<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0"><channel><title>The Hacker News</title><link>https://thehackernews.com</link><description>Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com</description><language>en-us</language><lastBuildDate>Tue, 10 Mar 2026 14:07:31 +0530</lastBuildDate><sy:updatePeriod>hourly</sy:updatePeriod><sy:updateFrequency>1</sy:updateFrequency><atom:link href="https://feeds.feedburner.com/TheHackersNews" rel="self" type="application/rss+xml"/><item><title>Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool</title><description><![CDATA[Salesforce has warned of an increase in threat actor activity that's aimed at exploiting misconfigurations in publicly accessible Experience Cloud sites by making use of a customized version of an open-source tool called AuraInspector.
The activity, per the company, involves the exploitation of customers' overly permissive Experience Cloud guest user configurations to obtain access to sensitive]]></description><link>https://thehackernews.com/2026/03/threat-actors-mass-scan-salesforce.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/threat-actors-mass-scan-salesforce.html</guid><pubDate>Tue, 10 Mar 2026 12:47:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg3WBGF42HjwJCk1bkljwrz8qAZRBc_WKGgu7SuNluRZBhSEGh3JelP6R_I9w64bbi9soVTwDerZux7tknJmttdOS024pbnsAG8a16SYaBubeRlhDIYboq-SBO53ARQ77uWWAUGX6yTZ8AaeWOQMydWFRP-nbunFtTDsmCpqcUvgFBsTpxHYqSi050MtYl/s1600/salesforce.jpg"/></item><item><title>CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited</title><description><![CDATA[The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The vulnerability list is as follows -

CVE-2021-22054 (CVSS score: 7.5) - A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM) that]]></description><link>https://thehackernews.com/2026/03/cisa-flags-solarwinds-ivanti-and.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/cisa-flags-solarwinds-ivanti-and.html</guid><pubDate>Tue, 10 Mar 2026 11:47:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ3Jqmj7G6SohXnwkh-xbheyTYoylchcxew5kAJKo9InrbQ0QqVtNQ2hgFc5UuSyQ7sljAfkAlfMzlclT3LQetQdmpqqm3vyb9sZQO2QogQ55M8CpUjCAPMWXEYbtQHbT93Cg7cpWNH2Zq5RtU1T515FT_OAfFKj50HXF8Uwb1VgkLHIhjd-vNZWPRKQdf/s1600/cisa-kev.jpg"/></item><item><title>Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials</title><description><![CDATA[Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data from compromised hosts.
The package, named "@openclaw-ai/openclawai," was uploaded to the registry by a user named "openclaw-ai" on March 3, 2026. It has been downloaded 178 times to date. The library is still available for]]></description><link>https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/malicious-npm-package-posing-as.html</guid><pubDate>Tue, 10 Mar 2026 00:01:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNWahQ89p408qBpZO2cmP-m44fNG_BRHT34hjfmDGn2WhALZRls9d94ap8uK0ZYXj1JjAgxdDogTHv_1PHloweK3RtglJheCsgulTB0-KrYOgUFI3Gvp4FJiPaV33FVa8I5bl-v92O1IephSEiV_FMU010of5pnmgMQ0ZmBuvY4yC0Bl0ndth42P924uxR/s1600/openclaw.jpg"/></item><item><title>UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device</title><description><![CDATA[The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign targeting a cryptocurrency organization in 2025 to steal millions of dollars in cryptocurrency.
The activity has been attributed with moderate confidence to the state-sponsored adversary, which is also tracked under the cryptonyms Jade Sleet, PUKCHONG, Slow Pisces, and]]></description><link>https://thehackernews.com/2026/03/unc4899-used-airdrop-file-transfer-and.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/unc4899-used-airdrop-file-transfer-and.html</guid><pubDate>Mon, 09 Mar 2026 20:20:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu3lqP8aiEKLJA-l7TChGGULVqWhyphenhyphenMc67vwAHHEK4LkpR5ZlZuFIYWFmmPqdA8VQpGbFPvjwGvDHxkhXmC9xhTWlRCccD9PyU3A08-ahTc87j__u6g7RvgkwNo85LmbffhVRly_r4Sd9iiVdEvjtVvpcw0NiwOM1NfjNFQXx5xquwbd9E1zUUr09SYv_-A/s1600/crypto.jpg"/></item><item><title>⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack &amp; Vibe-Coded Malware</title><description><![CDATA[Another week in cybersecurity. Another week of "you've got to be kidding me."
Attackers were busy. Defenders were busy. And somewhere in the middle, a whole lot of people had a very bad Monday morning. That's kind of just how it goes now.
The good news? There were some actual wins this week. Real ones. The kind where the good guys showed up, did the work, and made a dent. It doesn't always]]></description><link>https://thehackernews.com/2026/03/weekly-recap-qualcomm-0-day-ios-exploit.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/weekly-recap-qualcomm-0-day-ios-exploit.html</guid><pubDate>Mon, 09 Mar 2026 19:16:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoDPwegKSRDQPO8CYuOJ9gg-wqvYfrwW1Ne0kApS2regCVz9BAJVhPeGCxT8oMd8gnIfNm4-QdgqCXs6VHUDEoS4i66bGo7R52oYjURwGCyG5gPaM-MeWqgTrM5fmKSHJh42NYkPDYQX9v2x97Q2XP1l816qk17OL8ncXwGpRj3AQ-BTjjDZlG1WnbFKDz/s1600/recap-march.jpg"/></item><item><title>Can the Security Platform Finally Deliver for the Mid-Market?</title><description><![CDATA[Mid-market organizations are constantly striving to achieve security levels on a par with their enterprise peers. With heightened awareness of supply chain attacks, your customers and business partners are defining the security level you must meet.
