๐ Open VSX flaw let attackers publish malicious VS Code extensions by bypassing scans.
Single boolean bug treated scan failures as โnothing to scan,โ so extensions passed under load and went live.
๐ How scan failures were misread and checks skipped โ https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html
Single boolean bug treated scan failures as โnothing to scan,โ so extensions passed under load and went live.
๐ How scan failures were misread and checks skipped โ https://thehackernews.com/2026/03/open-vsx-bug-let-malicious-vs-code.html
๐6๐ฅ5
Cybersecurity is now tied to geopolitics.
State-backed cyber operations target telecoms, infrastructure, and governments, while hacktivist groups increasingly align with national interests.
๐ How cyber conflict is reshaping global security โ https://thehackernews.com/2026/03/we-are-at-war.html
State-backed cyber operations target telecoms, infrastructure, and governments, while hacktivist groups increasingly align with national interests.
๐ How cyber conflict is reshaping global security โ https://thehackernews.com/2026/03/we-are-at-war.html
๐ฅ14๐4
๐จ A supply chain attack hit the telnyx Python packageโversions 4.87.1 and 4.87.2 were backdoored to steal credentials.
Malware hidden in .WAV files runs on import, exfiltrates data, persists on Windows, and runs fileless on Linux/macOS before deleting traces.
๐ Read โ https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html
Malware hidden in .WAV files runs on import, exfiltrates data, persists on Windows, and runs fileless on Linux/macOS before deleting traces.
๐ Read โ https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html
๐คฏ6๐ค4๐3๐ฅ2
๐ Apple is sending #iPhone Lock Screen alerts warning users about active web-based attacks targeting outdated iOS.
Coruna and DarkSword exploit kits target older iOS via compromised sites, expanding risk beyond targeted attacks.
๐ Read โ https://thehackernews.com/2026/03/apple-sends-lock-screen-alerts-to.html
Coruna and DarkSword exploit kits target older iOS via compromised sites, expanding risk beyond targeted attacks.
๐ Read โ https://thehackernews.com/2026/03/apple-sends-lock-screen-alerts-to.html
๐18๐6๐คฏ5๐ฅ1
๐ Russian-linked TA446 is using DarkSword iOS exploit kit in targeted phishing emails.
Spoofed โdiscussion invitesโ trigger exploits only on iPhones and deliver GHOSTBLADE malware, expanding from credential theft to device compromise across government, academia, and policy targets.
๐ How DarkSword is used in these attacks โ https://thehackernews.com/2026/03/ta446-deploys-leaked-darksword-ios.html
Spoofed โdiscussion invitesโ trigger exploits only on iPhones and deliver GHOSTBLADE malware, expanding from credential theft to device compromise across government, academia, and policy targets.
๐ How DarkSword is used in these attacks โ https://thehackernews.com/2026/03/ta446-deploys-leaked-darksword-ios.html
๐10๐ฅ6
โ ๏ธ CISA flagged active exploitation of an F5 BIG-IP APM flaw.CVE-2025-53521 (CVSS 9.3) enables RCE, reclassified from DoS after new findings.
Exploitation is confirmed in the wild, with a federal patch deadline set.
๐ Read โ https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html
Exploitation is confirmed in the wild, with a federal patch deadline set.
๐ Read โ https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html
๐ฅ12
๐จ Attackers are probing Citrix NetScaler for CVE-2026-3055 (CVSS 9.3).
Honeypots show requests to /cgi/GetAuthMethods to identify SAML IdP setups, which are required for exploitation.
๐ How attackers are mapping vulnerable NetScaler targets โ https://thehackernews.com/2026/03/citrix-netscaler-under-active-recon-for.html
Honeypots show requests to /cgi/GetAuthMethods to identify SAML IdP setups, which are required for exploitation.
๐ How attackers are mapping vulnerable NetScaler targets โ https://thehackernews.com/2026/03/citrix-netscaler-under-active-recon-for.html
๐ฅ10๐6โก2
โก Iran-linked hackers breached FBI Director Kash Patelโs personal email and leaked years-old data.
No government data was exposed, but the breach is part of a wider campaign using phishing, VPN access, and wiper attacks to disrupt targets and send geopolitical signals.
๐ Read about tactics, Stryker attack, and MOIS links โ https://thehackernews.com/2026/03/iran-linked-hackers-breach-fbi.html
No government data was exposed, but the breach is part of a wider campaign using phishing, VPN access, and wiper attacks to disrupt targets and send geopolitical signals.
๐ Read about tactics, Stryker attack, and MOIS links โ https://thehackernews.com/2026/03/iran-linked-hackers-breach-fbi.html
๐ฅ54๐24๐10๐ฑ7๐6โก4
โ ๏ธ Three China-linked clusters targeted a Southeast Asian government in a coordinated operation.
Overlapping malware and tactics show a sustained push for long-term access, not disruption, across several months in 2025.
๐ Read โ https://thehackernews.com/2026/03/three-china-linked-clusters-target.html
Overlapping malware and tactics show a sustained push for long-term access, not disruption, across several months in 2025.
๐ Read โ https://thehackernews.com/2026/03/three-china-linked-clusters-target.html
๐ฅ9๐5โก4๐2
AI isnโt making code safer. Itโs expanding the attack surface.
As Eric Fourrier, GitGuardian CEO, notes, 28.65M secrets were exposed in 2025 as AI workflows expanded tokens, APIs, and machine identities.
Risk has shifted from code to credentials. Remediation is now the bottleneck.
๐ Why AI security is shifting beyond code โ https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
As Eric Fourrier, GitGuardian CEO, notes, 28.65M secrets were exposed in 2025 as AI workflows expanded tokens, APIs, and machine identities.
Risk has shifted from code to credentials. Remediation is now the bottleneck.
๐ Why AI security is shifting beyond code โ https://thehackernews.com/expert-insights/2026/03/the-real-problem-isnt-that-ai-cant.html
๐ฅ16๐1
๐ A Russian-linked toolkit is spreading through fake Windows shortcut files disguised as private key folders.
CTRL hides activity through RDP tunnels and local pipes, avoiding standard C2 traffic and reducing network detection signals.
๐ Read โ https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html
CTRL hides activity through RDP tunnels and local pipes, avoiding standard C2 traffic and reducing network detection signals.
๐ Read โ https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html
๐10๐ฅ5๐คฏ5โก1
This media is not supported in your browser
VIEW IN TELEGRAM
GitGuardian found 29M leaked secrets in 2025, up 34%โthe largest jump on record.
AI services and internal systems drive exposure, while 64% of 2022 leaks remain valid; detection isnโt the issue, remediation & ownership are.
๐ Where secrets leak & why they stay exploitable โ https://thehackernews.com/2026/03/the-state-of-secrets-sprawl-2026-9.html
AI services and internal systems drive exposure, while 64% of 2022 leaks remain valid; detection isnโt the issue, remediation & ownership are.
๐ Where secrets leak & why they stay exploitable โ https://thehackernews.com/2026/03/the-state-of-secrets-sprawl-2026-9.html
๐ฅ5๐1
This week in cybersecurity...
๐ก Telecom backbone backdoored
๐ฌ FBI director's inbox owned
โ๏ธ Botnet hiding in blockchain
๐ฆ Chrome extension = infostealer
๐ฑ๏ธ ClickFix hits macOS
๐ซ Foreign routers banned
๐ฎ RedLine operator extradited
๐ธ BEC fraudster gets 7 years
๐ท Deepfake-proof sensor developed
๐ 30+ CVEs, some live in the wild
Full recap is live ๐ https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html
๐ก Telecom backbone backdoored
๐ฌ FBI director's inbox owned
โ๏ธ Botnet hiding in blockchain
๐ฆ Chrome extension = infostealer
๐ฑ๏ธ ClickFix hits macOS
๐ซ Foreign routers banned
๐ฎ RedLine operator extradited
๐ธ BEC fraudster gets 7 years
๐ท Deepfake-proof sensor developed
๐ 30+ CVEs, some live in the wild
Full recap is live ๐ https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html
๐ฅ7๐6๐ฑ1
Media is too big
VIEW IN TELEGRAM
๐ฃ Nudge Security has added AI Agent Discovery to help teams manage shadow AI risks.
Employees are rapidly creating AI agents that connect to critical systems with broad permissionsโoften without visibility. These agents can persist even after creators leave.
Nudge Security helps by:
๐ Discovering agents across platforms like Copilot Studio, Salesforce, and more
๐ Mapping ownership, permissions, and integrations
๐ Identifying risks like exposed access, hardcoded credentials, and orphaned agents
๐ Enforcing guardrails to validate and secure usage
AI Agent Discovery is in research preview. Start a free trial to access it: https://thn.news/ai-discovery-tool
Employees are rapidly creating AI agents that connect to critical systems with broad permissionsโoften without visibility. These agents can persist even after creators leave.
Nudge Security helps by:
๐ Discovering agents across platforms like Copilot Studio, Salesforce, and more
๐ Mapping ownership, permissions, and integrations
๐ Identifying risks like exposed access, hardcoded credentials, and orphaned agents
๐ Enforcing guardrails to validate and secure usage
AI Agent Discovery is in research preview. Start a free trial to access it: https://thn.news/ai-discovery-tool
๐ฅ7๐4๐3
โ ๏ธ A new malware loader is using fake โfixโ prompts to trick users into running PowerShell commands.
DeepLoad runs inside legitimate Windows processes and begins stealing browser credentials and sessions early in the attack.
๐ Read โ https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
DeepLoad runs inside legitimate Windows processes and begins stealing browser credentials and sessions early in the attack.
๐ Read โ https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
๐11๐7๐ฅ4
Most Tier 1 delays start before the threat is even understood.
Tool switching and static triage slow investigations and hide real behavior. Unified workflows and behavior-first analysis reduce friction, speed validation, and cut unnecessary escalations.
๐ How SOC teams cut delays at Tier 1 โ https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html
Tool switching and static triage slow investigations and hide real behavior. Unified workflows and behavior-first analysis reduce friction, speed validation, and cut unnecessary escalations.
๐ How SOC teams cut delays at Tier 1 โ https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html
๐ฅ4๐2
๐ Two OpenAI flaws showed how AI systems can expose sensitive data.
๐ธ One allowed silent leaks via a DNS side channel in ChatGPT
๐ธ Another enabled GitHub token theft via Codex injection
๐ What these vulnerabilities exposed about AI security โ https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html
๐ธ One allowed silent leaks via a DNS side channel in ChatGPT
๐ธ Another enabled GitHub token theft via Codex injection
๐ What these vulnerabilities exposed about AI security โ https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html
๐9๐ฅ9๐1
โก WARNING - Axios npm (83M weekly downloads) was compromised, turning installs into a malware delivery path.
Versions 1.14.1 and 0.30.4 pulled a fake dependency that dropped a cross-platform RAT, then erased evidence. Published using stolen maintainer credentials.
๐ What happened and how the attack worked โ https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
Versions 1.14.1 and 0.30.4 pulled a fake dependency that dropped a cross-platform RAT, then erased evidence. Published using stolen maintainer credentials.
๐ What happened and how the attack worked โ https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
๐ฑ16๐9๐คฏ4๐ฅ1
Most AppSec teams say they fix critical bugs. Data shows otherwise.
In Semgrep's report, Braden Riggs finds top teams fix 63% of critical issues, while most fix just 13%. Same tools and alertsโthe gap is execution, not detection.
๐ What 50k repos reveal about real vulnerability fixes โ https://thehackernews.com/expert-insights/2026/03/which-code-vulnerabilities-actually-get.html
In Semgrep's report, Braden Riggs finds top teams fix 63% of critical issues, while most fix just 13%. Same tools and alertsโthe gap is execution, not detection.
๐ What 50k repos reveal about real vulnerability fixes โ https://thehackernews.com/expert-insights/2026/03/which-code-vulnerabilities-actually-get.html
๐4๐ค2๐ฅ1
Silver Fox is spreading AtlasCross RAT via fake Zoom, Signal, and Teams sites.
Signed installers from typo domains bypass checks, disable security tools, and run the RAT in memory for remote access and data theft across Asia.
๐ Full details โ https://thehackernews.com/2026/03/silver-fox-expands-asia-cyber-campaign.html
Signed installers from typo domains bypass checks, disable security tools, and run the RAT in memory for remote access and data theft across Asia.
๐ Full details โ https://thehackernews.com/2026/03/silver-fox-expands-asia-cyber-campaign.html
๐4๐ฅ1
โ ๏ธ A flaw in Google Cloud Vertex AI could expose sensitive data across projects.
Default service agent permissions allow attackers to steal credentials from AI agents, access storage buckets, and move inside cloud environments.
๐ Details here โ https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html
Default service agent permissions allow attackers to steal credentials from AI agents, access storage buckets, and move inside cloud environments.
๐ Details here โ https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html
๐3๐คฏ3๐ฅ1