The Hacker News
โœ”
163K subscribers
2.8K photos
18 videos
4 files
8.73K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
AI comes with potential risks and vulnerabilities, but you can protect your workers and your organization. One of the best places to start is with a comprehensive AI usage policy.

This template provides:

โœ… A definition of artificial intelligence
โœ… A breakdown of acceptable and prohibited AI use
โœ… Customizable guidelines for training, human oversight, accountability, and amendments

๐Ÿ”— Get your AI employee usage policy template โ†’ https://thn.news/ai-policy-guide
๐Ÿ”ฅ7๐Ÿ‘3๐Ÿค”1
โš ๏ธ Amazon says Interlock #ransomware exploited a Cisco firewall flaw rated 10.0 CVSS as a zero-day weeks before disclosure.

Attackers gained root access via insecure deserialization, then deployed RATs, proxies, and persistence tools.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/interlock-ransomware-exploits-cisco-fmc.html
๐Ÿ˜ฑ8๐Ÿคฏ6๐Ÿ‘2๐Ÿ”ฅ2๐Ÿ˜2
North Korean operatives used AI-powered fake identities to land remote IT jobs at global firms and redirect salaries to state programs, per U.S. sanctions.

Tools like Faceswap, VPN tunneling, and crypto laundering helped sustain access and evade detection over time.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html
๐Ÿ”ฅ20๐Ÿ˜11๐Ÿค”6๐Ÿ‘3๐Ÿ‘2
โš ๏ธ CISA flags active exploitation across Zimbra and SharePoint, with federal patch deadlines now in motion.

One flaw enables remote code execution. The other turns email rendering into an attack vector.

In parallel, a Cisco zero-day was used weeks before disclosureโ€”showing how fast attackers are moving.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/cisa-warns-of-zimbra-sharepoint-flaw.html
๐Ÿ”ฅ12๐Ÿ˜2๐Ÿ‘1๐Ÿ‘1
๐Ÿ›‘ Shai-Hulud 2.0 ran code before security scans, quietly breaking CI/CD at the source.

As Jonny Rivera from ActiveState explains, it stole cloud credentials and turned GitHub runners into attacker-controlled botnetsโ€”long before detection kicked in.

Fix: control what enters the pipeline.

๐Ÿ”— How curated catalogs stop pre-install attacks โ†’ https://thehackernews.com/expert-insights/2026/03/the-curated-catalog-biggest-defense.html
๐Ÿ‘6๐Ÿ”ฅ3
๐Ÿšจ WARNING - A new #iOS exploit kit, DarkSword, has been active since late 2025 across multiple threat groups.

It targets #iPhone on iOS 18.4โ€“18.7, chaining zero-days to gain full access and rapidly extract dataโ€”files, messages, credentials, and crypto walletsโ€”then wipe traces within minutes.

๐Ÿ”— DarkSword details here โ†’ https://thehackernews.com/2026/03/darksword-ios-exploit-kit-uses-6-flaws.html
๐Ÿ˜15๐Ÿ”ฅ7๐Ÿค”6๐Ÿ‘4
โšก Claude Code runs with full user permissions, acting before security tools can see it.

Files, commands, dataโ€”executed with no real audit trail. Learn how Ceros enforces runtime controls and logs every action with identity.

๐Ÿ”— Tool execution trails and MCP risks explained โ†’ https://thehackernews.com/2026/03/how-ceros-gives-security-teams.html
๐Ÿ”ฅ18๐Ÿ˜ฑ5๐Ÿ˜4๐Ÿ‘2
๐Ÿ›‘ Perseus, a new #Android malware, enables full device takeover via Accessibility abuse. It runs live remote sessions, steals banking credentials, and scans notes apps for sensitive data.

It spreads through IPTV-style apps delivered via phishing and sideloading.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/new-perseus-android-banking-malware.html
๐Ÿ˜13๐Ÿ”ฅ8๐Ÿคฏ6๐Ÿ‘1
โšก 25,000 U.S. businesses already use macOS, and the number keeps growing. Yet macOS threats are still flying under the radar for most security teams.

Attackers know this. ๐Ÿ‘€ And they're quietly adding more cross-platform threats to take advantage of it, targeting sensitive data.

That's exactly why #ANYRUN just levelled up. The sandbox now supports #macOS alongside #Windows, #Linux, and #Android โ€” one unified place, full visibility, faster verdicts.

๐Ÿ‘‰ Close the gap before it becomes a costly one: https://thn.news/mac-threat-analysis
๐Ÿ”ฅ12๐Ÿ‘9๐Ÿ‘3
This week in ThreatsDay Bulletinโ€ฆ itโ€™s the quiet stuff you shouldnโ€™t ignore ๐Ÿ‘‡

๐Ÿ”“ FortiGate RaaS
โš™๏ธ ITSM โ†’ RCE
๐Ÿฆ  New C2 malware
๐Ÿ”— Deep link exec
๐Ÿ“ก Citrix spikes
๐Ÿ’ฌ Teams โ†’ access
๐ŸŽฃ ClickFix backdoor
๐ŸŽฎ Game-borne stealers
๐Ÿ’ณ Live chat phishing
๐ŸŒ Expanding APT ops
๐Ÿค– 1.75M bad apps blocked
๐Ÿ” 28M+ secrets leaked

Read before you miss something important โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-fortigate-raas.html
๐Ÿ‘4๐Ÿค”2
โšก WEBINAR: Security spend is rising. Breaches arenโ€™t slowing. The gap is proof your defenses work.

