π Attackers turned the nx npm supply-chain compromise into full AWS admin access in under 72 hours.
Google says UNC6426 stole a developerβs GitHub token via QUIETVAULT, abused GitHub-to-AWS OIDC trust, created a new admin role, then accessed S3 data and destroyed production systems.
π Read β https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html
Google says UNC6426 stole a developerβs GitHub token via QUIETVAULT, abused GitHub-to-AWS OIDC trust, created a new admin role, then accessed S3 data and destroyed production systems.
π Read β https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html
π6β‘2
β‘ Microsoft patched 84 vulnerabilities in March Patch Tuesday, including 8 critical flaws and two publicly known zero-days in .NET and SQL Server.
Researchers say 55% are privilege-escalation bugs. Fixes also address Azure MCP token-theft risk and an Excel flaw that could enable data exfiltration.
π Key CVEs and risks explained β https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html
Researchers say 55% are privilege-escalation bugs. Fixes also address Azure MCP token-theft risk and an Excel flaw that could enable data exfiltration.
π Key CVEs and risks explained β https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html
π10π6β‘4
β οΈ Most companies still carry thousands of open CVEs.
AI now automates recon, vuln discovery, and exploit development. What once looked like technical debt is quickly becoming an attack surface.
Backlogs arenβt passive risk anymore.
Theyβre weapons.
π Why AI is changing vulnerability risk β https://thehackernews.com/2026/03/what-boards-must-demand-in-age-of-ai.html
AI now automates recon, vuln discovery, and exploit development. What once looked like technical debt is quickly becoming an attack surface.
Backlogs arenβt passive risk anymore.
Theyβre weapons.
π Why AI is changing vulnerability risk β https://thehackernews.com/2026/03/what-boards-must-demand-in-age-of-ai.html
π7π₯2
β οΈ Security patches rolled out across 50+ vendors this cycle.
SAP fixed critical Log4j and NetWeaver flaws. Microsoft patched 84 bugs. Adobe resolved 80. HPE closed a CVSS 9.8 Aruba authentication bypass.
Cisco, GitLab, Linux distros, and many others also issued fixes.
π Read β https://thehackernews.com/2026/03/dozens-of-vendors-patch-security-flaws.html
SAP fixed critical Log4j and NetWeaver flaws. Microsoft patched 84 bugs. Adobe resolved 80. HPE closed a CVSS 9.8 Aruba authentication bypass.
Cisco, GitLab, Linux distros, and many others also issued fixes.
π Read β https://thehackernews.com/2026/03/dozens-of-vendors-patch-security-flaws.html
π5
This media is not supported in your browser
VIEW IN TELEGRAM
Transform risk into opportunity!
Big news from AuditBoard - they're now Optro. A name change that signals something real β a connected view across audit, risk, and compliance that helps organizations get ahead of risk, not just respond to it. Learn why over 50% of the Fortune 500 trust Optro to transform risk into opportunity.
We are looking forward to watching the next chapter β https://thn.news/compliance-ai
Big news from AuditBoard - they're now Optro. A name change that signals something real β a connected view across audit, risk, and compliance that helps organizations get ahead of risk, not just respond to it. Learn why over 50% of the Fortune 500 trust Optro to transform risk into opportunity.
We are looking forward to watching the next chapter β https://thn.news/compliance-ai
π5β‘2
This media is not supported in your browser
VIEW IN TELEGRAM
Meta disabled 150,000+ scam accounts tied to fraud compounds across Southeast Asia.
The coordinated action with authorities in 11 countries led to 21 arrests by Thai police. Meta also added scam warnings on Facebook and AI chat-review tools on Messenger and WhatsApp.
π Read β https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html
The coordinated action with authorities in 11 countries led to 21 arrests by Thai police. Meta also added scam warnings on Facebook and AI chat-review tools on Messenger and WhatsApp.
π Read β https://thehackernews.com/2026/03/meta-disables-150k-accounts-linked-to.html
π7π₯6π1
π Two critical flaws in #n8n enable remote code execution.
One bug lets attackers inject shell commands via public form inputs. Another escapes the expression sandbox.
Chained together, attackers could decrypt stored credentials including API keys, tokens, and passwords.
π Details β https://thehackernews.com/2026/03/critical-n8n-flaws-allow-remote-code.html
One bug lets attackers inject shell commands via public form inputs. Another escapes the expression sandbox.
Chained together, attackers could decrypt stored credentials including API keys, tokens, and passwords.
