Apple’s Foldable Tipped to Launch as ‘iPhone Ultra’; Price and Memory Configurations Leaked

Apple’s first foldable iPhone has appeared in several leaks detailing its possible pricing, storage options, and hardware. A tipster claims the handset could launch in China with 256GB, 512GB, and 1TB variants priced at CNY 15,999 (roughly Rs. 2,14,400), CNY 17,999 (roughly Rs. 2,41,100), and CNY 19,999 (roughly Rs. 2,67,900). Estimated US pricing could start […]

Continue Reading

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

Ravie LakshmananMar 13, 2026Ransomware / Cybercrime INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency’s ongoing efforts to dismantle criminal networks, disrupt emerging threats, and safeguard victims from scams. The effort is part of an international law […]

Continue Reading

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42 is tracking the threat activity under the moniker CL-STA-1087, where CL refers to cluster, and STA stands for state-backed motivation. “The activity demonstrated strategic operational […]

Continue Reading

Nvidia may soon unveil a brand-new AI chip. A closer look at the $20 billion bet to make it happen

On the day before Christmas, when few stocks were stirring, a pricey and pivotal transaction jolted the AI computing race: Nvidia was spending a reported $20 billion to license technology from chip startup Groq and hire key employees, including its CEO, who previously helped Google create what’s become the leading alternative to Nvidia’s AI processors. […]

Continue Reading

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Ravie LakshmananMar 13, 2026VPN Security / Malware Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques. “The campaign redirects users searching for legitimate enterprise software to malicious ZIP files on attacker-controlled websites to deploy digitally signed trojans that masquerade […]

Continue Reading

Investigating a New Click-Fix Variant

Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on independent research and observations of the current threat landscape available at the time of publication. The content is intended for informational and preparedness purposes only. Read more blogs around […]

Continue Reading

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Ravie LakshmananMar 13, 2026Linux / Vulnerability Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel’s AppArmor module that could be exploited by unprivileged users to circumvent kernel protections, escalate to root, and undermine container isolation guarantees. The nine confused deputy vulnerabilities have been collectively codenamed CrackArmor by the Qualys Threat Research Unit (TRU). […]

Continue Reading

$100 oil, PCE data, MLB valuations and more in Morning Squawk

This is CNBC’s Morning Squawk newsletter. Subscribe here to receive future editions in your inbox. Happy Friday. The U.S. launched 60 more trade investigations last night, as the Trump administration continues to look for ways to replace the president’s now-overturned duties. The new probes focus on forced labor trade practices. Stock futures are higher this morning after […]

Continue Reading

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential routers worldwide into a botnet for committing large-scale fraud. “SocksEscort infected home and small business internet routers with malware,” the U.S. Department of Justice (DoJ) said. “The malware allowed SocksEscort to direct internet traffic through the […]

Continue Reading

Who is really footing the AI energy bill? Inside the debate about data center electricity costs

Advocacy groups and community members protest laws surrounding data centers while outside the Texas Capitol in Austin Monday, Feb. 23, 2026. Austin American-statesman/hearst Newspapers | Hearst Newspapers | Getty Images The companies racing to build the massive infrastructure needed for the artificial intelligence boom are facing growing backlash over electricity costs, as households and policymakers question […]

Continue Reading