GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos | Cybersecurity

Ravie LakshmananMar 16, 2026Malware / Cryptocurrency The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of…

Read more

Zombie ZIP method can fool antivirus during the first scan | Malware

A researcher published “Zombie ZIP,” a simple way to change the first part (header) of a ZIP file so it falsely claims its contents are uncompressed while they are actually compressed. Many…

Read more

Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More | Cybersecurity

Ravie LakshmananMar 16, 2026Cybersecurity / Hacking Some weeks in security feel normal. Then you read a few tabs and get that immediate “ah, great, we’re doing this now” feeling. This…

Read more

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage | Cybersecurity

Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 Grupo’s LAB52 threat intelligence team….

Read more

Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse | Cybersecurity

Ravie LakshmananMar 16, 2026Mobile Security / Data Protection Google is testing a new security feature as part of Android Advanced Protection Mode (AAPM) that prevents certain kinds of apps from…

Read more

OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration | Cybersecurity

Ravie LakshmananMar 14, 2026Artificial Intelligence / Endpoint Security China’s National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw…

Read more

March 2026 Patch Tuesday fixes two zero-day vulnerabilities | Malware

Microsoft releases important security updates on the second Tuesday of every month, known as Patch Tuesday. This month’s update fixes 79 Microsoft CVEs including two zero-day vulnerabilities. Microsoft defines a…

Read more

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers | Cybersecurity

Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a “significant escalation” in how it propagates through the Open VSX registry. “Instead of requiring…

Read more

Meta rolls out anti-scam tools across WhatsApp, Facebook, and Messenger | Malware

Meta has rolled out more anti-scam protections across WhatsApp, Facebook, and Messenger to fight sophisticated fraud tactics. The features will help stop celebrity impersonators and brand spoofers from defrauding its…

Read more

Google patches two Chrome zero-days under active attack. Update now | Malware

Google has released an out-of-band security update for Chrome desktop that patches two high‑severity zero‑day vulnerabilities. Both bugs can be exploited remotely and require only that a user visit a…

Read more

Watch out for fake Malwarebytes renewal notices in your calendar | Malware

We’ve become aware of a scam campaign sending fake calendar invites that impersonate Malwarebytes and attempt to trick recipients into calling a scam “billing support” number.  We have written before about how calendar invites can be abused for phishing, and even…

Read more

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware | Cybersecurity

A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42…

Read more

Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8 | Cybersecurity

Ravie LakshmananMar 13, 2026Browser Security / Vulnerability Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in…

Read more

Fake Temu Coin airdrop uses ClickFix trick to install stealthy malware | Malware

We’ve covered ClickFix campaigns before: the fake CAPTCHAs, the fake Windows updates, the trick of getting victims to paste malicious commands into their own machines. Now we’ve identified a campaign that uses…

Read more

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries | Cybersecurity

A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential routers worldwide into a botnet for committing large-scale fraud. “SocksEscort infected…

Read more

Microsoft Authenticator could leak login codes—update your app now | Malware

A vulnerability in Microsoft Authenticator for both iOS and Android (CVE-2026-26123) could leak your one-time sign-in codes or authentication deep links to a malicious app on the same device.  Deep…

Read more

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays | Cybersecurity

Ravie LakshmananMar 12, 2026Malware / Cybercrime Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that’s written in Rust, marking a significant departure from other known…

Read more

Apple patches Coruna exploit kit flaws for older iOS versions | Malware

On March 3, 2026, Google warned about a powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (released in September 2019) up to version 17.2.1 (released in December 2023)….

Read more

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs | Cybersecurity

Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted infrastructure, legitimate-looking authentication flows,…

Read more

This Android vulnerability can break your lock screen in under 60 seconds | Malware

A vulnerability in Android devices can allow attackers to gain access to a phone in less than a minute. The vulnerability, tracked as CVE-2026-20435, affects certain MediaTek SoCs (System-on-a-Chip) using…

Read more

Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload | Cybersecurity

The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of five…

Read more

Watch out for tax-season robocalls pushing fake “relief programs” | Malware

While Americans are sorting through paperwork to get their taxes filed in time, scammers are working overtime to grab a piece of the action. As tax season ramps up, so…

Read more

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed | Cybersecurity

Ravie LakshmananMar 12, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV)…

Read more

Phishers hide scam links with IPv6 trick in “free toothbrush” emails | Malware

A recurring lure in phishing emails impersonating United Healthcare is the promise of a free Oral-B toothbrush. But the interesting part isn’t the toothbrush. It’s the link. Two examples of…

Read more

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes | Cybersecurity

Ravie LakshmananMar 11, 2026Artificial Intelligence / Browser Security Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could…

Read more

Sextortion “I recorded you” emails reuse passwords found in disposable inboxes | Malware

Our malware removal support team recently flagged a new wave of sextortion emails, with the subject line: “You pervert, I recorded you!” If the message sounds familiar, that’s because it’s…

Read more

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials | Cybersecurity

Ravie LakshmananMar 11, 2026 Vulnerability / Application Security Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could…

Read more

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days | Cybersecurity

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are…

Read more

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets | Cybersecurity

Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors. The Rust packages, published to crates.io, are listed…

Read more

Hackers may have breached FBI wiretap network via supply chain | Malware

Investigators are worried that a recent attack on a critical FBI system was more than just a random hit, and that another nation-state might have been involved. On February 17,…

Read more
Update cookies preferences