๐ Suspected Iran-linked hackers targeted Iraqi officials by impersonating the foreign ministry and delivering malware.
Tracked as Dust Specter, the campaign deploys SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM via password-protected archives and DLL sideloading.
๐ Read โ https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html
Tracked as Dust Specter, the campaign deploys SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM via password-protected archives and DLL sideloading.
๐ Read โ https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html
๐คฏ9๐5๐4๐ฅ2๐ค2๐1๐ฑ1
๐ฅ ActiveState Launches World's Largest Secure OSS Catalog With 79M Components.
ActiveState has launched the worldโs largest secure open-source catalog, uniting 79M components across 12+ languages (Java, Python, Rust, etc.). It cuts CVE exposure by 99% via SLSA-3 builds and reclaims 30% of engineering time by automating manual maintenance and governance.
๐ Read the release: https://thn.news/open-source-catalog
ActiveState has launched the worldโs largest secure open-source catalog, uniting 79M components across 12+ languages (Java, Python, Rust, etc.). It cuts CVE exposure by 99% via SLSA-3 builds and reclaims 30% of engineering time by automating manual maintenance and governance.
๐ Read the release: https://thn.news/open-source-catalog
๐8
๐จ DDR5 bot scalping, Telegram cybercrime hubs, and new malware campaigns.
This weekโs #ThreatsDay Bulletin breaks down the biggest security threats and tactics shaping the threat landscape right now.
๐ Read โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html
This weekโs #ThreatsDay Bulletin breaks down the biggest security threats and tactics shaping the threat landscape right now.
๐ Read โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html
๐7๐คฏ6
โ ๏ธ Cisco confirms active exploitation of two Catalyst SD-WAN Manager flaws.
โถ CVE-2026-20122 enables arbitrary file overwrite via API credentials.
โถCVE-2026-20128 can expose data and grant DCA privileges after login.
๐ Read โ https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html
Patches are out across multiple releases.
โถ CVE-2026-20122 enables arbitrary file overwrite via API credentials.
โถCVE-2026-20128 can expose data and grant DCA privileges after login.
๐ Read โ https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html
Patches are out across multiple releases.
๐ฅ11๐5๐คฏ4โก1๐1
โ ๏ธ CISA added two CVSS 9.8 flaws to its KEV list after active exploitation.
One hits Hikvision devices and can expose sensitive data. The other targets Rockwell Logix controllers and could let attackers alter system configs.
๐ Details โ https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html
Federal agencies must patch by March 26.
One hits Hikvision devices and can expose sensitive data. The other targets Rockwell Logix controllers and could let attackers alter system configs.
๐ Details โ https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html
Federal agencies must patch by March 26.
๐ฅ5๐1
๐ ClickFix has moved to Windows Terminal.
Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.
That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.
๐ Read โ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.
That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.
๐ Read โ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
๐คฏ8๐2๐ฅ2๐2
๐จ China-linked APT UAT-9244 has been targeting telecom networks in South America since 2024.
Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโused for persistence, command control, and large-scale brute-force scanning.
๐ Inside TernDoor, PeerTime, and BruteEntry โ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโused for persistence, command control, and large-scale brute-force scanning.
๐ Inside TernDoor, PeerTime, and BruteEntry โ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
๐4๐ฑ3๐ฅ2๐2
๐ Iran-linked hackers quietly embedded inside multiple U.S. organizations, Broadcom researchers report.
The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.
๐ Read โ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.
๐ Read โ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
๐ฅ25๐6๐ฑ4๐1
MSPs trying to scale cybersecurity hit the same wall: manual risk assessments that donโt scale.
AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโenabling continuous security services instead of one-off fixes.
๐ Inside: framework for scalable risk-first cybersecurity services โ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโenabling continuous security services instead of one-off fixes.
๐ Inside: framework for scalable risk-first cybersecurity services โ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
๐3๐ฅ2๐ค1
Your shiny new AI agent can now:
๐ Browse
๐ ๏ธ Execute code
โข๏ธ Touch production systems
Agency Gap = tools + APIs + permissions = new attack surface.
Secure your agents BEFORE they get owned.
๐ Join the webinar โ https://thehacker.news/ai-agents-attack-surface
๐ Browse
๐ ๏ธ Execute code
โข๏ธ Touch production systems
Agency Gap = tools + APIs + permissions = new attack surface.
Secure your agents BEFORE they get owned.
๐ Join the webinar โ https://thehacker.news/ai-agents-attack-surface
๐ค3๐2๐ฅ2
โ ๏ธ VOID#GEIST malware delivers 3 RATs: XWorm, AsyncRAT, and Xeno RAT through a layered script chain.
Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.
๐ Inside the full fileless attack chain โ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.
๐ Inside the full fileless attack chain โ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
๐ฅ3๐2๐2
โก Bitdefender says Pakistan-aligned Transparent Tribe (APT36) is targeting Indian government entities with AI-generated malware.
The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.
๐ Inside: phishing chain, malware tools, and infrastructure โ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.
๐ Inside: phishing chain, malware tools, and infrastructure โ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
๐15๐ฅ3๐2๐1
๐ฎ Car tire pressure sensors may expose where you go.
Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.
That enables long-term trackingโno cameras, no line of sight.
๐ How TPMS signals reveal vehicle movement โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.
That enables long-term trackingโno cameras, no line of sight.
๐ How TPMS signals reveal vehicle movement โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
โก9๐ฅ7๐5
โกNATO has cleared #iPhone and iPad to handle classified information.
The approval relies on built-in iOS and iPadOS securityโno custom hardening or special software required.
Germanyโs BSI had already cleared the devices for classified government use.
๐ Details on NATO approval โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
The approval relies on built-in iOS and iPadOS securityโno custom hardening or special software required.
Germanyโs BSI had already cleared the devices for classified government use.
๐ Details on NATO approval โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
โก13๐7๐4๐ค1๐ฑ1
๐ฅ Anthropic says its #Claude model found 22 Firefox vulnerabilities while scanning ~6,000 C++ files with Mozilla.
14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.
๐ Read โ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.
๐ Read โ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
๐ฅ14๐2๐คฏ1