The Hacker News
โœ”
155K subscribers
2.5K photos
16 videos
4 files
8.43K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ China-linked APT UAT-9244 has been targeting telecom networks in South America since 2024.

Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโ€”used for persistence, command control, and large-scale brute-force scanning.

๐Ÿ”— Inside TernDoor, PeerTime, and BruteEntry โ†’ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
๐Ÿ‘7๐Ÿ”ฅ5๐Ÿ˜3๐Ÿ˜ฑ3โšก1
๐Ÿ›‘ Iran-linked hackers quietly embedded inside multiple U.S. organizations, Broadcom researchers report.

The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
๐Ÿ”ฅ33๐Ÿ‘8๐Ÿ˜ฑ4โšก2๐Ÿ˜1
MSPs trying to scale cybersecurity hit the same wall: manual risk assessments that donโ€™t scale.

AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโ€”enabling continuous security services instead of one-off fixes.

๐Ÿ”— Inside: framework for scalable risk-first cybersecurity services โ†’ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
๐Ÿ‘4๐Ÿ”ฅ3๐Ÿค”2โšก1
Your shiny new AI agent can now:

๐Ÿ”— Browse
๐Ÿ› ๏ธ Execute code
โ˜ข๏ธ Touch production systems

Agency Gap = tools + APIs + permissions = new attack surface.

Secure your agents BEFORE they get owned.

๐Ÿ”— Join the webinar โ†’ https://thehacker.news/ai-agents-attack-surface
๐Ÿ”ฅ4๐Ÿค”3๐Ÿ‘2
โš ๏ธ VOID#GEIST malware delivers 3 RATs: XWorm, AsyncRAT, and Xeno RAT through a layered script chain.

Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.

๐Ÿ”— Inside the full fileless attack chain โ†’ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
๐Ÿ”ฅ6๐Ÿ˜3๐Ÿ‘2
โšก Bitdefender says Pakistan-aligned Transparent Tribe (APT36) is targeting Indian government entities with AI-generated malware.

The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.

๐Ÿ”— Inside: phishing chain, malware tools, and infrastructure โ†’ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
๐Ÿ˜18๐Ÿ‘5๐Ÿ”ฅ3๐Ÿ‘2โšก1
๐Ÿ˜ฎ Car tire pressure sensors may expose where you go.

Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.

That enables long-term trackingโ€”no cameras, no line of sight.

๐Ÿ”— How TPMS signals reveal vehicle movement โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
โšก15๐Ÿ”ฅ11๐Ÿ˜8๐Ÿคฏ1
โšกNATO has cleared #iPhone and iPad to handle classified information.

The approval relies on built-in iOS and iPadOS securityโ€”no custom hardening or special software required.

Germanyโ€™s BSI had already cleared the devices for classified government use.

๐Ÿ”— Details on NATO approval โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
โšก18๐Ÿ˜9๐Ÿ‘8๐Ÿ˜ฑ4๐Ÿ”ฅ2๐Ÿค”1
๐Ÿ”ฅ Anthropic says its #Claude model found 22 Firefox vulnerabilities while scanning ~6,000 C++ files with Mozilla.

14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
๐Ÿ”ฅ38๐Ÿคฏ11๐Ÿ˜5๐Ÿ˜ฑ3๐Ÿ‘2
๐Ÿ”ฅ OpenAI launched "Codex Security," an AI agent that finds and fixes code vulnerabilities.

In testing it scanned 1.2M commits across open-source repos, uncovering 792 critical and 10,561 high-severity flaws in projects including OpenSSH, GnuTLS, PHP, and Chromium.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html
๐Ÿคฏ40๐Ÿ”ฅ21๐Ÿ‘7๐Ÿ˜7๐Ÿค”4โšก1
โš ๏ธ A newly tracked threat cluster is quietly breaching critical infrastructure across Asia.

Unit 42 says attackers exploit web servers, plant web shells, and dump credentials with tools like Mimikatz to move across networks in aviation, energy, and government sectors.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/web-server-exploits-and-mimikatz-used.html
๐Ÿ‘4๐Ÿ˜3๐Ÿ‘2
๐Ÿ›‘ Two Chrome extensions turned malicious after an ownership transfer.

Researchers say QuickLens (7,000 users) now strips security headers and pulls remote code every 5 minutes. The payload executes via hidden elements, leaving no malicious code in the extension source.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/chrome-extension-turns-malicious-after.html
๐Ÿ˜6โšก2๐Ÿ‘2๐Ÿคฏ2