Cyber News Digest — 2026-03-14

Auto-generated by the nethound.sh news pipeline. 60 articles summarized.


INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

Relevance: ★★★★★ (5/5) | Published: Fri, 13 Mar 2026 20:50:00 +0530

INTERPOL has successfully dismantled 45,000 malicious IP addresses and servers linked to phishing, malware, and ransomware operations, resulting in the arrest of 94 individuals as part of a global law enforcement effort involving 72 countries and territories. This operation highlights the agency’s commitment to disrupting criminal networks and protecting victims from cyber scams. The takedown underscores the international collaboration needed to combat emerging cyber threats.

Takeaway: Ransomware recovery consultants and threat intelligence labs should leverage international operation insights to enhance monitoring of malicious IPs and incorporate global threat data into their Go-based security tools for better proactive defense.

Read full article →


Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Relevance: ★★★★★ (5/5) | Published: Fri, 13 Mar 2026 09:45:00 +0530

Veeam has issued security patches for seven critical vulnerabilities in its Backup & Replication software, including flaws like CVE-2026-21666 and CVE-2026-21667 that enable authenticated users to execute remote code on the backup server, potentially leading to severe exploitation. These vulnerabilities, with high CVSS scores up to 9.9, affect versions up to 12.1.2.172 and could allow unauthorized access to sensitive data or system control. The updates are essential for enterprises relying on Veeam for data protection, as exploitation could compromise backup integrity.

Takeaway: Organizations using Veeam Backup & Replication should immediately apply the latest patches to mitigate risks of remote code execution, which could be leveraged in ransomware attacks targeting backups for data exfiltration or destruction.

Read full article →


Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

Relevance: ★★★★★ (5/5) | Published: Thu, 12 Mar 2026 22:32:00 +0530

Cybersecurity researchers have revealed that the threat actor Hive0163 is deploying an AI-generated malware called Slopoly to maintain persistent access during ransomware attacks, demonstrating the ease with which AI can be used to create new malware frameworks rapidly. While Slopoly is not yet highly advanced, it highlights the growing trend of AI weaponization by financially motivated hackers. This development underscores the need for evolving defenses against AI-assisted threats in the ransomware landscape.

Takeaway: Organizations should enhance threat intelligence monitoring for AI-generated malware indicators and incorporate AI-driven detection tools in incident response strategies to counter evolving ransomware tactics like those from Hive0163.

Read full article →


ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

Relevance: ★★★★★ (5/5) | Published: Thu, 12 Mar 2026 18:44:00 +0530

This week’s ThreatsDay Bulletin from The Hacker News rounds up recent cybersecurity threats, including an OAuth trap for credential theft, techniques to disable Endpoint Detection and Response (EDR) tools, phishing campaigns exploiting the Signal messaging app, a “Zombie ZIP” vulnerability in file compression, an AI platform hack, and other emerging risks. The post highlights how old attack methods are being refined and warns that some of these could soon appear in real-world incidents. It emphasizes the evolving nature of threats in a familiar yet concerning pattern.

Takeaway: Security teams should review and update EDR configurations and phishing awareness training to mitigate risks from EDR killers and Signal-based phishing, which could serve as initial access vectors in ransomware attacks.

Read full article →


Patch Tuesday, February 2026 Edition

Relevance: ★★★★★ (5/5) | Published: Tue, 10 Feb 2026 21:49:53 +0000

Microsoft has issued its February 2026 Patch Tuesday updates, addressing over 50 security vulnerabilities in Windows and related software, with a notable focus on six zero-day flaws that are already under active exploitation by attackers. These patches cover a range of issues, from remote code execution to elevation of privileges, emphasizing the urgency for immediate deployment to mitigate ongoing threats. The updates also include fixes for other Microsoft products like Office and SharePoint, highlighting the broad impact on enterprise environments.

Takeaway: Organizations should prioritize applying these patches immediately, especially in ransomware-prone environments, to close zero-day exploitation vectors that could enable initial access or persistence by threat actors.

Read full article →


Please Don’t Feed the Scattered Lapsus ShinyHunters

Relevance: ★★★★★ (5/5) | Published: Mon, 02 Feb 2026 16:15:16 +0000

The article discusses the operations of the Scattered Lapsus ShinyHunters (SLSH) data ransom gang, which employs aggressive tactics like harassing and swatting executives’ families while alerting journalists and regulators to pressure victims into paying ransoms. It highlights how SLSH combines elements from previous groups like Lapsus$ and ShinyHunters, focusing on data extortion rather than traditional ransomware encryption. The piece advises against paying these extortionists and emphasizes the importance of robust incident response to mitigate such threats.

Takeaway: Organizations should enhance executive protection measures and develop comprehensive incident response plans to counter harassment-based extortion tactics from groups like SLSH, potentially incorporating threat intelligence monitoring for early detection.

Read full article →


England Hockey investigating ransomware data breach

Relevance: ★★★★★ (5/5) | Published: Thu, 12 Mar 2026 16:37:16 -0400

England Hockey is probing a potential ransomware attack after the AiLock ransomware group claimed responsibility by listing the organization on its data leak site. The incident involves possible data exfiltration, though details on the breach’s scope or any ransom demands remain unclear. The governing body has engaged cybersecurity experts to investigate and mitigate any risks.

Takeaway: Organizations should actively monitor ransomware data leak sites for early detection of breaches and enhance incident response plans to include rapid engagement with experts for containment and recovery.

