TeamPCP’s destructive run of supply chain breaches has stopped, for now: it has been three days since the group published malicious versions of Telnyx’s SDK on PyPI, and there haven’t been reports of new open-source project compromises. Partnership with emerging…
Category: EN
Citrix NetScaler products confirmed to be under exploitation
Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign. This article has been indexed from Cybersecurity Dive – Latest News Read the original article:…
New Homoglyph Attack Techniques Help Cybercriminals Spoof Trusted Domains
Cybercriminals have found a clever way to trick people by swapping real letters in website addresses with characters that look almost the same. These are called homoglyph attacks, and they are becoming a growing problem across the internet. A single…
Passkeys Hit Critical Mass: Microsoft Auto-Enables for Millions, 87% of Companies Deploy as Passwords Near End-of-Life
March 2026 marks passwordless tipping point: Microsoft forces passkey migration, regulatory deadlines hit, and adoption surges to 69% of consumers. The post Passkeys Hit Critical Mass: Microsoft Auto-Enables for Millions, 87% of Companies Deploy as Passwords Near End-of-Life appeared first…
Newly observed malware campaign likely combines AI and ClickFix
Using the techniques in tandem helps hackers evade detection, a security firm said. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Newly observed malware campaign likely combines AI and ClickFix
TeamPCP Supply Chain Campaign: Update 004 – Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
This is the fourth update to the TeamPCP supply chain campaign threat intelligence report, ”When the Security Scanner Became the Weapon” (v3.0, March 25, 2026). Update 003 covered developments through March 28, including the first 48-hour pause in new compromises and the…
It’s a mystery … alleged unpatched Telegram zero-day allows device takeover, but Telegram denies
A critical Telegram flaw could allow zero-click remote code execution on devices, but Telegram denies it. Researcher Michael DePlante (@izobashi) of TrendAI Zero Day disclosed a new Telegram vulnerability through Zero Day Initiative (ZDI). The vulnerability, tracked as ZDI-CAN-30207 (CVSS…
New macOS security feature will alert users about possible ClickFix attacks
Apple introduced an extra layer of protection against ClickFix attacks, only for macOS Tahoe 26.4 and later This article has been indexed from Malwarebytes Read the original article: New macOS security feature will alert users about possible ClickFix attacks
Security Alerts or Scams? How to Spot Fake Login Warnings and Protect Your Accounts
Your phone buzzes with a notification: “Unusual login activity detected on your account.” It’s enough to make anyone uneasy. But is it a genuine alert about a hacking attempt, or could the message itself be a trap? Notifications from…
AI-Driven Phishing Campaign Exploits Railway to Breach Microsoft Cloud Accounts at Scale
Security experts at Huntress report a fast-changing phishing operation using AI tools and cloud systems to breach Microsoft accounts in hundreds of companies. This activity ties back to improper use of Railway, a service that helps people launch apps…
Iran-Linked Hackers Breach FBI Director Kash Patel’s Email, Leak Messages Online
Iran-linked hackers breached FBI Director Kash Patel’s personal email, leaking older messages in a retaliatory cyberattack with no classified data exposed. The post Iran-Linked Hackers Breach FBI Director Kash Patel’s Email, Leak Messages Online appeared first on TechRepublic. This article…
BlankGrabber Stealer Uses Fake Certificate Loader to Hide Malware Delivery Chain
A Python-based information stealer known as BlankGrabber has been caught using a deceptive certificate loader trick to hide a multi-stage malware delivery chain. First identified in 2023, this threat has grown more complex over time and keeps targeting everyday users…
Open VSX’s New Scanner Vulnerability Allows Malicious Extension Goes Live
A serious security flaw was recently found in Open VSX, the extension marketplace used by popular code editors like Cursor and Windsurf, as well as the broader VS Code fork ecosystem. The vulnerability was found inside the platform’s newly introduced…
Hackers Backdoor Telnyx Python SDK on PyPI to Steal Cloud and Dev Credentials
A widely used Python package was quietly turned into a weapon, and most developers who got hit had no idea it happened. On March 27, 2026, a threat actor known as TeamPCP uploaded two malicious versions of the Telnyx Python…
Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control
LLMs can write complex Rego and Cedar code in seconds, but a single missing condition or hallucinated attribute can quietly dismantle your organization’s least-privilege security model. The post Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control appeared first…
Healthcare IT Platform CareCloud Probing Potential Data Breach
The company has disclosed a cybersecurity incident involving one of its electronic health record environments. The post Healthcare IT Platform CareCloud Probing Potential Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
3 SOC Process Fixes That Unlock Tier 1 Productivity
What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come from fragmented workflows, manual triage steps, and limited visibility early…
⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More
Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and research that stopped being theoretical right around the time defenders…
Cyber Briefing: 2026.03.30
A wave of global cyber incidents highlights escalating threats—from nation-state campaigns and ransomware attacks to major breaches, exploit warnings, and regulatory crackdowns impacting governments, This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.03.30
Stryker restores most manufacturing after cyberattack
The medtech company has been working to restore manufacturing, ordering and shipping operations since it was hit by a cyberattack on March 11. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Stryker restores…