What if you could be the enabler for your organization to remain competitive — and help win business — by easily demonstrating that you meet these]]></description><link>https://thehackernews.com/2026/03/can-security-platform-finally-deliver.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/can-security-platform-finally-deliver.html</guid><pubDate>Mon, 09 Mar 2026 17:15:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1VI1qz4KwHldnHqAJcopF23x8Jtybzn4Obme0AQPvuP_SDx-vwFks8V70CSb-Gn_BBlONDV7BoK3IrxzxGfUd_3va58XjeoXX81Ix1E7JkcgC2kikZ-nWAawWhE0uU8bURJs1ggtbIG1N_F8VsYIYyjDe5NuF3SAholWy_u6Evu5ROpWGAaIShHZMNiA/s1600/bit.jpg"/></item><item><title>Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft</title><description><![CDATA[Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data.
The extensions in question, both originally associated with a developer named "akshayanuonline@gmail.com" (BuildMelon), are listed below -

QuickLens - Search Screen with]]></description><link>https://thehackernews.com/2026/03/chrome-extension-turns-malicious-after.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/chrome-extension-turns-malicious-after.html</guid><pubDate>Mon, 09 Mar 2026 15:58:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH49NW0X18R8bc0fzFm6aPt92f15pxPq-HLMfyFmsApiXvZEsCn4z9qNQErHHvW34SFXKUPWy7mK70hM06Ld6Cxa4DioW7xjV9jnMamMF3DDKIQ39VwJhvq7l4bO79yzGp8huA6ewRk-XdWvJSeYT8fs16PdOa9BSxdbzw0hIwC1PVxh9uY5L0Wx3nNMAL/s1600/chrome-malware.jpg"/></item><item><title>Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure</title><description><![CDATA[High-value organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a years-long campaign.
The activity, which has targeted aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors, has been attributed by Palo Alto Networks Unit 42 to a previously undocumented threat activity group dubbed]]></description><link>https://thehackernews.com/2026/03/web-server-exploits-and-mimikatz-used.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/web-server-exploits-and-mimikatz-used.html</guid><pubDate>Mon, 09 Mar 2026 12:51:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBw-CldP1FbyOXvJqoX3p-J6QQbtYRACj95MIqX7KakiKKyLMYE4lYpQm6eY7S5sGhsAp8vYbM2ZwPJT59JdjSnGyybDhNucYaymCijGQfyx_cJwkpBZGQ7Mgk2kiCALQU4qZ6i6q0SPo2cBEQHt8j6XX8RQo3kvQ9mj1W3DVP2ZoNF7ZkF7dsdJD9gVZI/s1600/critical.png"/></item><item><title>OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues</title><description><![CDATA[OpenAI on Friday began rolling out Codex Security, an artificial intelligence (AI)-powered security agent that's designed to find, validate, and propose fixes for vulnerabilities.
The feature is available in a research preview to ChatGPT Pro, Enterprise, Business, and Edu customers via the Codex web with free usage for the next month.
"It builds deep context about your project to identify]]></description><link>https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html</guid><pubDate>Sat, 07 Mar 2026 21:58:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzxRjA2uB_r2z4AtvhADiDGrxTc62766WI5jApivjtuLfb2aS2kz9RWk7f9P3Lm7Nj5HH3u-7Etx4-8xr_Y4PflexsuMsAzXjvPoPLSQaSt1O-t4U3yBAnKm4HLm-64dbHDsWF-EXYVMvaMrMnhfbhV_qn2cvwmJE6x-U42aTjGbIOTNOXxpiH3x15C6Ag/s1600/codex.jpg"/></item><item><title>Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model</title><description><![CDATA[Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla.
Of these, 14 have been classified as high, seven have been classified as moderate, and one has been rated low in severity. The issues were addressed in Firefox 148, released late last month. The vulnerabilities were identified over a two-week period in]]></description><link>https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html</guid><pubDate>Sat, 07 Mar 2026 16:51:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2DaQuy20IkM7M8iL7NBmzJhI9m5KDEpf6CBgxcI9rAhiVLO1VyfdAeQKaInOY3dlIiwy1FWtusinpu8Yyj1fChemLiVCTLnMLRtKaKNvDbOOa0ZjVFt5zoT7yON1ljb2DAlgki_aVmVuWSmAPn2jFszCpJdjzN7DGGRzeEzD5OYcSn2oeLzcaBARYzmOS/s1600/firefox-claude.jpg"/></item><item><title>Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India</title><description><![CDATA[The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence (AI)-powered coding tools to strike targets with various implants.
The activity is designed to produce a "high-volume, mediocre mass of implants" that are developed using lesser-known programming languages like Nim, Zig, and Crystal and rely on trusted services like]]></description><link>https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/transparent-tribe-uses-ai-to-mass.html</guid><pubDate>Fri, 06 Mar 2026 20:41:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw7Nnrc1zd-1NJp8aP69eS_s4Ai_GG7Um-ltzX8eO5Jfrnxaq_fj3z5u3k7WUU65b0lmmxd6012MxINWFPC5vZDhznqnIrNEerUiPKbeKEVCTwtRCv2RCwnYa-k_hz4mha_qyOBV9kgvkWw6xlZfNSQYqvhez0T1xJFJXeaCjlYFAAtwt4RrMdmMHHsAU3/s1600/ai-coded-malware.jpg"/></item><item><title>Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT</title><description><![CDATA[Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various encrypted remote access trojan (RATs) payloads that correspond to XWorm, AsyncRAT, and Xeno RAT.
The stealthy attack chain has been codenamed VOID#GEIST by Securonix Threat Research.
