β‘ A Russian botnet operator tied to #ransomware attacks on U.S. firms has been sentenced.
2 years prison + $100K fine for co-running TA551, which sold access to hacked systems used by gangs like BitPaymer, leading to $14M+ in extortion.
π How TA551 enabled ransomware attacks on 70+ companies β https://thehackernews.com/2026/03/russian-hacker-sentenced-to-2-years-for.html
2 years prison + $100K fine for co-running TA551, which sold access to hacked systems used by gangs like BitPaymer, leading to $14M+ in extortion.
π How TA551 enabled ransomware attacks on 70+ companies β https://thehackernews.com/2026/03/russian-hacker-sentenced-to-2-years-for.html
π7π5π₯5
β¨ GRC Insights from Harvard Business Review.
Manual oversight canβt keep pace with todayβs risk environment. Learn how organizations are using AI to connect GRC across the enterprise.
In this Harvard Business Review Analytic Services report, explore how AI is transforming GRC.
Read The Resilient Enterprise: Using AI to Connect Governance, Risk, and Compliance to explore:
β’ How connected platforms replace fragmented risk processes
β’ The role of artificial risk intelligence in proactive GRC
β’ How to scale AI responsibly across the enterprise
Get your copy: https://thn.news/resilient-ai-governance
Manual oversight canβt keep pace with todayβs risk environment. Learn how organizations are using AI to connect GRC across the enterprise.
In this Harvard Business Review Analytic Services report, explore how AI is transforming GRC.
Read The Resilient Enterprise: Using AI to Connect Governance, Risk, and Compliance to explore:
β’ How connected platforms replace fragmented risk processes
β’ The role of artificial risk intelligence in proactive GRC
β’ How to scale AI responsibly across the enterprise
Get your copy: https://thn.news/resilient-ai-governance
π8
πΎ Breaches now start in the browser β Attackers exploit legit functionality, dump data, and demand ransom. Get Push Securityβs 2026 Browser Attacks Report to see what teams can do. π https://thn.news/browser-push-2026-t
π8
GlassWorm now delivers a multi-stage malware chain via malicious packages and hijacked accounts.
It hides C2 in Solana memos, installs a fake Google Docs Chrome extension, and steals cookies, sessions, and crypto wallet data, with added hardware wallet phishing.
π Read β https://thehackernews.com/2026/03/glassworm-malware-uses-solana-dead.html
It hides C2 in Solana memos, installs a fake Google Docs Chrome extension, and steals cookies, sessions, and crypto wallet data, with added hardware wallet phishing.
π Read β https://thehackernews.com/2026/03/glassworm-malware-uses-solana-dead.html
π3
A state-backed actor used an AI agent to run cyber ops, with 80β90% handled autonomously.
Compromise an AI agent already inside your environment, and the kill chain disappears. It already has access, permissions, and normal data flowsβso activity looks legitimate.
π How AI agents bypass traditional detection models β https://thehackernews.com/2026/03/the-kill-chain-is-obsolete-when-your-ai.html
Compromise an AI agent already inside your environment, and the kill chain disappears. It already has access, permissions, and normal data flowsβso activity looks legitimate.
π How AI agents bypass traditional detection models β https://thehackernews.com/2026/03/the-kill-chain-is-obsolete-when-your-ai.html
π₯6π€―3π2π2β‘1
β οΈ Russia has arrested the alleged admin of LeakBase, a major cybercrime forum.
147,000+ users traded stolen data including credentials, bank info, and corporate records used for fraud and account takeovers.
Authorities say user accounts, messages, and IP logs have been seized.
π Read β https://thehackernews.com/2026/03/leakbase-admin-arrested-in-russia-over.html
147,000+ users traded stolen data including credentials, bank info, and corporate records used for fraud and account takeovers.
Authorities say user accounts, messages, and IP logs have been seized.
π Read β https://thehackernews.com/2026/03/leakbase-admin-arrested-in-russia-over.html
π11π€―7π6π₯4π±1
β οΈ A new Magento skimmer uses WebRTC data channels instead of HTTP to steal payment data.
It pulls payloads and exfiltrates card details over encrypted UDP, bypassing CSP and staying invisible to most monitoring tools.
Attacks are exploiting the PolyShell RCE flaw at scale.
π Read β https://thehackernews.com/2026/03/webrtc-skimmer-bypasses-csp-to-steal.html
It pulls payloads and exfiltrates card details over encrypted UDP, bypassing CSP and staying invisible to most monitoring tools.
Attacks are exploiting the PolyShell RCE flaw at scale.
