AI comes with potential risks and vulnerabilities, but you can protect your workers and your organization. One of the best places to start is with a comprehensive AI usage policy.
This template provides:
โ A definition of artificial intelligence
โ A breakdown of acceptable and prohibited AI use
โ Customizable guidelines for training, human oversight, accountability, and amendments
๐ Get your AI employee usage policy template โ https://thn.news/ai-policy-guide
This template provides:
โ A definition of artificial intelligence
โ A breakdown of acceptable and prohibited AI use
โ Customizable guidelines for training, human oversight, accountability, and amendments
๐ Get your AI employee usage policy template โ https://thn.news/ai-policy-guide
๐ฅ7๐3๐ค1
โ ๏ธ Amazon says Interlock #ransomware exploited a Cisco firewall flaw rated 10.0 CVSS as a zero-day weeks before disclosure.
Attackers gained root access via insecure deserialization, then deployed RATs, proxies, and persistence tools.
๐ Read โ https://thehackernews.com/2026/03/interlock-ransomware-exploits-cisco-fmc.html
Attackers gained root access via insecure deserialization, then deployed RATs, proxies, and persistence tools.
๐ Read โ https://thehackernews.com/2026/03/interlock-ransomware-exploits-cisco-fmc.html
๐ฑ8๐คฏ6๐2๐ฅ2๐2
North Korean operatives used AI-powered fake identities to land remote IT jobs at global firms and redirect salaries to state programs, per U.S. sanctions.
Tools like Faceswap, VPN tunneling, and crypto laundering helped sustain access and evade detection over time.
๐ Read โ https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html
Tools like Faceswap, VPN tunneling, and crypto laundering helped sustain access and evade detection over time.
๐ Read โ https://thehackernews.com/2026/03/ofac-sanctions-dprk-it-worker-network.html
๐ฅ20๐11๐ค6๐3๐2
โ ๏ธ CISA flags active exploitation across Zimbra and SharePoint, with federal patch deadlines now in motion.
One flaw enables remote code execution. The other turns email rendering into an attack vector.
In parallel, a Cisco zero-day was used weeks before disclosureโshowing how fast attackers are moving.
๐ Read โ https://thehackernews.com/2026/03/cisa-warns-of-zimbra-sharepoint-flaw.html
One flaw enables remote code execution. The other turns email rendering into an attack vector.
In parallel, a Cisco zero-day was used weeks before disclosureโshowing how fast attackers are moving.
๐ Read โ https://thehackernews.com/2026/03/cisa-warns-of-zimbra-sharepoint-flaw.html
๐ฅ12๐2๐1๐1
๐ Shai-Hulud 2.0 ran code before security scans, quietly breaking CI/CD at the source.
As Jonny Rivera from ActiveState explains, it stole cloud credentials and turned GitHub runners into attacker-controlled botnetsโlong before detection kicked in.
Fix: control what enters the pipeline.
๐ How curated catalogs stop pre-install attacks โ https://thehackernews.com/expert-insights/2026/03/the-curated-catalog-biggest-defense.html
As Jonny Rivera from ActiveState explains, it stole cloud credentials and turned GitHub runners into attacker-controlled botnetsโlong before detection kicked in.
Fix: control what enters the pipeline.
๐ How curated catalogs stop pre-install attacks โ https://thehackernews.com/expert-insights/2026/03/the-curated-catalog-biggest-defense.html
๐6๐ฅ3
๐จ WARNING - A new #iOS exploit kit, DarkSword, has been active since late 2025 across multiple threat groups.
It targets #iPhone on iOS 18.4โ18.7, chaining zero-days to gain full access and rapidly extract dataโfiles, messages, credentials, and crypto walletsโthen wipe traces within minutes.
๐ DarkSword details here โ https://thehackernews.com/2026/03/darksword-ios-exploit-kit-uses-6-flaws.html
It targets #iPhone on iOS 18.4โ18.7, chaining zero-days to gain full access and rapidly extract dataโfiles, messages, credentials, and crypto walletsโthen wipe traces within minutes.
๐ DarkSword details here โ https://thehackernews.com/2026/03/darksword-ios-exploit-kit-uses-6-flaws.html
๐15๐ฅ7๐ค6๐4
โก Claude Code runs with full user permissions, acting before security tools can see it.
Files, commands, dataโexecuted with no real audit trail. Learn how Ceros enforces runtime controls and logs every action with identity.
๐ Tool execution trails and MCP risks explained โ https://thehackernews.com/2026/03/how-ceros-gives-security-teams.html
Files, commands, dataโexecuted with no real audit trail. Learn how Ceros enforces runtime controls and logs every action with identity.