At a high level, the obfuscated batch script is used to deploy a second]]></description><link>https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/multi-stage-voidgeist-malware.html</guid><pubDate>Fri, 06 Mar 2026 20:03:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQjK1KC9p7VWWkeFycROhD4cXTkFws06lICtY2bwCh8m2G8vl20VKnurwKZGiqVLWKxZGBRREcIKUImgupySapsKegJcZjxIYuU5nmLtLBABpnxQIC0ShG0uUbiG0jfRH7IgBTj5COyPK090eD7qof5VnsI2gUG43uLkhdy3EqDCVPguAcBp7HSdASnA9Q/s1600/key-malware.jpg"/></item><item><title>The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity</title><description><![CDATA[Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable value at scale.
Risk-based cybersecurity is the foundation of that model. When done right, it builds client trust, increases upsell opportunities, and drives recurring revenue. But to deliver this consistently and efficiently, you need the right technology and processes.]]></description><link>https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/the-msp-guide-to-using-ai-powered-risk.html</guid><pubDate>Fri, 06 Mar 2026 16:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj87js9FM5u5gJgNYbTJGym-RLvB-9rHWoeFBMkLbzvbBgY8aGaMtb_pX5i2-rQz34VbJsQfeOD-GvRJ0yNXUSGjR3vnV7CUt4APOPSwvBNpaF4m64z5OxmNVw0WDaCa3q_KlAjNecBrLurfYPNFC3xiASO71v6k23E77RKyyRujOXUMWHbymxtrVLatdI/s1600/cynomi.jpg"/></item><item><title>Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor</title><description><![CDATA[New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies' networks, including banks, airports, non-profit, and the Israeli arm of a software company.
The activity has been attributed to a state-sponsored hacking group called MuddyWater (aka Seedworm). It's affiliated with the Iranian]]></description><link>https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/iran-linked-muddywater-hackers-target.html</guid><pubDate>Fri, 06 Mar 2026 15:53:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGoo0ChP6Wq4Hd0U_DeehQmIN-4DHpRX8YdIY6vSO3kEUeTeILUvJMbAZO2gplvYIYCG_q13wfn_So9SkmjHIFZdwyQZKf0uSyyUMpCV-0uUuptOsPsdAvQQbzBdTAG7zoeX2Zf5L2zrHoY0z-qd5RnNvHsm_R4qaVGKzY440Tkdv2zUJ7y9iUE-UP8Ddl/s1600/iran-hackers.jpg"/></item><item><title>China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks</title><description><![CDATA[A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024, targeting Windows and Linux systems and edge devices with three different implants.
The activity is being tracked by Cisco Talos under the moniker UAT-9244, describing it as closely associated with another cluster known as FamousSparrow.
It's worth]]></description><link>https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/china-linked-hackers-use-terndoor.html</guid><pubDate>Fri, 06 Mar 2026 13:52:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibIdID8bpu83EtYZEGzGQcfnL4Q2mTuhTp95la1d1iDtHqYtujF75TT6TkEmu6C123EIHQNF2P-M-Kj7Z0-3pjvm4CFFqnJ_qOxbgVAGJ7V6rnycpn-O-8v3Mw3dkYcSHSyee7EdPjIEejdoWwUx0YBQXexhtMZ79zQV5rBwbbrvxzoloBcLHoSOY_7Sg-/s1600/telecom.jpg"/></item><item><title>Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer</title><description><![CDATA[Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows Terminal app as a way to activate a sophisticated attack chain and deploy the Lumma Stealer malware.
The activity, observed in February 2026, makes use of the terminal emulator program instead of instructing users to launch the Windows Run dialog and paste a command]]></description><link>https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/microsoft-reveals-clickfix-campaign.html</guid><pubDate>Fri, 06 Mar 2026 12:14:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8H7sofZNyrZMv3vcKOeRa7Rw948uDto8VgAXNO8ZKLjUdzhpZW-ub4M_fxuM631fZplWm8BkPK8OifkblZnbNgFKXUB4PoFXXSeg1D0_olC5lAxQ0KtidSFQHlUvxVn1subQyQtI2qbzhChm0Sm3ADLs9C120EfhvLoBtNLbbtrSiyl3AKcss7u-WT-lS/s1600/clickfix.jpg"/></item><item><title>Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog</title><description><![CDATA[The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The critical-severity vulnerabilities are listed below -

CVE-2017-7921 (CVSS score: 9.8) - An improper authentication vulnerability affecting]]></description><link>https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/hikvision-and-rockwell-automation-cvss.html</guid><pubDate>Fri, 06 Mar 2026 12:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1dAatoZKBR1txy7hG-8XLixhMv5jhZEjgT_asHnTfyxS1KK9tOrJNwk2MSbXOL1ZoH8-18chWJUuLnegz6ByTRQuljhmqPu9W_BxQSQR7n45B1M3D1XHrwkne4uzqurGVkqDhyphenhyphendkfISqLjawr0HzRQX7ZhfXa-jB3hJ5V0oMr3TOebv_rcpcw9I3ym6v1/s1600/cisa.jpg"/></item><item><title>Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities</title><description><![CDATA[Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild.
The vulnerabilities in question are listed below -

CVE-2026-20122 (CVSS score: 7.1) - An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system.]]></description><link>https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html</guid><pubDate>Thu, 05 Mar 2026 20:52:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEr5vlbwHAPeevtBJ7iylInnh2ZQCxX10smm1srCFONJBSriIbAvvp5jAFpFYdeoyk9BKBhyFZx-U4xBhqtN2eT1r150GMLdRP3scA8PsHMYh0PGALAqnzwQnLS-3K_9yneL-7tRa3lD-TTOIebyc_alzp2kLKFdFRCiJcWMcmTiMnoqUAeO_Wxv6hd05D/s1600/cisco-exploit.jpg"/></item><item><title>Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders</title><description><![CDATA[Most organizations assume encrypted data is safe.
But many attackers are already preparing for a future where today’s encryption can be broken. Instead of trying to decrypt information now, they are collecting encrypted data and storing it so it can be decrypted later using quantum computers.