π Details β https://thehackernews.com/2026/03/critical-n8n-flaws-allow-remote-code.html
π₯14π4π2
π€π£ Researchers show AI web agents can be trained to fall for phishing.
Exploiting Agentic Blabbering, attackers observe the browserβs reasoning and refine scam pages until the AI stops flagging them.
π Read β https://thehackernews.com/2026/03/researchers-trick-perplexitys-comet-ai.html
Exploiting Agentic Blabbering, attackers observe the browserβs reasoning and refine scam pages until the AI stops flagging them.
π Read β https://thehackernews.com/2026/03/researchers-trick-perplexitys-comet-ai.html
π8π7π3
A new Wi-Fi attack called AirSnitch shows client isolation may not protect users on shared networks.
Researchers found every tested router vulnerable to at least one technique that lets attackers intercept traffic from nearby devices connected to the same Wi-Fi.
π Read β https://thehackernews.com/2026/03/weekly-recap-qualcomm-0-day-ios-exploit.html#:~:text=New%20AirSnitch%20Attack%20Shows%20Wi%2DFi%20Client%20Isolation%20May%20Not%20Be%20Enough
Researchers found every tested router vulnerable to at least one technique that lets attackers intercept traffic from nearby devices connected to the same Wi-Fi.
π Read β https://thehackernews.com/2026/03/weekly-recap-qualcomm-0-day-ios-exploit.html#:~:text=New%20AirSnitch%20Attack%20Shows%20Wi%2DFi%20Client%20Isolation%20May%20Not%20Be%20Enough
π₯20π5β‘3π1
β οΈ CISA confirms active exploitation of CVE-2025-68613 in the #n8n automation platform.
The expression-injection flaw allows authenticated attackers to run code with n8n process privilegesβexposing data, altering workflows, or taking full control of the instance.
π Read β https://thehackernews.com/2026/03/cisa-flags-actively-exploited-n8n-rce.html
The expression-injection flaw allows authenticated attackers to run code with n8n process privilegesβexposing data, altering workflows, or taking full control of the instance.
π Read β https://thehackernews.com/2026/03/cisa-flags-actively-exploited-n8n-rce.html
β‘10π4π₯4π4
β‘ Apple backports CVE-2023-43010 fix after the WebKit flaw was used in the Coruna #iPhone exploit kit.
It allows memory corruption via malicious web content. Fix now covers iOS 15.8.7 & 16.7.15 devices, including iPhone 6s, 7, 8 & X.
π Read β https://thehackernews.com/2026/03/apple-issues-security-updates-for-older.html
It allows memory corruption via malicious web content. Fix now covers iOS 15.8.7 & 16.7.15 devices, including iPhone 6s, 7, 8 & X.
π Read β https://thehackernews.com/2026/03/apple-issues-security-updates-for-older.html
π10π₯4π3π2
Attackers now weaponize phishing volume.
Research shows 66% of SOC teams canβt keep up with alerts, letting attackers hide targeted spear-phish inside thousands of decoys. The flood isnβt random. Itβs meant to exhaust analysts and slow investigation.
π How phishing campaigns exploit SOC workload β https://thehackernews.com/2026/03/attackers-dont-just-send-phishing.html
Research shows 66% of SOC teams canβt keep up with alerts, letting attackers hide targeted spear-phish inside thousands of decoys. The flood isnβt random. Itβs meant to exhaust analysts and slow investigation.
π How phishing campaigns exploit SOC workload β https://thehackernews.com/2026/03/attackers-dont-just-send-phishing.html
π₯8π€―6π2
New week. Same internet chaos.
β οΈ OAuth token theft
π± Signal/WhatsApp hijacks
βοΈ Cloud flaw breaches
π§ Zombie ZIP evasion
πΌ HR malware kills EDR
π€ AI agent platform hack
π¬ Teams impersonation attacks
π 174-exploit botnet scans
π ThreatsDay is out β quick hits from this weekβs cyber chaos β https://thehackernews.com/2026/03/threatsday-bulletin-oauth-trap-edr.html
β οΈ OAuth token theft
π± Signal/WhatsApp hijacks
βοΈ Cloud flaw breaches
π§ Zombie ZIP evasion
πΌ HR malware kills EDR
π€ AI agent platform hack
π¬ Teams impersonation attacks
π 174-exploit botnet scans
π ThreatsDay is out β quick hits from this weekβs cyber chaos β https://thehackernews.com/2026/03/threatsday-bulletin-oauth-trap-edr.html
π7β‘6π₯1
Want a Masterβs or Graduate Certificate in Cybersecurity Risk Management from Georgetown University?
