The Hacker News
βœ”
155K subscribers
2.5K photos
16 videos
4 files
8.43K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
πŸ” Chrome is testing Merkle Tree Certificates (MTCs) to prepare HTTPS for the post-quantum era.

Instead of embedding post-quantum keys in bulky X.509 chains, a CA signs one β€œTree Head” covering millions of certs. Browsers get a compact proof of inclusion, reducing TLS handshake data.

πŸ”— Read β†’ https://thehackernews.com/2026/03/google-develops-merkle-tree.html
πŸ”₯15⚑4πŸ‘1
⚠️ A new Google Chrome flaw (CVE-2026-0628, CVSS 8.8) could let a malicious extension inject code into the Gemini side panel due to weak WebView policy enforcement.

Successful exploitation enabled privilege escalation and potential access to the camera, microphone, screenshots, and local files.

πŸ”— Details β†’ https://thehackernews.com/2026/03/new-chrome-vulnerability-let-malicious.html
😁23🀯15
A threat group known as SloppyLemming used Rust malware for the first time in attacks on Pakistani and Bangladeshi government and infrastructure networks.

Arctic Wolf links the activity to spear-phishing, ClickOnce abuse, and a BurrowShell implant that masks traffic as Windows Update.

πŸ”— Details β†’ https://thehackernews.com/2026/03/sloppylemming-targets-pakistan-and.html
πŸ€”10πŸ”₯5πŸ‘3
⚠️ Google says CVE-2026-21385 is being exploited in the wild.

The high-severity flaw affects a Qualcomm graphics component in Android and involves a buffer over-read caused by an integer overflow. Activity appears limited and targeted.

πŸ”— Details β†’ https://thehackernews.com/2026/03/google-confirms-cve-2026-21385-in.html
😁9πŸ‘4πŸ€”3
AI is being sold as the fix for lean security teams. The reality is more nuanced.

Small teams face rising threats and limited staff. AI can improve detection and triage, but it also demands integration, tuning, and oversight. Many tools add noise instead of clarity.

For lean teams, the question is outcomes, not AI labels.

πŸ”— Inside: build vs MDR tradeoffs and Forrester’s findings β†’ https://thehackernews.com/expert-insights/2026/03/ai-in-cybersecurity-is-it-worth-effort.html
πŸ‘6😁4🀯4
⚠️ A new phishing wave uses malicious OAuth apps to bypass email and browser defenses, #Microsoft warns.

Victims click links tied to fake app scopes, get redirected through legitimate identity providers, and end up downloading ZIP files that trigger PowerShell, MSI installs, and DLL sideloading.

πŸ”— Read β†’ https://thehackernews.com/2026/03/microsoft-warns-oauth-redirect-abuse.html
πŸ”₯11😱5πŸ‘3
🚨 A new phishing suite called "Starkiller" proxies real login pages to bypass MFA.

It runs headless Chrome in Docker, loads the legitimate site, and relays everything live. Keystrokes and session tokens pass through attacker infrastructure, enabling account takeover.

πŸ”— How the AitM setup works β†’ https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html
🀯17πŸ‘6πŸ”₯6
Nearly 70% of enterprises already run AI agents in production, but governance isn’t keeping pace.

MCP-based agents can access apps, reuse tokens, and execute workflows without fitting into normal IAM lifecycles. That leaves stale credentials, over-scoped access, and weak audit trails.

Gartner calls for supervisory guardrails.

πŸ”— Where AI becomes identity risk β†’ https://thehackernews.com/2026/03/ai-agents-next-wave-identity-dark.html
πŸ”₯4🀯4πŸ‘3
⚠️ 600+ FortiGate devices breached in an AI-assisted campaign.

Team Cymru traced it to #CyberStrikeAI, an open-source Go tool bundling 100+ security utilities, run from 21 IPs across Asia and beyond.

The maintainer shows ties to #China’s vulnerability ecosystem.

πŸ”— Details β†’ https://thehackernews.com/2026/03/open-source-cyberstrikeai-deployed-in.html
πŸ‘7πŸ”₯5🀯5⚑2
Threat actors deployed modified Havoc C2 after posing as IT support.

They spam-bombed targets, called them directly to gain remote access, sent victims to a fake Outlook β€œanti-spam” page to steal credentials, then used DLL sideloading and legit RMM tools to move to nine endpoints in 11 hours.

πŸ”— Read β†’ https://thehackernews.com/2026/03/fake-tech-support-spam-deploys.html
πŸ‘8⚑4πŸ”₯3πŸ‘3
πŸ›‘ A command-injection bug in VMware Aria Operations is now in CISA’s KEV catalog.

The flaw β€” CVE-2026-22719 (CVSS 8.1) β€” could let unauthenticated attackers run arbitrary commands during migration workflows.