This tactic—known as “harvest now, decrypt later”—means sensitive data transmitted today could become]]></description><link>https://thehackernews.com/2026/03/preparing-for-quantum-era-post-quantum.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/preparing-for-quantum-era-post-quantum.html</guid><pubDate>Thu, 05 Mar 2026 20:52:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX1kV8IdraKTyGmXfKTap-DKE7krpM6SchfXQZlvruEBaaJyCbG0HQuJD3B08AkkIZF6Ej7oQ2Nr3AfzVD5klERt782T3IuCPT8tSYm49B6j6se-IH7d0XC4kBcTPl-yp3tsA_YmhrZsB0On2ukhH1rhlSaG3fpRXNrSzpbMEoVu_EBoiMGcbFVg9AcWTC/s1600/webinar.jpg"/></item><item><title>ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine &amp; More</title><description><![CDATA[Some weeks in cybersecurity feel routine. This one doesn&rsquo;t.
Several new developments surfaced over the past few days, showing how quickly the threat landscape keeps shifting. Researchers uncovered fresh activity, security teams shared new findings, and a few unexpected moves from major tech companies also drew attention.
Together, these updates offer a useful snapshot of what is happening]]></description><link>https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/threatsday-bulletin-redis-rce-ddr5-bot.html</guid><pubDate>Thu, 05 Mar 2026 19:14:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmX71oTh0PhBoeXrV6BUD7_jQe9VWPqHc60ijUxf4iv8wPE8UeWY8dlDrfbx3-Ut5aNoNQZJ8DH_ADNQGgFL4NbMMcw-IayIe9HXKG3l5EN3-og9LuNqBP452mXpm1HTn3ooWlJ-q4QRqvPJC4gmR0lstJ8KWdQYa2knQ5J69nneIwIRTKKG43fXtcWRXm/s1600/threatsday.jpg"/></item><item><title>Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware</title><description><![CDATA[A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by impersonating the country's Ministry of Foreign Affairs to deliver a set of never-before-seen malware.
Zscaler ThreatLabz, which observed the activity in January 2026, is tracking the cluster under the name Dust Specter. The attacks, which manifest in the form of two different]]></description><link>https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/dust-specter-targets-iraqi-officials.html</guid><pubDate>Thu, 05 Mar 2026 17:31:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWg0441avqEutKSymEsuuVP_gKz7kiss4jZesCHLwD4731n135lf6jhJdT2X5CPIWISsByG0RsJoH7eXSyGVOI6RNmo1QkE8Z24lPdiFTLni79c2EoiLGlAurQsIHqn7j_-MDPlL9F98XAsRtrBD17V7YXRYikdcET0hnw897ButkFyI1T4JmzxpJdwM8y/s1600/iran-attack.jpg"/></item><item><title>Where Multi-Factor Authentication Stops and Credential Abuse Starts</title><description><![CDATA[Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise networks every day using valid credentials. The issue is not MFA itself, but coverage.&nbsp;
Enforced through an identity provider (IdP) such as Microsoft Entra ID, Okta, or]]></description><link>https://thehackernews.com/2026/03/where-multi-factor-authentication-stops.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/where-multi-factor-authentication-stops.html</guid><pubDate>Thu, 05 Mar 2026 16:30:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh573fCRL7EMT-Piz1QEJizjMNdQH5G4eMHpLbuCGvm-PNF6-osRuSQF09DHGIuYS1EXDgZXUmWzVf1p3kHDH0_jE7_XDKuG0J7R9Yc3kP4XbaW3UoF3gLYCQ6ba63S0iYQf3Ftf7s0UkDD9QBbnzUcBPRDQXI401TzAVjET05OjgS38tiYgfWA79kS-8g/s1600/outpost.jpg"/></item><item><title>APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine</title><description><![CDATA[Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow.
"The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals]]></description><link>https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html</guid><pubDate>Thu, 05 Mar 2026 15:40:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihW1ns0JTT2vYUjdQEqTcDwytBGmTnID9xQkCxuT-WURhd71xeh9UD80hZiRL3WWBOg5dCVZKY2huOuElbB-QjczQquCirdpgVRjWNM426jLNF-U_s8RGs9CjNC1Qr2DJhQ532z6bz2hdMkzUjJ-vSKpJmBdvyy5qgkAuwB2armvVyx4HNsn4glFMWmupC/s1600/Ukraine.jpg"/></item><item><title>Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks</title><description><![CDATA[Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law enforcement agencies and security companies.
The subscription-based phishing kit, which first emerged in August 2023, was described by Europol as one of the largest phishing]]></description><link>https://thehackernews.com/2026/03/europol-led-operation-takes-down-tycoon.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/europol-led-operation-takes-down-tycoon.html</guid><pubDate>Thu, 05 Mar 2026 12:21:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj8UTSWEMM2rFGJeOr4V1jcbj7LGdQOWonmvhfcbkNspvoCt-7wsBrnJoMuGgnyCZ-E4G5DqWRcPYrrTi3MF-nZWM3pke6JmFrnNlIrs99WF4ayKdghQxMVtvsxxkvv0FMHmKHWCA92klsfqy2fS4rD0_YcBTOapV-lsGCsZhnLHMCe3oMhEukpHaTgGQE/s1600/takedown.jpg"/></item><item><title>FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials</title><description><![CDATA[A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools.
The LeakBase forum, per the U.S. Department of Justice (DoJ), had over 142,000 members and more than 215,000 messages between members as of December 2025. Those attempting to access the forum's website ("leakbase[.]la") are now]]></description><link>https://thehackernews.com/2026/03/fbi-and-europol-seize-leakbase-forum.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/fbi-and-europol-seize-leakbase-forum.html</guid><pubDate>Thu, 05 Mar 2026 12:04:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqCkvzA_QIoUAC6eMNU1kDX-c7UWPBC9pNRMLDRcjLxiDk6nxLIsjxSYkqpSIX3KpG20nCf8386lGtqomuIqQRGBtC5xfPi0oADNXOggDel6qLCkNMoE7YaHjazq_iL3XF7RZzkfAn18D8-kx1Jz7YAYzHo6bQVRhSdhYSHa16pljvUq8Cihnv3CUARjH0/s1600/FORUM.jpg"/></item><item><title>149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict</title><description><![CDATA[Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion.
