Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign | Cybersecurity

Ravie LakshmananMar 30, 2026Threat Intelligence / Network Intrusion Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described…

Read more

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack | Cybersecurity

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache…

Read more

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug | Cybersecurity

Ravie LakshmananMar 28, 2026Vulnerability / Network Security A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and…

Read more

Criminals are renting virtual phones to bypass bank security | Malware

Researchers at Group-IB warn about criminals using virtual Android devices to bypass modern security solutions. Cloud phones are virtual Android devices that can fully mimic real device fingerprints (model, hardware,…

Read more

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits | Cybersecurity

Ravie LakshmananMar 27, 2026Spyware / Mobile Security Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based…

Read more

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware | Cybersecurity

Ravie LakshmananMar 27, 2026Threat Intelligence / Vulnerability A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the…

Read more

Bogus Avast website fakes virus scan, installs Venom Stealer instead | Malware

A fake website impersonating Avast antivirus is tricking people into infecting their own computers. The site looks legitimate, runs what appears to be a virus scan, and claims your system…

Read more

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks | Cybersecurity

Ravie LakshmananMar 27, 2026Vulnerability / Artificial Intelligence Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation…

Read more

Landmark verdicts put Meta’s “addiction machine” platforms on trial | Malware

Meta faced two major legal setbacks this week as courts in New Mexico and California both found the company liable for harm to children. A New Mexico jury just ordered…

Read more

Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka | Malware

A previously undocumented macOS infostealer has surfaced during our routine threat hunting. We initially tracked it as NukeChain, but shortly before publication, the malware’s operator panel became publicly visible, revealing…

Read more

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks | Cybersecurity

A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting…

Read more

GlassWorm attack installs fake browser extension for surveillance | Malware

GlassWorm hides inside developer tools. Once it’s in, it steals data, installs remote access malware, and even a fake browser extension to monitor activity. While it starts with developers, the…

Read more

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks | Cybersecurity

Ravie LakshmananMar 26, 2026Malware / Mobile Security The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version…

Read more

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites | Cybersecurity

Ravie LakshmananMar 26, 2026Malware / Web Security Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively…

Read more

New FCC router ban could leave home networks less secure | Malware

On Monday, the Federal Communications Commission (FCC) updated its list of insecure equipment, outlining its reasons for adding all consumer-grade routers made outside the US. Effectively, this would stop foreign-made…

Read more

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace | Cybersecurity

Ravie LakshmananMar 25, 2026Cybercrime / Dark Web The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. According to TASS…

Read more

Hackers claim to have accessed data tied to millions of crime tipsters | Malware

Millions of crime tips may have been exposed after a hacker group claims to have compromised systems used by Crime Stoppers programs and other organizations worldwide.  The incident centers on…

Read more

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data | Cybersecurity

Ravie LakshmananMar 25, 2026Browser Security / Threat Intelligence Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of comprehensive data theft and…

Read more

The Kill Chain Is Obsolete When Your AI Agent Is the Threat | Cybersecurity

In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90%…

Read more

Meet Khaled Mohamed: the bug hunter who found a Microsoft flaw | Malware

It’s only on rare occasions that anyone pays attention to the acknowledgment section of a vulnerability disclosure. But for the person who found the bug, it’s often the conclusion of…

Read more

Scam compounds hiring “AI models” to seal the deal in deepfake video calls | Malware

Scam compounds in Southeast Asia have already become modern slave farms, trapping victims and forcing many of them to become scammers for them. Now they’ve added another type of worker to the mix: so-called…

Read more

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise | Cybersecurity

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a…

Read more

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials | Cybersecurity

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the…

Read more

FBI, CISA warn of Russian hackers hijacking Signal and WhatsApp accounts | Malware

In a Public Service Announcement (PSA) the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) warn the public about ongoing Russian-linked phishing campaigns that aim…

Read more

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills | Cybersecurity

The Hacker NewsMar 24, 2026Security Operations / Network Security Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But…

Read more

Advanced Flow will make Android sideloading safer | Malware

Google has announced the introduction of Advanced Flow, designed to let Android users install apps from unverified developers more safely than before. This process is known as sideloading. It means…

Read more

The March Madness scam playbook | Malware

March Madness is the annual men’s and women’s NCAA Division I basketball tournament, where 68 teams play in a single-elimination bracket for the US national championship. But March Madness doesn’t just…

Read more

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware | Cybersecurity

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that’s distributed via malicious Microsoft Visual…

Read more

FriendlyDealer mimics official app stores to push unvetted gambling apps | Malware

We’ve identified a huge social-engineering campaign designed to steer people into online gambling sites under the impression they’re installing a legitimate app. We’re calling it FriendlyDealer. It’s been observed across…

Read more

CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More | Cybersecurity

Ravie LakshmananMar 23, 2026Cybersecurity / Hacking Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many…

Read more
Update cookies preferences