<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0"><channel><title>The Hacker News</title><link>https://thehackernews.com</link><description>Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com</description><language>en-us</language><lastBuildDate>Fri, 06 Mar 2026 20:40:19 +0530</lastBuildDate><sy:updatePeriod>hourly</sy:updatePeriod><sy:updateFrequency>1</sy:updateFrequency><atom:link href="https://feeds.feedburner.com/TheHackersNews" rel="self" type="application/rss+xml"/><item><title>Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India</title><description><![CDATA[The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants.
The activity is designed to produce a "high-volume, mediocre mass of implants" that are developed using lesser-known programming languages like Nim, Zig, and Crystal and rely on trusted services like]]></description><link>https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html</guid><pubDate>Fri, 06 Mar 2026 20:41:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw7Nnrc1zd-1NJp8aP69eS_s4Ai_GG7Um-ltzX8eO5Jfrnxaq_fj3z5u3k7WUU65b0lmmxd6012MxINWFPC5vZDhznqnIrNEerUiPKbeKEVCTwtRCv2RCwnYa-k_hz4mha_qyOBV9kgvkWw6xlZfNSQYqvhez0T1xJFJXeaCjlYFAAtwt4RrMdmMHHsAU3/s1600/ai-coded-malware.jpg"/></item><item><title>Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT</title><description><![CDATA[Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT.
The stealthy attack chain has been codenamed VOID#GEIST by Securonix Threat Research.
At a high level, the obfuscated batch script is used to deploy a second]]></description><link>https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html</guid><pubDate>Fri, 06 Mar 2026 20:03:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQjK1KC9p7VWWkeFycROhD4cXTkFws06lICtY2bwCh8m2G8vl20VKnurwKZGiqVLWKxZGBRREcIKUImgupySapsKegJcZjxIYuU5nmLtLBABpnxQIC0ShG0uUbiG0jfRH7IgBTj5COyPK090eD7qof5VnsI2gUG43uLkhdy3EqDCVPguAcBp7HSdASnA9Q/s1600/key-malware.jpg"/></item><item><title>The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity</title><description><![CDATA[Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale.
Risk-based cybersecurity is the foundation of that model. When done right, it builds client trust, increases upsell opportunities, and drives recurring revenue. But to deliver this consistently and efficiently, you need the right technology and processes.]]></description><link>https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html</guid><pubDate>Fri, 06 Mar 2026 16:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj87js9FM5u5gJgNYbTJGym-RLvB-9rHWoeFBMkLbzvbBgY8aGaMtb_pX5i2-rQz34VbJsQfeOD-GvRJ0yNXUSGjR3vnV7CUt4APOPSwvBNpaF4m64z5OxmNVw0WDaCa3q_KlAjNecBrLurfYPNFC3xiASO71v6k23E77RKyyRujOXUMWHbymxtrVLatdI/s1600/cynomi.jpg"/></item><item><title>Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor</title><description><![CDATA[New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies' networks, including banks, airports, non-profit, and the Israeli arm of a software company.
The activity has been attributed to a state-sponsored hacking group called MuddyWater (aka Seedworm). It's affiliated with the Iranian]]></description><link>https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html</guid><pubDate>Fri, 06 Mar 2026 15:53:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGoo0ChP6Wq4Hd0U_DeehQmIN-4DHpRX8YdIY6vSO3kEUeTeILUvJMbAZO2gplvYIYCG_q13wfn_So9SkmjHIFZdwyQZKf0uSyyUMpCV-0uUuptOsPsdAvQQbzBdTAG7zoeX2Zf5L2zrHoY0z-qd5RnNvHsm_R4qaVGKzY440Tkdv2zUJ7y9iUE-UP8Ddl/s1600/iran-hackers.jpg"/></item><item><title>China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks</title><description><![CDATA[A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants.
The activity is being tracked by Cisco Talos under the moniker UAT-9244, describing it as closely associated with another cluster known as FamousSparrow.
It's worth]]></description><link>https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html</guid><pubDate>Fri, 06 Mar 2026 13:52:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibIdID8bpu83EtYZEGzGQcfnL4Q2mTuhTp95la1d1iDtHqYtujF75TT6TkEmu6C123EIHQNF2P-M-Kj7Z0-3pjvm4CFFqnJ_qOxbgVAGJ7V6rnycpn-O-8v3Mw3dkYcSHSyee7EdPjIEejdoWwUx0YBQXexhtMZ79zQV5rBwbbrvxzoloBcLHoSOY_7Sg-/s1600/telecom.jpg"/></item><item><title>Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer</title><description><![CDATA[Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware.
The activity, observed in February 2026, makes use of the terminal emulator program instead of instructing users to launch the Windows Run dialog and paste a command]]></description><link>https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html</guid><pubDate>Fri, 06 Mar 2026 12:14:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8H7sofZNyrZMv3vcKOeRa7Rw948uDto8VgAXNO8ZKLjUdzhpZW-ub4M_fxuM631fZplWm8BkPK8OifkblZnbNgFKXUB4PoFXXSeg1D0_olC5lAxQ0KtidSFQHlUvxVn1subQyQtI2qbzhChm0Sm3ADLs9C120EfhvLoBtNLbbtrSiyl3AKcss7u-WT-lS/s1600/clickfix.jpg"/></item><item><title>Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog</title><description><![CDATA[The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The critical-severity vulnerabilities are listed below -

CVE-2017-7921 (CVSS score: 9.8) - An improper authentication vulnerability affecting]]></description><link>https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html</guid><pubDate>Fri, 06 Mar 2026 12:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1dAatoZKBR1txy7hG-8XLixhMv5jhZEjgT_asHnTfyxS1KK9tOrJNwk2MSbXOL1ZoH8-18chWJUuLnegz6ByTRQuljhmqPu9W_BxQSQR7n45B1M3D1XHrwkne4uzqurGVkqDhyphenhyphendkfISqLjawr0HzRQX7ZhfXa-jB3hJ5V0oMr3TOebv_rcpcw9I3ym6v1/s1600/cisa.jpg"/></item><item><title>Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities</title><description><![CDATA[Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild.