"The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2," Radware said in a Tuesday]]></description><link>https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/149-hacktivist-ddos-attacks-hit-110.html</guid><pubDate>Wed, 04 Mar 2026 22:51:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjabhLtgN_k3Zm7rY2cHxMPh9Py-QdY1pESzIEtJbo45w5Y744g5nEtkc9z6tmPaXh_wB0pgzxbFwTzM7C0whbwEbbSopd-CZy98ANNcLF5k7orHTEMlkLSN5JegxMAMPEyeXPE2VXurPv4npqtKkvuay4ZltoPMk47uR-eqP6LsFHp3SqxAeu8tthDyZMa/s1600/ddos.jpg"/></item><item><title>Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1</title><description><![CDATA[Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1.
The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It's not effective against the latest version of iOS. The findings were first reported by WIRED.
"The]]></description><link>https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html</guid><pubDate>Wed, 04 Mar 2026 18:58:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijM5GpGGT0LP6vQkv_yu-1sEWzgjTfk9OIdbMaYKiXdAVgK5DbybegA7hVb_XEgaAPPNAAXJNMh7K2jsH1uHltLp-6L_gOS5xWudR5Z4I76PI3Zv0h2tfvWgCUsq5LoiLMm4x_XXomAeWKVZJ_uNOmCL4cK8TlwNL_SxwwNX0XEr7I9D-ZK-JE1iwHsvM1/s1600/ios.jpg"/></item><item><title>New RFP Template for AI Usage Control and AI Governance </title><description><![CDATA[As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need "AI Governance," but they have no idea what they are actually looking for.
The CISO’s Dilemma: You Have the AI Budget, but Do You Have the Requirements?
As AI]]></description><link>https://thehackernews.com/2026/03/new-rfp-template-for-ai-usage-control.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/new-rfp-template-for-ai-usage-control.html</guid><pubDate>Wed, 04 Mar 2026 17:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrvS_eE1grWPn8hXdb-s4EpPUtevfmC487K-kpFLYJOHCw0vZ1A81bBjhZflx5zj8qY4KrWG3FbQ2dbSFOatzswmBbFxZJkX5vqJOpzyaCefDzEiOfca4ayNkY1ERY95TefFgfRj01keLjzjK_8NKr4OSO3B5vM4k9yY_J9dNtmc1Z7lXdqjawA22F2Zc/s1600/main-ai.jpg"/></item><item><title>Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux</title><description><![CDATA[Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that's functional on Windows, macOS, and Linux systems.
The names of the packages are listed below -

nhattuanbl/lara-helper (37 Downloads)
nhattuanbl/simple-queue (29 Downloads)
nhattuanbl/lara-swagger (49 Downloads)]]></description><link>https://thehackernews.com/2026/03/fake-laravel-packages-on-packagist.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/fake-laravel-packages-on-packagist.html</guid><pubDate>Wed, 04 Mar 2026 15:07:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDAkhOUNeGmbnO6-Wf7OTYmb_GbxBRyWPlLwHY_xWh2a3fWN3wqYQcNDK2z-ck6dCpYStrieeh79uwREaRnu7vXx3_1SqPqi0KYqdyMtPq45fbRFKtBdc_Vnbkh9mgOXSPu4GOPlkqQxfCX-mQ-62Jw5jsA8CybEImOOvdliNEOcPjnGQDEjKrunI4kOyG/s1600/php.jpg"/></item><item><title>APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2</title><description><![CDATA[Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024.
"Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments," Check Point said]]></description><link>https://thehackernews.com/2026/03/apt41-linked-silver-dragon-targets.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/apt41-linked-silver-dragon-targets.html</guid><pubDate>Wed, 04 Mar 2026 13:44:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGPaqQJe-7ak-qgx29_h6G7zUiJhGiBSHZEiydrRzZzuKVlVMBzrJNLFndAvmu15EzX2SXQ8NUHKyH9ZJDQRQMnXukmrUfdPor35gswSxUuTNGGXo7h8eOhDNBVAaCGEo_ohNYv2-8W-zpOuSSHYqCB5iURwesotjNTK9a3926UdkuqI2uz-zUBMzNP5cU/s1600/dragon.jpg"/></item><item><title>CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog</title><description><![CDATA[The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild.
The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an]]></description><link>https://thehackernews.com/2026/03/cisa-adds-actively-exploited-vmware.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/cisa-adds-actively-exploited-vmware.html</guid><pubDate>Wed, 04 Mar 2026 10:05:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwSnIflppBRH5X_FxN5pZcibA3-KyhW9iDiNGlD76L9B8dFwzLtP5i7FHFzf73XpTAhCLtmQn0JD_fUqgXceUlrCwPgJqbmlkPXi2e_IDggrIHDyJ5HoDzr191LxAbe08arokXZ4FXH5k9NxErepVgiaEkGVfWDWQ2ZWJ8h3mGjySQ-QqTzo02oBdh01Up/s1600/vmware.jpg"/></item><item><title>Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations</title><description><![CDATA[Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack.
The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from]]></description><link>https://thehackernews.com/2026/03/fake-tech-support-spam-deploys.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/fake-tech-support-spam-deploys.html</guid><pubDate>Tue, 03 Mar 2026 22:45:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMxXTslXwVQy4UDmwQOi39oPLz0gBjk3E_mUL0hONp_uAbe2mkCooBcTU3zE6nArVycOldRPm5jMHfzTAI_plrX1jvn5o8zmSGKTH794N2tpztPyTLW-TBZqfHaa4nbHLMY2LHhW0l1J4wzmg8lCRXOFWdAQSSn1Qb4iR8PIeRUE9K1NvpCtluT69-y7By/s1600/outlook.jpg"/></item><item><title>Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow</title><description><![CDATA[Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode SOC performance over time.
The Paradox at the Gate:]]></description><link>https://thehackernews.com/2026/03/building-high-impact-tier-1-3-steps.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/building-high-impact-tier-1-3-steps.html</guid><pubDate>Tue, 03 Mar 2026 20:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwYwVezgvocYpgSVlObttlWWj69Wzly716Z1gfPOUjTsEL1TqBXiWSSexSIR2o96ji1cbMuxtxZVETQ7oN6klFQ2do3WCjhmiVLt1BXlMekcMlJSGxTD6XffjEZRWsc3q8eo0HmRc1IV8p777ZLFW4wOXPsDNaCetHqmCkMLILYOAsmDgSaVwerAUtS0A/s1600/tier1.jpg"/></item><item><title>Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries</title><description><![CDATA[The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks.
The new findings come from Team Cymru, which detected its use following an analysis of the IP address ("212.11.64[.]250") that was used by the suspected]]></description><link>https://thehackernews.com/2026/03/open-source-cyberstrikeai-deployed-in.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/open-source-cyberstrikeai-deployed-in.html</guid><pubDate>Tue, 03 Mar 2026 19:59:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfbbcxvw46Df6wZJpHzgD3wrBSTcFyJLQEYVSpnUYNF2U92TTfAilNI6bijzKSHSiHb_XiQgw_V9Rn5HBEoUjx-pGg9fVLh07C7gebKC80qyqTUD0HvHbiquEkIvxjs9n6MuQH5QHp_Sf9nw_NIJRg8Ffi8N_1exLScK5EMuP99dwof4p4aCvRIqlv8zwV/s1600/cyberattacks.jpg"/></item><item><title>AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged</title><description><![CDATA[The Rise of MCPs in the Enterprise
The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real work. By providing structured access to applications, APIs, and data, MCP enables prompt-driven AI agents that can retrieve information, take action, and automate end-to-end business workflows across the enterprise. This is already showing up in production]]></description><link>https://thehackernews.com/2026/03/ai-agents-next-wave-identity-dark.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/ai-agents-next-wave-identity-dark.html</guid><pubDate>Tue, 03 Mar 2026 17:00:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy66jCAP3njemOp9S0dnoRSikwWIk-OjV_6kygA0ubIpsczO3IWQf7SD3hcvCzRrDtiL6_2jOk3fWy2YtEWMwEyCmvzhw6QReN8cvfOlYuiXP4VzgeV_PaFRsylxXhR7akoqfkgxsD_oiNXSAabskwOrDoIJMSsAgr0VZO2UW-4odf7eAjioV1KX7mn3w/s1600/ormain.jpg"/></item><item><title>Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication</title><description><![CDATA[Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections.
It's advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard that lets them select a brand to impersonate or enter a brand's real URL. It also lets]]></description><link>https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/starkiller-phishing-suite-uses-aitm.html</guid><pubDate>Tue, 03 Mar 2026 16:40:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOdnsC4miBmpXK8ZPV1kM1figMIfiqkQpUeAt8idIiZEFRCNt6AMaFSmpUaR215Hrw-XIGi6Zcl9vOgGO5ItB53gWlN_r8UxGz_yTrPTk9bFgCUudYbq2jETdm526DpMDaPyT8UFt7m5XUwlrYdJmUDyEmoQO6zcnGvUB4_W0mBiHJtWFqJk7udXMelfSu/s1600/star.jpg"/></item><item><title>Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets</title><description><![CDATA[Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers.
The activity, the company said, targets government and public-sector organizations with the end goal of redirecting victims to attacker-controlled infrastructure without stealing their tokens. It described]]></description><link>https://thehackernews.com/2026/03/microsoft-warns-oauth-redirect-abuse.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/microsoft-warns-oauth-redirect-abuse.html</guid><pubDate>Tue, 03 Mar 2026 14:50:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVaGXK9F-m4oJx6H9HD0gQaOmONLT8sEFgtKmoGO4k6MzjQY-bfbtoGrUcG2k7tH571M_K6Ej7P5Z5vtjuCYsrKU3tRpOE2fkZv_ViiEmjpUeYwwHTB_8oKlQZd2-VysqvPgdvaofwFi13iPjMSe1pjf0nudP2s4YvheFQHwvsQT8neGjKTPq7nA_PPn0x/s1600/ms-login.jpg"/></item><item><title>Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited</title><description><![CDATA[Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices has been exploited in the wild.
The vulnerability in question is CVE-2026-21385 (CVSS score: 7.8), a buffer over-read in the Graphics component.
"Memory corruption when adding user-supplied data without checking available buffer space," Qualcomm said in an advisory,]]></description><link>https://thehackernews.com/2026/03/google-confirms-cve-2026-21385-in.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/google-confirms-cve-2026-21385-in.html</guid><pubDate>Tue, 03 Mar 2026 12:38:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR_pPCmiYZpBkIhumuW9B55rXBX7U9PZto5xPxHsLBbx5EstbqXgUI-XLZkQQV8OCsdaOi5RuSapl0V4LPKX9B_8MDBqSteyX83vXpj7G8-87BBhyphenhyphen75Os_0RhTFWBL_yxr7JVwXXtZ-qdbbugAlw9MoC5mFEx0hfQMncgnDRR8tLlEMXsLiPmim2sTjzNO/s1600/android-exploit.jpg"/></item><item><title>SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains</title><description><![CDATA[The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government entities and critical infrastructure operators in Pakistan and Bangladesh.
