The Hacker News
โœ”
154K subscribers
2.54K photos
17 videos
4 files
8.47K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
โš ๏ธ CISA added two CVSS 9.8 flaws to its KEV list after active exploitation.

One hits Hikvision devices and can expose sensitive data. The other targets Rockwell Logix controllers and could let attackers alter system configs.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html

Federal agencies must patch by March 26.
๐Ÿ”ฅ6๐Ÿ‘2โšก1
๐Ÿ›‘ ClickFix has moved to Windows Terminal.

Microsoft says victims are told to open wt.exe and paste a command from fake CAPTCHA pages.

That launches PowerShell, pulls payloads, and injects Lumma Stealer into Chrome and Edge to steal saved credentials.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html
๐Ÿคฏ11๐Ÿ‘4๐Ÿ”ฅ4๐Ÿ˜3โšก2
๐Ÿšจ China-linked APT UAT-9244 has been targeting telecom networks in South America since 2024.

Cisco Talos uncovered 3 new implants across Windows, #Linux, and edge devicesโ€”used for persistence, command control, and large-scale brute-force scanning.

๐Ÿ”— Inside TernDoor, PeerTime, and BruteEntry โ†’ https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html
๐Ÿ‘7๐Ÿ”ฅ5๐Ÿ˜3๐Ÿ˜ฑ3โšก1
๐Ÿ›‘ Iran-linked hackers quietly embedded inside multiple U.S. organizations, Broadcom researchers report.

The campaign is tied to MuddyWater, an #Iranian state group. Attackers deployed a Deno-based backdoor and tried exfiltrating data using Rclone to cloud storage.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html
๐Ÿ”ฅ33๐Ÿ‘8๐Ÿ˜ฑ4โšก3๐Ÿ˜2
MSPs trying to scale cybersecurity hit the same wall: manual risk assessments that donโ€™t scale.

AI-powered risk management automates assessments, maps compliance, and turns findings into remediationโ€”enabling continuous security services instead of one-off fixes.

๐Ÿ”— Inside: framework for scalable risk-first cybersecurity services โ†’ https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html
๐Ÿ‘5๐Ÿ”ฅ3๐Ÿค”2โšก1
Your shiny new AI agent can now:

๐Ÿ”— Browse
๐Ÿ› ๏ธ Execute code
โ˜ข๏ธ Touch production systems

Agency Gap = tools + APIs + permissions = new attack surface.

Secure your agents BEFORE they get owned.

๐Ÿ”— Join the webinar โ†’ https://thehacker.news/ai-agents-attack-surface
๐Ÿ”ฅ4๐Ÿค”3๐Ÿ‘2
โš ๏ธ VOID#GEIST malware delivers 3 RATs: XWorm, AsyncRAT, and Xeno RAT through a layered script chain.

Phishing emails pull a batch file from TryCloudflare, open a fake invoice PDF, then use Python to decrypt shellcode and inject it into explorer.exe via Early Bird APC.

๐Ÿ”— Inside the full fileless attack chain โ†’ https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html
๐Ÿ”ฅ6๐Ÿ˜3๐Ÿ‘2
โšก Bitdefender says Pakistan-aligned Transparent Tribe (APT36) is targeting Indian government entities with AI-generated malware.

The campaign spreads polyglot implants in Nim, Zig, and Crystal and hides C2 inside Slack, Supabase, and Google Sheets.

๐Ÿ”— Inside: phishing chain, malware tools, and infrastructure โ†’ https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html
๐Ÿ˜18๐Ÿ‘5๐Ÿ”ฅ3๐Ÿ‘2โšก1
๐Ÿ˜ฎ Car tire pressure sensors may expose where you go.

Researchers found TPMS sensors broadcast unchanging IDs in unencrypted radio signals. Receivers up to 40 m away can capture them and recognize the same vehicle again.

That enables long-term trackingโ€”no cameras, no line of sight.

๐Ÿ”— How TPMS signals reveal vehicle movement โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#tpms-signals-allow-covert-vehicle-tracking
โšก15๐Ÿ”ฅ11๐Ÿ˜8๐Ÿคฏ2
โšกNATO has cleared #iPhone and iPad to handle classified information.

The approval relies on built-in iOS and iPadOS securityโ€”no custom hardening or special software required.

Germanyโ€™s BSI had already cleared the devices for classified government use.

๐Ÿ”— Details on NATO approval โ†’ https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html#nato-clears-consumer-iphones-and-ipads
โšก18๐Ÿ˜9๐Ÿ‘8๐Ÿ˜ฑ4๐Ÿ”ฅ2๐Ÿค”1
๐Ÿ”ฅ Anthropic says its #Claude model found 22 Firefox vulnerabilities while scanning ~6,000 C++ files with Mozilla.

