The Hacker News
โœ”
160K subscribers
2.72K photos
18 videos
4 files
8.65K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ Coruna turns a 2023 #iOS espionage exploit into a broader attack kit.

Kaspersky confirms it reuses and evolves the Triangulation kernel exploit, now updated for newer chips and iOS versions and still actively maintained.

Now bundled into 23 exploits across 5 chains and used beyond targeted ops, it shows #iPhone exploitation is scaling.

๐Ÿ”— How Coruna evolved and is being deployed โ†’ https://thehackernews.com/2026/03/coruna-ios-kit-reuses-2023.html
๐Ÿค”5๐Ÿ”ฅ4๐Ÿ‘3๐Ÿ‘2
Learn to Secure Containers | Free Certification.

Transform your team into experts in practical container security. This free, self-paced course covers everything from selecting secure base images and scanning for vulnerabilities to protecting your production environment.

Complete the course to earn a shareable certification badge.

Start Free Course: https://thn.news/container-security-academy
๐Ÿ‘5๐Ÿ”ฅ3๐Ÿ‘2
โš ๏ธ A flaw in Claudeโ€™s Chrome extension let attackers inject prompts by just visiting a page.

No clicks. A hidden iframe + XSS chain made the extension treat attacker input as real user commands, enabling data theft and actions like sending emails.

๐Ÿ”— How the silent prompt injection worked โ†’ https://thehackernews.com/2026/03/claude-extension-flaw-enabled-zero.html
๐Ÿ‘11๐Ÿคฏ6๐Ÿ”ฅ2๐Ÿ˜2
๐Ÿ›‘ A China-linked group has embedded kernel-level sleeper implants in telecom networks since 2021.

Its BPFDoor backdoor runs inside the OS, triggers via crafted packets, and enables long-term monitoring of government networks and users.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html
๐Ÿคฏ20๐Ÿ”ฅ9๐Ÿ‘6๐Ÿ˜ฑ5โšก1๐Ÿ‘1๐Ÿ˜1
A flaw in ClawHub let attackers fake download counts to rank #1.

An exposed backend function had no auth or limits, allowing anyone to inflate downloads and push malicious skills to the topโ€”creating false trust and enabling code execution at scale.

๐Ÿ”— How attackers manipulated ClawHub rankings and spread malicious skills โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-pqc-push-ai-vuln.html#bug-lets-attackers-fake-rankings
๐Ÿ˜16๐Ÿ”ฅ5โšก2๐Ÿ‘1๐Ÿ‘1
โš ๏ธ Three flaws in LangChain and LangGraph expose files, secrets, and chat history.

Path traversal, unsafe deserialization, and SQL injection create separate paths to access sensitive data in enterprise AI apps.

๐Ÿ”— Full breakdown of each CVE and impact โ†’ https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html
๐Ÿ”ฅ4๐Ÿ˜4โšก3๐Ÿ‘1
๐Ÿšจ A pro-Ukraine group has carried out 70+ cyberattacks on Russian firms since 2025.

Bearlyfy mixes extortion and sabotage, shifting from small companies to large enterprises with six-figure demands. It now uses custom GenieLocker ransomware.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/bearlyfy-hits-70-russian-firms-with.html
๐Ÿ”ฅ17๐Ÿ‘12๐Ÿ‘6๐Ÿ˜3๐Ÿค”2
Attackers are hijacking TikTok for Business accounts using AitM phishing pages.

Fake login flows use Cloudflare Turnstile to evade detection, then steal credentials for account takeover and malvertising.

๐Ÿ”— Full breakdown of the TikTok phishing chain โ†’ https://thehackernews.com/2026/03/aitm-phishing-targets-tiktok-business.html
๐Ÿ‘7๐Ÿ”ฅ4๐Ÿ˜4
๐Ÿ›‘ Open VSX flaw let attackers publish malicious VS Code extensions by bypassing scans.

Single boolean bug treated scan failures as โ€œnothing to scan,โ€ so extensions passed under load and went live.

๐Ÿ”— How scan failures were misread and checks skipped โ†’ https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html
๐Ÿ‘6๐Ÿ”ฅ5
Cybersecurity is now tied to geopolitics.

State-backed cyber operations target telecoms, infrastructure, and governments, while hacktivist groups increasingly align with national interests.

๐Ÿ”— How cyber conflict is reshaping global security โ†’ https://thehackernews.com/2026/03/we-are-at-war.html
๐Ÿ”ฅ14๐Ÿ‘4
๐Ÿšจ A supply chain attack hit the telnyx Python packageโ€”versions 4.87.1 and 4.87.2 were backdoored to steal credentials.

Malware hidden in .WAV files runs on import, exfiltrates data, persists on Windows, and runs fileless on Linux/macOS before deleting traces.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html
๐Ÿคฏ6๐Ÿค”4๐Ÿ‘3๐Ÿ”ฅ2
๐Ÿ›‘ Apple is sending #iPhone Lock Screen alerts warning users about active web-based attacks targeting outdated iOS.

Coruna and DarkSword exploit kits target older iOS via compromised sites, expanding risk beyond targeted attacks.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/apple-sends-lock-screen-alerts-to.html
๐Ÿ‘18๐Ÿ˜6๐Ÿคฏ5๐Ÿ”ฅ1
๐Ÿ›‘ Russian-linked TA446 is using DarkSword iOS exploit kit in targeted phishing emails.

Spoofed โ€œdiscussion invitesโ€ trigger exploits only on iPhones and deliver GHOSTBLADE malware, expanding from credential theft to device compromise across government, academia, and policy targets.

๐Ÿ”— How DarkSword is used in these attacks โ†’ https://thehackernews.com/2026/03/ta446-deploys-leaked-darksword-ios.html
๐Ÿ˜10๐Ÿ”ฅ6
โš ๏ธ CISA flagged active exploitation of an F5 BIG-IP APM flaw.CVE-2025-53521 (CVSS 9.3) enables RCE, reclassified from DoS after new findings.

Exploitation is confirmed in the wild, with a federal patch deadline set.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html
๐Ÿ”ฅ12
๐Ÿšจ Attackers are probing Citrix NetScaler for CVE-2026-3055 (CVSS 9.3).

Honeypots show requests to /cgi/GetAuthMethods to identify SAML IdP setups, which are required for exploitation.

๐Ÿ”— How attackers are mapping vulnerable NetScaler targets โ†’ https://thehackernews.com/2026/03/citrix-netscaler-under-active-recon-for.html
๐Ÿ”ฅ10๐Ÿ˜6โšก2
โšก Iran-linked hackers breached FBI Director Kash Patelโ€™s personal email and leaked years-old data.

No government data was exposed, but the breach is part of a wider campaign using phishing, VPN access, and wiper attacks to disrupt targets and send geopolitical signals.

๐Ÿ”— Read about tactics, Stryker attack, and MOIS links โ†’ https://thehackernews.com/2026/03/iran-linked-hackers-breach-fbi.html
๐Ÿ”ฅ54๐Ÿ˜24๐Ÿ‘10๐Ÿ˜ฑ7๐Ÿ‘6โšก4
โš ๏ธ Three China-linked clusters targeted a Southeast Asian government in a coordinated operation.

Overlapping malware and tactics show a sustained push for long-term access, not disruption, across several months in 2025.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/three-china-linked-clusters-target.html
๐Ÿ”ฅ9๐Ÿ˜5โšก4๐Ÿ‘2
AI isnโ€™t making code safer. Itโ€™s expanding the attack surface.

As Eric Fourrier, GitGuardian CEO, notes, 28.65M secrets were exposed in 2025 as AI workflows expanded tokens, APIs, and machine identities.

Risk has shifted from code to credentials. Remediation is now the bottleneck.

๐Ÿ”— Why AI security is shifting beyond code โ†’ https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
๐Ÿ”ฅ16๐Ÿ‘1
๐Ÿ›‘ A Russian-linked toolkit is spreading through fake Windows shortcut files disguised as private key folders.

CTRL hides activity through RDP tunnels and local pipes, avoiding standard C2 traffic and reducing network detection signals.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html
๐Ÿ‘10๐Ÿ”ฅ5๐Ÿคฏ5โšก1
This media is not supported in your browser
VIEW IN TELEGRAM
GitGuardian found 29M leaked secrets in 2025, up 34%โ€”the largest jump on record.

AI services and internal systems drive exposure, while 64% of 2022 leaks remain valid; detection isnโ€™t the issue, remediation & ownership are.

๐Ÿ”— Where secrets leak & why they stay exploitable โ†’ https://thehackernews.com/2026/03/the-state-of-secrets-sprawl-2026-9.html
๐Ÿ”ฅ5๐Ÿ˜1
This week in cybersecurity...

๐Ÿ“ก Telecom backbone backdoored
๐Ÿ“ฌ FBI director's inbox owned
โ›“๏ธ Botnet hiding in blockchain
๐Ÿฆ  Chrome extension = infostealer
๐Ÿ–ฑ๏ธ ClickFix hits macOS
๐Ÿšซ Foreign routers banned
๐Ÿ‘ฎ RedLine operator extradited
๐Ÿ’ธ BEC fraudster gets 7 years
๐Ÿ“ท Deepfake-proof sensor developed
๐Ÿ“‹ 30+ CVEs, some live in the wild

Full recap is live ๐Ÿ‘‡ https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html
๐Ÿ”ฅ7๐Ÿ‘6๐Ÿ˜ฑ1