The activity, per Arctic Wolf, took place between January 2025 and January 2026. It involves the use of two distinct attack chains to deliver malware families tracked as BurrowShell and a Rust-based]]></description><link>https://thehackernews.com/2026/03/sloppylemming-targets-pakistan-and.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/sloppylemming-targets-pakistan-and.html</guid><pubDate>Tue, 03 Mar 2026 12:23:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfEU4zf_Kk2z8HBMdkRrw-hKeM6LmC7tBBt_P7K_2rGOfnc15ew5Y9fg4NeeCAMUNfRvcEhbLohCz6-oeONrOsfTnLDk7nEETbgewwLvjyqxprh26CYIpvGexZOvWADe0EutygQFHoGeMCa1sSNRQt-iA5meuqodGe7MK2Lpepa9CUu4PkxeszGIf_pDUH/s1600/malware-attack.jpg"/></item><item><title>New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel</title><description><![CDATA[Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers to escalate privileges and gain access to local files on the system.
The vulnerability, tracked as CVE-2026-0628 (CVSS score: 8.8), has been described as a case of insufficient policy enforcement in the WebView tag. It was patched by Google in early January 2026]]></description><link>https://thehackernews.com/2026/03/new-chrome-vulnerability-let-malicious.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/new-chrome-vulnerability-let-malicious.html</guid><pubDate>Mon, 02 Mar 2026 22:38:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGvdv2as5vfPUJybxkOOX1bDflJKOb5b1uVw9SHrVOo6TD5GKc0JbMB2p2yxxpwj4UlZK680ZnF4J8Ccie6G13W8cklnxDOs-E74-jy3fuIyr53UWuGuwhSM8HvHUIhilChdeRdF3yz9ObuHMHlKGUHI4TMWachzuvWJ3aZdEmz_fPNaIRm_IYDKiqUl1G/s1600/gemini-chrome.jpg"/></item><item><title>Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome</title><description><![CDATA[Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against the future risk posed by quantum computers.
"To ensure the scalability and efficiency of the ecosystem, Chrome has no immediate plan to add traditional X.509 certificates containing post-quantum cryptography to the Chrome Root Store," the Chrome Secure Web and Networking Team said.
"]]></description><link>https://thehackernews.com/2026/03/google-develops-merkle-tree.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/google-develops-merkle-tree.html</guid><pubDate>Mon, 02 Mar 2026 22:22:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI7UWgA_nVAo80v0LRW4e9HTMYUIiEebPJv-EX7ssG1EVxwD-_hlvqqVzQ7Eb4mA9FWWW1U2WYmA8JPnPhyphenhyphenBWaCgFcyeEzcr0QhDRoUsPYgMqB7Ddt2_vEzEYMJj0w9Q9lb2nf12s_FoXDpql2BbxlpCo1oplXSzGjLFmqAsoW_Ix7CufTx5LiWrepwal8/s1600/chrome.jpg"/></item><item><title>⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More</title><description><![CDATA[This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control, exposed keys, and normal features are being used as entry points.
The pattern becomes clear only when you see everything together. Faster scans, smarter misuse of trusted services, and steady]]></description><link>https://thehackernews.com/2026/03/weekly-recap-sd-wan-0-day-critical-cves.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/weekly-recap-sd-wan-0-day-critical-cves.html</guid><pubDate>Mon, 02 Mar 2026 18:56:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu0K0gzfLNadrVS1pk-FHUr-YKau70_2AMjFqoEQn73Mycfa1L3KJO_qQw4Iy83xZ4N8CIj4at04Eh4RDW8FBqza_Ob59078iWjuUKiRYDmlBsKka28GnhpwY680JoRjiO_6LGSU56CLbbj58UKANlY57dUOuQSG18lHn1kBtnn6oEaypA0DcdPypgylsI/s1600/recap-main.jpg"/></item><item><title>How to Protect Your SaaS from Bot Attacks with SafeLine WAF</title><description><![CDATA[Most SaaS teams remember the day their user traffic started growing fast. Few notice the day bots started targeting them.
On paper, everything looks great: more sign-ups, more sessions, more API calls. But in reality, something feels off:

Sign-ups increase, but users aren’t activating.
Server costs rise faster than revenue.
Logs are filled with repeated requests from strange user agents.

If]]></description><link>https://thehackernews.com/2026/03/how-to-protect-your-saas-from-bot.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/how-to-protect-your-saas-from-bot.html</guid><pubDate>Mon, 02 Mar 2026 17:25:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg26Zv-2JJHry05kpFUII9FwYbAuuOo0Wcdb3JH31Zkra0fNWVzvjjVEcBkHMlrctkhJbZzTygsEUTtn3vP-0eboH1JfY3x-bGM5-epP8rB610TfRYk4HD9SLZ-rhnFYt-U52xiAurOeGa2SoHVjbjjfpTr8nEpxbteNyzCrIvX8ICcKWNaDHQFFrvi7UQ/s1600/safeline.jpg"/></item><item><title>APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday</title><description><![CDATA[A recently disclosed security flaw patched by Microsoft may have been exploited by the Russia-linked state-sponsored threat actor known as APT28, according to new findings from Akamai.
The vulnerability in question is CVE-2026-21513 (CVSS score: 8.8), a high-severity security feature bypass affecting the MSHTML Framework.
"Protection mechanism failure in MSHTML Framework allows an unauthorized]]></description><link>https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/apt28-tied-to-cve-2026-21513-mshtml-0.html</guid><pubDate>Mon, 02 Mar 2026 16:06:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGmBYExYY-MdqirvtI7-k2gWDf2rCE5AX4J246DywytJU0hWklJfAxRUKUa6AhU-VFWf2jazsAR1DkpPBHUqv2LsGckfxhVUebrMsnAccaYYmp2L9VJDz4rHaRLxKRgXaYM-UPcFS_ZoyveJxkLu1RunwaIuCBckILFDzMo1mCZtg9zaOmXrOSEEWU7RSg/s1600/windows.jpg"/></item><item><title>North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT</title><description><![CDATA[Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry.