Read full article →


AI-generated Slopoly malware used in Interlock ransomware attack

Relevance: ★★★★★ (5/5) | Published: Thu, 12 Mar 2026 16:01:27 -0400

A new malware variant called Slopoly, believed to be generated using AI tools, enabled attackers to maintain persistence on a compromised server for over a week, facilitating data exfiltration in an Interlock ransomware operation. The malware’s code exhibits characteristics typical of AI generation, such as unusual variable names and inefficient structures, highlighting the growing role of generative AI in cyber threats. This incident underscores how AI can lower the barrier for creating sophisticated malware used in ransomware attacks.

Takeaway: Ransomware recovery teams and threat intelligence labs should integrate AI-generated code detection techniques into their monitoring tools to identify and mitigate similar persistent threats like Slopoly early in the attack chain.

Read full article →


GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

Relevance: ★★★★☆ (4/5) | Published: Sat, 14 Mar 2026 18:25:00 +0530

Cybersecurity researchers have identified an escalated GlassWorm supply-chain attack that leverages 72 malicious extensions in the Open VSX registry to target developers, using features like extensionPack and extensionDependencies to propagate malware indirectly without embedding loaders in every extension. This method allows initially benign-looking extensions to become transitive carriers of the attack, infecting Visual Studio Code users who install them. The campaign represents a sophisticated evolution in attacking open-source registries to compromise developer environments.

Takeaway: Developers and organizations should audit and verify VS Code extensions from Open VSX for dependencies and packs to mitigate supply-chain risks, potentially integrating automated scanning tools in threat intelligence workflows.

Read full article →


Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

Relevance: ★★★★☆ (4/5) | Published: Fri, 13 Mar 2026 23:03:00 +0530

A suspected China-based cyber espionage group, tracked as CL-STA-1087 by Palo Alto Networks Unit 42, has been targeting Southeast Asian military organizations since at least 2020 using custom malware like AppleChris and MemFun for intelligence gathering. The operation exhibits strategic patience, with attackers deploying sophisticated tools to evade detection and maintain long-term access. This campaign highlights ongoing state-sponsored threats in the region focused on military espionage.

Takeaway: Threat intelligence labs should incorporate indicators from CL-STA-1087, such as AppleChris and MemFun malware signatures, into monitoring tools to detect similar espionage tactics in non-ransomware scenarios.

Read full article →


Investigating a New Click-Fix Variant

Relevance: ★★★★☆ (4/5) | Published: Fri, 13 Mar 2026 18:58:00 +0530

The Threat Research Center has released a report investigating a new variant of the Click-Fix attack, which is based on their independent research into the evolving threat landscape to boost cybersecurity awareness and defensive measures. The content emphasizes that the report is for informational purposes only and encourages reading related threat blogs. A link is provided for further details on this emerging variant.

Takeaway: Organizations should monitor for evolving social engineering tactics like Click-Fix variants and integrate threat intelligence updates into their incident response plans to mitigate potential malware infections that could lead to ransomware.

Read full article →


Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Relevance: ★★★★☆ (4/5) | Published: Fri, 13 Mar 2026 13:48:00 +0530

Cybersecurity researchers from Qualys have uncovered nine vulnerabilities in Linux’s AppArmor security module, dubbed CrackArmor, which allow unprivileged users to exploit confused deputy issues for root privilege escalation and to bypass container isolation. These flaws, stemming from improper handling of delegated mediation tasks, could enable attackers to undermine kernel protections in affected Linux distributions. The vulnerabilities have been patched in recent kernel updates, emphasizing the need for timely system upgrades.

Takeaway: Organizations should immediately audit and patch Linux kernels to versions addressing CVE-2024- something (specific CVEs not detailed), and enhance threat monitoring for privilege escalation attempts in containerized environments to prevent potential exploitation in ransomware or other attacks.

Read full article →


Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

Relevance: ★★★★☆ (4/5) | Published: Fri, 13 Mar 2026 10:56:00 +0530

International law enforcement, led by the U.S. Department of Justice, has successfully disrupted the SocksEscort proxy botnet, which infected thousands of residential and small business routers with malware to create a network of over 369,000 IPs across 163 countries for facilitating large-scale fraud. The operation involved court-authorized actions to dismantle the criminal service that allowed users to anonymously route traffic through compromised devices. This takedown highlights ongoing efforts to combat botnet-based cybercrime infrastructure.

Takeaway: Organizations should prioritize securing routers against malware infections and incorporate threat intelligence on proxy botnets into incident response plans to detect potential abuse in ransomware or fraud campaigns.

Read full article →


How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

Relevance: ★★★★☆ (4/5) | Published: Thu, 12 Mar 2026 19:00:00 +0530

The article discusses how modern phishing attacks have evolved to use trusted infrastructure and encrypted traffic, making them harder to detect with traditional methods, and emphasizes the need for CISOs to scale detection capabilities in their Security Operations Centers (SOCs). It outlines three key steps to achieve this: enhancing visibility into encrypted traffic, integrating advanced analytics for behavioral detection, and automating response processes to handle the volume of threats. This approach helps enterprises expose phishing early and mitigate risks more effectively.

Takeaway: Ransomware recovery consultants can incorporate scalable phishing detection strategies into their threat intelligence lab to better identify initial access vectors commonly used in ransomware campaigns, potentially integrating Go-based tools for automated analysis.

Read full article →


Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload

Relevance: ★★★★☆ (4/5) | Published: Thu, 12 Mar 2026 17:00:00 +0530

The article highlights how advanced phishing campaigns are crafted not only to deceive employees but also to overwhelm SOC analysts by prolonging investigations from minutes to hours, potentially leading to uncontained breaches. It notes that while the industry emphasizes employee training and email gateways, attackers exploit the investigative workload to exhaust resources. The discussion underscores the need for streamlined tools and processes to detect and mitigate these tactics efficiently.

