๐ ClickFix has moved to Windows Terminal.
Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.
That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.
๐ Read โ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.
That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.
๐ Read โ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
๐คฏ10๐3๐ฅ3๐3โก1
๐จ China-linked APT UAT-9244 has been targeting telecom networks in South America since 2024.
Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโused for persistence, command control, and large-scale brute-force scanning.
๐ Inside TernDoor, PeerTime, and BruteEntry โ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโused for persistence, command control, and large-scale brute-force scanning.
๐ Inside TernDoor, PeerTime, and BruteEntry โ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
๐6๐ฅ3๐3๐ฑ3โก1
๐ Iran-linked hackers quietly embedded inside multiple U.S. organizations, Broadcom researchers report.
The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.
๐ Read โ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.
๐ Read โ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
๐ฅ29๐6๐ฑ4โก2๐1
MSPs trying to scale cybersecurity hit the same wall: manual risk assessments that donโt scale.
AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโenabling continuous security services instead of one-off fixes.
๐ Inside: framework for scalable risk-first cybersecurity services โ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโenabling continuous security services instead of one-off fixes.
๐ Inside: framework for scalable risk-first cybersecurity services โ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
๐4๐ฅ2๐ค2โก1
Your shiny new AI agent can now:
๐ Browse
๐ ๏ธ Execute code
โข๏ธ Touch production systems
Agency Gap = tools + APIs + permissions = new attack surface.
Secure your agents BEFORE they get owned.
๐ Join the webinar โ https://thehacker.news/ai-agents-attack-surface
๐ Browse
๐ ๏ธ Execute code
โข๏ธ Touch production systems
Agency Gap = tools + APIs + permissions = new attack surface.
Secure your agents BEFORE they get owned.
๐ Join the webinar โ https://thehacker.news/ai-agents-attack-surface
๐ฅ4๐ค3๐2
โ ๏ธ VOID#GEIST malware delivers 3 RATs: XWorm, AsyncRAT, and Xeno RAT through a layered script chain.
Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.
๐ Inside the full fileless attack chain โ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.
๐ Inside the full fileless attack chain โ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
๐ฅ5๐3๐2
โก Bitdefender says Pakistan-aligned Transparent Tribe (APT36) is targeting Indian government entities with AI-generated malware.
The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.
๐ Inside: phishing chain, malware tools, and infrastructure โ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.
๐ Inside: phishing chain, malware tools, and infrastructure โ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
๐17๐4๐ฅ3๐2โก1
๐ฎ Car tire pressure sensors may expose where you go.
Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.
That enables long-term trackingโno cameras, no line of sight.
๐ How TPMS signals reveal vehicle movement โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.
That enables long-term trackingโno cameras, no line of sight.
๐ How TPMS signals reveal vehicle movement โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
โก14๐ฅ8๐8๐คฏ1
โกNATO has cleared #iPhone and iPad to handle classified information.
The approval relies on built-in iOS and iPadOS securityโno custom hardening or special software required.
Germanyโs BSI had already cleared the devices for classified government use.
๐ Details on NATO approval โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
The approval relies on built-in iOS and iPadOS securityโno custom hardening or special software required.
Germanyโs BSI had already cleared the devices for classified government use.
๐ Details on NATO approval โ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
โก17๐7๐7๐ฑ4๐ค1
๐ฅ Anthropic says its #Claude model found 22 Firefox vulnerabilities while scanning ~6,000 C++ files with Mozilla.
14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.
๐ Read โ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.
๐ Read โ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
๐ฅ30๐คฏ9๐5๐1๐ฑ1
๐ฅ OpenAI launched "Codex Security," an AI agent that finds and fixes code vulnerabilities.
In testing it scanned 1.2M commits across open-source repos, uncovering 792 critical and 10,561 high-severity flaws in projects including OpenSSH, GnuTLS, PHP, and Chromium.
๐ Details โ https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html
In testing it scanned 1.2M commits across open-source repos, uncovering 792 critical and 10,561 high-severity flaws in projects including OpenSSH, GnuTLS, PHP, and Chromium.
๐ Details โ https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html
๐คฏ26๐ฅ14๐5๐ค3๐1