Join our virtual webinar on March 24. Sign up: https://thn.news/risk-mgmt-fb
Join our virtual webinar on March 24. Sign up: https://thn.news/risk-mgmt-fb
π6π₯2π2
Modern phishing now hides behind HTTPS and trusted services, so attacks look like normal logins.
Sandbox analysis executes suspicious links safely and exposes credential-stealing flows in under 60 seconds.
π How SOC teams uncover phishing before account takeover β https://thehackernews.com/2026/03/how-to-scale-phishing-detection-in-your.html
Sandbox analysis executes suspicious links safely and exposes credential-stealing flows in under 60 seconds.
π How SOC teams uncover phishing before account takeover β https://thehackernews.com/2026/03/how-to-scale-phishing-detection-in-your.html
π8π4π₯3
π€ IBM X-Force found AI-generated #malware Slopoly used by Hive0163.
The PowerShell backdoor persists for days, beacons every 30s, and runs commands from a remote C2. AI didnβt make it advanced β it made malware faster to build.
π Read here β https://thehackernews.com/2026/03/hive0163-uses-ai-assisted-slopoly.html
The PowerShell backdoor persists for days, beacons every 30s, and runs commands from a remote C2. AI didnβt make it advanced β it made malware faster to build.
π Read here β https://thehackernews.com/2026/03/hive0163-uses-ai-assisted-slopoly.html
β‘6π₯5π±5π2
β οΈ Rust-based banking trojan VENON is targeting 33 financial institutions in Brazil.
It monitors banking windows, triggers credential-stealing overlays, and hijacks ItaΓΊ app shortcuts to redirect victims to attacker-controlled pages.
π Read β https://thehackernews.com/2026/03/rust-based-venon-malware-targets-33.html
It monitors banking windows, triggers credential-stealing overlays, and hijacks ItaΓΊ app shortcuts to redirect victims to attacker-controlled pages.
π Read β https://thehackernews.com/2026/03/rust-based-venon-malware-targets-33.html
π₯20π4β‘1π1
β οΈ Veeam fixed multiple flaws in Backup & Replication, including 9.9-severity RCE bugs that let authenticated domain users run code on backup servers.
Affected: all v12 builds before 12.3.2.4465.
π CVEs and patch details β https://thehackernews.com/2026/03/veeam-patches-7-critical-backup.html
Affected: all v12 builds before 12.3.2.4465.
π CVEs and patch details β https://thehackernews.com/2026/03/veeam-patches-7-critical-backup.html
π9π3β‘2π₯1
π Global police dismantled SocksEscort, a proxy botnet built from hacked home routers.
AVrecon malware turned SOHO devices into anonymous gateways for fraud, ransomware, and DDoS.
Operation Lightning seized 34 domains, 23 servers, froze $3.5M. 369K IPs across 163 countries.
π Read β https://thehackernews.com/2026/03/authorities-disrupt-socksescort-proxy.html
AVrecon malware turned SOHO devices into anonymous gateways for fraud, ransomware, and DDoS.
Operation Lightning seized 34 domains, 23 servers, froze $3.5M. 369K IPs across 163 countries.
π Read β https://thehackernews.com/2026/03/authorities-disrupt-socksescort-proxy.html
π10π4π₯2π2π€―1
π Linux AppArmor hit by 9 βCrackArmorβ flaws letting unprivileged users manipulate security profiles and escalate to root.
The bugs date back to 2017 and affect kernels 4.11+ across major distros including Ubuntu, Debian, and SUSE.
π Read β https://thehackernews.com/2026/03/nine-crackarmor-flaws-in-linux-apparmor.html
The bugs date back to 2017 and affect kernels 4.11+ across major distros including Ubuntu, Debian, and SUSE.
π Read β https://thehackernews.com/2026/03/nine-crackarmor-flaws-in-linux-apparmor.html
π12π₯4
β οΈ WARNING: Google fixed 2 exploited Chrome bugs (CVSS 8.8) in Skia and the V8 engine.
Crafted HTML pages can trigger memory corruption or sandbox code execution.Update to Chrome v146 now.
Edge, Brave, Opera, and Vivaldi patches will follow.
π Read β https://thehackernews.com/2026/03/google-fixes-two-chrome-zero-days.html
Crafted HTML pages can trigger memory corruption or sandbox code execution.Update to Chrome v146 now.
Edge, Brave, Opera, and Vivaldi patches will follow.
π Read β https://thehackernews.com/2026/03/google-fixes-two-chrome-zero-days.html
π₯9π4π2