Continuous validation tests controls against real attacker behavior. Automate CTI-driven testing. Feed results into SOC workflows.

๐Ÿ”— Live demo + practical setup โ†’ https://thehacker.news/automate-testing-security-posture
๐Ÿ”ฅ7๐Ÿ‘2๐Ÿค”2
๐Ÿ”ฅ 54 EDR killers now use BYOVD, abusing 34 signed drivers to reach kernel access.

Ransomware operators deploy them first to disable defenses, not evade detection inside the encryptor. Evasion has moved outโ€”into dedicated tools built to break EDR reliably.

๐Ÿ”— Tools, tactics, and defensive gaps explained โ†’ https://thehackernews.com/2026/03/54-edr-killers-use-byovd-to-exploit-34.html
๐Ÿ”ฅ8โšก2๐Ÿค”2๐Ÿ‘1
Speagle malware is abusing Cobra DocGuard to quietly steal data. It sends exfiltration through a legitimate DocGuard server, blending into normal traffic and avoiding detection.

It only runs on systems with DocGuard installed, signaling targeted espionage activity.

๐Ÿ”— How it hides, steals, and wipes traces โ†’ https://thehackernews.com/2026/03/speagle-malware-hijacks-cobra-docguard.html
๐Ÿ”ฅ10๐Ÿคฏ6๐Ÿค”2๐Ÿ‘1
โš ๏ธ WARNING - Apple warns outdated iPhones are now exposed to mass-scale exploit kits like Coruna and DarkSword.

Compromised websites can silently trigger infections and steal sensitive data from unpatched devices.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/apple-warns-older-iphones-vulnerable-to.html
๐Ÿ˜19๐Ÿค”6๐Ÿ‘4๐Ÿ‘1
๐Ÿ›‘ The U.S. disrupted IoT botnets behind record DDoS attacks, including a 31.4 Tbps spike in seconds.

These networks hijacked millions of TVs, routers, and cameras, then sold that power for attacks and extortion.

๐Ÿ”—Learn more โ†’ https://thehackernews.com/2026/03/doj-disrupts-3-million-device-iot.html
๐Ÿ˜10โšก3๐Ÿค”3๐Ÿ‘1๐Ÿ”ฅ1
โšก Google adding a 24-hour delay for installing #Android apps from unverified developers.

Users must enable developer mode, reboot, and confirm again after a day. This is meant to stop #malware and scams that trick users into disabling Play Protect or giving access.

๐Ÿ”— Details here โ†’ https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html
๐Ÿ‘23๐Ÿค”10๐Ÿคฏ5โšก2๐Ÿ˜ฑ2๐Ÿ‘1
โš ๏ธ A critical Magento flaw lets attackers upload files without login and take over stores.

The issue, PolyShell, uses the REST API to upload hidden malicious files as images. This can lead to remote code execution or stored XSS.

No fix for current versions yet.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/magento-polyshell-flaw-enables.html
๐Ÿ”ฅ6๐Ÿค”5๐Ÿ˜3๐Ÿ‘1
AI is making cyber attacks look normal. Phishing and malware now act like real users, not obvious threats.

That breaks rule-based and signature defenses. Attackers use valid logins and stay within limits. Security now shifts to identity and real-time context.

๐Ÿ”— How AI attacks bypass detection and what replaces it โ†’ https://thehackernews.com/2026/03/the-importance-of-behavioral-analytics.html
๐Ÿ‘12๐Ÿค”3
โš ๏ธ Langflow CVE-2026-33017 was exploited in 20 hours of disclosure.

An exposed API runs attacker-supplied Python with no auth, enabling full server takeover. Real attacks show credential theft, file access, and staged payload delivery.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/critical-langflow-flaw-cve-2026-33017.html
๐Ÿ”ฅ9๐Ÿ‘4๐Ÿค”2
CursorJack abuses cursor:// links to trigger arbitrary command execution via MCP installs with executable configs.

One click plus user approval can run local commands or link to a malicious server.

๐Ÿ”— Deep link abuse flow, MCP risk, and PoC details โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-fortigate-raas.html#deep-link-abuse-enables-command-execution
๐Ÿ”ฅ11๐Ÿค”7๐Ÿ‘2
๐Ÿ›‘ ALERT - Trivy, a popular open-source vulnerability scanner, was compromised after attackers hijacked 75 version tags in #GitHub Actions to deliver an infostealer.

It ran in CI pipelines, stealing creds and tokens, then exfiltrating data or staging it via stolen GitHub PATs.

๐Ÿ”— Attack flow, impacted versions, fixes โ†’ https://thehackernews.com/2026/03/trivy-security-scanner-github-actions.html
๐Ÿคฏ22๐Ÿ˜8๐Ÿ”ฅ4๐Ÿค”3โšก2๐Ÿ‘1