Remote Monitoring and Management (RMM) tools are the backbone of modern IT operations. Security professionals rely on them daily to patch systems, troubleshoot issues, and manage entire networks from anywhere. These tools deliver speed, control, and convenience — qualities every…
Category: Cyber Security News
New ClickFix Attack leverages Windows Terminal for Payload Execution
Cybersecurity researchers have uncovered a new wave of ClickFix attacks that now exploit Windows Terminal to deliver malicious payloads directly onto victim machines. Unlike earlier iterations of this social engineering technique, which relied on the Windows Run dialog, this latest…
Microsoft 365 Outage Hits North America as CDN Misconfiguration Disrupts Multiple Services
Microsoft is actively investigating a service disruption affecting multiple Microsoft 365 products for users in the North American region, with engineers pointing to Content Delivery Network (CDN) configuration issues as the likely root cause. The incident, tracked in the Microsoft…
OpenAnt – AI Based vulnerability Scanner to Detect Vulnerabilities
OpenAnt is an open-source, LLM-based vulnerability discovery tool designed to help security teams and open-source maintainers proactively identify verified security flaws with minimal false positives and false negatives. Released under the Apache 2.0 license, OpenAnt is available on GitHub and…
China-Nexus Hackers Attacking Telecommunication Providers With New Malware
A China-linked advanced persistent threat actor has been actively targeting telecommunications providers across South America since 2024, deploying three new malware implants to gain deep access into critical network infrastructure. The group, tracked as UAT-9244, operates against both Windows and…
Apache ActiveMQ Allow Attackers to Trigger DoS Attacks With Malformed Packets
A medium-severity flaw in ActiveMQ (CVE-2025-66168, CVSS 5.4) allows authenticated attackers to trigger a Denial-of-Service (DoS) using malformed network packets. The issue was initially discovered by security researcher Gai Tanaka and confirmed on the Apache mailing list by maintainers Christopher…
WordPress Membership Plugin Vulnerability Let Attackers Create Admin Accounts
A critical security flaw, identified as CVE-2026-1492, has been found in the User Registration & Membership plugin for WordPress. This vulnerability allows unauthenticated attackers to bypass security controls and create administrator accounts, leading to a complete website takeover. The User Registration & Membership plugin helps website owners create…
New Android Mirax Bot Advertised on Cybercriminal Forums Claiming Advanced Capabilities
A new Android banking malware called Mirax Bot has surfaced on underground cybercriminal forums, with a threat actor actively promoting it as a powerful tool built specifically for financial fraud. Sold under a Malware-as-a-Service (MaaS) model, the bot is offered…
Amazon AWS-LC Vulnerabilities Allows Attackers to Bypass Certificate Chain Verification
A critical security bulletin addressing three distinct vulnerabilities in AWS-LC, its open-source, general-purpose cryptographic library. Published on March 2, 2026, the disclosure highlights a flaw that allows unauthenticated attackers to bypass certificate chain verification and exploit timing side-channels. If left…
FBI Arrested U.S. Government Contractor Who Allegedly Stole More than $46 Million
On March 4, 2026, a major international law enforcement operation led to the capture of John Daghita, a U.S. government contractor. Daghita is accused of a massive insider theft, allegedly stealing more than $46 million in cryptocurrency from the United…
Phishing Emails Push Fake ChatGPT and Gemini iOS Apps To Steal Logins
A sophisticated phishing campaign is targeting iPhone users by impersonating two of the world’s most trusted AI brands — OpenAI’s ChatGPT and Google’s Gemini. The attackers are sending out deceptive emails designed to lure recipients into downloading fake applications from…
Google Confirms 90 Zero-Day Vulnerabilities Actively Exploited in 2025
The Google Threat Intelligence Group (GTIG) released its annual analysis, confirming that 90 zero-day vulnerabilities were actively exploited in the wild throughout 2025. While this marks a slight decrease from the record 100 zero-days in 2023, it represents a noticeable…
Hackers Can Use Indirect Prompt Injection Allows Adversaries to Manipulate AI Agents with Content
Artificial intelligence tools are now a core part of everyday workflows — from browsers that summarize web pages to automated agents that help users make decisions online. As these tools become more capable, attackers are learning how to turn them…
PoC Exploit Released Cisco SD-WAN 0-Day Vulnerability Exploited in the Wild
A public proof-of-concept (PoC) exploit has been released for CVE-2026-20127, a maximum-severity zero-day vulnerability in Cisco Catalyst SD-WAN Controller and SD-WAN Manager that has been actively exploited in the wild since at least 2023. Cisco Talos is tracking the threat activity…
OpenAI Launches GPT-5.4 With Advanced Reasoning, Coding, and Computer-Use Capabilities
OpenAI on March 5, 2026, released GPT-5.4, its most capable and efficient frontier model to date, combining advanced reasoning, coding, and agentic workflows into a single unified system. The model is rolling out across ChatGPT (as GPT-5.4 Thinking), the API,…
Suspected DPRK Threat Actors Compromise Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
A coordinated campaign targeting cryptocurrency organizations has drawn attention from the security community, with evidence pointing to threat actors potentially linked to North Korea’s state-sponsored hacking operations. The attackers moved systematically across multiple tiers of the crypto supply chain —…
Threat Actors Use New RingH23 Arsenal to Compromise MacCMS and CDN Infrastructure at Scale
A cybercriminal group known as Funnull — previously sanctioned by the U.S. Treasury — has returned with a dangerous new toolkit called RingH23, silently compromising CDN nodes and poisoning the MacCMS content management system to redirect millions of users to…
Threat Actors Using Fake Claude Code Download to Deploy Infostealer
Cybercriminals have found a new way to target developers and IT professionals by setting up fake download pages that impersonate Claude Code, a legitimate AI coding assistant. These deceptive pages trick users into downloading what appears to be an official…
ClickFix Campaign Uses Fake VCs on LinkedIn to Deliver Malware to Crypto and Web3 Professionals
A coordinated malware campaign is targeting cryptocurrency and Web3 professionals through a carefully built chain of social engineering, fake venture capital identities, and spoofed video conferencing links. First tracked in early 2026, the operation uses a technique called ClickFix to…
New MongoDB Vulnerability Lets Hackers Crash Any MongoDB Server
A high-severity vulnerability, CVE-2026-25611 (CVSS 7.5), has been discovered in MongoDB, allowing unauthenticated attackers to crash exposed servers using minimal bandwidth. According to Cato CTRL, it affects all MongoDB versions where compression is enabled (v3.4+, on by default since v3.6),…