14 were high-severity. Turning bugs into exploits proved harder: after hundreds of attempts, the AI succeeded only twice.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html
๐Ÿ”ฅ41๐Ÿคฏ12๐Ÿ˜5๐Ÿ‘3๐Ÿ˜ฑ3
๐Ÿ”ฅ OpenAI launched "Codex Security," an AI agent that finds and fixes code vulnerabilities.

In testing it scanned 1.2M commits across open-source repos, uncovering 792 critical and 10,561 high-severity flaws in projects including OpenSSH, GnuTLS, PHP, and Chromium.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html
๐Ÿคฏ43๐Ÿ”ฅ22๐Ÿ‘8๐Ÿ˜7๐Ÿค”4โšก1
โš ๏ธ A newly tracked threat cluster is quietly breaching critical infrastructure across Asia.

Unit 42 says attackers exploit web servers, plant web shells, and dump credentials with tools like Mimikatz to move across networks in aviation, energy, and government sectors.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/web-server-exploits-and-mimikatz-used.html
๐Ÿ‘9๐Ÿ˜6๐Ÿ‘4
๐Ÿ›‘ Two Chrome extensions turned malicious after an ownership transfer.

Researchers say QuickLens (7,000 users) now strips security headers and pulls remote code every 5 minutes. The payload executes via hidden elements, leaving no malicious code in the extension source.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/chrome-extension-turns-malicious-after.html
๐Ÿ˜13๐Ÿคฏ7โšก4๐Ÿ”ฅ3๐Ÿ˜ฑ3๐Ÿ‘2
Latest edition of Cybersecurity recap worth reading:

๐ŸŒ PhaaS network dismantled
๐Ÿ“ฑ Qualcomm 0-day exploited
๐Ÿ”— iOS hit with 23-exploit chain
๐Ÿ“ก Wi-Fi isolation bypassed
๐Ÿค– AI writes malware
๐Ÿ•ต๏ธ Iran targets US banks
๐Ÿดโ€โ˜ ๏ธ Phobos operator pleads guilty
๐Ÿ”“ WP plugin drops rogue admins
๐ŸฆŠ AI finds 22 Firefox vulns
โ˜๏ธ AzCopy abused for exfiltration
๐Ÿ”‘ 1M+ private keys leaked
๐Ÿง  MuddyWater upgrades toolkit
๐Ÿ“‹ ClickFix drops ransomware
๐Ÿ’€ LeakBase taken down
๐Ÿชค MCP server backdoored
๐Ÿ“ฒ Fake Google page drops RAT
๐Ÿ’ธ Ransomware payments drop 8%
๐ŸŒ 90 zero-days tracked in 2025

๐Ÿ”— Full RECAP โ†’ https://thehackernews.com/2026/03/weekly-recap-qualcomm-0-day-ios-exploit.html
๐Ÿ”ฅ12๐Ÿคฏ8๐Ÿ˜6๐Ÿ˜ฑ3
Supply-chain pressure is pushing mid-market firms to meet enterprise security standards. Partners now expect proof of resilience.

A Bitdefender webinar explains how security platform consolidation helps lean IT teams cut complexity and show stronger security posture.

๐Ÿ”— GravityZone platform approach โ†’ https://thehackernews.com/2026/03/can-security-platform-finally-deliver.html
๐Ÿ‘8
๐Ÿšจ North Koreaโ€™s UNC4899 breached a crypto firm via AirDrop from a developโ€™s device.

A poisoned archive ran a fake Kubernetes CLI, opened a backdoor, pivoted into Google Cloud, exposed CI/CD tokens & reset accounts to steal millions.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/unc4899-used-airdrop-file-transfer-and.html
๐Ÿคฏ16๐Ÿ˜10๐Ÿ‘5
โš ๏ธ A malicious npm package is spreading a full RAT malware disguised as an OpenClaw installer.

It pulls a hidden second-stage payload and steals browser data, macOS Keychain entries, crypto wallets, and developer cloud credentials.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html
๐Ÿ”ฅ24๐Ÿคฏ3โšก1๐Ÿ‘1
โš ๏ธ CISA added 3 actively exploited flaws to KEV.

Most critical: SolarWinds Web Help Desk CVE-2025-26399 (CVSS 9.8) allowing remote command execution.

Other KEV entries hit Omnissa Workspace One UEM and Ivanti Endpoint Manager. Federal agencies ordered to patch.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/03/cisa-flags-solarwinds-ivanti-and.html
๐Ÿ‘10๐Ÿ˜ฑ4
Security teams often prioritize fixes by CVSS. But CVSS measures technical severity, not actual risk.

A 9.8 CVSS flaw in an isolated test system may be patched first, while a lower-scored bug in a public login API waits.

Real risk depends on exposure, exploit paths, and business impact.

๐Ÿ”— Why context changes vulnerability priorities โ†’ https://thehackernews.com/expert-insights/2026/03/why-cvss-scores-dont-tell-real-story-of.html
๐Ÿ”ฅ15๐Ÿ‘6๐Ÿ˜ฑ2๐Ÿ˜1๐Ÿคฏ1