Microsoft says attackers are poisoning search results to spread fake VPN clients that steal credentials.
The campaign redirects software searches to trojanized installers on GitHub that show fake VPN prompts while Hyrax steals credentials.
π Read β https://thehackernews.com/2026/03/storm-2561-spreads-trojan-vpn-clients.html
The campaign redirects software searches to trojanized installers on GitHub that show fake VPN prompts while Hyrax steals credentials.
π Read β https://thehackernews.com/2026/03/storm-2561-spreads-trojan-vpn-clients.html
π20π₯8π5π€2
INTERPOL dismantled 45,000 malicious IPs and servers tied to phishing, malware, and ransomware.
Operation Synergia III across 72 countries led to 94 arrests, 110 suspects under investigation, and seized devices and servers tied to global scam infrastructure.
π Read β https://thehackernews.com/2026/03/interpol-dismantles-45000-malicious-ips.html
Operation Synergia III across 72 countries led to 94 arrests, 110 suspects under investigation, and seized devices and servers tied to global scam infrastructure.
π Read β https://thehackernews.com/2026/03/interpol-dismantles-45000-malicious-ips.html
π24π6π₯4π€2π±2π1
π Meta will shut down Instagramβs end-to-end encrypted chats on May 8, 2026.
Users with affected conversations will get instructions to download messages or media before the change.
π Read β https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html
Users with affected conversations will get instructions to download messages or media before the change.
π Read β https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html
π€32π€―20π14π±6π₯3β‘2π1
Researchers exposed a long-running cyber espionage campaign targeting Southeast Asian militaries.
The cluster CL-STA-1087 deployed AppleChris and MemFun backdoors plus a custom Mimikatz variant to quietly extract data on C4I systems, military capabilities, and Western defense ties.
π Tools and tradecraft β https://thehackernews.com/2026/03/chinese-hackers-target-southeast-asian.html
The cluster CL-STA-1087 deployed AppleChris and MemFun backdoors plus a custom Mimikatz variant to quietly extract data on C4I systems, military capabilities, and Western defense ties.
π Tools and tradecraft β https://thehackernews.com/2026/03/chinese-hackers-target-southeast-asian.html
π₯9π8π4
Researchers found 72 malicious extensions in the Open VSX registry.
Attackers publish a harmless VS Code extension, gain trust, then update it to pull a GlassWorm dependency.
The payload steals tokens, credentials, and crypto wallets from developer systems.
π Read β https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html
Attackers publish a harmless VS Code extension, gain trust, then update it to pull a GlassWorm dependency.
The payload steals tokens, credentials, and crypto wallets from developer systems.
π Read β https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html
π8π₯8π3
π OpenClaw AI agents can leak data via indirect prompt injection.
A crafted URL generated by the agent triggers Telegram or Discord link previews that silently send sensitive data to attacker domains.
Chinaβs CNCERT warns organizations to isolate or restrict the tool.
π Attack details β https://thehackernews.com/2026/03/openclaw-ai-agent-flaws-could-enable.html
A crafted URL generated by the agent triggers Telegram or Discord link previews that silently send sensitive data to attacker domains.
Chinaβs CNCERT warns organizations to isolate or restrict the tool.
π Attack details β https://thehackernews.com/2026/03/openclaw-ai-agent-flaws-could-enable.html
π17π14π14π₯4β‘3π±2
π Google is tightening Androidβs defenses.
In Android 17 Beta 2, Advanced Protection Mode π‘οΈ blocks most apps from accessing the Accessibility Services API.
Malware has long abused it to read screens and steal data.
π Read β https://thehackernews.com/2026/03/android-17-blocks-non-accessibility.html
In Android 17 Beta 2, Advanced Protection Mode π‘οΈ blocks most apps from accessing the Accessibility Services API.
Malware has long abused it to read screens and steal data.
π Read β https://thehackernews.com/2026/03/android-17-blocks-non-accessibility.html
π₯19β‘6π2π±2π€1
π¨ Russian-linked actors targeted Ukrainian entities with DRILLAPP, a JavaScript backdoor executed through Microsoft Edge.
It abuses Chromium debugging flags to access files, record audio, capture webcam images, and grab screen data.
Lures referenced Starlink installs and a Ukrainian charity.
π Read β https://thehackernews.com/2026/03/drillapp-backdoor-targets-ukraine.html
It abuses Chromium debugging flags to access files, record audio, capture webcam images, and grab screen data.
Lures referenced Starlink installs and a Ukrainian charity.