The packages masquerade as developer tools, but contain functionality to extract the actual command-and-control (C2) by using seemingly harmless Pastebin content as a dead drop resolver and]]></description><link>https://thehackernews.com/2026/03/north-korean-hackers-publish-26-npm.html</link><guid isPermaLink="false">https://thehackernews.com/2026/03/north-korean-hackers-publish-26-npm.html</guid><pubDate>Mon, 02 Mar 2026 14:14:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhB4nJ8ODWGAqDEjQl4cCSKOtIJoGood2beXae5mc7MKzZbAYl1Ij2AX0L3CNCuUc4R4TL-DOR6bIHU6yzHfoFir_gl6jbUf_0w69pGg3tsXI92smKf02pmQPqkbyBs-eOUp0SqdGSrBH68os3R2lkTDGvGpi3R3-EThgOy_ATJKTXVqr0_ug-otA6FkeAo/s1600/npm.jpg"/></item><item><title>ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket</title><description><![CDATA[OpenClaw has fixed a high-severity security issue that, if successfully exploited, could have allowed a malicious website to connect to a locally running artificial intelligence (AI) agent and take over control.
"Our vulnerability lives in the core system itself – no plugins, no marketplace, no user-installed extensions – just the bare OpenClaw gateway, running exactly as documented," Oasis]]></description><link>https://thehackernews.com/2026/02/clawjacked-flaw-lets-malicious-sites.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/clawjacked-flaw-lets-malicious-sites.html</guid><pubDate>Sat, 28 Feb 2026 22:51:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMEZ7gMViZ9XlXs35FiyviBZR19FbDXmatfjhNRw59daWLw41ScorGKG3xXYWFD6dDuYHajwoUnkWgQV9SrPe9iiV8UqDVjw4K5hX8cng7VDPTsljAZazuxUDdk7_hZ7SFV9rDCxNcYNWjmEY_lUVj01-PEI9D9rY5tMYJZTP5X887UuXOsDD90UOvo_mG/s1600/opem.jpg"/></item><item><title>Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement</title><description><![CDATA[New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data.
The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix "AIza") embedded in client-side code to provide Google-related services like]]></description><link>https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html</guid><pubDate>Sat, 28 Feb 2026 15:26:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1wA-JoARjvd0BYW-3G0XMdHXcWpWdkWk3bIkWV2myMGfRRsp4Dl8A24cpj8Elpe5lJO6KdyS36Nsts7_o0Xx70HSxwY3se4RuNPRzfFmodMhX-jU_lkCefaathP6uan4UGLWmuQvxjerq6_H-z16vFY3h4pCeVqDBGA13ne12uRZfuU7fHW2pQVAtuM4E/s1600/gemini.jpg"/></item><item><title>Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute</title><description><![CDATA[Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a "supply chain risk."
"This action follows months of negotiations that reached an impasse over two exceptions we requested to the lawful use of our AI model, Claude: the mass domestic surveillance of Americans and fully autonomous weapons," the]]></description><link>https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html</guid><pubDate>Sat, 28 Feb 2026 10:27:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP1VB5XjUzzozGARm5rLhXynwMUWvOhyS4BwO0WHVH6BWf7DhyphenhyphencjAx23XY3HJhDvtgaJ_nW31sVB9yejXl_h6PS1m-X2lbtohZZuJIiSkhRvFsgLASnaDT-PGlcqhsMX-0X7OkK865R0UlztioEsFS8vkdv73Sarw7_H6mvg14v_ovh6hk9NqW3tzlmZ8X/s1600/Anthropic.jpg"/></item><item><title>DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams</title><description><![CDATA[The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering.
The confiscated funds were traced to cryptocurrency addresses used for the laundering of criminally derived proceeds stolen from victims of cryptocurrency investment scams, the department added.
"Criminal]]></description><link>https://thehackernews.com/2026/02/doj-seizes-61-million-in-tether-linked.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/doj-seizes-61-million-in-tether-linked.html</guid><pubDate>Fri, 27 Feb 2026 23:41:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglF1nudH44Lr269ed-E49qDWqg7t-GFuybhyQ8-6oDnBn-CcFh7o21w44Cjxxw0cuZQDBXdHQCxuOrR_vOLEvON4DyGSPWbr-7l3XaHXInETTZLxm-BAfCxUCFZ-Wxek-TnFI8t1rJ3gew5p3BnztZeIXY0ePy6DUFqL5R9QlKHZaUOVPwdIuDLkCju83c/s1600/tether-scam.jpg"/></item><item><title>900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks</title><description><![CDATA[The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025.
Of these, 401 instances are located in the U.S., followed by 51 in Brazil, 43 in Canada, 40 in Germany, and 36 in France.
The non-profit entity said the compromises are likely]]></description><link>https://thehackernews.com/2026/02/900-sangoma-freepbx-instances.html</link><guid isPermaLink="false">https://thehackernews.com/2026/02/900-sangoma-freepbx-instances.html</guid><pubDate>Fri, 27 Feb 2026 23:29:00 +0530</pubDate><author>info@thehackernews.com (The Hacker News)</author><enclosure length="12216320" type="image/jpeg" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVfnqoWodxrya2TOd7lDLrZ23Bvo_FZhrnRLTnOO-Y4zvouKylIpkT7KE_LKo8lQGBCwMo3GCldGiyqSJobUKHLxmKx6hja0EBG6K3DCtQG-bmDDapu2el8CnQMMs971cJ3dICyw4-T1I8o0W7-XNHKzRBO8U48USZlO8MmtJkKKaOkweEzgKZF2PyaUt9/s1600/freepbx.jpg"/></item></channel></rss>