The vulnerabilities in question are listed below -

CVE-2026-20122 (CVSS score: 7.1) - An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system.]]></description><link>https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html</guid><pubDate>Thu, 05 Mar 2026 20:52:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEr5vlbwHAPeevtBJ7iylInnh2ZQCxX10smm1srCFONJBSriIbAvvp5jAFpFYdeoyk9BKBhyFZx-U4xBhqtN2eT1r150GMLdRP3scA8PsHMYh0PGALAqnzwQnLS-3K_9yneL-7tRa3lD-TTOIebyc_alzp2kLKFdFRCiJcWMcmTiMnoqUAeO_Wxv6hd05D/s1600/cisco-exploit.jpg"/></item><item><title>Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders</title><description><![CDATA[Most organizations assume encrypted data is safe.
But many attackers are already preparing for a future where today’s encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can be decrypted later using quantum computers.
This tactic—known as “harvest now, decrypt later”—means sensitive data transmitted today could become]]></description><link>https://thehackernews.com/2026/03/preparing-for-quantum-era-post-quantum.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/preparing-for-quantum-era-post-quantum.html</guid><pubDate>Thu, 05 Mar 2026 20:52:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX1kV8IdraKTyGmXfKTap-DKE7krpM6SchfXQZlvruEBaaJyCbG0HQuJD3B08AkkIZF6Ej7oQ2Nr3AfzVD5klERt782T3IuCPT8tSYm49B6j6se-IH7d0XC4kBcTPl-yp3tsA_YmhrZsB0On2ukhH1rhlSaG3fpRXNrSzpbMEoVu_EBoiMGcbFVg9AcWTC/s1600/webinar.jpg"/></item><item><title>ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine &amp; More</title><description><![CDATA[Some weeks in cybersecurity feel routine. This one doesn&rsquo;t.
Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity, security teams shared new findings, and a few unexpected moves from major tech companies also drew attention.
Together, these updates offer a useful snapshot of what is happening]]></description><link>https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html</guid><pubDate>Thu, 05 Mar 2026 19:14:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmX71oTh0PhBoeXrV6BUD7_jQe9VWPqHc60ijUxf4iv8wPE8UeWY8dlDrfbx3-Ut5aNoNQZJ8DH_ADNQGgFL4NbMMcw-IayIe9HXKG3l5EN3-og9LuNqBP452mXpm1HTn3ooWlJ-q4QRqvPJC4gmR0lstJ8KWdQYa2knQ5J69nneIwIRTKKG43fXtcWRXm/s1600/threatsday.jpg"/></item><item><title>Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware</title><description><![CDATA[A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware.
Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different]]></description><link>https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html</guid><pubDate>Thu, 05 Mar 2026 17:31:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWg0441avqEutKSymEsuuVP_gKz7kiss4jZesCHLwD4731n135lf6jhJdT2X5CPIWISsByG0RsJoH7eXSyGVOI6RNmo1QkE8Z24lPdiFTLni79c2EoiLGlAurQsIHqn7j_-MDPlL9F98XAsRtrBD17V7YXRYikdcET0hnw897ButkFyI1T4JmzxpJdwM8y/s1600/iran-attack.jpg"/></item><item><title>Where Multi-Factor Authentication Stops and Credential Abuse Starts</title><description><![CDATA[Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage.&nbsp;
Enforced through an identity provider (IdP) such as Microsoft Entra ID, Okta, or]]></description><link>https://thehackernews.com/2026/03/where-multi-factor-authentication-stops.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/where-multi-factor-authentication-stops.html</guid><pubDate>Thu, 05 Mar 2026 16:30:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh573fCRL7EMT-Piz1QEJizjMNdQH5G4eMHpLbuCGvm-PNF6-osRuSQF09DHGIuYS1EXDgZXUmWzVf1p3kHDH0_jE7_XDKuG0J7R9Yc3kP4XbaW3UoF3gLYCQ6ba63S0iYQf3Ftf7s0UkDD9QBbnzUcBPRDQXI401TzAVjET05OjgS38tiYgfWA79kS-8g/s1600/outpost.jpg"/></item><item><title>APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine</title><description><![CDATA[Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow.
"The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals]]></description><link>https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html</guid><pubDate>Thu, 05 Mar 2026 15:40:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihW1ns0JTT2vYUjdQEqTcDwytBGmTnID9xQkCxuT-WURhd71xeh9UD80hZiRL3WWBOg5dCVZKY2huOuElbB-QjczQquCirdpgVRjWNM426jLNF-U_s8RGs9CjNC1Qr2DJhQ532z6bz2hdMkzUjJ-vSKpJmBdvyy5qgkAuwB2armvVyx4HNsn4glFMWmupC/s1600/Ukraine.jpg"/></item><item><title>Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks</title><description><![CDATA[Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies.