Takeaway: Ransomware recovery consultants should prioritize developing or integrating automated threat intelligence tools in Go to accelerate phishing investigations and reduce SOC fatigue, preventing minor incidents from escalating into full breaches.

Read full article →


CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

Relevance: ★★★★☆ (4/5) | Published: Thu, 12 Mar 2026 10:48:00 +0530

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical remote code execution (RCE) vulnerability in the n8n workflow automation tool, tracked as CVE-2025-68613 with a CVSS score of 9.9, to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation. This expression injection flaw allows attackers to execute arbitrary code on vulnerable systems, and despite a patch being available, over 24,700 instances remain exposed online. The addition to the KEV catalog underscores the urgency for federal agencies and organizations to prioritize remediation.

Takeaway: Organizations using n8n should immediately apply the patch and scan for exposed instances to mitigate risks of RCE exploitation, which could serve as an entry point for ransomware or other threats in incident response scenarios.

Read full article →


Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Relevance: ★★★★☆ (4/5) | Published: Wed, 11 Mar 2026 20:21:00 +0530

Cybersecurity researchers have revealed two critical, now-patched vulnerabilities in the n8n workflow automation tool, including CVE-2026-27577 (CVSS 9.4) which allows sandbox escape leading to remote code execution, and CVE-2026-27493 (CVSS 9.5) enabling unauthenticated exposure of stored credentials. These flaws could permit attackers to execute arbitrary commands or steal sensitive data without authentication. The issues have been addressed in the latest n8n release, urging users to update immediately.

Takeaway: Organizations using n8n should promptly update to the patched version and incorporate vulnerability scanning into threat intelligence processes to detect similar RCE and credential exposure risks in automation tools.

Read full article →


Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

Relevance: ★★★★☆ (4/5) | Published: Wed, 11 Mar 2026 17:56:00 +0530

SAP has issued security updates to fix two critical vulnerabilities, including CVE-2019-17571, a code injection flaw in its Quotation Management Insurance application with a CVSS score of 9.8, and CVE-2026-27685, an insecure deserialization issue scoring 9.1, both potentially allowing arbitrary code execution. The article highlights patches from dozens of vendors addressing flaws in enterprise software and network devices to mitigate risks of exploitation. These updates are part of a broader effort to secure systems against remote attacks.

Takeaway: Enterprises should prioritize applying these patches to vulnerable SAP systems and other affected software to reduce the risk of ransomware actors exploiting them for initial access or lateral movement during incidents.

Read full article →


Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Relevance: ★★★★☆ (4/5) | Published: Wed, 11 Mar 2026 14:45:00 +0530

Microsoft has released patches for 84 security vulnerabilities in its March Patch Tuesday update, including two publicly known zero-days, with eight rated Critical and 76 Important; the flaws span categories like privilege escalation (46), remote code execution (18), and information disclosure (10), affecting various software components. This update addresses risks that could enable attackers to gain elevated privileges or execute arbitrary code on unpatched systems. Notably, the two zero-days have been actively exploited in the wild, underscoring the urgency for immediate patching.

Takeaway: Organizations should prioritize applying these Microsoft patches to prevent exploitation in ransomware attacks, integrating them into threat intelligence monitoring and incident response workflows.

Read full article →


Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Relevance: ★★★★☆ (4/5) | Published: Wed, 11 Mar 2026 10:42:00 +0530

Cybersecurity researchers identified five malicious Rust crates on crates.io—chrono_anchor, dnp3times, time_calibrator, time_calibrators, and time-sync—that pose as time-related utilities but actually exfiltrate sensitive data from .env files to attackers, impersonating the legitimate timeapi.io service. These packages were published between late February and early March, highlighting a supply chain attack vector. Additionally, the report mentions an AI bot exploiting CI/CD pipelines to steal developer secrets, underscoring vulnerabilities in automated development workflows.

Takeaway: Developers and security teams should rigorously vet and scan third-party dependencies in Rust (and similar ecosystems like Go) for malicious code, and implement strict access controls in CI/CD pipelines to prevent secret exfiltration that could enable broader threats like ransomware.

Read full article →


FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Relevance: ★★★★☆ (4/5) | Published: Tue, 10 Mar 2026 21:51:00 +0530

Cybersecurity researchers have identified a new campaign where attackers exploit vulnerabilities or weak credentials in FortiGate Next-Generation Firewall appliances to gain initial access to networks. Once inside, they extract configuration files that reveal service account credentials and detailed network topology, enabling further compromise. This tactic highlights the risks of exposed edge devices in enterprise environments.

Takeaway: Organizations should prioritize patching known vulnerabilities in FortiGate devices, enforce strong authentication, and monitor for unusual access to configuration files to prevent initial breaches that could escalate to ransomware incidents.

Read full article →


New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

Relevance: ★★★★☆ (4/5) | Published: Tue, 10 Mar 2026 18:50:00 +0530

Cybersecurity researchers from Tenable have identified nine cross-tenant vulnerabilities in Google Looker Studio, dubbed “LeakyLooker,” which could allow attackers to execute arbitrary SQL queries on victims’ databases and exfiltrate sensitive data in Google Cloud environments. These flaws stem from improper handling of data sources and could enable unauthorized access across tenants. Fortunately, there is no evidence of exploitation in the wild, and Google has likely addressed them following disclosure.

