β οΈ A malicious npm package is spreading a full RAT malware disguised as an OpenClaw installer.
It pulls a hidden second-stage payload and steals browser data, macOS Keychain entries, crypto wallets, and developer cloud credentials.
π Read β https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html
It pulls a hidden second-stage payload and steals browser data, macOS Keychain entries, crypto wallets, and developer cloud credentials.
π Read β https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html
π₯24π€―3β‘1π1
β οΈ CISA added 3 actively exploited flaws to KEV.
Most critical: SolarWinds Web Help Desk CVE-2025-26399 (CVSS 9.8) allowing remote command execution.
Other KEV entries hit Omnissa Workspace One UEM and Ivanti Endpoint Manager. Federal agencies ordered to patch.
π Details β https://thehackernews.com/2026/03/cisa-flags-solarwinds-ivanti-and.html
Most critical: SolarWinds Web Help Desk CVE-2025-26399 (CVSS 9.8) allowing remote command execution.
Other KEV entries hit Omnissa Workspace One UEM and Ivanti Endpoint Manager. Federal agencies ordered to patch.
π Details β https://thehackernews.com/2026/03/cisa-flags-solarwinds-ivanti-and.html
π10π±4
Security teams often prioritize fixes by CVSS. But CVSS measures technical severity, not actual risk.
A 9.8 CVSS flaw in an isolated test system may be patched first, while a lower-scored bug in a public login API waits.
Real risk depends on exposure, exploit paths, and business impact.
π Why context changes vulnerability priorities β https://thehackernews.com/expert-insights/2026/03/why-cvss-scores-dont-tell-real-story-of.html
A 9.8 CVSS flaw in an isolated test system may be patched first, while a lower-scored bug in a public login API waits.
Real risk depends on exposure, exploit paths, and business impact.
π Why context changes vulnerability priorities β https://thehackernews.com/expert-insights/2026/03/why-cvss-scores-dont-tell-real-story-of.html
π₯15π6π±2π1π€―1
πThreat actors are mass-scanning #Salesforce Experience Cloud sites using AuraInspector.
The tool probes the /s/sfsites/aura API and can extract CRM data if guest user permissions are too broad. Salesforce says the platform isnβt vulnerableβmisconfiguration is the risk.
π Read β https://thehackernews.com/2026/03/threat-actors-mass-scan-salesforce.html
The tool probes the /s/sfsites/aura API and can extract CRM data if guest user permissions are too broad. Salesforce says the platform isnβt vulnerableβmisconfiguration is the risk.
π Read β https://thehackernews.com/2026/03/threat-actors-mass-scan-salesforce.html
π€8π€―7π3
π Russian state-linked hackers APT28 are spying on Ukrainian military targets using BEARDSHELL and a modified COVENANT framework.
Active since April 2024, the operation hides command-and-control in cloud services like Icedrive and Filen.
π Read β https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html
Active since April 2024, the operation hides command-and-control in cloud services like Icedrive and Filen.
π Read β https://thehackernews.com/2026/03/apt28-uses-beardshell-and-covenant.html
π€―10π9π₯6π6π3
Serious vulnerabilities now get exploited within 24β48 hours of disclosure. Some forecasts say minutes by 2028.
During the SharePoint ToolShell zero-day, thousands of servers were still exposed to the internet β many unnecessarily.
π Why attack surface exposure gets missed β https://thehackernews.com/2026/03/the-zero-day-scramble-is-avoidable.html
During the SharePoint ToolShell zero-day, thousands of servers were still exposed to the internet β many unnecessarily.
π Why attack surface exposure gets missed β https://thehackernews.com/2026/03/the-zero-day-scramble-is-avoidable.html
π5π4π±3π₯2
β‘ WEBINAR β AI agents now send emails, move data, and run tasks across company systems.
Many operate as βinvisible employeesβ with access security teams rarely track. Attackers exploit this by planting instructions that make agents leak sensitive data.
π Learn how to secure AI agent workflows β https://thehackernews.com/2026/03/how-to-stop-ai-data-leaks-webinar-guide.html
Many operate as βinvisible employeesβ with access security teams rarely track. Attackers exploit this by planting instructions that make agents leak sensitive data.