The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing]]></description><link>https://thehackernews.com/2026/03/europol-led-operation-takes-down-tycoon.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/europol-led-operation-takes-down-tycoon.html</guid><pubDate>Thu, 05 Mar 2026 12:21:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj8UTSWEMM2rFGJeOr4V1jcbj7LGdQOWonmvhfcbkNspvoCt-7wsBrnJoMuGgnyCZ-E4G5DqWRcPYrrTi3MF-nZWM3pke6JmFrnNlIrs99WF4ayKdghQxMVtvsxxkvv0FMHmKHWCA92klsfqy2fS4rD0_YcBTOapV-lsGCsZhnLHMCe3oMhEukpHaTgGQE/s1600/takedown.jpg"/></item><item><title>FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials</title><description><![CDATA[A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools.
The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access the forum's website ("leakbase[.]la") are now]]></description><link>https://thehackernews.com/2026/03/fbi-and-europol-seize-leakbase-forum.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/fbi-and-europol-seize-leakbase-forum.html</guid><pubDate>Thu, 05 Mar 2026 12:04:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqCkvzA_QIoUAC6eMNU1kDX-c7UWPBC9pNRMLDRcjLxiDk6nxLIsjxSYkqpSIX3KpG20nCf8386lGtqomuIqQRGBtC5xfPi0oADNXOggDel6qLCkNMoE7YaHjazq_iL3XF7RZzkfAn18D8-kx1Jz7YAYzHo6bQVRhSdhYSHa16pljvUq8Cihnv3CUARjH0/s1600/FORUM.jpg"/></item><item><title>149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict</title><description><![CDATA[Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion.
"The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2," Radware said in a Tuesday]]></description><link>https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html</guid><pubDate>Wed, 04 Mar 2026 22:51:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjabhLtgN_k3Zm7rY2cHxMPh9Py-QdY1pESzIEtJbo45w5Y744g5nEtkc9z6tmPaXh_wB0pgzxbFwTzM7C0whbwEbbSopd-CZy98ANNcLF5k7orHTEMlkLSN5JegxMAMPEyeXPE2VXurPv4npqtKkvuay4ZltoPMk47uR-eqP6LsFHp3SqxAeu8tthDyZMa/s1600/ddos.jpg"/></item><item><title>Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1</title><description><![CDATA[Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1.
The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It's not effective against the latest version of iOS. The findings were first reported by WIRED.
"The]]></description><link>https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html</guid><pubDate>Wed, 04 Mar 2026 18:58:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijM5GpGGT0LP6vQkv_yu-1sEWzgjTfk9OIdbMaYKiXdAVgK5DbybegA7hVb_XEgaAPPNAAXJNMh7K2jsH1uHltLp-6L_gOS5xWudR5Z4I76PI3Zv0h2tfvWgCUsq5LoiLMm4x_XXomAeWKVZJ_uNOmCL4cK8TlwNL_SxwwNX0XEr7I9D-ZK-JE1iwHsvM1/s1600/ios.jpg"/></item><item><title>New RFP Template for AI Usage Control and AI Governance </title><description><![CDATA[As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need "AI Governance," but they have no idea what they are actually looking for.
The CISO’s Dilemma: You Have the AI Budget, but Do You Have the Requirements?
As AI]]></description><link>https://thehackernews.com/2026/03/new-rfp-template-for-ai-usage-control.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/new-rfp-template-for-ai-usage-control.html</guid><pubDate>Wed, 04 Mar 2026 17:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrvS_eE1grWPn8hXdb-s4EpPUtevfmC487K-kpFLYJOHCw0vZ1A81bBjhZflx5zj8qY4KrWG3FbQ2dbSFOatzswmBbFxZJkX5vqJOpzyaCefDzEiOfca4ayNkY1ERY95TefFgfRj01keLjzjK_8NKr4OSO3B5vM4k9yY_J9dNtmc1Z7lXdqjawA22F2Zc/s1600/main-ai.jpg"/></item><item><title>Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux</title><description><![CDATA[Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on Windows, macOS, and Linux systems.
The names of the packages are listed below -

nhattuanbl/lara-helper (37 Downloads)
nhattuanbl/simple-queue (29 Downloads)
nhattuanbl/lara-swagger (49 Downloads)]]></description><link>https://thehackernews.com/2026/03/fake-laravel-packages-on-packagist.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/fake-laravel-packages-on-packagist.html</guid><pubDate>Wed, 04 Mar 2026 15:07:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDAkhOUNeGmbnO6-Wf7OTYmb_GbxBRyWPlLwHY_xWh2a3fWN3wqYQcNDK2z-ck6dCpYStrieeh79uwREaRnu7vXx3_1SqPqi0KYqdyMtPq45fbRFKtBdc_Vnbkh9mgOXSPu4GOPlkqQxfCX-mQ-62Jw5jsA8CybEImOOvdliNEOcPjnGQDEjKrunI4kOyG/s1600/php.jpg"/></item><item><title>APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2</title><description><![CDATA[Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024.
"Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments," Check Point said]]></description><link>https://thehackernews.com/2026/03/apt41-linked-silver-dragon-targets.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/apt41-linked-silver-dragon-targets.html</guid><pubDate>Wed, 04 Mar 2026 13:44:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGPaqQJe-7ak-qgx29_h6G7zUiJhGiBSHZEiydrRzZzuKVlVMBzrJNLFndAvmu15EzX2SXQ8NUHKyH9ZJDQRQMnXukmrUfdPor35gswSxUuTNGGXo7h8eOhDNBVAaCGEo_ohNYv2-8W-zpOuSSHYqCB5iURwesotjNTK9a3926UdkuqI2uz-zUBMzNP5cU/s1600/dragon.jpg"/></item><item><title>CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog</title><description><![CDATA[The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild.
The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an]]></description><link>https://thehackernews.com/2026/03/cisa-adds-actively-exploited-vmware.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/cisa-adds-actively-exploited-vmware.html</guid><pubDate>Wed, 04 Mar 2026 10:05:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwSnIflppBRH5X_FxN5pZcibA3-KyhW9iDiNGlD76L9B8dFwzLtP5i7FHFzf73XpTAhCLtmQn0JD_fUqgXceUlrCwPgJqbmlkPXi2e_IDggrIHDyJ5HoDzr191LxAbe08arokXZ4FXH5k9NxErepVgiaEkGVfWDWQ2ZWJ8h3mGjySQ-QqTzo02oBdh01Up/s1600/vmware.jpg"/></item><item><title>Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations</title><description><![CDATA[Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack.
The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from]]></description><link>https://thehackernews.com/2026/03/fake-tech-support-spam-deploys.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/fake-tech-support-spam-deploys.html</guid><pubDate>Tue, 03 Mar 2026 22:45:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMxXTslXwVQy4UDmwQOi39oPLz0gBjk3E_mUL0hONp_uAbe2mkCooBcTU3zE6nArVycOldRPm5jMHfzTAI_plrX1jvn5o8zmSGKTH794N2tpztPyTLW-TBZqfHaa4nbHLMY2LHhW0l1J4wzmg8lCRXOFWdAQSSn1Qb4iR8PIeRUE9K1NvpCtluT69-y7By/s1600/outlook.jpg"/></item><item><title>Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow</title><description><![CDATA[Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode SOC performance over time.
The Paradox at the Gate:]]></description><link>https://thehackernews.com/2026/03/building-high-impact-tier-1-3-steps.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/building-high-impact-tier-1-3-steps.html</guid><pubDate>Tue, 03 Mar 2026 20:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwYwVezgvocYpgSVlObttlWWj69Wzly716Z1gfPOUjTsEL1TqBXiWSSexSIR2o96ji1cbMuxtxZVETQ7oN6klFQ2do3WCjhmiVLt1BXlMekcMlJSGxTD6XffjEZRWsc3q8eo0HmRc1IV8p777ZLFW4wOXPsDNaCetHqmCkMLILYOAsmDgSaVwerAUtS0A/s1600/tier1.jpg"/></item><item><title>Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries</title><description><![CDATA[The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks.
The new findings come from Team Cymru, which detected its use following an analysis of the IP address ("212.11.64[.]250") that was used by the suspected]]></description><link>https://thehackernews.com/2026/03/open-source-cyberstrikeai-deployed-in.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/open-source-cyberstrikeai-deployed-in.html</guid><pubDate>Tue, 03 Mar 2026 19:59:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfbbcxvw46Df6wZJpHzgD3wrBSTcFyJLQEYVSpnUYNF2U92TTfAilNI6bijzKSHSiHb_XiQgw_V9Rn5HBEoUjx-pGg9fVLh07C7gebKC80qyqTUD0HvHbiquEkIvxjs9n6MuQH5QHp_Sf9nw_NIJRg8Ffi8N_1exLScK5EMuP99dwof4p4aCvRIqlv8zwV/s1600/cyberattacks.jpg"/></item><item><title>AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged</title><description><![CDATA[The Rise of MCPs in the Enterprise
The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This is already showing up in production]]></description><link>https://thehackernews.com/2026/03/ai-agents-next-wave-identity-dark.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/ai-agents-next-wave-identity-dark.html</guid><pubDate>Tue, 03 Mar 2026 17:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy66jCAP3njemOp9S0dnoRSikwWIk-OjV_6kygA0ubIpsczO3IWQf7SD3hcvCzRrDtiL6_2jOk3fWy2YtEWMwEyCmvzhw6QReN8cvfOlYuiXP4VzgeV_PaFRsylxXhR7akoqfkgxsD_oiNXSAabskwOrDoIJMSsAgr0VZO2UW-4odf7eAjioV1KX7mn3w/s1600/ormain.jpg"/></item><item><title>Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication</title><description><![CDATA[Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.
It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand's real URL. It also lets]]></description><link>https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html</guid><pubDate>Tue, 03 Mar 2026 16:40:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOdnsC4miBmpXK8ZPV1kM1figMIfiqkQpUeAt8idIiZEFRCNt6AMaFSmpUaR215Hrw-XIGi6Zcl9vOgGO5ItB53gWlN_r8UxGz_yTrPTk9bFgCUudYbq2jETdm526DpMDaPyT8UFt7m5XUwlrYdJmUDyEmoQO6zcnGvUB4_W0mBiHJtWFqJk7udXMelfSu/s1600/star.jpg"/></item><item><title>Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets</title><description><![CDATA[Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers.