Takeaway: Organizations using Google Looker Studio should immediately verify that their instances are updated to mitigate risks of data exfiltration, which could be leveraged in ransomware campaigns for double extortion.

Read full article →


The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

Relevance: ★★★★☆ (4/5) | Published: Tue, 10 Mar 2026 16:30:00 +0530

The article emphasizes that while zero-day vulnerabilities are unpredictable, organizations can mitigate their impact by deliberately reducing their attack surface, as many teams unknowingly expose more internet-facing assets than necessary. It explores reasons for excessive exposure, such as unmanaged growth, and provides guidance on managing it through better visibility and control. With exploit times shrinking, proactive attack surface reduction is presented as key to avoiding chaotic responses to new threats.

Takeaway: Regularly audit and minimize internet-facing assets to shrink your attack surface, enhancing resilience against zero-day exploits that could lead to ransomware incidents.

Read full article →


APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

Relevance: ★★★★☆ (4/5) | Published: Tue, 10 Mar 2026 16:25:00 +0530

The Russian hacking group APT28 has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance on Ukrainian military targets, according to ESET research. These implants enable espionage activities, with BEARDSHELL focusing on data collection and COVENANT providing command-and-control capabilities. APT28, also known as Fancy Bear, continues to evolve its toolkit for state-sponsored cyber operations.

Takeaway: Threat intelligence teams should incorporate indicators of compromise for BEARDSHELL and COVENANT into monitoring tools to detect potential APT28 intrusions in high-risk environments.

Read full article →


CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

Relevance: ★★★★☆ (4/5) | Published: Tue, 10 Mar 2026 11:47:00 +0530

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including flaws in SolarWinds, Ivanti, and Omnissa Workspace One UEM (formerly VMware). The vulnerabilities encompass a server-side request forgery (SSRF) in Workspace One, along with others in SolarWinds and Ivanti products that are being targeted by threat actors. This update urges federal agencies and organizations to prioritize patching to mitigate ongoing exploitation risks.

Takeaway: Organizations should immediately assess and patch systems affected by these CVEs to prevent exploitation in ransomware or other cyber attacks, and incorporate them into threat intelligence monitoring for incident response preparedness.

Read full article →


UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

Relevance: ★★★★☆ (4/5) | Published: Mon, 09 Mar 2026 20:20:00 +0530

The North Korean threat actor UNC4899, also known as Jade Sleet and other aliases, is believed to have compromised a cryptocurrency firm in 2025 by exploiting a developer’s use of AirDrop to transfer a trojanized file to a work device, leading to a cloud breach and the theft of millions in cryptocurrency. This sophisticated campaign highlights the risks of personal device usage in professional environments and the advanced tactics employed by state-sponsored groups. Attribution is made with moderate confidence based on observed techniques and infrastructure overlaps.

Takeaway: Organizations should implement strict policies against using personal file transfer methods like AirDrop for work-related files and enhance developer training on supply chain risks to prevent similar breaches.

Read full article →


Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

Relevance: ★★★★☆ (4/5) | Published: Mon, 09 Mar 2026 12:51:00 +0530

A Chinese threat actor has been conducting a prolonged cyber campaign against high-value organizations in South, Southeast, and East Asia, targeting sectors like aviation, energy, government, and telecommunications using web server exploits and the Mimikatz tool for credential access. Palo Alto Networks Unit 42 has attributed this to a newly identified threat group, highlighting tactics such as exploiting vulnerabilities in servers and deploying custom malware for persistence. The attacks emphasize the ongoing risks to critical infrastructure in the region.

Takeaway: Organizations should enhance threat intelligence monitoring for web server vulnerabilities and Mimikatz usage, potentially integrating Go-based detection tools to identify credential dumping attempts in incident response workflows.

Read full article →


Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

Relevance: ★★★★☆ (4/5) | Published: Fri, 06 Mar 2026 20:03:00 +0530

Cybersecurity researchers at Securonix have detailed a multi-stage malware campaign named VOID#GEIST, which employs obfuscated batch scripts to deliver encrypted payloads of remote access trojans (RATs) including XWorm, AsyncRAT, and Xeno RAT. The attack chain begins with a stealthy batch script that deploys secondary stages, enabling persistent remote access and potential further compromise. This disclosure highlights the evolving tactics of threat actors using simple scripting for sophisticated malware delivery.

Takeaway: Organizations should enhance detection for obfuscated batch scripts in endpoint monitoring and conduct threat hunting for RAT indicators to prevent initial access leading to broader incidents like ransomware.

Read full article →


Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

Relevance: ★★★★☆ (4/5) | Published: Fri, 06 Mar 2026 15:53:00 +0530

New research from Symantec and Carbon Black reveals that the Iranian state-sponsored hacking group MuddyWater (also known as Seedworm) has infiltrated networks of U.S. companies, including banks, airports, non-profits, and the Israeli branch of a software firm, using a novel backdoor called Dindoor. The group is embedding itself for persistent access, potentially for espionage or further attacks. This activity highlights ongoing threats from APT groups linked to Iran targeting critical sectors.

Takeaway: Organizations should update threat intelligence feeds to include indicators of compromise for MuddyWater and the Dindoor backdoor to enhance detection and incident response capabilities in their networks.

Read full article →


China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

Relevance: ★★★★☆ (4/5) | Published: Fri, 06 Mar 2026 13:52:00 +0530

A China-linked APT group, tracked as UAT-9244 and associated with FamousSparrow, has been attacking telecommunications infrastructure in South America since 2024, deploying custom implants like TernDoor, PeerTime, and BruteEntry to target Windows, Linux, and edge devices. These tools enable persistent access, credential theft, and brute-force attacks, highlighting sophisticated tactics for espionage or disruption in critical sectors. The activity underscores the growing threat to telecom networks from state-sponsored actors.