๐ Tool execution trails and MCP risks explained โ https://thehackernews.com/2026/03/how-ceros-gives-security-teams.html
๐ฅ18๐ฑ5๐4๐2
๐ Perseus, a new #Android malware, enables full device takeover via Accessibility abuse. It runs live remote sessions, steals banking credentials, and scans notes apps for sensitive data.
It spreads through IPTV-style apps delivered via phishing and sideloading.
๐ Read โ https://thehackernews.com/2026/03/new-perseus-android-banking-malware.html
It spreads through IPTV-style apps delivered via phishing and sideloading.
๐ Read โ https://thehackernews.com/2026/03/new-perseus-android-banking-malware.html
๐13๐ฅ8๐คฏ6๐1
โก 25,000 U.S. businesses already use macOS, and the number keeps growing. Yet macOS threats are still flying under the radar for most security teams.
Attackers know this. ๐ And they're quietly adding more cross-platform threats to take advantage of it, targeting sensitive data.
That's exactly why #ANYRUN just levelled up. The sandbox now supports #macOS alongside #Windows, #Linux, and #Android โ one unified place, full visibility, faster verdicts.
๐ Close the gap before it becomes a costly one: https://thn.news/mac-threat-analysis
Attackers know this. ๐ And they're quietly adding more cross-platform threats to take advantage of it, targeting sensitive data.
That's exactly why #ANYRUN just levelled up. The sandbox now supports #macOS alongside #Windows, #Linux, and #Android โ one unified place, full visibility, faster verdicts.
๐ Close the gap before it becomes a costly one: https://thn.news/mac-threat-analysis
๐ฅ12๐9๐3
This week in ThreatsDay Bulletinโฆ itโs the quiet stuff you shouldnโt ignore ๐
๐ FortiGate RaaS
โ๏ธ ITSM โ RCE
๐ฆ New C2 malware
๐ Deep link exec
๐ก Citrix spikes
๐ฌ Teams โ access
๐ฃ ClickFix backdoor
๐ฎ Game-borne stealers
๐ณ Live chat phishing
๐ Expanding APT ops
๐ค 1.75M bad apps blocked
๐ 28M+ secrets leaked
Read before you miss something important โ https://thehackernews.com/2026/03/threatsday-bulletin-fortigate-raas.html
๐ FortiGate RaaS
โ๏ธ ITSM โ RCE
๐ฆ New C2 malware
๐ Deep link exec
๐ก Citrix spikes
๐ฌ Teams โ access
๐ฃ ClickFix backdoor
๐ฎ Game-borne stealers
๐ณ Live chat phishing
๐ Expanding APT ops
๐ค 1.75M bad apps blocked
๐ 28M+ secrets leaked
Read before you miss something important โ https://thehackernews.com/2026/03/threatsday-bulletin-fortigate-raas.html
๐4๐ค2
โก WEBINAR: Security spend is rising. Breaches arenโt slowing. The gap is proof your defenses work.
Continuous validation tests controls against real attacker behavior. Automate CTI-driven testing. Feed results into SOC workflows.
๐ Live demo + practical setup โ https://thehacker.news/automate-testing-security-posture
Continuous validation tests controls against real attacker behavior. Automate CTI-driven testing. Feed results into SOC workflows.
๐ Live demo + practical setup โ https://thehacker.news/automate-testing-security-posture
๐ฅ7๐2๐ค2
๐ฅ 54 EDR killers now use BYOVD, abusing 34 signed drivers to reach kernel access.
Ransomware operators deploy them first to disable defenses, not evade detection inside the encryptor. Evasion has moved outโinto dedicated tools built to break EDR reliably.
๐ Tools, tactics, and defensive gaps explained โ https://thehackernews.com/2026/03/54-edr-killers-use-byovd-to-exploit-34.html
Ransomware operators deploy them first to disable defenses, not evade detection inside the encryptor. Evasion has moved outโinto dedicated tools built to break EDR reliably.
๐ Tools, tactics, and defensive gaps explained โ https://thehackernews.com/2026/03/54-edr-killers-use-byovd-to-exploit-34.html
๐ฅ8โก2๐ค2๐1
Speagle malware is abusing Cobra DocGuard to quietly steal data. It sends exfiltration through a legitimate DocGuard server, blending into normal traffic and avoiding detection.
It only runs on systems with DocGuard installed, signaling targeted espionage activity.
๐ How it hides, steals, and wipes traces โ https://thehackernews.com/2026/03/speagle-malware-hijacks-cobra-docguard.html
It only runs on systems with DocGuard installed, signaling targeted espionage activity.
๐ How it hides, steals, and wipes traces โ https://thehackernews.com/2026/03/speagle-malware-hijacks-cobra-docguard.html
๐ฅ10๐คฏ6๐ค2๐1
โ ๏ธ WARNING - Apple warns outdated iPhones are now exposed to mass-scale exploit kits like Coruna and DarkSword.