The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described]]></description><link>https://thehackernews.com/2026/03/microsoft-warns-oauth-redirect-abuse.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/microsoft-warns-oauth-redirect-abuse.html</guid><pubDate>Tue, 03 Mar 2026 14:50:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVaGXK9F-m4oJx6H9HD0gQaOmONLT8sEFgtKmoGO4k6MzjQY-bfbtoGrUcG2k7tH571M_K6Ej7P5Z5vtjuCYsrKU3tRpOE2fkZv_ViiEmjpUeYwwHTB_8oKlQZd2-VysqvPgdvaofwFi13iPjMSe1pjf0nudP2s4YvheFQHwvsQT8neGjKTPq7nA_PPn0x/s1600/ms-login.jpg"/></item><item><title>Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited</title><description><![CDATA[Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild.
The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component.
"Memory corruption when adding user-supplied data without checking available buffer space," Qualcomm said in an advisory,]]></description><link>https://thehackernews.com/2026/03/google-confirms-cve-2026-21385-in.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/google-confirms-cve-2026-21385-in.html</guid><pubDate>Tue, 03 Mar 2026 12:38:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR_pPCmiYZpBkIhumuW9B55rXBX7U9PZto5xPxHsLBbx5EstbqXgUI-XLZkQQV8OCsdaOi5RuSapl0V4LPKX9B_8MDBqSteyX83vXpj7G8-87BBhyphenhyphen75Os_0RhTFWBL_yxr7JVwXXtZ-qdbbugAlw9MoC5mFEx0hfQMncgnDRR8tLlEMXsLiPmim2sTjzNO/s1600/android-exploit.jpg"/></item><item><title>SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains</title><description><![CDATA[The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh.
The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as BurrowShell and a Rust-based]]></description><link>https://thehackernews.com/2026/03/sloppylemming-targets-pakistan-and.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/sloppylemming-targets-pakistan-and.html</guid><pubDate>Tue, 03 Mar 2026 12:23:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfEU4zf_Kk2z8HBMdkRrw-hKeM6LmC7tBBt_P7K_2rGOfnc15ew5Y9fg4NeeCAMUNfRvcEhbLohCz6-oeONrOsfTnLDk7nEETbgewwLvjyqxprh26CYIpvGexZOvWADe0EutygQFHoGeMCa1sSNRQt-iA5meuqodGe7MK2Lpepa9CUu4PkxeszGIf_pDUH/s1600/malware-attack.jpg"/></item><item><title>New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel</title><description><![CDATA[Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system.
The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of insufficient policy enforcement in the WebView tag. It was patched by Google in early January 2026]]></description><link>https://thehackernews.com/2026/03/new-chrome-vulnerability-let-malicious.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/new-chrome-vulnerability-let-malicious.html</guid><pubDate>Mon, 02 Mar 2026 22:38:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGvdv2as5vfPUJybxkOOX1bDflJKOb5b1uVw9SHrVOo6TD5GKc0JbMB2p2yxxpwj4UlZK680ZnF4J8Ccie6G13W8cklnxDOs-E74-jy3fuIyr53UWuGuwhSM8HvHUIhilChdeRdF3yz9ObuHMHlKGUHI4TMWachzuvWJ3aZdEmz_fPNaIRm_IYDKiqUl1G/s1600/gemini-chrome.jpg"/></item><item><title>Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome</title><description><![CDATA[Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers.
"To ensure the scalability and efficiency of the ecosystem, Chrome has no immediate plan to add traditional X.509 certificates containing post-quantum cryptography to the Chrome Root Store," the Chrome Secure Web and Networking Team said.
"]]></description><link>https://thehackernews.com/2026/03/google-develops-merkle-tree.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/google-develops-merkle-tree.html</guid><pubDate>Mon, 02 Mar 2026 22:22:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI7UWgA_nVAo80v0LRW4e9HTMYUIiEebPJv-EX7ssG1EVxwD-_hlvqqVzQ7Eb4mA9FWWW1U2WYmA8JPnPhyphenhyphenBWaCgFcyeEzcr0QhDRoUsPYgMqB7Ddt2_vEzEYMJj0w9Q9lb2nf12s_FoXDpql2BbxlpCo1oplXSzGjLFmqAsoW_Ix7CufTx5LiWrepwal8/s1600/chrome.jpg"/></item><item><title>⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More</title><description><![CDATA[This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control, exposed keys, and normal features are being used as entry points.
The pattern becomes clear only when you see everything together. Faster scans, smarter misuse of trusted services, and steady]]></description><link>https://thehackernews.com/2026/03/weekly-recap-sd-wan-0-day-critical-cves.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/weekly-recap-sd-wan-0-day-critical-cves.html</guid><pubDate>Mon, 02 Mar 2026 18:56:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu0K0gzfLNadrVS1pk-FHUr-YKau70_2AMjFqoEQn73Mycfa1L3KJO_qQw4Iy83xZ4N8CIj4at04Eh4RDW8FBqza_Ob59078iWjuUKiRYDmlBsKka28GnhpwY680JoRjiO_6LGSU56CLbbj58UKANlY57dUOuQSG18lHn1kBtnn6oEaypA0DcdPypgylsI/s1600/recap-main.jpg"/></item><item><title>How to Protect Your SaaS from Bot Attacks with SafeLine WAF</title><description><![CDATA[Most SaaS teams remember the day their user traffic started growing fast. Few notice the day bots started targeting them.
On paper, everything looks great: more sign-ups, more sessions, more API calls. But in reality, something feels off:

Sign-ups increase, but users aren’t activating.
