Cryptocurrency Supply Chain Attack4 Min Read March 24, 2026 Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The act…
8 Min Read March 24, 2026 5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents On February 25, 2026, Gartner published its inaugural Market Guide for… Enterprise Security Threat Intelligence
4 Min Read March 24, 2026 TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials Two more GitHub Actions workflows have become the latest to be… DevSecOps Vulnerability
4 Min Read March 24, 2026 The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills Cybersecurity has changed fast. Roles are more specialized, and… Network Security Security Operations
Cybersecurity Hacking14 Min Read March 23, 2026 ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing…
Cloud Security SaaS Security5 Min Read March 23, 2026 We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them AWS Bedrock is Amazon's platform for building AI-powered applications. It gives developers access to foundation models and the tools to…
Cloud Security Email Security5 Min Read March 23, 2026 Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware Microsoft has warned of fresh campaigns that are capitalizing on the upcoming tax season in the U.S. to harvest credentials and deliver…
Cyber Espionage Threat Intelligence3 Min Read March 21, 2026 FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications…
Threat Intelligence Vulnerability1 Min Read March 21, 2026 Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager Oracle has released security updates to address a critical security flaw impacting Identity Manager and Web Services Manager that could be…
Malware Threat Intelligence4 Min Read March 21, 2026 Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that…
Threat Intelligence Vulnerability3 Min Read March 21, 2026 CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel…
Cloud Security DevSecOps4 Min Read March 20, 2026 Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to…
Artificial Intelligence Vulnerability4 Min Read March 20, 2026 Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at…
Data Privacy Mobile Security3 Min Read March 20, 2026 Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from…
Artificial Intelligence Data Protection4 Min Read March 20, 2026 The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out…
Vulnerability Web Security2 Min Read March 20, 2026 Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover Sansec is warning of a critical security flaw in Magento's REST API that could allow unauthenticated attackers to upload arbitrary executables…
Botnet Network Security3 Min Read March 20, 2026 DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet…
Malware Mobile Security2 Min Read March 20, 2026 Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried out…
Cyber Espionage Threat Intelligence2 Min Read March 19, 2026 Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program…
Endpoint Security Threat Detection3 Min Read March 19, 2026 54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own…
Cybersecurity Hacking News10 Min Read March 19, 2026 ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once.…
Malware Mobile Security3 Min Read March 19, 2026 New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim…
Artificial Intelligence Enterprise Security7 Min Read March 19, 2026 How Ceros Gives Security Teams Visibility and Control in Claude Code Security teams have spent years building identity and access controls for human users and service accounts. But a new category of actor has…
Cyber Espionage Vulnerability6 Min Read March 19, 2026 DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least…
Data Protection Vulnerability2 Min Read March 18, 2026 Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited…
Supply Chain Attack Web Security5 Min Read March 18, 2026 Claude Code Security and Magecart: Getting the Threat Model Right When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it –…
Network Security Vulnerability3 Min Read March 18, 2026 9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which…
Ransomware Windows Security3 Min Read March 17, 2026 LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader The ransomware operation known as LeakNet has adopted the ClickFix social engineering tactic delivered through compromised websites as an…
Artificial Intelligence Security Leadership3 Min Read March 17, 2026 AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Finds A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the challenge, according to the…
Endpoint Security Threat Intelligence2 Min Read March 17, 2026 Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim's KakaoTalk desktop…
Network Security Vulnerability2 Min Read March 17, 2026 CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its…
Cryptocurrency Malware3 Min Read March 16, 2026 GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds…
Cybersecurity Hacking13 Min Read March 16, 2026 ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now”…
Artificial Intelligence Threat Detection5 Min Read March 16, 2026 Why Security Validation Is Becoming Agentic If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one…
Malvertising Threat Intelligence6 Min Read March 16, 2026 ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers Three different ClickFix campaigns have been found to act as a delivery vector for the deployment of a macOS information stealer called…
Cyber Espionage Endpoint Security3 Min Read March 16, 2026 DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report…
Artificial Intelligence Endpoint Security3 Min Read March 14, 2026 OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of…
Malware Threat Intelligence4 Min Read March 14, 2026 GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it…
Cyber Espionage Military Security3 Min Read March 13, 2026 Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign…
Data Protection Encryption2 Min Read March 13, 2026 Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026 Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. "If you have chats…
Cybercrime Ransomware3 Min Read March 13, 2026 INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and…
Malware VPN Security2 Min Read March 13, 2026 Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through…
Malware Threat Hunting6 Min Read March 13, 2026 Investigating a New Click-Fix Variant Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of…
Browser Security Vulnerability2 Min Read March 13, 2026 Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8 Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been…
Linux Vulnerability2 Min Read March 13, 2026 Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited…
Botnet Threat Intelligence3 Min Read March 13, 2026 Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands…