This week in cybersecurity...
๐ก Telecom backbone backdoored
๐ฌ FBI director's inbox owned
โ๏ธ Botnet hiding in blockchain
๐ฆ Chrome extension = infostealer
๐ฑ๏ธ ClickFix hits macOS
๐ซ Foreign routers banned
๐ฎ RedLine operator extradited
๐ธ BEC fraudster gets 7 years
๐ท Deepfake-proof sensor developed
๐ 30+ CVEs, some live in the wild
Full recap is live ๐ https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html
๐ก Telecom backbone backdoored
๐ฌ FBI director's inbox owned
โ๏ธ Botnet hiding in blockchain
๐ฆ Chrome extension = infostealer
๐ฑ๏ธ ClickFix hits macOS
๐ซ Foreign routers banned
๐ฎ RedLine operator extradited
๐ธ BEC fraudster gets 7 years
๐ท Deepfake-proof sensor developed
๐ 30+ CVEs, some live in the wild
Full recap is live ๐ https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html
๐ฅ7๐6๐ฑ1
Media is too big
VIEW IN TELEGRAM
๐ฃ Nudge Security has added AI Agent Discovery to help teams manage shadow AI risks.
Employees are rapidly creating AI agents that connect to critical systems with broad permissionsโoften without visibility. These agents can persist even after creators leave.
Nudge Security helps by:
๐ Discovering agents across platforms like Copilot Studio, Salesforce, and more
๐ Mapping ownership, permissions, and integrations
๐ Identifying risks like exposed access, hardcoded credentials, and orphaned agents
๐ Enforcing guardrails to validate and secure usage
AI Agent Discovery is in research preview. Start a free trial to access it: https://thn.news/ai-discovery-tool
Employees are rapidly creating AI agents that connect to critical systems with broad permissionsโoften without visibility. These agents can persist even after creators leave.
Nudge Security helps by:
๐ Discovering agents across platforms like Copilot Studio, Salesforce, and more
๐ Mapping ownership, permissions, and integrations
๐ Identifying risks like exposed access, hardcoded credentials, and orphaned agents
๐ Enforcing guardrails to validate and secure usage
AI Agent Discovery is in research preview. Start a free trial to access it: https://thn.news/ai-discovery-tool
๐ฅ7๐4๐3
โ ๏ธ A new malware loader is using fake โfixโ prompts to trick users into running PowerShell commands.
DeepLoad runs inside legitimate Windows processes and begins stealing browser credentials and sessions early in the attack.
๐ Read โ https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
DeepLoad runs inside legitimate Windows processes and begins stealing browser credentials and sessions early in the attack.
๐ Read โ https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
๐11๐7๐ฅ4
Most Tier 1 delays start before the threat is even understood.
Tool switching and static triage slow investigations and hide real behavior. Unified workflows and behavior-first analysis reduce friction, speed validation, and cut unnecessary escalations.
๐ How SOC teams cut delays at Tier 1 โ https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html
Tool switching and static triage slow investigations and hide real behavior. Unified workflows and behavior-first analysis reduce friction, speed validation, and cut unnecessary escalations.
๐ How SOC teams cut delays at Tier 1 โ https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html
๐ฅ4๐2
๐ Two OpenAI flaws showed how AI systems can expose sensitive data.
๐ธ One allowed silent leaks via a DNS side channel in ChatGPT
๐ธ Another enabled GitHub token theft via Codex injection
๐ What these vulnerabilities exposed about AI security โ https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html
๐ธ One allowed silent leaks via a DNS side channel in ChatGPT
๐ธ Another enabled GitHub token theft via Codex injection
๐ What these vulnerabilities exposed about AI security โ https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html
๐9๐ฅ9๐1
โก WARNING - Axios npm (83M weekly downloads) was compromised, turning installs into a malware delivery path.
Versions 1.14.1 and 0.30.4 pulled a fake dependency that dropped a cross-platform RAT, then erased evidence. Published using stolen maintainer credentials.
๐ What happened and how the attack worked โ https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
Versions 1.14.1 and 0.30.4 pulled a fake dependency that dropped a cross-platform RAT, then erased evidence. Published using stolen maintainer credentials.
๐ What happened and how the attack worked โ https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
๐ฑ16๐9๐คฏ4๐ฅ1
Most AppSec teams say they fix critical bugs. Data shows otherwise.
In Semgrep's report, Braden Riggs finds top teams fix 63% of critical issues, while most fix just 13%. Same tools and alertsโthe gap is execution, not detection.
๐ What 50k repos reveal about real vulnerability fixes โ https://thehackernews.com/expert-insights/2026/03/which-code-vulnerabilities-actually-get.html
In Semgrep's report, Braden Riggs finds top teams fix 63% of critical issues, while most fix just 13%. Same tools and alertsโthe gap is execution, not detection.
๐ What 50k repos reveal about real vulnerability fixes โ https://thehackernews.com/expert-insights/2026/03/which-code-vulnerabilities-actually-get.html
๐4๐ค2๐ฅ1
Silver Fox is spreading AtlasCross RAT via fake Zoom, Signal, and Teams sites.
Signed installers from typo domains bypass checks, disable security tools, and run the RAT in memory for remote access and data theft across Asia.
๐ Full details โ https://thehackernews.com/2026/03/silver-fox-expands-asia-cyber-campaign.html
Signed installers from typo domains bypass checks, disable security tools, and run the RAT in memory for remote access and data theft across Asia.
๐ Full details โ https://thehackernews.com/2026/03/silver-fox-expands-asia-cyber-campaign.html
๐4๐ฅ1
โ ๏ธ A flaw in Google Cloud Vertex AI could expose sensitive data across projects.
Default service agent permissions allow attackers to steal credentials from AI agents, access storage buckets, and move inside cloud environments.
๐ Details here โ https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html
Default service agent permissions allow attackers to steal credentials from AI agents, access storage buckets, and move inside cloud environments.
๐ Details here โ https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html
๐3๐คฏ3๐ฅ1
AI is shrinking cyberattacks to hours.
Threat actors use AI to automate phishing, find vulnerabilities, and chain exploits faster than human response. Traditional security is too slow.
Defenders are moving to continuous AI-driven testing and fixes.
๐ Why speed now defines cybersecurity โ https://thehackernews.com/2026/03/the-ai-arms-race-why-unified-exposure.html
Threat actors use AI to automate phishing, find vulnerabilities, and chain exploits faster than human response. Traditional security is too slow.
Defenders are moving to continuous AI-driven testing and fixes.
๐ Why speed now defines cybersecurity โ https://thehackernews.com/2026/03/the-ai-arms-race-why-unified-exposure.html
๐ฑ8๐3๐2๐ฅ1
AI is redefining cyber roles, hiring, and skills.
See where teams are rebuilding and where careers are heading by downloading your copy of 2026 Workforce Research Report.
๐ Download โ https://thn.news/sans-workforce-research
See where teams are rebuilding and where careers are heading by downloading your copy of 2026 Workforce Research Report.
๐ Download โ https://thn.news/sans-workforce-research
๐4๐ค4๐ฅ2
โ ๏ธ A zero-day in TrueConf let attackers spread malware through its own update system.
CVE-2026-3502 (CVSS 7.8) was exploited by compromising on-prem servers, pushing tampered updates to all connected clients in government networks across Southeast Asia.
๐ How the TrueChaos campaign weaponized software updates โ https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html
CVE-2026-3502 (CVSS 7.8) was exploited by compromising on-prem servers, pushing tampered updates to all connected clients in government networks across Southeast Asia.
๐ How the TrueChaos campaign weaponized software updates โ https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html
๐ฅ4๐ค4๐คฏ3๐2
๐ฅ Google has opened Android verification to all developers.
Developer verification is now live globally, letting devs confirm identity and register apps ahead of enforcement.
From Sept 30, 2026, only verified apps install in select markets, expanding globally in 2027.
๐ Timeline and what devs must do next โ https://thehackernews.com/2026/03/android-developer-verification-rollout.html
Developer verification is now live globally, letting devs confirm identity and register apps ahead of enforcement.
From Sept 30, 2026, only verified apps install in select markets, expanding globally in 2027.
๐ Timeline and what devs must do next โ https://thehackernews.com/2026/03/android-developer-verification-rollout.html
๐13๐ฑ8๐6๐คฏ4๐ฅ1
๐ฅ Anthropic accidentally exposed 512,000 lines of Claude Code via an npm packaging error.