Server costs rise faster than revenue.
Logs are filled with repeated requests from strange user agents.

If]]></description><link>https://thehackernews.com/2026/03/how-to-protect-your-saas-from-bot.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/how-to-protect-your-saas-from-bot.html</guid><pubDate>Mon, 02 Mar 2026 17:25:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg26Zv-2JJHry05kpFUII9FwYbAuuOo0Wcdb3JH31Zkra0fNWVzvjjVEcBkHMlrctkhJbZzTygsEUTtn3vP-0eboH1JfY3x-bGM5-epP8rB610TfRYk4HD9SLZ-rhnFYt-U52xiAurOeGa2SoHVjbjjfpTr8nEpxbteNyzCrIvX8ICcKWNaDHQFFrvi7UQ/s1600/safeline.jpg"/></item><item><title>APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday</title><description><![CDATA[A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai.
The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-severity security feature bypass affecting the MSHTML Framework.
"Protection mechanism failure in MSHTML Framework allows an unauthorized]]></description><link>https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html</guid><pubDate>Mon, 02 Mar 2026 16:06:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGmBYExYY-MdqirvtI7-k2gWDf2rCE5AX4J246DywytJU0hWklJfAxRUKUa6AhU-VFWf2jazsAR1DkpPBHUqv2LsGckfxhVUebrMsnAccaYYmp2L9VJDz4rHaRLxKRgXaYM-UPcFS_ZoyveJxkLu1RunwaIuCBckILFDzMo1mCZtg9zaOmXrOSEEWU7RSg/s1600/windows.jpg"/></item><item><title>North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT</title><description><![CDATA[Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry.
The packages masquerade as developer tools, but contain functionality to extract the actual command-and-control (C2) by using seemingly harmless Pastebin content as a dead drop resolver and]]></description><link>https://thehackernews.com/2026/03/north-korean-hackers-publish-26-npm.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/north-korean-hackers-publish-26-npm.html</guid><pubDate>Mon, 02 Mar 2026 14:14:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB4nJ8ODWGAqDEjQl4cCSKOtIJoGood2beXae5mc7MKzZbAYl1Ij2AX0L3CNCuUc4R4TL-DOR6bIHU6yzHfoFir_gl6jbUf_0w69pGg3tsXI92smKf02pmQPqkbyBs-eOUp0SqdGSrBH68os3R2lkTDGvGpi3R3-EThgOy_ATJKTXVqr0_ug-otA6FkeAo/s1600/npm.jpg"/></item><item><title>ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket</title><description><![CDATA[OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control.
"Our vulnerability lives in the core system itself – no plugins, no marketplace, no user-installed extensions – just the bare OpenClaw gateway, running exactly as documented," Oasis]]></description><link>https://thehackernews.com/2026/02/clawjacked-flaw-lets-malicious-sites.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/clawjacked-flaw-lets-malicious-sites.html</guid><pubDate>Sat, 28 Feb 2026 22:51:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMEZ7gMViZ9XlXs35FiyviBZR19FbDXmatfjhNRw59daWLw41ScorGKG3xXYWFD6dDuYHajwoUnkWgQV9SrPe9iiV8UqDVjw4K5hX8cng7VDPTsljAZazuxUDdk7_hZ7SFV9rDCxNcYNWjmEY_lUVj01-PEI9D9rY5tMYJZTP5X887UuXOsDD90UOvo_mG/s1600/opem.jpg"/></item><item><title>Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement</title><description><![CDATA[New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data.
The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix "AIza") embedded in client-side code to provide Google-related services like]]></description><link>https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html</guid><pubDate>Sat, 28 Feb 2026 15:26:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1wA-JoARjvd0BYW-3G0XMdHXcWpWdkWk3bIkWV2myMGfRRsp4Dl8A24cpj8Elpe5lJO6KdyS36Nsts7_o0Xx70HSxwY3se4RuNPRzfFmodMhX-jU_lkCefaathP6uan4UGLWmuQvxjerq6_H-z16vFY3h4pCeVqDBGA13ne12uRZfuU7fHW2pQVAtuM4E/s1600/gemini.jpg"/></item><item><title>Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute</title><description><![CDATA[Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a "supply chain risk."
"This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance of Americans and fully autonomous weapons," the]]></description><link>https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html</guid><pubDate>Sat, 28 Feb 2026 10:27:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP1VB5XjUzzozGARm5rLhXynwMUWvOhyS4BwO0WHVH6BWf7DhyphenhyphencjAx23XY3HJhDvtgaJ_nW31sVB9yejXl_h6PS1m-X2lbtohZZuJIiSkhRvFsgLASnaDT-PGlcqhsMX-0X7OkK865R0UlztioEsFS8vkdv73Sarw7_H6mvg14v_ovh6hk9NqW3tzlmZ8X/s1600/Anthropic.jpg"/></item><item><title>DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams</title><description><![CDATA[The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering.
The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added.
"Criminal]]></description><link>https://thehackernews.com/2026/02/doj-seizes-61-million-in-tether-linked.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/doj-seizes-61-million-in-tether-linked.html</guid><pubDate>Fri, 27 Feb 2026 23:41:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglF1nudH44Lr269ed-E49qDWqg7t-GFuybhyQ8-6oDnBn-CcFh7o21w44Cjxxw0cuZQDBXdHQCxuOrR_vOLEvON4DyGSPWbr-7l3XaHXInETTZLxm-BAfCxUCFZ-Wxek-TnFI8t1rJ3gew5p3BnztZeIXY0ePy6DUFqL5R9QlKHZaUOVPwdIuDLkCju83c/s1600/tether-scam.jpg"/></item><item><title>900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks</title><description><![CDATA[The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025.
