The Hacker News
โœ”
155K subscribers
2.49K photos
16 videos
4 files
8.42K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
โš ๏ธ Most encrypted web traffic relies on ECDHE, the TLS key exchange that lets browsers and servers derive a shared secret.

Quantum computers could break the elliptic-curve math behind it. The industry is moving to hybrid exchanges combining ECDHE with post-quantum ML-KEM.

๐Ÿ”— Learn how hybrid key exchange protects data from future quantum attacks โ†’ https://thehackernews.com/expert-insights/2026/03/demystifying-key-exchange-from.html
๐Ÿ‘11๐Ÿ”ฅ4
๐Ÿšจ Russian-linked hackers are using BadPaw and MeowMeow malware to target Ukrainian entities.

Phishing emails deliver a ZIP with an HTA lure. Code hidden in a PNG loads a .NET dropper that installs a backdoor capable of running PowerShell commands and manipulating files.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html
๐Ÿ˜14๐Ÿ‘4๐Ÿ”ฅ4๐Ÿคฏ4๐Ÿ˜ฑ1
๐Ÿ›‘ Suspected Iran-linked hackers targeted Iraqi officials by impersonating the foreign ministry and delivering malware.

Tracked as Dust Specter, the campaign deploys SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM via password-protected archives and DLL sideloading.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html
๐Ÿคฏ9๐Ÿ‘5๐Ÿ˜4๐Ÿ”ฅ2๐Ÿค”2๐Ÿ‘1๐Ÿ˜ฑ1
๐Ÿ”ฅ ActiveState Launches World's Largest Secure OSS Catalog With 79M Components.

ActiveState has launched the worldโ€™s largest secure open-source catalog, uniting 79M components across 12+ languages (Java, Python, Rust, etc.). It cuts CVE exposure by 99% via SLSA-3 builds and reclaims 30% of engineering time by automating manual maintenance and governance.

๐Ÿ”— Read the release: https://thn.news/open-source-catalog
๐Ÿ‘8
๐Ÿšจ DDR5 bot scalping, Telegram cybercrime hubs, and new malware campaigns.

This weekโ€™s #ThreatsDay Bulletin breaks down the biggest security threats and tactics shaping the threat landscape right now.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html
๐Ÿ‘7๐Ÿคฏ6
โš ๏ธ Cisco confirms active exploitation of two Catalyst SD-WAN Manager flaws.

โ–ถ CVE-2026-20122 enables arbitrary file overwrite via API credentials.
โ–ถCVE-2026-20128 can expose data and grant DCA privileges after login.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html

Patches are out across multiple releases.
๐Ÿ”ฅ11๐Ÿ‘5๐Ÿคฏ4โšก1๐Ÿ‘1
โš ๏ธ CISA added two CVSS 9.8 flaws to its KEV list after active exploitation.

One hits Hikvision devices and can expose sensitive data. The other targets Rockwell Logix controllers and could let attackers alter system configs.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html

Federal agencies must patch by March 26.
๐Ÿ”ฅ5๐Ÿ‘1
๐Ÿ›‘ ClickFix has moved to Windows Terminal.

Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.

That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
๐Ÿคฏ8๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ˜2
๐Ÿšจ China-linked APT UAT-9244 has been targeting telecom networks in South America since 2024.

Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโ€”used for persistence, command control, and large-scale brute-force scanning.

๐Ÿ”— Inside TernDoor, PeerTime, and BruteEntry โ†’ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
๐Ÿ‘4๐Ÿ˜ฑ3๐Ÿ”ฅ2๐Ÿ˜2
๐Ÿ›‘ Iran-linked hackers quietly embedded inside multiple U.S. organizations, Broadcom researchers report.

The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
๐Ÿ”ฅ25๐Ÿ‘6๐Ÿ˜ฑ4๐Ÿ˜1
MSPs trying to scale cybersecurity hit the same wall: manual risk assessments that donโ€™t scale.

AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโ€”enabling continuous security services instead of one-off fixes.

๐Ÿ”— Inside: framework for scalable risk-first cybersecurity services โ†’ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
๐Ÿ‘3๐Ÿ”ฅ2๐Ÿค”1
Your shiny new AI agent can now:

๐Ÿ”— Browse
๐Ÿ› ๏ธ Execute code
โ˜ข๏ธ Touch production systems

Agency Gap = tools + APIs + permissions = new attack surface.

Secure your agents BEFORE they get owned.

๐Ÿ”— Join the webinar โ†’ https://thehacker.news/ai-agents-attack-surface
๐Ÿค”3๐Ÿ‘2๐Ÿ”ฅ2
โš ๏ธ VOID#GEIST malware delivers 3 RATs: XWorm, AsyncRAT, and Xeno RAT through a layered script chain.

Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.

๐Ÿ”— Inside the full fileless attack chain โ†’ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
๐Ÿ”ฅ3๐Ÿ‘2๐Ÿ˜2
โšก Bitdefender says Pakistan-aligned Transparent Tribe (APT36) is targeting Indian government entities with AI-generated malware.

The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.

๐Ÿ”— Inside: phishing chain, malware tools, and infrastructure โ†’ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
๐Ÿ˜15๐Ÿ”ฅ3๐Ÿ‘2๐Ÿ‘1
๐Ÿ˜ฎ Car tire pressure sensors may expose where you go.

Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.

That enables long-term trackingโ€”no cameras, no line of sight.

๐Ÿ”— How TPMS signals reveal vehicle movement โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
โšก9๐Ÿ”ฅ7๐Ÿ˜5
โšกNATO has cleared #iPhone and iPad to handle classified information.

The approval relies on built-in iOS and iPadOS securityโ€”no custom hardening or special software required.

Germanyโ€™s BSI had already cleared the devices for classified government use.

๐Ÿ”— Details on NATO approval โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
โšก13๐Ÿ‘7๐Ÿ˜4๐Ÿค”1๐Ÿ˜ฑ1
๐Ÿ”ฅ Anthropic says its #Claude model found 22 Firefox vulnerabilities while scanning ~6,000 C++ files with Mozilla.

14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
๐Ÿ”ฅ14๐Ÿ˜2๐Ÿคฏ1