πŸ”— Details β†’ https://thehackernews.com/2026/03/cisa-adds-actively-exploited-vmware.html
πŸ”₯12⚑3πŸ€”3πŸ‘2
πŸ‰ Silver Dragon APT is breaching government networks in Europe and Southeast Asia via server exploits and phishing.

Researchers link the activity to the APT41 ecosystem, using BamboLoader and DNS tunneling to maintain covert access.

πŸ”— Read β†’ https://thehackernews.com/2026/03/apt41-linked-silver-dragon-targets.html
😁13πŸ”₯6πŸ€”3πŸ‘2
AI in the SOC is shifting from alert triage to full investigations, writes Jon Hencinski of Prophet Security.

In one case, an AI system ran 265 queries across 6 data sources to confirm a compromised AWS credential used for cloud reconnaissanceβ€”work normally done by senior analysts.

πŸ”— How the investigation reconstructed the attack β†’ https://thehackernews.com/expert-insights/2026/03/ai-soc-investigation-has-moved-beyond.html
πŸ”₯10πŸ‘3🀯3
πŸ–₯️ Malicious Packagist packages posing as Laravel helpers install a remote access trojan.

The malware connects to a C2 server, runs shell commands, uploads files, captures screenshots, and retries every 15 seconds to stay persistent.

πŸ”— Malware behavior and package names β†’ https://thehackernews.com/2026/03/fake-laravel-packages-on-packagist.html
πŸ‘6πŸ”₯3🀯1
⚠️ Many SOCs’ weakest link isn’t toolsβ€”it’s Tier-1 analysts.

Most alerts + least experience β†’ alert fatigue & false positives β†’ slower detection & delayed escalation.

Better threat intel turns alerts into fast decisions.

πŸ”— How intel feeds + sandbox analysis strengthen Tier-1 triage β†’ https://thehackernews.com/2026/03/building-high-impact-tier-1-3-steps.html
πŸ”₯7🀯4πŸ‘3
βœ… 5-Step Readiness Checklist for Security Automation.

Security questionnaires are a critical part of security reviews, but manual processes slow teams down and increase risk.

πŸ“‹ This 5-step automated security readiness checklist outlines the foundational steps GRC and information security teams need to prepare for automation that is accurate, defensible, and scalable.

Download the checklist to assess your readiness and take the first step toward more efficient security reviews

πŸ”— https://thn.news/automated-sec-checklist
πŸ‘6
πŸ›‘ ALERT: Google uncovered an #iPhone exploit kit called Coruna containing 23 iOS exploits targeting versions 13–17.2.1.

The framework fingerprints devices and automatically loads the matching WebKit exploit chain. Researchers say it moved from #surveillance vendors to nation-state operators and later cybercrime groups.

πŸ”— Exploit chains, campaigns, and malware payload details β†’ https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html
πŸ‘9😁8πŸ”₯5πŸ€”2
⚠️ Multiple infostealers β€” Arkanix, NovaStealer, DarkCloud, MawaStealer and others β€” are active in the wild.

Researchers say Arkanix was likely built with LLM assistance, speeding malware development. Stolen logs are filtered and sold to brokers seeking corporate network access.

πŸ”— Read β†’ https://thehackernews.com/2026/03/weekly-recap-sd-wan-0-day-critical-cves.html#:~:text=Multiple%20Stealer%20Malware%20Families%20Detected
😁5🀯3⚑2πŸ”₯2
Human-led. Rules-based. LLM-powered agentic systems. Each promises efficiency. Each has limits.

The real advantage? Knowing when, and how, to use them together.

The teams pulling ahead aren’t betting on a single model. They’re architecting a custom mix of all three.

On March 12th, join Tines for Workflow clarity: Where AI fits in modern automation. You'll learn how to harness AI with clarity and control, and determine the right combination of workflows for you.

πŸ”— Register and learn more here: https://thn.news/modern-automation-ai
πŸ€”6πŸ‘3⚑2
πŸ›‘ Hacktivists launched 149 DDoS attacks targeting 110 organizations in 16 countries after the U.S.–Israel strikes on Iran, security researchers report.

Most attacks hit government systems in the Middle East, with Kuwait, Israel, and Jordan seeing the highest activity.

πŸ”— Read β†’ https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html
⚑16πŸ‘12😁9πŸ€”7πŸ”₯4
Authorities have seized #LeakBase, a cybercrime forum used to trade stolen databases and infostealer logs.

Site had 142k+ members and hosted hundreds of millions of stolen credentials & financial records used for account takeovers and fraud.

πŸ”— Read β†’ https://thehackernews.com/2026/03/fbi-and-europol-seize-leakbase-forum.html
πŸ‘11πŸ”₯3