GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos | Cybersecurity
Ravie LakshmananMar 16, 2026Malware / Cryptocurrency The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of…
Read moreZombie ZIP method can fool antivirus during the first scan | Malware
A researcher published “Zombie ZIP,” a simple way to change the first part (header) of a ZIP file so it falsely claims its contents are uncompressed while they are actually compressed. Many…
Read moreChrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More | Cybersecurity
Ravie LakshmananMar 16, 2026Cybersecurity / Hacking Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now” feeling. This…
Read moreDRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage | Cybersecurity
Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 Grupo’s LAB52 threat intelligence team….
Read moreAndroid 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse | Cybersecurity
Ravie LakshmananMar 16, 2026Mobile Security / Data Protection Google is testing a new security feature as part of Android Advanced Protection Mode (AAPM) that prevents certain kinds of apps from…
Read moreOpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration | Cybersecurity
Ravie LakshmananMar 14, 2026Artificial Intelligence / Endpoint Security China’s National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw…
Read moreMarch 2026 Patch Tuesday fixes two zero-day vulnerabilities | Malware
Microsoft releases important security updates on the second Tuesday of every month, known as Patch Tuesday. This month’s update fixes 79 Microsoft CVEs including two zero-day vulnerabilities. Microsoft defines a…
Read moreGlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers | Cybersecurity
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a “significant escalation” in how it propagates through the Open VSX registry. “Instead of requiring…
Read moreMeta rolls out anti-scam tools across WhatsApp, Facebook, and Messenger | Malware
Meta has rolled out more anti-scam protections across WhatsApp, Facebook, and Messenger to fight sophisticated fraud tactics. The features will help stop celebrity impersonators and brand spoofers from defrauding its…
Read moreGoogle patches two Chrome zero-days under active attack. Update now | Malware
Google has released an out-of-band security update for Chrome desktop that patches two high‑severity zero‑day vulnerabilities. Both bugs can be exploited remotely and require only that a user visit a…
Read moreWatch out for fake Malwarebytes renewal notices in your calendar | Malware
We’ve become aware of a scam campaign sending fake calendar invites that impersonate Malwarebytes and attempt to trick recipients into calling a scam “billing support” number. We have written before about how calendar invites can be abused for phishing, and even…
Read moreChinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware | Cybersecurity
A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42…
Read moreGoogle Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8 | Cybersecurity
Ravie LakshmananMar 13, 2026Browser Security / Vulnerability Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in…
Read moreFake Temu Coin airdrop uses ClickFix trick to install stealthy malware | Malware
We’ve covered ClickFix campaigns before: the fake CAPTCHAs, the fake Windows updates, the trick of getting victims to paste malicious commands into their own machines. Now we’ve identified a campaign that uses…
Read moreAuthorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries | Cybersecurity
A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential routers worldwide into a botnet for committing large-scale fraud. “SocksEscort infected…
Read moreMicrosoft Authenticator could leak login codes—update your app now | Malware
A vulnerability in Microsoft Authenticator for both iOS and Android (CVE-2026-26123) could leak your one-time sign-in codes or authentication deep links to a malicious app on the same device. Deep…
Read moreRust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays | Cybersecurity
Ravie LakshmananMar 12, 2026Malware / Cybercrime Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that’s written in Rust, marking a significant departure from other known…
Read moreApple patches Coruna exploit kit flaws for older iOS versions | Malware
On March 3, 2026, Google warned about a powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (released in September 2019) up to version 17.2.1 (released in December 2023)….
Read moreHow to Scale Phishing Detection in Your SOC: 3 Steps for CISOs | Cybersecurity
Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted infrastructure, legitimate-looking authentication flows,…
Read moreThis Android vulnerability can break your lock screen in under 60 seconds | Malware
A vulnerability in Android devices can allow attackers to gain access to a phone in less than a minute. The vulnerability, tracked as CVE-2026-20435, affects certain MediaTek SoCs (System-on-a-Chip) using…
Read moreAttackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload | Cybersecurity
The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of five…
Read moreWatch out for tax-season robocalls pushing fake “relief programs” | Malware
While Americans are sorting through paperwork to get their taxes filed in time, scammers are working overtime to grab a piece of the action. As tax season ramps up, so…
Read moreCISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed | Cybersecurity
Ravie LakshmananMar 12, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV)…
Read morePhishers hide scam links with IPv6 trick in “free toothbrush” emails | Malware
A recurring lure in phishing emails impersonating United Healthcare is the promise of a free Oral-B toothbrush. But the interesting part isn’t the toothbrush. It’s the link. Two examples of…
Read moreResearchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes | Cybersecurity
Ravie LakshmananMar 11, 2026Artificial Intelligence / Browser Security Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could…
Read moreSextortion “I recorded you” emails reuse passwords found in disposable inboxes | Malware
Our malware removal support team recently flagged a new wave of sextortion emails, with the subject line: “You pervert, I recorded you!” If the message sounds familiar, that’s because it’s…
Read moreCritical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials | Cybersecurity
Ravie LakshmananMar 11, 2026 Vulnerability / Application Security Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could…
Read moreMicrosoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days | Cybersecurity
Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are…
Read moreFive Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets | Cybersecurity
Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors. The Rust packages, published to crates.io, are listed…
Read moreHackers may have breached FBI wiretap network via supply chain | Malware
Investigators are worried that a recent attack on a critical FBI system was more than just a random hit, and that another nation-state might have been involved. On February 17,…
Read more