Takeaway: Organizations in critical infrastructure should enhance threat intelligence monitoring for indicators of these implants and consider developing Go-based detection tools to identify similar APT persistence mechanisms in their environments.

Read full article →


Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Relevance: ★★★★☆ (4/5) | Published: Fri, 06 Mar 2026 12:14:00 +0530

Microsoft has uncovered a ClickFix social engineering campaign that exploits the Windows Terminal app to initiate an attack chain leading to the deployment of Lumma Stealer malware, observed starting in February 2026. Instead of directing users to the Windows Run dialog, attackers instruct victims to paste malicious commands into the Terminal, facilitating the malware’s execution. This tactic highlights evolving methods in info-stealer distribution, potentially aiding in credential theft for further attacks like ransomware.

Takeaway: Organizations should enhance user awareness training on verifying commands in Windows Terminal and implement endpoint detection rules to monitor for suspicious Terminal executions, which could prevent initial access in ransomware-related chains.

Read full article →


Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

Relevance: ★★★★☆ (4/5) | Published: Fri, 06 Mar 2026 12:00:00 +0530

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical vulnerabilities—CVE-2017-7921 (CVSS 9.8) in Hikvision products, involving improper authentication, and another in Rockwell Automation—to its Known Exploited Vulnerabilities (KEV) catalog due to evidence of active exploitation. These flaws could allow attackers to bypass authentication and gain unauthorized access to affected systems. Organizations using these products are urged to apply patches immediately to mitigate risks.

Takeaway: In threat intelligence operations, prioritize monitoring and scanning for these CVEs in client environments to prevent initial access vectors that could lead to ransomware deployments.

Read full article →


Microsoft Patch Tuesday, March 2026 Edition

Relevance: ★★★★☆ (4/5) | Published: Wed, 11 Mar 2026 00:32:51 +0000

Microsoft released security updates for March 2026, addressing at least 77 vulnerabilities across Windows and other software, with no zero-day flaws reported unlike the previous month. The updates include critical fixes that organizations should prioritize, particularly those affecting widely used components. Highlights from Krebs on Security emphasize the need for timely patching to mitigate potential exploitation risks.

Takeaway: Organizations should prioritize deploying these Windows patches in ransomware-prone environments to reduce exploit risks, and consider integrating automated vulnerability scanning tools built in Go for faster threat intelligence and incident response.

Read full article →


How AI Assistants are Moving the Security Goalposts

Relevance: ★★★★☆ (4/5) | Published: Sun, 08 Mar 2026 23:35:42 +0000

The article discusses the rising popularity of AI-based assistants that can access users’ computers, files, and online services to automate tasks, particularly among developers and IT professionals. It highlights how these tools are reshaping organizational security priorities by blurring distinctions between data and code, as well as between trusted insiders and potential threats. Recent headlines underscore the risks, positioning AI agents as both innovative aids and potential vectors for security vulnerabilities.

Takeaway: Organizations should integrate monitoring and access controls for AI assistants into their threat intelligence and incident response strategies to mitigate risks of insider threats or unauthorized actions.

Read full article →


Who is the Kimwolf Botmaster “Dort”?

Relevance: ★★★★☆ (4/5) | Published: Sat, 28 Feb 2026 12:01:57 +0000

KrebsOnSecurity investigates the identity of “Dort,” the botmaster behind the massive Kimwolf botnet, which was exposed by a security researcher in early 2026, leading to retaliatory attacks including DDoS, doxing, email floods, and SWATing against the researcher and the author. The article compiles publicly available information to profile Dort, highlighting the botnet’s disruptive scale and the ongoing threats it poses. It underscores the risks faced by cybersecurity professionals when exposing major threats.

Takeaway: Threat intelligence teams should prioritize monitoring for Kimwolf botnet indicators and implement robust personal security measures, such as anonymization and emergency response protocols, to mitigate risks of retaliation from exposed threat actors.

Read full article →


‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Relevance: ★★★★☆ (4/5) | Published: Fri, 20 Feb 2026 20:00:30 +0000

The ‘Starkiller’ phishing-as-a-service platform cleverly proxies legitimate login pages of popular sites, relaying victims’ credentials and MFA codes to the real site while capturing them, making it harder for security teams to detect and dismantle compared to traditional static phishing sites. This method uses disguised links to load the authentic site indirectly, bypassing common takedown efforts by anti-abuse groups. The service enhances phishing stealth and persistence, posing a growing threat to credential security.

Takeaway: Organizations should enhance employee training on verifying URLs and implement advanced phishing detection tools that inspect for proxy behaviors to mitigate risks from such sophisticated credential harvesting techniques, which often precede ransomware attacks.

Read full article →


FBI seeks victims of Steam games used to spread malware

Relevance: ★★★★☆ (4/5) | Published: Fri, 13 Mar 2026 16:52:31 -0400

The FBI is urging victims who downloaded eight malicious games from Steam to come forward with information to aid an ongoing investigation into malware distribution via the platform. These games were uploaded to infect users’ systems, and the call for victims aims to gather details on the impact and spread of the malware. Authorities emphasize the importance of user reports to track down the perpetrators and mitigate further threats.

Takeaway: Security teams should monitor and educate users on verifying game downloads from platforms like Steam to prevent malware infections, potentially integrating such threat intel into IR playbooks or custom Go-based scanning tools.