π Learn how to secure AI agent workflows β https://thehackernews.com/2026/03/how-to-stop-ai-data-leaks-webinar-guide.html
π₯7π5π3π±1
π¨ Researchers found 9 cross-tenant flaws in #Google Looker Studio that could let attackers run arbitrary SQL queries on connected databases and access cloud data.
BigQuery, Sheets, #PostgreSQL, and other connectors were exposed.
π Attack paths and affected services β https://thehackernews.com/2026/03/new-leakylooker-flaws-in-google-looker.html
BigQuery, Sheets, #PostgreSQL, and other connectors were exposed.
π Attack paths and affected services β https://thehackernews.com/2026/03/new-leakylooker-flaws-in-google-looker.html
π3π₯2β‘1π1
π KadNap malware has infected 14,000+ devices since Aug 2025, mostly in the U.S.
Targets Asus routers and hides C2 using a peer-to-peer DHT network. Infected devices are sold as residential proxies through the DoppelgΓ€nger service.
π Details β https://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.html
Targets Asus routers and hides C2 using a peer-to-peer DHT network. Infected devices are sold as residential proxies through the DoppelgΓ€nger service.
π Details β https://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.html
π€8π5π3β‘1
β οΈ Attackers are abusing FortiGate firewalls as entry points.
A SentinelOne report says exploits and weak credentials let intruders extract configs holding Active Directory service account credentials, then enroll rogue machines and scan internal networks.
π FortiGate breach chain and AD access details β https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html
A SentinelOne report says exploits and weak credentials let intruders extract configs holding Active Directory service account credentials, then enroll rogue machines and scan internal networks.
π FortiGate breach chain and AD access details β https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html
π9π€―9β‘3
β οΈ Five Rust crates on crates-io posed as time tools but secretly stole dev secrets.
They targeted .env files, siphoning API keys and tokens from developer machines and CI pipelines.
Removed now, but stolen credentials may still be active.
π Read β https://thehackernews.com/2026/03/five-malicious-rust-crates-and-ai-bot.html
They targeted .env files, siphoning API keys and tokens from developer machines and CI pipelines.
Removed now, but stolen credentials may still be active.
π Read β https://thehackernews.com/2026/03/five-malicious-rust-crates-and-ai-bot.html
π8β‘2
π Attackers turned the nx npm supply-chain compromise into full AWS admin access in under 72 hours.
Google says UNC6426 stole a developerβs GitHub token via QUIETVAULT, abused GitHub-to-AWS OIDC trust, created a new admin role, then accessed S3 data and destroyed production systems.
π Read β https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html
Google says UNC6426 stole a developerβs GitHub token via QUIETVAULT, abused GitHub-to-AWS OIDC trust, created a new admin role, then accessed S3 data and destroyed production systems.
π Read β https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html
π6β‘3
β‘ Microsoft patched 84 vulnerabilities in March Patch Tuesday, including 8 critical flaws and two publicly known zero-days in .NET and SQL Server.
Researchers say 55% are privilege-escalation bugs. Fixes also address Azure MCP token-theft risk and an Excel flaw that could enable data exfiltration.
π Key CVEs and risks explained β https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html
Researchers say 55% are privilege-escalation bugs. Fixes also address Azure MCP token-theft risk and an Excel flaw that could enable data exfiltration.
π Key CVEs and risks explained β https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html
π10π6β‘4
β οΈ Most companies still carry thousands of open CVEs.
AI now automates recon, vuln discovery, and exploit development. What once looked like technical debt is quickly becoming an attack surface.
Backlogs arenβt passive risk anymore.
Theyβre weapons.
π Why AI is changing vulnerability risk β https://thehackernews.com/2026/03/what-boards-must-demand-in-age-of-ai.html
AI now automates recon, vuln discovery, and exploit development. What once looked like technical debt is quickly becoming an attack surface.
Backlogs arenβt passive risk anymore.
Theyβre weapons.
π Why AI is changing vulnerability risk β https://thehackernews.com/2026/03/what-boards-must-demand-in-age-of-ai.html
π7π₯2
β οΈ Security patches rolled out across 50+ vendors this cycle.
SAP fixed critical Log4j and NetWeaver flaws. Microsoft patched 84 bugs. Adobe resolved 80. HPE closed a CVSS 9.8 Aruba authentication bypass.
Cisco, GitLab, Linux distros, and many others also issued fixes.