Of these, 401 instances are located in the U.S., followed by 51 in Brazil, 43 in Canada, 40 in Germany, and 36 in France.
The non-profit entity said the compromises are likely]]></description><link>https://thehackernews.com/2026/02/900-sangoma-freepbx-instances.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/900-sangoma-freepbx-instances.html</guid><pubDate>Fri, 27 Feb 2026 23:29:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVfnqoWodxrya2TOd7lDLrZ23Bvo_FZhrnRLTnOO-Y4zvouKylIpkT7KE_LKo8lQGBCwMo3GCldGiyqSJobUKHLxmKx6hja0EBG6K3DCtQG-bmDDapu2el8CnQMMs971cJ3dICyw4-T1I8o0W7-XNHKzRBO8U48USZlO8MmtJkKKaOkweEzgKZF2PyaUt9/s1600/freepbx.jpg"/></item><item><title>Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor</title><description><![CDATA[Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe.
The Go module, github[.]com/xinfeisoft/crypto, impersonates the legitimate "golang.org/x/crypto" codebase, but injects malicious code that's responsible for exfiltrating secrets entered via terminal password]]></description><link>https://thehackernews.com/2026/02/malicious-go-crypto-module-steals.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/malicious-go-crypto-module-steals.html</guid><pubDate>Fri, 27 Feb 2026 21:03:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdXNmYRKw13_BHE7B7MMtqTTpJXBkgDzl2sH31t0L0_VCl9uJbWPS2yg0j0jz0XJovSYryM4NcSCAZdtTDsoRa2d6y3U84K9TDQYJSObLgaJXXh8juWmP6liqj_uirhZvKjR0dqYZ-J2mwTnmEIYIKfAoC9BY3yL2xhfLD_NbwVKzekKwoI3u4iSzU44Xn/s1600/hackers.jpg"/></item><item><title>ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks</title><description><![CDATA[The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks.
The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware]]></description><link>https://thehackernews.com/2026/02/scarcruft-uses-zoho-workdrive-and-usb.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/scarcruft-uses-zoho-workdrive-and-usb.html</guid><pubDate>Fri, 27 Feb 2026 18:13:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGnWXXVXx1WeEkTWrq3_CCY922KPE3hV_pg-UYgx86QO76S5DomWi6TxZZQSGZ1Jpf2Rp2riR41Ld7zqWhjfdniLJthYBBDJx3eyNFMPQn5ph9kmmRyrib3HpIe1o5oEp6htOMFVe-m9UQNaXhhoY6MkHeXk1oM4UfctRDC5piMbIZGdjr2bApPUzXMQXK/s1600/keys.jpg"/></item><item><title>Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms</title><description><![CDATA[Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT).
"A malicious downloader staged a portable Java runtime and executed a malicious Java archive (JAR) file named jd-gui.jar," the Microsoft Threat Intelligence team said in a post on X. "This downloader used PowerShell]]></description><link>https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html</guid><pubDate>Fri, 27 Feb 2026 15:36:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEillKgTghwZEhxrFFKb47xsniaaZYeDlISTMJYxMDr_82YETlHvM5M0XWXjizlkv1MgSAzkIEDbOcvfPsjsOaxRHvzl4-7LWTmKR6awOPB_FidaOgq0xhHslZbEJ7zh0Hq6CV0NJ8LUY-SDyA-nF6SeQ6Zzu-qrlWWMFsVg2n3yDRj0hcIPYEPLw6eAmadL/s1600/remote.jpg"/></item><item><title>Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams</title><description><![CDATA[Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based in Brazil, China, and Vietnam.
As part of the effort, the advertisers' methods of payment have been suspended, related accounts have been disabled, and the website domain names used to pull off the scams have been blocked.
Concurrently, the social]]></description><link>https://thehackernews.com/2026/02/meta-files-lawsuits-against-brazil.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/meta-files-lawsuits-against-brazil.html</guid><pubDate>Fri, 27 Feb 2026 13:26:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwKH9i7LZ3Jt6juj9BX2MCjTNRBKuvKX58L2mWuQN1teRdCwExZsz5LLZNBRvRri4BtJW1ECj92EU42c1XJfy1vBdLXZoxIfjzKEca7ST3Fw-jhU0_XakPBZfgQF1huHepkdAUFmrRtXWUsdnBf-W6cYEtWehaJ1Ca41-6DK414TB_2QwF9M5sm-ofmOuG/s1600/facebook-ads.jpg"/></item><item><title>Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown</title><description><![CDATA[Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient to takedown efforts.
"Instead of relying on traditional servers or domains for command-and-control, Aeternum stores its instructions on the public Polygon blockchain," Qrator Labs said in a report shared with The]]></description><link>https://thehackernews.com/2026/02/aeternum-c2-botnet-stores-encrypted.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/aeternum-c2-botnet-stores-encrypted.html</guid><pubDate>Thu, 26 Feb 2026 23:30:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQlH8RQUmcg8IWqV76NL0o4uRe86gJ6kxLV3DRYppBAVrfFR_gMPQBFn6GIl2jd9ZgzsuwRGAGTVUbaWCj795-XZ8I3eSBDLz6Q_0w4Alef6GNA3NtpK4po_WVC6p9o4aNVHqgCAEb3a7CqL_x7oBGWQ7N4z0IMyzOX3aZoI_TUZenfdAm0LZojDIkumG0/s1600/botnet.jpg"/></item><item><title>UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor</title><description><![CDATA[A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.