Read full article →


From VMware to what’s next: Protecting data during hypervisor migration

Relevance: ★★★★☆ (4/5) | Published: Fri, 13 Mar 2026 10:15:25 -0400

The article discusses the risks to data availability and recovery during hypervisor migrations, such as from VMware to alternatives, highlighting potential vulnerabilities that could lead to data loss or downtime. It emphasizes the importance of verified backups and cross-platform recovery solutions, as explained by Acronis, to mitigate these hidden threats. Overall, it advises organizations to prioritize robust data protection strategies to ensure seamless transitions without compromising security.

Takeaway: During hypervisor migrations, implement verified backups and test cross-platform recovery processes to safeguard against data loss, which is critical for ransomware incident response and recovery.

Read full article →


Fake enterprise VPN sites used to steal company credentials

Relevance: ★★★★☆ (4/5) | Published: Fri, 13 Mar 2026 09:23:28 -0400

A threat actor known as Storm-2561 is creating fake websites that mimic legitimate enterprise VPN portals from vendors like Ivanti, Cisco, and Fortinet, tricking users into downloading malicious clients that steal VPN credentials. These attacks target corporate users, potentially granting attackers access to internal networks for further exploitation. The campaign highlights the risks of phishing and social engineering in credential theft operations.

Takeaway: Organizations should implement strict verification processes for VPN software downloads, such as sourcing directly from official vendor sites and enabling multi-factor authentication to mitigate credential theft risks.

Read full article →


US disrupts SocksEscort proxy network powered by Linux malware

Relevance: ★★★★☆ (4/5) | Published: Thu, 12 Mar 2026 12:19:56 -0400

Law enforcement agencies from the U.S. and Europe, in collaboration with private partners, have successfully disrupted the SocksEscort proxy network, which relied on edge devices infected with the AVRecon Linux malware to provide anonymous proxy services for cybercriminals. The operation involved seizing domains and redirecting traffic to a warning page, effectively dismantling a key infrastructure used for hiding malicious activities like phishing and credential stuffing. This disruption highlights the growing threat of malware targeting Linux-based IoT and edge devices for building covert proxy networks.

Takeaway: Security teams should enhance threat intelligence monitoring for AVRecon-like Linux malware on edge devices and consider integrating proxy detection capabilities into Go-based tools to identify and mitigate similar anonymization networks used in ransomware operations.

Read full article →


Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8

Relevance: ★★★☆☆ (3/5) | Published: Fri, 13 Mar 2026 14:47:00 +0530

Google has released security updates for Chrome to patch two high-severity zero-day vulnerabilities exploited in the wild, including CVE-2026-3909, an out-of-bounds write flaw in the Skia graphics library allowing remote attackers to access memory via crafted HTML, and another affecting the V8 JavaScript engine. These fixes aim to prevent potential remote code execution and other attacks. The updates are crucial for users to apply immediately to mitigate ongoing exploitation risks.

Takeaway: Organizations should prioritize updating Chrome browsers across their networks to protect against these exploited zero-days, which could serve as entry points for ransomware or other malware in threat intelligence monitoring.

Read full article →


Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Relevance: ★★★☆☆ (3/5) | Published: Thu, 12 Mar 2026 23:01:00 +0530

Cybersecurity researchers have uncovered a new Rust-based banking malware called VENON that targets Windows users in Brazil, infecting systems to steal credentials via overlays and focusing on 33 specific banks. This malware represents a shift from traditional Delphi-based threats in the Latin American cybercrime scene, with its initial discovery occurring last month. VENON’s use of Rust highlights evolving tactics in malware development for financial theft.

Takeaway: Threat intelligence teams should monitor for Rust-based malware indicators in financial sectors, potentially incorporating detection rules into Go-based security tools for enhanced credential theft prevention.

Read full article →


Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Relevance: ★★★☆☆ (3/5) | Published: Thu, 12 Mar 2026 15:28:00 +0530

Apple has released security updates for older iOS, iPadOS, and macOS Sonoma devices to address CVE-2023-43010, a WebKit vulnerability that could cause memory corruption through malicious web content. This flaw was exploited as part of the Coruna exploit kit, prompting the backporting of fixes to ensure broader device protection. The update highlights Apple’s ongoing efforts to mitigate active threats even on legacy systems.

Takeaway: Organizations should prioritize applying these Apple patches to vulnerable devices and incorporate monitoring for WebKit-based exploits into threat intelligence feeds to prevent potential initial access vectors in broader attacks.

Read full article →


Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Relevance: ★★★☆☆ (3/5) | Published: Thu, 12 Mar 2026 13:26:00 +0530

Cybersecurity researchers have identified six new Android malware families, including banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT, as well as the SURXRAT remote administration tool, all designed to steal data and conduct financial fraud by targeting Pix payments, banking apps, and crypto wallets. These malware variants enable attackers to compromise devices and extract sensitive information for illicit gains. The discovery highlights the evolving threat landscape in mobile financial security.

Takeaway: Incorporate monitoring for these Android malware families into threat intelligence feeds to enhance detection of mobile-based financial threats that could intersect with broader cybercrime ecosystems.

Read full article →


Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Relevance: ★★★☆☆ (3/5) | Published: Wed, 11 Mar 2026 22:08:00 +0530

Researchers demonstrated that Perplexity’s Comet AI Browser, an agentic tool designed to autonomously perform web actions using AI, can be manipulated into falling for phishing scams in under four minutes by exploiting its reasoning mechanisms to bypass security guardrails. The attack leverages the AI’s tendency to justify actions, effectively lowering its defenses and allowing it to execute malicious tasks like entering fake credentials. This highlights emerging vulnerabilities in AI-driven browsers that could be weaponized for scams or data breaches.

