Telegram’s Crackdown Changed How Threat Actors Act, But Not Where They Act | Cybersecurity
Telegram entered 2025 under unprecedented pressure. Public scrutiny, regulatory attention, and leadership turmoil forced the platform to do something it had long resisted, enforce at scale. Moderation volumes surged, automation…
Read moreThis is all it takes to stop a train (Lock and Code S07E06) | Malware
This week on the Lock and Code podcast… Forget the runaway train thrillingly shot in Buster Keaton’s 1926 film “The General,” and never mind the charging locomotive rescued by actors…
Read moreFBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks | Cybersecurity
Ravie LakshmananMar 21, 2026Cyber Espionage / Threat Intelligence Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like WhatsApp and Signal to…
Read moreOracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager | Cybersecurity
Ravie LakshmananMar 21, 2026Vulnerability / Threat Intelligence Oracle has released security updates to address a critical security flaw impacting Identity Manager and Web Services Manager that could be exploited to…
Read moreTrivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets | Cybersecurity
Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets. The…
Read moreCould your face change what you pay? NYC wants limits on biometric tracking | Malware
New York City lawmakers are pushing to ban private businesses from using biometric tools like voice and facial recognition software to track the public. While the desire to use surveillance…
Read moreCritical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure | Cybersecurity
A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabilities. The security…
Read moreThat “job brief” on Google Forms could infect your device | Malware
We’ve identified a campaign using business-related lures, such as job interviews, project briefs, and financial document, to distribute malware, including the PureHVNC Remote Access Trojan (RAT). It’s not the malware…
Read moreGoogle Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams | Cybersecurity
Ravie LakshmananMar 20, 2026Data Privacy / Mobile Security Google on Thursday announced a new “advanced flow” for Android sideloading that requires a mandatory 24-hour wait period to install apps from…
Read moreApple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks | Cybersecurity
Ravie LakshmananMar 20, 2026Mobile Security / Malware Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried…
Read moreYour tax forms sell for $20 on the dark web | Malware
Tax season is also peak season for identity theft. Criminals use stolen personal data to file fake tax returns and claim refunds before the real taxpayer does. Here’s how the…
Read moreSpeagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers | Cybersecurity
Ravie LakshmananMar 19, 2026Cyber Espionage / Threat Intelligence Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard….
Read moreNew Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data | Cybersecurity
Ravie LakshmananMar 19, 2026Malware / Mobile Security Cybersecurity researchers have disclosed a new Android malware family called Perseus that’s being actively distributed in the wild with an aim to conduct…
Read moreA DarkSword hangs over unpatched iPhones | Malware
Researchers at Google have identified an iOS exploit chain, named DarkSword, that has been used since late last year by multiple actors to infect iPhones with malware in targeted attacks. DarkSword…
Read moreDarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover | Cybersecurity
A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least November 2025, according to reports from…
Read moreGoogle cracks down on Android apps abusing accessibility | Malware
Google just dropped a bombshell for app developers with the latest version of its Android mobile operating system. The company can now prevent apps from installing if they try to…
Read moreApple patches WebKit bug that could let sites access your data | Malware
Apple has released a Background Security Improvement to patch a flaw that could allow malicious websites to bypass browser protections and access data from other sites. What is it? The…
Read moreOFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs | Cybersecurity
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People’s Republic of Korea (DPRK)…
Read moreResearchers found font-rendering trick to hide malicious commands | Malware
Researchers have published a proof-of-concept (PoC) that uses custom fonts to fool many popular Artificial Intelligence (AI) assistants, including ChatGPT, Claude, Copilot, Gemini, Leo, Grok, Perplexity, Sigma, Dia, Fellou, and…
Read moreGetting the Threat Model Right | Cybersecurity
When a Magecart payload hides inside the EXIF data of a dynamically loaded third-party favicon, no repository scanner will catch it – because the malicious code never actually touches your…
Read moreInside a network of 20,000+ fake shops | Malware
We mapped a sprawling fake shop operation of over 20,000 domains, dozens of shared IP addresses and identical storefronts with different names pasted on top. They exist for one purpose:…
Read moreApple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS | Cybersecurity
Ravie LakshmananMar 18, 2026Vulnerability / Zero-Day Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS….
Read moreHow searching for a VPN could mean handing over your work login details | Malware
This blog is about how trying to do the “right thing” can lead you straight into a trap. People searching for a VPN ended up downloading credential-stealing malware. From the…
Read moreFake Pudgy World site steals your crypto passwords | Malware
A phishing site impersonating the newly-launched Pudgy World browser game is targeting crypto users with a technique that goes well beyond a convincing logo and matching color scheme. Pudgy World…
Read moreAI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE | Cybersecurity
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries. In a report published…
Read more90% of people don’t trust AI with their data | Malware
AI didn’t sneak into our lives. It burst through the door, took a seat at the table, and started finishing our sentences. Instead of a helpful list of links, Google…
Read moreAI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Finds | Cybersecurity
The Hacker NewsMar 17, 2026Artificial Intelligence / Security Leadership A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the…
Read moreThe Biggest Defense Against Shai-Hulud 3.0 | Cybersecurity
When Shai-Hulud 2.0 hit in late 2025, it was a brutal, expensive wake-up call for DevSecOps teams. It showed that the industry’s direction of shifting left, where teams pass security…
Read moreDelete doesn’t mean gone. Here’s how File Shredder fixes that | Malware
You have done it a thousand times. Right-click. Delete. Empty Trash. Done. Except it’s not done. That file, your tax return, your private photos, that EmbezzlementPlan.doc… it’s all still sitting…
Read moreHacked sites deliver Vidar infostealer to Windows users | Malware
In recent years, ClickFix and fake CAPTCHA techniques have become a popular way for cybercriminals to distribute malware. Instead of exploiting a technical vulnerability, these attacks rely on convincing people…
Read more