π Read β https://thehackernews.com/2026/03/drillapp-backdoor-targets-ukraine.html
π11π₯10π€―5β‘4π±4
β οΈ A new ClickFix variant abuses Win+R to mount a remote WebDAV drive and run malware.
It launches a trojanized WorkFlowy Electron app that beacons to C2 every 2 seconds. Atos says it bypassed Microsoft Defender and surfaced only through threat hunting.
π Inside: WebDAV trick + ASAR injection β https://thehackernews.com/2026/03/investigating-new-click-fix-variant.html
It launches a trojanized WorkFlowy Electron app that beacons to C2 every 2 seconds. Atos says it bypassed Microsoft Defender and surfaced only through threat hunting.
π Inside: WebDAV trick + ASAR injection β https://thehackernews.com/2026/03/investigating-new-click-fix-variant.html
β‘6π4π₯4
π ALERT: ClickFix campaigns are spreading macOS infostealer MacSync.
Victims paste a Terminal command from fake install pages or ChatGPT threads, installing malware that steals credentials, files, Keychain data, and crypto wallet seeds.
π Read β https://thehackernews.com/2026/03/clickfix-campaigns-spread-macsync-macos.html
Victims paste a Terminal command from fake install pages or ChatGPT threads, installing malware that steals credentials, files, Keychain data, and crypto wallet seeds.
π Read β https://thehackernews.com/2026/03/clickfix-campaigns-spread-macsync-macos.html
π12π₯6π3
Stop testing silos. Attackers donβt exploit single flaws; they chain them.
Agentic AI validation replaces fragmented scanning with continuous, system-wide testing. It maps the path from threat to asset in real-time.
π Stop guessing. Start validating β https://thehackernews.com/2026/03/why-security-validation-is-becoming.html
Agentic AI validation replaces fragmented scanning with continuous, system-wide testing. It maps the path from threat to asset in real-time.
π Stop guessing. Start validating β https://thehackernews.com/2026/03/why-security-validation-is-becoming.html
π₯5π3π2π€2π€―2
π₯ This weekβs CYBER RECAP is pure βπ what the hell nowβ energy.
Fresh bugs. Quiet abuse. Supply-chain messes. Botnet weirdness. Phishing getting uglier. AI doing AI things. And the usual pile of flaws you really donβt want to ignore.
Skim it for the headlines. Read it properly for the stuff thatβs going to show up in everyoneβs incident notes next.
π Read β https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html
Fresh bugs. Quiet abuse. Supply-chain messes. Botnet weirdness. Phishing getting uglier. AI doing AI things. And the usual pile of flaws you really donβt want to ignore.
Skim it for the headlines. Read it properly for the stuff thatβs going to show up in everyoneβs incident notes next.
π Read β https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html
π₯8π3π€1π€―1
Attackers are hijacking GitHub accounts and silently planting malware in Python repos.
ForceMemo uses stolen tokens to force-push malicious code while preserving the original commit author and messageβrewriting Git history with no visible trace in the UI.
π Read β https://thehackernews.com/2026/03/glassworm-attack-uses-stolen-github.html
ForceMemo uses stolen tokens to force-push malicious code while preserving the original commit author and messageβrewriting Git history with no visible trace in the UI.
π Read β https://thehackernews.com/2026/03/glassworm-attack-uses-stolen-github.html
π₯15π±9π7π5
β οΈ CISA flags CVE-2025-47813 in Wing FTP as actively exploited.
It leaks server paths via cookie errorsβlow severity, high value. Attackers can pair it with a known RCE flaw already used to deploy malware.
π How it enables real attack chains β https://thehackernews.com/2026/03/cisa-flags-actively-exploited-wing-ftp.html
It leaks server paths via cookie errorsβlow severity, high value. Attackers can pair it with a known RCE flaw already used to deploy malware.
π How it enables real attack chains β https://thehackernews.com/2026/03/cisa-flags-actively-exploited-wing-ftp.html
π8π₯4
Firewalls still see encrypted port 443 traffic, not what users actually do inside SaaS apps or AI tools.
As Dedi Shindler (Red Access) notes, that blinds teams to prompts, data leaks, and session activity. The fix isnβt replacing firewallsβitβs adding session-level visibility.
π Firewall-native SSE explained β https://thehackernews.com/expert-insights/2026/03/the-firewall-isnt-blind-it-just-needs.html
As Dedi Shindler (Red Access) notes, that blinds teams to prompts, data leaks, and session activity. The fix isnβt replacing firewallsβitβs adding session-level visibility.