Takeaway: Organizations should incorporate threat modeling for AI agentic tools in their threat intelligence processes to identify and mitigate risks of manipulation leading to phishing or unauthorized actions.

Read full article →


What Boards Must Demand in the Age of AI-Automated Exploitation

Relevance: ★★★☆☆ (3/5) | Published: Wed, 11 Mar 2026 17:00:00 +0530

The article warns boards and executives about the risks of ignoring large vulnerability backlogs, especially as AI automates exploitation, potentially leading to accountability questions post-incident. It emphasizes that accepting such risks is no longer viable, urging leaders to demand proactive measures. The piece highlights the shift in cybersecurity landscape where AI accelerates threats, making swift action essential.

Takeaway: Boards should demand regular AI-driven vulnerability assessments and prioritization to mitigate automated exploitation risks, enhancing overall incident response readiness.

Read full article →


UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

Relevance: ★★★☆☆ (3/5) | Published: Wed, 11 Mar 2026 13:01:00 +0530

A threat actor tracked as UNC6426 exploited stolen keys from a previous supply-chain compromise of the nx npm package to rapidly breach a victim’s AWS cloud environment in just 72 hours. The attack began with the theft of a developer’s GitHub token, which enabled unauthorized access to cloud resources and subsequent data exfiltration. This incident highlights the persistent risks from supply-chain attacks and the speed at which attackers can escalate privileges in cloud infrastructures.

Takeaway: Organizations should implement strict monitoring of third-party dependencies and enforce multi-factor authentication on developer tools like GitHub to mitigate risks from supply-chain compromises leading to cloud breaches.

Read full article →


KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

Relevance: ★★★☆☆ (3/5) | Published: Tue, 10 Mar 2026 21:30:00 +0530

Cybersecurity researchers from Black Lotus Labs have uncovered KadNap malware, which targets Asus routers to build a stealthy botnet for proxying malicious traffic, infecting over 14,000 devices since August 2025, with the majority of victims in the U.S. The malware exploits vulnerabilities in edge devices to create a network that can anonymously route various types of illicit activities. While not directly tied to ransomware, such botnets could potentially support initial access or command-and-control operations in broader cyber threats.

Takeaway: Organizations should prioritize vulnerability scanning and firmware updates on edge devices like routers to prevent botnet enlistment, enhancing threat intelligence monitoring for proxy-based anomalies that could precede ransomware attacks.

Read full article →


Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Relevance: ★★★☆☆ (3/5) | Published: Tue, 10 Mar 2026 12:47:00 +0530

Salesforce has issued a warning about threat actors using a modified version of the open-source AuraInspector tool to mass-scan and exploit misconfigurations in publicly accessible Experience Cloud sites. These attacks target overly permissive guest user settings, potentially granting unauthorized access to sensitive data. The company recommends reviewing and tightening these configurations to mitigate risks.

Takeaway: Organizations using Salesforce should audit their Experience Cloud guest user permissions immediately to prevent unauthorized access and integrate this into threat intelligence monitoring for similar cloud misconfiguration exploits.

Read full article →


Can the Security Platform Finally Deliver for the Mid-Market?

Relevance: ★★★☆☆ (3/5) | Published: Mon, 09 Mar 2026 17:15:00 +0530

The article discusses how mid-market organizations are pushing to match enterprise-level security standards amid rising supply chain attack threats, emphasizing that partners and customers now demand proof of robust security to maintain business relationships. It explores whether unified security platforms can finally provide accessible, effective solutions for these mid-sized entities to demonstrate compliance and competitiveness. The piece positions such platforms as key enablers for winning business by simplifying security validation.

Takeaway: Mid-market firms should evaluate unified security platforms to address supply chain risks and meet partner expectations, potentially integrating them with threat intelligence tools for enhanced ransomware preparedness.

Read full article →


Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Relevance: ★★★☆☆ (3/5) | Published: Mon, 09 Mar 2026 15:58:00 +0530

Two Chrome extensions originally developed by BuildMelon turned malicious following an apparent ownership transfer, allowing attackers to push malware, inject arbitrary code, and steal sensitive data from users. The affected extensions, QuickLens and another unnamed one, highlight the risks of supply chain attacks in browser ecosystems where new owners can update code without immediate scrutiny. This incident underscores the importance of vigilance in extension management to prevent downstream infections.

Takeaway: Organizations should regularly audit and monitor browser extensions for ownership changes and suspicious updates to mitigate risks of malware injection in incident response scenarios.

Read full article →


Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

Relevance: ★★★☆☆ (3/5) | Published: Fri, 06 Mar 2026 20:41:00 +0530

The Pakistan-linked hacking group Transparent Tribe is leveraging AI-powered coding tools to generate a large volume of mediocre malware implants in obscure languages like Nim, Zig, and Crystal, aimed at targeting Indian entities. These implants exploit trusted services to evade detection and facilitate espionage activities. This marks another instance of threat actors adopting AI to scale their operations efficiently.

Takeaway: Security teams should enhance threat intelligence monitoring for AI-generated malware in uncommon programming languages to improve detection and response strategies against evolving espionage campaigns.