π Read β https://thehackernews.com/2026/03/dozens-of-vendors-patch-security-flaws.html
SAP fixed critical Log4j and NetWeaver flaws. Microsoft patched 84 bugs. Adobe resolved 80. HPE closed a CVSS 9.8 Aruba authentication bypass.
Cisco, GitLab, Linux distros, and many others also issued fixes.
π Read β https://thehackernews.com/2026/03/dozens-of-vendors-patch-security-flaws.html
π5
This media is not supported in your browser
VIEW IN TELEGRAM
Transform risk into opportunity!
Big news from AuditBoard - they're now Optro. A name change that signals something real β a connected view across audit, risk, and compliance that helps organizations get ahead of risk, not just respond to it. Learn why over 50% of the Fortune 500 trust Optro to transform risk into opportunity.
We are looking forward to watching the next chapter β https://thn.news/compliance-ai
Big news from AuditBoard - they're now Optro. A name change that signals something real β a connected view across audit, risk, and compliance that helps organizations get ahead of risk, not just respond to it. Learn why over 50% of the Fortune 500 trust Optro to transform risk into opportunity.
We are looking forward to watching the next chapter β https://thn.news/compliance-ai
π5β‘2
This media is not supported in your browser
VIEW IN TELEGRAM
Meta disabled 150,000+ scam accounts tied to fraud compounds across Southeast Asia.
The coordinated action with authorities in 11 countries led to 21 arrests by Thai police. Meta also added scam warnings on Facebook and AI chat-review tools on Messenger and WhatsApp.
π Read β https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html
The coordinated action with authorities in 11 countries led to 21 arrests by Thai police. Meta also added scam warnings on Facebook and AI chat-review tools on Messenger and WhatsApp.
π Read β https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html
π7π₯6π1
π Two critical flaws in #n8n enable remote code execution.
One bug lets attackers inject shell commands via public form inputs. Another escapes the expression sandbox.
Chained together, attackers could decrypt stored credentials including API keys, tokens, and passwords.
π Details β https://thehackernews.com/2026/03/critical-n8n-flaws-allow-remote-code.html
One bug lets attackers inject shell commands via public form inputs. Another escapes the expression sandbox.
Chained together, attackers could decrypt stored credentials including API keys, tokens, and passwords.
π Details β https://thehackernews.com/2026/03/critical-n8n-flaws-allow-remote-code.html
π₯14π4π2
π€π£ Researchers show AI web agents can be trained to fall for phishing.
Exploiting Agentic Blabbering, attackers observe the browserβs reasoning and refine scam pages until the AI stops flagging them.
π Read β https://thehackernews.com/2026/03/researchers-trick-perplexitys-comet-ai.html
Exploiting Agentic Blabbering, attackers observe the browserβs reasoning and refine scam pages until the AI stops flagging them.
π Read β https://thehackernews.com/2026/03/researchers-trick-perplexitys-comet-ai.html
π8π7π3
A new Wi-Fi attack called AirSnitch shows client isolation may not protect users on shared networks.
Researchers found every tested router vulnerable to at least one technique that lets attackers intercept traffic from nearby devices connected to the same Wi-Fi.
π Read β https://thehackernews.com/2026/03/weekly-recap-qualcomm-0-day-ios-exploit.html#:~:text=New%20AirSnitch%20Attack%20Shows%20Wi%2DFi%20Client%20Isolation%20May%20Not%20Be%20Enough
Researchers found every tested router vulnerable to at least one technique that lets attackers intercept traffic from nearby devices connected to the same Wi-Fi.
π Read β https://thehackernews.com/2026/03/weekly-recap-qualcomm-0-day-ios-exploit.html#:~:text=New%20AirSnitch%20Attack%20Shows%20Wi%2DFi%20Client%20Isolation%20May%20Not%20Be%20Enough
π₯22π5β‘3π1
β οΈ CISA confirms active exploitation of CVE-2025-68613 in the #n8n automation platform.
The expression-injection flaw allows authenticated attackers to run code with n8n process privilegesβexposing data, altering workflows, or taking full control of the instance.
π Read β https://thehackernews.com/2026/03/cisa-flags-actively-exploited-n8n-rce.html
The expression-injection flaw allows authenticated attackers to run code with n8n process privilegesβexposing data, altering workflows, or taking full control of the instance.
π Read β https://thehackernews.com/2026/03/cisa-flags-actively-exploited-n8n-rce.html
β‘10π₯5π4π4