The code reveals internal systems like multi-agent workflows, guardrails, and automationโgiving attackers a clear map to study and exploit.
๐ Read โ https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html
The code reveals internal systems like multi-agent workflows, guardrails, and automationโgiving attackers a clear map to study and exploit.
๐ Read โ https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html
๐ฅ33๐คฏ20๐4๐4
โ ๏ธ Google links the Axios npm compromise to North Korean group UNC1069.
Attackers hijacked the maintainer account and pushed malicious versions that executed during install via a hidden dependency, deploying a cross-platform backdoor (Windows, macOS, Linux) and then removing traces.
๐ Read โ https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html
Attackers hijacked the maintainer account and pushed malicious versions that executed during install via a hidden dependency, deploying a cross-platform backdoor (Windows, macOS, Linux) and then removing traces.
๐ Read โ https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html
๐คฏ13๐4๐ฅ4๐4โก3
Vulnerability management is shifting from periodic scans to continuous monitoring.
Exploitation can start within hours, making CVSS scores and patch cycles too slow. Teams now need continuous visibility, threat context, and real-time detection to manage actual risk.
๐ Why proactive vulnerability management is replacing scans โ https://thehackernews.com/expert-insights/2026/03/wazuh-for-proactive-vulnerability.html
Exploitation can start within hours, making CVSS scores and patch cycles too slow. Teams now need continuous visibility, threat context, and real-time detection to manage actual risk.
๐ Why proactive vulnerability management is replacing scans โ https://thehackernews.com/expert-insights/2026/03/wazuh-for-proactive-vulnerability.html
๐12๐ฅ4โก3
๐ Chrome 0-day Warning!
Tracked as CVE-2026-5281, this WebGPU (Dawn) use-after-free bug allows code execution via a crafted page if the renderer is compromised.
Itโs the 4th exploited Chrome browser zero-day in 2026.
๐ Read โ https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html
Tracked as CVE-2026-5281, this WebGPU (Dawn) use-after-free bug allows code execution via a crafted page if the renderer is compromised.
Itโs the 4th exploited Chrome browser zero-day in 2026.
๐ Read โ https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html
๐ฅ15๐5โก3
Cyberattacks are shifting away from malware.
84% now use built-in tools like PowerShell and WMIC to move inside systems without raising alarms. These actions look normal, making detection harder while excess access creates hidden risk.
๐ Why attackers now use your own tools โ https://thehackernews.com/2026/04/3-reasons-attackers-are-using-your.html
84% now use built-in tools like PowerShell and WMIC to move inside systems without raising alarms. These actions look normal, making detection harder while excess access creates hidden risk.
๐ Why attackers now use your own tools โ https://thehackernews.com/2026/04/3-reasons-attackers-are-using-your.html
๐คฏ5๐4๐ฅ2๐ค2๐ฑ1
๐จ Microsoft identified a campaign using WhatsApp to deliver malicious VBS files.
The attack renames Windows tools, uses cloud payloads and installs AnyDesk to enable stealthy persistence and remote access while blending into normal activity.
๐ Read โ https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html
The attack renames Windows tools, uses cloud payloads and installs AnyDesk to enable stealthy persistence and remote access while blending into normal activity.
๐ Read โ https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html
๐ฅ9๐5๐5
๐ซ Blocking #ChatGPT or DeepSeek doesnโt stop usageโit pushes it out of sight.
70% of users in one firm still used AI via browser extensions after a block, routing data externally without detection.
This is โtheatrical securityโ: control on paper, blind in practice.
๐ Why security is shifting to browser-level governance โ https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html
70% of users in one firm still used AI via browser extensions after a block, routing data externally without detection.
This is โtheatrical securityโ: control on paper, blind in practice.
๐ Why security is shifting to browser-level governance โ https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html
๐10๐10๐ค6๐ฅ4๐ฑ3โก1
CERT-UA warned of a phishing campaign impersonating the agency to spread AGEWHEEZE malware.
The malware enables full system control, but confirmed infections were limited despite wide targeting.
๐ Campaign details and malware capabilities โ https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html
The malware enables full system control, but confirmed infections were limited despite wide targeting.
๐ Campaign details and malware capabilities โ https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html
๐ฅ6๐2๐2๐คฏ2๐ค1