Compromised websites can silently trigger infections and steal sensitive data from unpatched devices.
๐ Read โ https://thehackernews.com/2026/03/apple-warns-older-iphones-vulnerable-to.html
Compromised websites can silently trigger infections and steal sensitive data from unpatched devices.
๐ Read โ https://thehackernews.com/2026/03/apple-warns-older-iphones-vulnerable-to.html
๐19๐ค6๐4๐1
๐ The U.S. disrupted IoT botnets behind record DDoS attacks, including a 31.4 Tbps spike in seconds.
These networks hijacked millions of TVs, routers, and cameras, then sold that power for attacks and extortion.
๐Learn more โ https://thehackernews.com/2026/03/doj-disrupts-3-million-device-iot.html
These networks hijacked millions of TVs, routers, and cameras, then sold that power for attacks and extortion.
๐Learn more โ https://thehackernews.com/2026/03/doj-disrupts-3-million-device-iot.html
๐10โก3๐ค3๐1๐ฅ1
โก Google adding a 24-hour delay for installing #Android apps from unverified developers.
Users must enable developer mode, reboot, and confirm again after a day. This is meant to stop #malware and scams that trick users into disabling Play Protect or giving access.
๐ Details here โ https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html
Users must enable developer mode, reboot, and confirm again after a day. This is meant to stop #malware and scams that trick users into disabling Play Protect or giving access.
๐ Details here โ https://thehackernews.com/2026/03/google-adds-24-hour-wait-for-unverified.html
๐23๐ค10๐คฏ5โก2๐ฑ2๐1
โ ๏ธ A critical Magento flaw lets attackers upload files without login and take over stores.
The issue, PolyShell, uses the REST API to upload hidden malicious files as images. This can lead to remote code execution or stored XSS.
No fix for current versions yet.
๐ Read โ https://thehackernews.com/2026/03/magento-polyshell-flaw-enables.html
The issue, PolyShell, uses the REST API to upload hidden malicious files as images. This can lead to remote code execution or stored XSS.
No fix for current versions yet.
๐ Read โ https://thehackernews.com/2026/03/magento-polyshell-flaw-enables.html
๐ฅ6๐ค5๐3๐1
AI is making cyber attacks look normal. Phishing and malware now act like real users, not obvious threats.
That breaks rule-based and signature defenses. Attackers use valid logins and stay within limits. Security now shifts to identity and real-time context.
๐ How AI attacks bypass detection and what replaces it โ https://thehackernews.com/2026/03/the-importance-of-behavioral-analytics.html
That breaks rule-based and signature defenses. Attackers use valid logins and stay within limits. Security now shifts to identity and real-time context.
๐ How AI attacks bypass detection and what replaces it โ https://thehackernews.com/2026/03/the-importance-of-behavioral-analytics.html
๐12๐ค3
โ ๏ธ Langflow CVE-2026-33017 was exploited in 20 hours of disclosure.
An exposed API runs attacker-supplied Python with no auth, enabling full server takeover. Real attacks show credential theft, file access, and staged payload delivery.
๐ Read โ https://thehackernews.com/2026/03/critical-langflow-flaw-cve-2026-33017.html
An exposed API runs attacker-supplied Python with no auth, enabling full server takeover. Real attacks show credential theft, file access, and staged payload delivery.
๐ Read โ https://thehackernews.com/2026/03/critical-langflow-flaw-cve-2026-33017.html
๐ฅ9๐4๐ค2
CursorJack abuses cursor:// links to trigger arbitrary command execution via MCP installs with executable configs.
One click plus user approval can run local commands or link to a malicious server.
๐ Deep link abuse flow, MCP risk, and PoC details โ https://thehackernews.com/2026/03/threatsday-bulletin-fortigate-raas.html#deep-link-abuse-enables-command-execution
One click plus user approval can run local commands or link to a malicious server.
๐ Deep link abuse flow, MCP risk, and PoC details โ https://thehackernews.com/2026/03/threatsday-bulletin-fortigate-raas.html#deep-link-abuse-enables-command-execution
๐ฅ11๐ค7๐2
๐ ALERT - Trivy, a popular open-source vulnerability scanner, was compromised after attackers hijacked 75 version tags in #GitHub Actions to deliver an infostealer.
It ran in CI pipelines, stealing creds and tokens, then exfiltrating data or staging it via stolen GitHub PATs.
๐ Attack flow, impacted versions, fixes โ https://thehackernews.com/2026/03/trivy-security-scanner-github-actions.html
It ran in CI pipelines, stealing creds and tokens, then exfiltrating data or staging it via stolen GitHub PATs.
๐ Attack flow, impacted versions, fixes โ https://thehackernews.com/2026/03/trivy-security-scanner-github-actions.html
๐คฏ22๐8๐ฅ4๐ค3โก2๐1