π Firewall-native SSE explained β https://thehackernews.com/expert-insights/2026/03/the-firewall-isnt-blind-it-just-needs.html
π10π5π₯4π3
β οΈ A fake job notice triggered full compromise in a Konni campaign.
The attack drops EndRAT, enabling remote control, persistence, and silent data theft, then spreads via KakaoTalk messages from the victimβs account.
Trusted contacts become the attack path.
π Read β https://thehackernews.com/2026/03/konni-deploys-endrat-through-spear.html
The attack drops EndRAT, enabling remote control, persistence, and silent data theft, then spreads via KakaoTalk messages from the victimβs account.
Trusted contacts become the attack path.
π Read β https://thehackernews.com/2026/03/konni-deploys-endrat-through-spear.html
π9π₯6π2
Most CISOs donβt know where AI runs in their own orgs. 67% lack visibilityβ0% have full oversight.
AI is spread across cloud, apps, and identity, owned by no one. Risk canβt be measured, let alone controlled.
π Data shows where AI security actually breaks β https://thehackernews.com/2026/03/ai-is-everywhere-but-cisos-are-still.html
AI is spread across cloud, apps, and identity, owned by no one. Risk canβt be measured, let alone controlled.
π Data shows where AI security actually breaks β https://thehackernews.com/2026/03/ai-is-everywhere-but-cisos-are-still.html
π₯4π3π±3
β οΈ A full Roundcube exploit kit tied to APT28 was found on a live server, targeting Ukrainian government email.
It enables XSS takeover, mailbox exfiltration, hidden forwarding, and even 2FA secret theft. Includes a new CSS-based data exfiltration method.
π Toolkit details β https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html#:~:text=Roundcube%20Exploitation%20Toolkit%20Discovered
It enables XSS takeover, mailbox exfiltration, hidden forwarding, and even 2FA secret theft. Includes a new CSS-based data exfiltration method.
π Toolkit details β https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html#:~:text=Roundcube%20Exploitation%20Toolkit%20Discovered
π₯5π3π2
AI agents donβt need prompts to turn rogue. They can coordinate attacks on their own.
Tests show agents collaborating to escalate privileges, disable defenses, and steal dataβeven persuading each other to act.
π Report details how agent-to-agent collusion bypasses controls β https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html#:~:text=Rogue%20AI%20Agents%20Can%20Work%20Together%20to%20Engage%20in%20Offensive%20Behaviors
Tests show agents collaborating to escalate privileges, disable defenses, and steal dataβeven persuading each other to act.
π Report details how agent-to-agent collusion bypasses controls β https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html#:~:text=Rogue%20AI%20Agents%20Can%20Work%20Together%20to%20Engage%20in%20Offensive%20Behaviors
π€―4π3π₯3π2
The best security teams aren't just reactive. They're informed.
Knowing what attackers are doing, how they operate, and where your gaps are isn't a nice-to-have, it's the foundation of a modern defense strategy. That's what Threat-Informed Defense delivers.
This guide lays out a six-stage Threat-Informed Defense pipeline to help your team:
β¦Ώ Cut through alert noise and focus on threats that matter
β¦Ώ Test your people, processes, and technology against realistic attack scenarios
β¦Ώ Put CTI to work operationally with tools like OpenCTI + OpenAEV
β¦Ώ Turn detection and response into a continuous, self-improving cycle
Download the guide today β https://thn.news/infosec-threat-guide
Knowing what attackers are doing, how they operate, and where your gaps are isn't a nice-to-have, it's the foundation of a modern defense strategy. That's what Threat-Informed Defense delivers.
This guide lays out a six-stage Threat-Informed Defense pipeline to help your team:
β¦Ώ Cut through alert noise and focus on threats that matter
β¦Ώ Test your people, processes, and technology against realistic attack scenarios
β¦Ώ Put CTI to work operationally with tools like OpenCTI + OpenAEV
β¦Ώ Turn detection and response into a continuous, self-improving cycle
Download the guide today β https://thn.news/infosec-threat-guide
π2π2π₯1
β οΈ LeakNet drops access brokers for ClickFix compromised sites trick users into running msiexec commands via fake CAPTCHA.
Lower cost, faster scale. Deno executes payloads in memory, then lateral movement and data theft follow.
π Details here β https://thehackernews.com/2026/03/leaknet-ransomware-uses-clickfix-via.html
Lower cost, faster scale. Deno executes payloads in memory, then lateral movement and data theft follow.
π Details here β https://thehackernews.com/2026/03/leaknet-ransomware-uses-clickfix-via.html
π₯13π4β‘1π1