 15K companies 
  • Maintain focus: Get only relevant signals through curated, high-confidence data 
  • Reduce alert noise: Gain continuous visibility and instant IOC enrichment drives confident decision-making 

Rapid Triage: Understanding Alerts Faster 

Triage is critical for handling high alert volumes and avoiding delays in response. ANY.RUN helps streamline triage by allowing teams to: 

  • Cut investigation time with rapid, interactive sandboxing for files and URLs providing in-depth view of behavioral activity. 
  • Reduce escalations with behavioral and contextual insight that enrich alerts for confident decisions by Tier-1 analysts. 
  • Lower operational costs by avoiding tool sprawl while delivering context-rich visibility into threats. 

Threat Hunting: Identifying Patterns Proactively 

Threat hunting focuses on uncovering patterns and anticipating attacker behavior. ANY.RUN supports proactive hunting by enabling teams to: 

  • Get early warning signs: Analysts can easily correlate indicators, infrastructure, and historical activity. 
  • Research and monitor trends: Identify relationships between campaigns, industries, regions, and threat actors. 
  • Explore TTPs: Detect reused techniques and infrastructure to build clearer profiles of attacker behavior. 

Upgrade your detection and visibility
Try ANY.RUN solutions to support all SOC processes



Power up your SOC 


By strengthening these three processes, organizations can achieve earlier detection, faster response, and more efficient SOC operations, reducing the risk of modern, trust-based attacks. 

Conclusion  

Enterprise cyber threats are shifting toward identity-based and trust-driven attacks. Campaigns like Lazarus and AI-powered phishing show that attackers no longer rely solely on malware or exploits. 

For decision-makers, this means rethinking how risk is assessed and how security operations are structured. Visibility, context, and speed are becoming critical factors in effective defense. 

Organizations that adapt their SOC processes to these realities will be better positioned to detect threats early and prevent incidents before they escalate. 

About ANY.RUN 

ANY.RUN delivers interactive malware analysis and actionable threat intelligence trusted by more than 15,000 organizations and 600,000 security analysts worldwide.   

Interactive SandboxThreat Intelligence Lookup, and Threat Intelligence Feeds help SOC and MSSP teams analyze threats faster, investigate incidents with deeper context, and detect emerging attacks earlier.   

ANY.RUN meets enterprise security and compliance expectations. The company is SOC 2 Type II certified, reinforcing its commitment to protecting customer data and maintaining strong security controls. 

The post Lazarus, AI, and Trust Abuse: Top Enterprise Cybersecurity Risks 2026  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More