Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign | Cybersecurity
Ravie LakshmananMar 30, 2026Threat Intelligence / Network Intrusion Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described…
Read moreIran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack | Cybersecurity
Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache…
Read moreCitrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug | Cybersecurity
Ravie LakshmananMar 28, 2026Vulnerability / Network Security A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and…
Read moreCriminals are renting virtual phones to bypass bank security | Malware
Researchers at Group-IB warn about criminals using virtual Android devices to bypass modern security solutions. Cloud phones are virtual Android devices that can fully mimic real device fingerprints (model, hardware,…
Read moreApple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits | Cybersecurity
Ravie LakshmananMar 27, 2026Spyware / Mobile Security Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based…
Read moreBearlyfy Hits Russian Firms with Custom GenieLocker Ransomware | Cybersecurity
Ravie LakshmananMar 27, 2026Threat Intelligence / Vulnerability A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since it first surfaced in the…
Read moreBogus Avast website fakes virus scan, installs Venom Stealer instead | Malware
A fake website impersonating Avast antivirus is tricking people into infecting their own computers. The site looks legitimate, runs what appears to be a virus scan, and claims your system…
Read moreLangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks | Cybersecurity
Ravie LakshmananMar 27, 2026Vulnerability / Artificial Intelligence Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation…
Read moreLandmark verdicts put Meta’s “addiction machine” platforms on trial | Malware
Meta faced two major legal setbacks this week as courts in New Mexico and California both found the company liable for harm to children. A New Mexico jury just ordered…
Read moreInfiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka | Malware
A previously undocumented macOS infostealer has surfaced during our routine threat hunting. We initially tracked it as NukeChain, but shortly before publication, the malware’s operator panel became publicly visible, revealing…
Read moreChina-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks | Cybersecurity
A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting…
Read moreGlassWorm attack installs fake browser extension for surveillance | Malware
GlassWorm hides inside developer tools. Once it’s in, it steals data, installs remote access malware, and even a fake browser extension to monitor activity. While it starts with developers, the…
Read moreCoruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks | Cybersecurity
Ravie LakshmananMar 26, 2026Malware / Mobile Security The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version…
Read moreWebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites | Cybersecurity
Ravie LakshmananMar 26, 2026Malware / Web Security Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively…
Read moreNew FCC router ban could leave home networks less secure | Malware
On Monday, the Federal Communications Commission (FCC) updated its list of insecure equipment, outlining its reasons for adding all consumer-grade routers made outside the US. Effectively, this would stop foreign-made…
Read moreLeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace | Cybersecurity
Ravie LakshmananMar 25, 2026Cybercrime / Dark Web The alleged administrator of the LeakBase cybercrime forum has been arrested by Russian law enforcement authorities, state media reported Thursday. According to TASS…
Read moreHackers claim to have accessed data tied to millions of crime tipsters | Malware
Millions of crime tips may have been exposed after a hacker group claims to have compromised systems used by Crime Stoppers programs and other organizations worldwide. The incident centers on…
Read moreGlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data | Cybersecurity
Ravie LakshmananMar 25, 2026Browser Security / Threat Intelligence Cybersecurity researchers have flagged a new evolution of the GlassWorm campaign that delivers a multi-stage framework capable of comprehensive data theft and…
Read moreThe Kill Chain Is Obsolete When Your AI Agent Is the Threat | Cybersecurity
In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90%…
Read moreMeet Khaled Mohamed: the bug hunter who found a Microsoft flaw | Malware
It’s only on rare occasions that anyone pays attention to the acknowledgment section of a vulnerability disclosure. But for the person who found the bug, it’s often the conclusion of…
Read moreScam compounds hiring “AI models” to seal the deal in deepfake video calls | Malware
Scam compounds in Southeast Asia have already become modern slave farms, trapping victims and forcing many of them to become scammers for them. Now they’ve added another type of worker to the mix: so-called…
Read moreTeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise | Cybersecurity
TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a…
Read moreGhost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials | Cybersecurity
Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the…
Read moreFBI, CISA warn of Russian hackers hijacking Signal and WhatsApp accounts | Malware
In a Public Service Announcement (PSA) the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) warn the public about ongoing Russian-linked phishing campaigns that aim…
Read moreThe Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills | Cybersecurity
The Hacker NewsMar 24, 2026Security Operations / Network Security Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But…
Read moreAdvanced Flow will make Android sideloading safer | Malware
Google has announced the introduction of Advanced Flow, designed to let Android users install apps from unverified developers more safely than before. This process is known as sideloading. It means…
Read moreThe March Madness scam playbook | Malware
March Madness is the annual men’s and women’s NCAA Division I basketball tournament, where 68 teams play in a single-elimination bracket for the US national championship. But March Madness doesn’t just…
Read moreNorth Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware | Cybersecurity
The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that’s distributed via malicious Microsoft Visual…
Read moreFriendlyDealer mimics official app stores to push unvetted gambling apps | Malware
We’ve identified a huge social-engineering campaign designed to steer people into online gambling sites under the impression they’re installing a legitimate app. We’re calling it FriendlyDealer. It’s been observed across…
Read moreCI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More | Cybersecurity
Ravie LakshmananMar 23, 2026Cybersecurity / Hacking Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many…
Read more