Read full article →


Kimwolf Botnet Swamps Anonymity Network I2P

Relevance: ★★★☆☆ (3/5) | Published: Wed, 11 Feb 2026 16:08:11 +0000

The Kimwolf IoT botnet has been causing significant disruptions to the I2P anonymity network over the past week by flooding it with traffic to hide its command-and-control servers and evade takedown efforts. I2P, a decentralized encrypted platform for secure communications, experienced slowdowns as botmasters leveraged it for evasion. This highlights how cybercriminals are increasingly using privacy-focused networks to protect their infrastructure.

Takeaway: Threat intelligence teams should monitor anonymity networks like I2P for signs of botnet abuse to enhance detection of evasion tactics in IoT threats.

Read full article →


Who Operates the Badbox 2.0 Botnet?

Relevance: ★★★☆☆ (3/5) | Published: Mon, 26 Jan 2026 16:11:38 +0000

Cybercriminals operating the Kimwolf botnet, which has infected over 2 million devices, recently shared evidence of compromising the control panel for Badbox 2.0, a massive China-based botnet embedded in malicious software on Android TV streaming boxes. This revelation comes amid ongoing investigations by the FBI and Google into Badbox 2.0’s operators. The bragging by Kimwolf’s botmasters provides potential leads on the identities behind Badbox 2.0.

Takeaway: Threat intelligence teams should monitor underground forums for similar braggadocio from botnet operators, as it can reveal interconnections between malware networks and aid in attribution efforts.

Read full article →


Kimwolf Botnet Lurking in Corporate, Govt. Networks

Relevance: ★★★☆☆ (3/5) | Published: Tue, 20 Jan 2026 18:19:13 +0000

The Kimwolf botnet has infected over 2 million IoT devices, compelling them to launch DDoS attacks and relay malicious traffic, while its capability to scan and infect additional devices on local networks poses a significant risk to organizations. New research highlights its unexpected prevalence in government and corporate environments, emphasizing the need for vigilance against such threats. This botnet underscores the ongoing vulnerabilities in IoT ecosystems that allow for rapid propagation and exploitation.

Takeaway: Organizations should enhance IoT device security through regular vulnerability scanning and network segmentation to detect and mitigate botnet infections like Kimwolf before they escalate into broader incidents.

Read full article →


Starbucks discloses data breach affecting hundreds of employees

Relevance: ★★★☆☆ (3/5) | Published: Fri, 13 Mar 2026 04:16:55 -0400

Starbucks has revealed a data breach where threat actors compromised the Starbucks Partner Central accounts of hundreds of employees, potentially exposing sensitive personal and employment data. The company detected the unauthorized access and has since reset affected passwords while offering credit monitoring services to those impacted. No customer data was reported to be involved in the incident.

Takeaway: Organizations should enhance multi-factor authentication and monitor for account takeover attempts to prevent similar employee-targeted breaches.

Read full article →


Google fixes two new Chrome zero-days exploited in attacks

Relevance: ★★★☆☆ (3/5) | Published: Fri, 13 Mar 2026 02:56:58 -0400

Google has issued emergency security updates for Chrome to address two high-severity zero-day vulnerabilities that are actively being exploited in attacks, potentially allowing remote code execution or data theft. The patches are part of Chrome version updates across multiple platforms, urging users to update immediately to mitigate risks. This follows a pattern of recent zero-day disclosures, highlighting ongoing threats to browser security.

Takeaway: Organizations should prioritize immediate updates to Chrome browsers in their environments to prevent exploitation of these zero-days, which could serve as entry points for broader threats like ransomware delivery.

Read full article →


Canadian retail giant Loblaw notifies customers of data breach

Relevance: ★★★☆☆ (3/5) | Published: Thu, 12 Mar 2026 17:32:21 -0400

Canadian retail giant Loblaw has notified customers of a data breach affecting their digital services, prompting the company to automatically log out all users as a precautionary measure to enhance security. Customers must log back in to access services, and Loblaw is working with cybersecurity experts to investigate the incident. While details on the breach’s scope remain limited, no evidence suggests customer data was compromised beyond the unauthorized access.

Takeaway: In incident response, forcing mass logouts and requiring re-authentication can quickly mitigate risks from unauthorized access, serving as a proactive step for threat intelligence teams to monitor and contain breaches.

Read full article →


⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Relevance: ★★☆☆☆ (2/5) | Published: Mon, 09 Mar 2026 19:16:00 +0530

This weekly cybersecurity recap from The Hacker News highlights recent incidents including a Qualcomm zero-day vulnerability, iOS exploit chains, the AirSnitch attack, and Vibe-Coded Malware, noting a mix of attacker successes and defender wins that made for challenging times in the field. It emphasizes the ongoing battle between threats and responses, with some positive outcomes where defensive efforts prevailed. The article underscores the relentless pace of cybersecurity developments, even if the provided content is truncated.

Takeaway: Security teams should monitor emerging vulnerabilities like Qualcomm zero-days and iOS exploits to enhance threat intelligence and inform incident response strategies, potentially integrating detection logic into Go-based tools.

Read full article →


Microsoft: Windows 11 users can’t access C: drive on some Samsung PCs

Relevance: ★★☆☆☆ (2/5) | Published: Fri, 13 Mar 2026 18:11:57 -0400

Microsoft is probing an issue where certain Samsung laptops running Windows 11 lose access to the C: drive and fail to launch applications following the installation of February 2024 security updates. Affected users report error messages indicating inability to access the drive, potentially disrupting normal operations. The problem appears linked to compatibility issues between the updates and Samsung’s hardware or software configurations.

Takeaway: Incident response teams should be aware of this bug to differentiate it from ransomware or malware attacks that similarly restrict drive access, ensuring quick verification against known Microsoft advisories before escalating.

Read full article →