
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Reposby info@thehackernews.com (The Hacker News) (The Hacker News) on March 16, 2026 at 7:37 pm
The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. “The attack […]
- ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on March 16, 2026 at 2:17 pm
Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now” feeling. This week has that energy. Fresh messes, old […]
- Why Security Validation Is Becoming Agenticby info@thehackernews.com (The Hacker News) (The Hacker News) on March 16, 2026 at 11:58 am
If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pentest engagement, or maybe an […]
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installersby info@thehackernews.com (The Hacker News) (The Hacker News) on March 16, 2026 at 11:41 am
Three different ClickFix campaigns have been found to act as a delivery vector for the deployment of a macOS information stealer called MacSync. “Unlike traditional exploit-based […]
- DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionageby info@thehackernews.com (The Hacker News) (The Hacker News) on March 16, 2026 at 9:07 am
Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 Grupo’s LAB52 threat […]
- Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuseby info@thehackernews.com (The Hacker News) (The Hacker News) on March 16, 2026 at 5:43 am
Google is testing a new security feature as part of Android Advanced Protection Mode (AAPM) that prevents certain kinds of apps from using the accessibility services API. The […]
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltrationby info@thehackernews.com (The Hacker News) (The Hacker News) on March 14, 2026 at 4:17 pm
China’s National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw (formerly Clawdbot and […]
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developersby info@thehackernews.com (The Hacker News) (The Hacker News) on March 14, 2026 at 12:55 pm
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a “significant escalation” in how it propagates through the Open VSX […]
- Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 5:33 pm
A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo […]
- Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026by info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 5:09 pm
Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. “If you have chats that are impacted by this change, you […]
- INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrimeby info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 3:20 pm
INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency’s […]
- Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentialsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 1:38 pm
Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) […]
- Investigating a New Click-Fix Variantby info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 1:28 pm
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on […]
- Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8by info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 9:17 am
Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in the wild. The list of […]
- Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolationby info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 8:18 am
Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel’s AppArmor module that could be exploited by unprivileged users to circumvent […]
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countriesby info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 5:26 am
A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential routers worldwide into […]
- Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Executionby info@thehackernews.com (The Hacker News) (The Hacker News) on March 13, 2026 at 4:15 am
Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if successfully exploited, could result in remote […]
- Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlaysby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 5:31 pm
Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that’s written in Rust, marking a significant departure from other known […]
- Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 5:02 pm
Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a financially motivated threat actor […]
- How to Scale Phishing Detection in Your SOC: 3 Steps for CISOsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 1:30 pm
Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted […]
- ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 1:14 pm
Another Thursday, another pile of weird security stuff that somehow happened in just seven days. Some of it is clever. Some of it is lazy. A few bits fall into that uncomfortable […]
- Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workloadby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 11:30 am
The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes […]
- Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploitby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 9:58 am
Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit. The […]
- Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Walletsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 7:56 am
Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial […]
- CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposedby info@thehackernews.com (The Hacker News) (The Hacker News) on March 12, 2026 at 5:18 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, […]
