- Max severity Ubiquiti UniFi flaw may allow account takeoverby Sergiu Gatlan on March 19, 2026
Ubiquiti has patched two vulnerabilities in the UniFi Network Application, including a maximum-severity flaw that may allow attackers to take over user […]
- New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Databy info@thehackernews.com (The Hacker News) on March 19, 2026
Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim to conduct […]
- CISA urges US orgs to secure Microsoft Intune systems after Stryker breachby Sergiu Gatlan on March 19, 2026
CISA warned U.S. organizations to follow Microsoft guidance to strengthen the Intune endpoint management tool after a cyberattack exploited it to wipe medical […]
- How Ceros Gives Security Teams Visibility and Control in Claude Codeby info@thehackernews.com (The Hacker News) on March 19, 2026
Security teams have spent years building identity and access controls for human users and service accounts. But a new category of actor has quietly entered […]
- New ‘Perseus’ Android malware checks user notes for secretsby Bill Toulas on March 19, 2026
A new Android malware called Perseus is checking user-curated notes to steal sensitive information, like passwords, recovery phrases, or financial data. [...]
- Critical Microsoft SharePoint flaw now exploited in attacksby Sergiu Gatlan on March 19, 2026
A critical Microsoft SharePoint vulnerability patched in January is now being exploited in attacks, the Cybersecurity and Infrastructure Security Agency (CISA) […]
- DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeoverby info@thehackernews.com (The Hacker News) on March 19, 2026
A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least November 2025, […]
- CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacksby info@thehackernews.com (The Hacker News) on March 19, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged government agencies to apply patches for two security flaws impacting Synacor Zimbra […]
- Aura confirms data breach exposing 900,000 marketing contactsby Bill Toulas on March 18, 2026
Identity protection company Aura has confirmed that an unauthorized party gained access to nearly 900,000 customer records containing names and email […]
- CISA orders feds to patch Zimbra XSS flaw exploited in attacksby Sergiu Gatlan on March 18, 2026
CISA has ordered U.S. government agencies to secure their servers against an actively exploited vulnerability in the Zimbra Collaboration Suite (ZCS). [...]
- ConnectWise patches new flaw allowing ScreenConnect hijackingby Bill Toulas on March 18, 2026
ConnectWise is warning ScreenConnect customers of a cryptographic signature verification vulnerability that could lead to unauthorized access and privilege […]
- OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobsby info@thehackernews.com (The Hacker News) on March 18, 2026
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the […]
- Ransomware gang exploits Cisco flaw in zero-day attacks since Januaryby Sergiu Gatlan on March 18, 2026
The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's Secure Firewall Management Center […]
- Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Accessby info@thehackernews.com (The Hacker News) on March 18, 2026
Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secure […]
- Marquis: Ransomware gang stole data of 672K people in cyberattackby Sergiu Gatlan on March 18, 2026
Marquis, a Texas-based financial services provider, revealed this week that a ransomware gang stole the data of over 670,000 individuals in an August 2025 […]
- The Refund Fraud Economy: Exploiting Major Retailers and Payment Platformsby Sponsored by Flare on March 18, 2026
Refund fraud is now a business, with methods and tutorials sold to exploit return policies for profit. Flare shows how fraudsters turn refunds and chargebacks […]
- New DarkSword iOS exploit used in infostealer attack on iPhonesby Bill Toulas on March 18, 2026
A new exploit kit for iOS devices and delivery framework dubbed "Darksword" has been used to steal a wide range of personal information, including data from […]
- Nordstrom's email system abused to send crypto scams to customersby Bill Toulas on March 18, 2026
Customers of upscale department store chain Nordstrom received fraudulent messages from a legitimate company email address that promoted cryptocurrency scams […]
- Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCEby info@thehackernews.com (The Hacker News) on March 18, 2026
Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an […]
- Claude Code Security and Magecart: Getting the Threat Model Rightby info@thehackernews.com (The Hacker News) on March 18, 2026
When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious […]
- 9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendorsby info@thehackernews.com (The Hacker News) on March 18, 2026
Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which can grant […]
- Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewelsby info@thehackernews.com (The Hacker News) on March 18, 2026
Security teams today are not short on tools or data. They are overwhelmed by both. Yet within the terabytes of alerts, exposures, and misconfigurations – […]
- Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploitby info@thehackernews.com (The Hacker News) on March 18, 2026
A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root […]
- Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOSby info@thehackernews.com (The Hacker News) on March 18, 2026
Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The […]
- Apple pushes first Background Security Improvements update to fix WebKit flawby Lawrence Abrams on March 18, 2026
Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without […]
- GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSXby Bill Toulas on March 17, 2026
The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, repositories, and extensions on GitHub, […]
- Europe sanctions Chinese and Iranian firms for cyberattacksby Bill Toulas on March 17, 2026
The European Union Council has announced sanctions against three entities and two individuals for their involvement in cyberattacks targeting critical […]
- From Documents to Decisions: How AI Is Transforming Healthcare Intakeby jpiatt on March 17, 2026
From Documents to Decisions: How AI Is Transforming Healthcare Intake jpiatt Tue, 03/17/2026 - 13:14 Wed, 05/13/2026 - 13:00 Resource Type […]
- AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCEby info@thehackernews.com (The Hacker News) on March 17, 2026
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments […]
- LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loaderby info@thehackernews.com (The Hacker News) on March 17, 2026
The ransomware operation known as LeakNet has adopted the ClickFix social engineering tactic delivered through compromised websites as an initial access […]
- AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Findsby info@thehackernews.com (The Hacker News) on March 17, 2026
A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the challenge, according to the AI and […]
- Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malwareby info@thehackernews.com (The Hacker News) on March 17, 2026
North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim's KakaoTalk desktop application to […]
- CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Pathsby info@thehackernews.com (The Hacker News) on March 17, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited […]
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Reposby info@thehackernews.com (The Hacker News) on March 16, 2026
The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python […]
- ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & Moreby info@thehackernews.com (The Hacker News) on March 16, 2026
Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now” feeling. This week has that energy. […]
- Why Security Validation Is Becoming Agenticby info@thehackernews.com (The Hacker News) on March 16, 2026
If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pentest […]
- ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installersby info@thehackernews.com (The Hacker News) on March 16, 2026
Three different ClickFix campaigns have been found to act as a delivery vector for the deployment of a macOS information stealer called MacSync. "Unlike […]
- DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionageby info@thehackernews.com (The Hacker News) on March 16, 2026
Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 Grupo's […]
- Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuseby info@thehackernews.com (The Hacker News) on March 16, 2026
Google is testing a new security feature as part of Android Advanced Protection Mode (AAPM) that prevents certain kinds of apps from using the accessibility […]
- OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltrationby info@thehackernews.com (The Hacker News) on March 14, 2026
China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw […]
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developersby info@thehackernews.com (The Hacker News) on March 14, 2026
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it propagates […]
- Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malwareby info@thehackernews.com (The Hacker News) on March 13, 2026
A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to […]
- Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026by info@thehackernews.com (The Hacker News) on March 13, 2026
Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. "If you have chats that are impacted […]
- INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrimeby info@thehackernews.com (The Hacker News) on March 13, 2026
INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as […]
- Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentialsby info@thehackernews.com (The Hacker News) on March 13, 2026
Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine […]
- Investigating a New Click-Fix Variantby info@thehackernews.com (The Hacker News) on March 13, 2026
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense […]
- Face value: What it takes to fool facial recognitionon March 13, 2026
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026
- Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8by info@thehackernews.com (The Hacker News) on March 13, 2026
Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in the […]
- Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolationby info@thehackernews.com (The Hacker News) on March 13, 2026
Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited by unprivileged […]
- Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countriesby info@thehackernews.com (The Hacker News) on March 13, 2026
A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential […]

