π Read β https://thehackernews.com/2026/03/webrtc-skimmer-bypasses-csp-to-steal.html
π8β‘5π₯3
β‘ WEBINAR β Your dashboard says βall good.β Attackers see gaps.
Stop guessing. Learn to validate your defenses against real attacks as experts demonstrate testing with real threat behavior to uncover gaps and prove what works.
π See how it works β https://thehackernews.com/2026/03/webinar-stop-guessing-learn-to-validate.html
Stop guessing. Learn to validate your defenses against real attacks as experts demonstrate testing with real threat behavior to uncover gaps and prove what works.
π See how it works β https://thehackernews.com/2026/03/webinar-stop-guessing-learn-to-validate.html
π5π₯3
ThreatsDay Bulletin: quick hits from a very busy week...
π PQC push
π€ AI bug finds
πΏ Pirated backdoors
π§© Wallet drainer
π± Firmware backdoor
π£ Phish kits rebound
π RMM via invites
π§ Fileless stealer
π¦ npm key theft
π Ranking bug abuse
π₯οΈ MSSQL scanner
π Forms malware
π¬ Web3 RAT lures
βοΈ Cloud fraud phones
π IIS outdated
π· CCTV abuse
π TDS scams
π» PS ransomware
π΅οΈ NK op exposed
𧬠Polyfill link
βοΈ Case dismissed
π Password powers
π± Android RAT
π Full roundup β https://thehackernews.com/2026/03/threatsday-bulletin-pqc-push-ai-vuln.html
π PQC push
π€ AI bug finds
πΏ Pirated backdoors
π§© Wallet drainer
π± Firmware backdoor
π£ Phish kits rebound
π RMM via invites
π§ Fileless stealer
π¦ npm key theft
π Ranking bug abuse
π₯οΈ MSSQL scanner
π Forms malware
π¬ Web3 RAT lures
βοΈ Cloud fraud phones
π IIS outdated
π· CCTV abuse
π TDS scams
π» PS ransomware
π΅οΈ NK op exposed
𧬠Polyfill link
βοΈ Case dismissed
π Password powers
π± Android RAT
π Full roundup β https://thehackernews.com/2026/03/threatsday-bulletin-pqc-push-ai-vuln.html
π6π5
π¨ Coruna turns a 2023 #iOS espionage exploit into a broader attack kit.
Kaspersky confirms it reuses and evolves the Triangulation kernel exploit, now updated for newer chips and iOS versions and still actively maintained.
Now bundled into 23 exploits across 5 chains and used beyond targeted ops, it shows #iPhone exploitation is scaling.
π How Coruna evolved and is being deployed β https://thehackernews.com/2026/03/coruna-ios-kit-reuses-2023.html
Kaspersky confirms it reuses and evolves the Triangulation kernel exploit, now updated for newer chips and iOS versions and still actively maintained.
Now bundled into 23 exploits across 5 chains and used beyond targeted ops, it shows #iPhone exploitation is scaling.
π How Coruna evolved and is being deployed β https://thehackernews.com/2026/03/coruna-ios-kit-reuses-2023.html
π€5π₯4π3π2
Learn to Secure Containers | Free Certification.
Transform your team into experts in practical container security. This free, self-paced course covers everything from selecting secure base images and scanning for vulnerabilities to protecting your production environment.
Complete the course to earn a shareable certification badge.
Start Free Course: https://thn.news/container-security-academy
Transform your team into experts in practical container security. This free, self-paced course covers everything from selecting secure base images and scanning for vulnerabilities to protecting your production environment.
Complete the course to earn a shareable certification badge.
Start Free Course: https://thn.news/container-security-academy
π5π₯3π2
β οΈ A flaw in Claudeβs Chrome extension let attackers inject prompts by just visiting a page.
No clicks. A hidden iframe + XSS chain made the extension treat attacker input as real user commands, enabling data theft and actions like sending emails.
π How the silent prompt injection worked β https://thehackernews.com/2026/03/claude-extension-flaw-enabled-zero.html
No clicks. A hidden iframe + XSS chain made the extension treat attacker input as real user commands, enabling data theft and actions like sending emails.
π How the silent prompt injection worked β https://thehackernews.com/2026/03/claude-extension-flaw-enabled-zero.html
π11π€―6π₯2π2
π A China-linked group has embedded kernel-level sleeper implants in telecom networks since 2021.
Its BPFDoor backdoor runs inside the OS, triggers via crafted packets, and enables long-term monitoring of government networks and users.
