๐จ DDR5 bot scalping, Telegram cybercrime hubs, and new malware campaigns.
This weekโs #ThreatsDay Bulletin breaks down the biggest security threats and tactics shaping the threat landscape right now.
๐ Read โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html
This weekโs #ThreatsDay Bulletin breaks down the biggest security threats and tactics shaping the threat landscape right now.
๐ Read โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html
๐7๐คฏ6
โ ๏ธ Cisco confirms active exploitation of two Catalyst SD-WAN Manager flaws.
โถ CVE-2026-20122 enables arbitrary file overwrite via API credentials.
โถCVE-2026-20128 can expose data and grant DCA privileges after login.
๐ Read โ https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html
Patches are out across multiple releases.
โถ CVE-2026-20122 enables arbitrary file overwrite via API credentials.
โถCVE-2026-20128 can expose data and grant DCA privileges after login.
๐ Read โ https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html
Patches are out across multiple releases.
๐ฅ11๐5๐คฏ4โก1๐1
โ ๏ธ CISA added two CVSS 9.8 flaws to its KEV list after active exploitation.
One hits Hikvision devices and can expose sensitive data. The other targets Rockwell Logix controllers and could let attackers alter system configs.
๐ Details โ https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html
Federal agencies must patch by March 26.
One hits Hikvision devices and can expose sensitive data. The other targets Rockwell Logix controllers and could let attackers alter system configs.
๐ Details โ https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html
Federal agencies must patch by March 26.
๐ฅ5๐2โก1
๐ ClickFix has moved to Windows Terminal.
Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.
That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.
๐ Read โ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.
That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.
๐ Read โ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
๐คฏ9๐3๐ฅ3๐3โก1
๐จ China-linked APT UAT-9244 has been targeting telecom networks in South America since 2024.
Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโused for persistence, command control, and large-scale brute-force scanning.
๐ Inside TernDoor, PeerTime, and BruteEntry โ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโused for persistence, command control, and large-scale brute-force scanning.
๐ Inside TernDoor, PeerTime, and BruteEntry โ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
๐5๐ฅ3๐3๐ฑ3โก1
๐ Iran-linked hackers quietly embedded inside multiple U.S. organizations, Broadcom researchers report.
The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.
๐ Read โ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.
๐ Read โ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
๐ฅ26๐6๐ฑ4โก2๐1
MSPs trying to scale cybersecurity hit the same wall: manual risk assessments that donโt scale.
AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโenabling continuous security services instead of one-off fixes.
๐ Inside: framework for scalable risk-first cybersecurity services โ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโenabling continuous security services instead of one-off fixes.
๐ Inside: framework for scalable risk-first cybersecurity services โ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
๐3๐ฅ2๐ค2โก1
Your shiny new AI agent can now:
๐ Browse
๐ ๏ธ Execute code
โข๏ธ Touch production systems
Agency Gap = tools + APIs + permissions = new attack surface.
Secure your agents BEFORE they get owned.
๐ Join the webinar โ https://thehacker.news/ai-agents-attack-surface
๐ Browse
๐ ๏ธ Execute code
โข๏ธ Touch production systems
Agency Gap = tools + APIs + permissions = new attack surface.
Secure your agents BEFORE they get owned.
๐ Join the webinar โ https://thehacker.news/ai-agents-attack-surface
๐ฅ3๐ค3๐2
โ ๏ธ VOID#GEIST malware delivers 3 RATs: XWorm, AsyncRAT, and Xeno RAT through a layered script chain.
Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.
๐ Inside the full fileless attack chain โ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.
๐ Inside the full fileless attack chain โ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
๐ฅ4๐3๐2
โก Bitdefender says Pakistan-aligned Transparent Tribe (APT36) is targeting Indian government entities with AI-generated malware.
The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.
๐ Inside: phishing chain, malware tools, and infrastructure โ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.
๐ Inside: phishing chain, malware tools, and infrastructure โ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
๐16๐ฅ3๐3๐2โก1
๐ฎ Car tire pressure sensors may expose where you go.
Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.
That enables long-term trackingโno cameras, no line of sight.
๐ How TPMS signals reveal vehicle movement โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.
That enables long-term trackingโno cameras, no line of sight.
๐ How TPMS signals reveal vehicle movement โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
โก12๐ฅ8๐8
โกNATO has cleared #iPhone and iPad to handle classified information.
The approval relies on built-in iOS and iPadOS securityโno custom hardening or special software required.
Germanyโs BSI had already cleared the devices for classified government use.
๐ Details on NATO approval โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
The approval relies on built-in iOS and iPadOS securityโno custom hardening or special software required.
Germanyโs BSI had already cleared the devices for classified government use.
๐ Details on NATO approval โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
โก16๐7๐7๐ฑ3๐ค1
๐ฅ Anthropic says its #Claude model found 22 Firefox vulnerabilities while scanning ~6,000 C++ files with Mozilla.
14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.
๐ Read โ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.
๐ Read โ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
๐ฅ24๐คฏ7๐5
๐ฅ OpenAI launched "Codex Security," an AI agent that finds and fixes code vulnerabilities.
In testing it scanned 1.2M commits across open-source repos, uncovering 792 critical and 10,561 high-severity flaws in projects including OpenSSH, GnuTLS, PHP, and Chromium.
๐ Details โ https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html
In testing it scanned 1.2M commits across open-source repos, uncovering 792 critical and 10,561 high-severity flaws in projects including OpenSSH, GnuTLS, PHP, and Chromium.
๐ Details โ https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html
๐คฏ8๐ฅ3