The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.
"Dohdoor utilizes the DNS-over-HTTPS (DoH)]]></description><link>https://thehackernews.com/2026/02/uat-10027-targets-us-education-and.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/uat-10027-targets-us-education-and.html</guid><pubDate>Thu, 26 Feb 2026 20:47:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJAVofZLLo1DEzVLXd9ahr2wbZLNqwM8K5eVDE8pDM5ossDzBi_U34YB81lu7LBProqz1SirGb7brANr4AQ83_k9Y0RhlcrsKKpl0IBovDLdy1awHNR_dxEV0umYpWUWLWkx7vQqCbunXZ7WnnJooiCvhchGXFwLAdT0LljMY_4MVRGfv2gM8uofci2J7E/s1600/healthcare-cyberattack.jpg"/></item><item><title>ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit &amp; 15+ Stories</title><description><![CDATA[Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats begin with something ordinary, like an ad, a meeting invite, or a software update.
Behind the scenes, the tactics are sharper. Access happens faster. Control is established sooner. Cleanup becomes harder.
Here is a quick look at the signals worth paying attention to.





  
 

  
  
    AI-powered command]]></description><link>https://thehackernews.com/2026/02/threatsday-bulletin-kali-linux-claude.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/threatsday-bulletin-kali-linux-claude.html</guid><pubDate>Thu, 26 Feb 2026 19:58:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuAB1iliom9nCE1t4EFFYCBDxr2FCZGZdPmUPVcHQVgdceDeSaCHS-tZsa7cSiorDkcU4MUItEpiQLxV7WrQcBduGuhtahmM44kjWtZ9P31HwKqJd-dBL4jGP4uBzz6HHWbnOptpUVRMkjkUW8JfTBJWvY0S_HPMDcELDXdFysRvn-4o3IYf2kRq-tHIi9/s1600/th.jpg"/></item><item><title>Expert Recommends: Prepare for PQC Right Now</title><description><![CDATA[Introduction: Steal It Today, Break It in a Decade
Digital evolution is unstoppable, and though the pace may vary, things tend to fall into place sooner rather than later. That, of course, applies to adversaries as well. The rise of ransomware and cyber extortion generated funding for a complex and highly professional criminal ecosystem. The era of the cloud brought general availability of]]></description><link>https://thehackernews.com/2026/02/expert-recommends-prepare-for-pqc-right.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/expert-recommends-prepare-for-pqc-right.html</guid><pubDate>Thu, 26 Feb 2026 17:36:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbha1Dn4Cs6KDeIqB93o3v5IPZazLflMBbkksxJYpdpzls5i-Fjrad95dyanzHqJutFNRtXCJk5XwNwXgRkftD-WjS4hApwBThXGAqq2wuxShyphenhyphenM91hUGYQTRJxNsOvzMDV6BugC0uskLr-XtvxztLgxDTaAAws6HTCew20TScLA5kO0Zz2xEXQ1SH65dlq/s1600/encrypt.jpg"/></item><item><title>Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware</title><description><![CDATA[A "coordinated developer-targeting campaign" is using malicious repositories disguised as legitimate Next.js projects and technical assessments to trick victims into executing them and establish persistent access to compromised machines.
"The activity aligns with a broader cluster of threats that use job-themed lures to blend into routine developer workflows and increase the likelihood of code]]></description><link>https://thehackernews.com/2026/02/fake-nextjs-repos-target-developers.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/fake-nextjs-repos-target-developers.html</guid><pubDate>Thu, 26 Feb 2026 16:05:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5GaeyxU6qnAMuRiZnc2gbSF7-tg-keCAzXjwtDBtKJhuZ0wcqxbPb_N-NyXBTrZ85M3dGuMYgk8qV4-QfSELGQ5o3NxoNAqeKfeoILZRrvkx72BJeTqvrVtnedsfUHTjl1Gn6NRQt2_dnJpnxV-PhKEekQXgqO1SZWyG_tRi1Jhjt5m87iDhABGq85pXt/s1600/software-hacker.jpg"/></item><item><title>Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens</title><description><![CDATA[Cybersecurity researchers have disclosed details of a new malicious package discovered on the NuGet Gallery, impersonating a library from financial services firm Stripe in an attempt to target the financial sector.
The package, codenamed StripeApi.Net, attempts to masquerade as Stripe.net, a legitimate library from Stripe that has over 75 million downloads. It was uploaded by a user named]]></description><link>https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html</guid><pubDate>Thu, 26 Feb 2026 15:39:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOOA0ov4ywkdj7FrYHif0WbJFrQ04THhkLcOL83R7ggXvtpTTMUeO8-3e-YOobbh_5hGpdNbnXr1pbeU4Uj1DfBd7HLLefvr3fbmKeNnmxknerJm4TDUvvNUL1uJT0MN5frpDoVizcBh5KuEtiU-zq2rhZhZmLJ3iVOauRaHqBUf3k5DnZU8MUq7WHE8fX/s1600/Stripe-malware.jpg"/></item></channel></rss>