Category: TheHackerNews

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
09
Mar
2026

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

Ravie LakshmananMar 03, 2026Malware / Phishing The threat activity cluster known as SloppyLemming has been attributed to a fresh set…

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
09
Mar
2026

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Ravie LakshmananMar 03, 2026Vulnerability / Mobile Security Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm…

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
09
Mar
2026

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Ravie LakshmananMar 03, 2026Phishing / Malware Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL…

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
09
Mar
2026

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor…

AI Agents: The Next Wave Identity Dark Matter
08
Mar
2026

AI Agents: The Next Wave Identity Dark Matter

The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push…

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
08
Mar
2026

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

Ravie LakshmananMar 03, 2026Vulnerability / Artificial Intelligence The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet…

The 3 Steps CISOs Must Follow
08
Mar
2026

The 3 Steps CISOs Must Follow

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real…

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
08
Mar
2026

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support…

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
08
Mar
2026

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

Ravie LakshmananMar 04, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently…

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
08
Mar
2026

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Ravie LakshmananMar 04, 2026Malware / Windows Security Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed…

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
08
Mar
2026

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Ravie LakshmananMar 04, 2026Threat Intelligence / Application Security Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities…

New RFP Template for AI Usage Control and AI Governance 
08
Mar
2026

New RFP Template for AI Usage Control and AI Governance 

The Hacker NewsMar 04, 2026Artificial Intelligence / SaaS Security As AI becomes the central engine for enterprise productivity, security leaders…