π Read β https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html
Its BPFDoor backdoor runs inside the OS, triggers via crafted packets, and enables long-term monitoring of government networks and users.
π Read β https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html
π€―20π₯9π6π±5β‘1π1π1
A flaw in ClawHub let attackers fake download counts to rank #1.
An exposed backend function had no auth or limits, allowing anyone to inflate downloads and push malicious skills to the topβcreating false trust and enabling code execution at scale.
π How attackers manipulated ClawHub rankings and spread malicious skills β https://thehackernews.com/2026/03/threatsday-bulletin-pqc-push-ai-vuln.html#bug-lets-attackers-fake-rankings
An exposed backend function had no auth or limits, allowing anyone to inflate downloads and push malicious skills to the topβcreating false trust and enabling code execution at scale.
π How attackers manipulated ClawHub rankings and spread malicious skills β https://thehackernews.com/2026/03/threatsday-bulletin-pqc-push-ai-vuln.html#bug-lets-attackers-fake-rankings
π16π₯5β‘2π1π1
β οΈ Three flaws in LangChain and LangGraph expose files, secrets, and chat history.
Path traversal, unsafe deserialization, and SQL injection create separate paths to access sensitive data in enterprise AI apps.
π Full breakdown of each CVE and impact β https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html
Path traversal, unsafe deserialization, and SQL injection create separate paths to access sensitive data in enterprise AI apps.
π Full breakdown of each CVE and impact β https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html
π₯4π4β‘3π1
π¨ A pro-Ukraine group has carried out 70+ cyberattacks on Russian firms since 2025.
Bearlyfy mixes extortion and sabotage, shifting from small companies to large enterprises with six-figure demands. It now uses custom GenieLocker ransomware.
π Read β https://thehackernews.com/2026/03/bearlyfy-hits-70-russian-firms-with.html
Bearlyfy mixes extortion and sabotage, shifting from small companies to large enterprises with six-figure demands. It now uses custom GenieLocker ransomware.
π Read β https://thehackernews.com/2026/03/bearlyfy-hits-70-russian-firms-with.html
π₯17π12π6π3π€2
Attackers are hijacking TikTok for Business accounts using AitM phishing pages.
Fake login flows use Cloudflare Turnstile to evade detection, then steal credentials for account takeover and malvertising.
π Full breakdown of the TikTok phishing chain β https://thehackernews.com/2026/03/aitm-phishing-targets-tiktok-business.html
Fake login flows use Cloudflare Turnstile to evade detection, then steal credentials for account takeover and malvertising.
π Full breakdown of the TikTok phishing chain β https://thehackernews.com/2026/03/aitm-phishing-targets-tiktok-business.html
π7π₯4π4
π Open VSX flaw let attackers publish malicious VS Code extensions by bypassing scans.
Single boolean bug treated scan failures as βnothing to scan,β so extensions passed under load and went live.
π How scan failures were misread and checks skipped β https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html
Single boolean bug treated scan failures as βnothing to scan,β so extensions passed under load and went live.
π How scan failures were misread and checks skipped β https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html
π6π₯5
Cybersecurity is now tied to geopolitics.
State-backed cyber operations target telecoms, infrastructure, and governments, while hacktivist groups increasingly align with national interests.
π How cyber conflict is reshaping global security β https://thehackernews.com/2026/03/we-are-at-war.html
State-backed cyber operations target telecoms, infrastructure, and governments, while hacktivist groups increasingly align with national interests.
π How cyber conflict is reshaping global security β https://thehackernews.com/2026/03/we-are-at-war.html
π₯14π4
π¨ A supply chain attack hit the telnyx Python packageβversions 4.87.1 and 4.87.2 were backdoored to steal credentials.
Malware hidden in .WAV files runs on import, exfiltrates data, persists on Windows, and runs fileless on Linux/macOS before deleting traces.
π Read β https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html
Malware hidden in .WAV files runs on import, exfiltrates data, persists on Windows, and runs fileless on Linux/macOS before deleting traces.
π Read β https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html
π€―6π€4π3π₯2
π Apple is sending #iPhone Lock Screen alerts warning users about active web-based attacks targeting outdated iOS.
Coruna and DarkSword exploit kits target older iOS via compromised sites, expanding risk beyond targeted attacks.
π Read β https://thehackernews.com/2026/03/apple-sends-lock-screen-alerts-to.html
Coruna and DarkSword exploit kits target older iOS via compromised sites, expanding risk beyond targeted attacks.
π Read β https://thehackernews.com/2026/03/apple-sends-lock-screen-alerts-to.html
π18π6π€―5π₯1