A newly discovered Android remote access trojan (RAT) called Oblivion RAT is raising concerns across the mobile threat landscape. Marketed as a malware-as-a-service (MaaS) platform, it is sold on cybercrime forums with subscription plans starting at $300 per month. Unlike…
Iran-linked actors use Telegram as C2 in malware attacks on dissidents
Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft. The FBI warns that Iran’s Ministry of Intelligence and Security (MOIS) runs cyber campaigns using Telegram as a command-and-control infrastructure to deliver…
CISA Warns of Apple Vulnerabilities Linked to DarkSword iOS Exploit Chain Exploited in Attacks
An urgent warning regarding three critical Apple vulnerabilities that threat actors are actively exploiting in the wild. These security flaws, officially tracked as CVE-2025-31277, CVE-2025-43510, and CVE-2025-43520, were recently added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. Security researchers have…
New CanisterWorm Steals npm Tokens and Spreads Through Compromised Publisher Accounts
A new wave of supply chain attacks is hitting the npm ecosystem through a self-propagating malware campaign known as CanisterWorm. The threat, linked to a group tracked as “TeamPCP,” compromises legitimate publisher namespaces and pushes poisoned package versions, effectively turning…
Proofpoint unifies email, data, and AI security to reduce enterprise blind spots
Proofpoint has unveiled innovations across its Collaboration Security and Data Security portfolios, strengthening protection for the agentic workspace, where people and AI agents interact across communication and data environments to execute business-critical work. As organizations deploy AI assistants and autonomous…
KeeThief
GhostPack tool for extracting KeePass 2.X key material from memory and interacting with the KeePass trigger system. This article has been indexed from CyberMaterial Read the original article: KeeThief
Zero Networks Kubernetes Access Matrix exposes hidden access paths and blast radius
Zero Networks has announced the Kubernetes Access Matrix, a real time visual map that exposes every allowed and denied rule inside Kubernetes clusters. The new capability enables security and DevOps teams to see, understand, and control Kubernetes access at scale,…
Russian hackers go after high-value targets through Signal
Russian intelligence-linked hackers are targeting commercial messaging platforms, with Signal a primary focus, the FBI and CISA warn. The campaign is aimed at individuals of intelligence interest, including government personnel, journalists, and others with access to sensitive communications. It is…
Zluri addresses expanding identity attack surface across SaaS, cloud, and AI
Enterprise identity is undergoing a fundamental shift. Employees are no longer the only identities operating inside organizations. Service accounts, machine identities, application integrations, and AI agents now interact with enterprise systems at scale, accelerating the growth of non-human identities and…
Operation Alice Takes Down 370,000+ Dark Web Sites
German-led policing effort against fraud operation disrupts countless CSAM and cybercrime sites This article has been indexed from www.infosecurity-magazine.com Read the original article: Operation Alice Takes Down 370,000+ Dark Web Sites
Huawei Sees AI Agent Boost To GPU, CPU Businesses
Huawei positions AI accelerators, general-purpose GPUs to benefit from rapid adoption of AI agents, amid global OpenClaw frenzy This article has been indexed from Silicon UK Read the original article: Huawei Sees AI Agent Boost To GPU, CPU Businesses
Most Secure Cloud Storage for Privacy & Protection
Cloud storage has tons of benefits, but not all have great security. Discover which cloud storage providers have the best security. The post Most Secure Cloud Storage for Privacy & Protection appeared first on eSecurity Planet. This article has been…
International police Operation Alice take down 373,000 dark web sites exploiting children
Operation Alice: Police dismantle a massive dark web network with 373,000 fake sites luring users seeking child sexual abuse material. An international law enforcement operation, code named Operation Alice, shut down one of the largest dark web scams, uncovering over…
Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments. The last known clean release of Trivy on Docker Hub is 0.69.3. The malicious versions 0.69.4,…
Orkney Broadband Outage Declared ‘Major Incident’
Outage affecting hundreds in northern Orkney islands caused by damage to subsea cable, will require specialist ship to fix, says BT This article has been indexed from Silicon UK Read the original article: Orkney Broadband Outage Declared ‘Major Incident’
Amazon’s Bezos Raising $100bn To Revamp Manufacturing With AI
Amazon founder Jeff Bezos reportedly in talks to create $100bn buyout fund to remodel complex manufacturing businesses around AI This article has been indexed from Silicon UK Read the original article: Amazon’s Bezos Raising $100bn To Revamp Manufacturing With AI
Critical QNAP QVR Pro Flaw Could Let Remote Attackers Access Systems
QNAP has released an urgent security advisory regarding a critical vulnerability affecting its QVR Pro application, a widely deployed network video surveillance solution. Disclosed on March 21, 2026, under the security advisory identifier QSA-26-07, this severe security flaw could allow…
Copyright-Themed Lures Deliver Multi-Stage PureLog Stealer in New Credential Theft Campaign
A new malware campaign is targeting organizations across healthcare, government, education, and hospitality sectors using cleverly disguised copyright violation notices to deliver PureLog Stealer, a powerful information-stealing malware. The campaign, first analyzed in March 2026, tricks victims into executing a…
Trivy Supply Chain Attack Spreads via Compromised Docker Hub Images
The ongoing supply chain attack targeting Aqua Security’s Trivy ecosystem has escalated, with new compromised Docker images discovered on Docker Hub. According to Socket’s analysis, two new Docker image tags, 0.69.5 and 0.69.6, were published on March 22 without corresponding…
$30 IP-KVM Flaws Could Enable BIOS-Level Enterprise Network Attacks
Recent threat research reveals a severe security crisis affecting low-cost IP-KVM devices. Security experts discovered nine vulnerabilities across four popular vendors, transforming these cheap management tools into powerful attack platforms. Compromising a single KVM device grants an attacker complete physical-level…
Building a Layered Security Stack: Identity, Network and Device Protection
Build a layered security stack with identity network and device protection using MFA SSO VPN and endpoint tools to reduce cyber risks. The post Building a Layered Security Stack: Identity, Network and Device Protection appeared first on Security Boulevard. This…
IT Security News Hourly Summary 2026-03-23 09h : 8 posts
8 posts were published in the last hour 7:34 : A week in security (March 16 – March 22) 7:34 : Deceptive VPN Websites Become Gateway for Corporate Data Theft 7:34 : Booz Allen’s Vellox brings AI vs. AI defense…
A week in security (March 16 – March 22)
A list of topics we covered in the week of March 16 to March 22 of 2026 This article has been indexed from Malwarebytes Read the original article: A week in security (March 16 – March 22)
Deceptive VPN Websites Become Gateway for Corporate Data Theft
The financial motivation of a threat group tracked by Microsoft as Storm-2561 has been quietly exploiting the familiarity of enterprise VPN ecosystems in a campaign intended to demonstrate how easy it is to weaponize trust in routine IT processes. …