Botnet exploits surge, Apple warns of iPhone hacks, Telnet RCE flaw found, major breaches exposed, EU sanctions cyber actors, and espionage activity expands. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.03.19
Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics
A well-known banking trojan called Horabot has resurfaced in an active campaign targeting users across Mexico, combining a multi-stage infection chain with an email worm that turns every compromised machine into a phishing relay. The threat bundles a Delphi-based banking…
Claude Vulnerabilities Allow Data Exfiltration and User Redirection to Malicious Sites
Three chained vulnerabilities in Claude.ai, Anthropic’s widely used AI assistant, that together allow attackers to silently exfiltrate sensitive conversation data and redirect unsuspecting users to malicious websites, all without requiring any integrations, tools, or MCP server configurations. The vulnerability chain,…
Malicious ‘Pyronut’ Package Backdoors Telegram Bots With Remote Code Execution
A malicious Python package named pyronut has been discovered on the Python Package Index (PyPI), targeting developers who build Telegram bots by impersonating the popular pyrogram framework. Rather than relying on typosquatting — where a name resembles a legitimate one — the threat actor…
‘Vibe-Coded’ Malware Campaign Uses Fake Tools, CDNs and File Hosts to Infect Users
The rise of AI-assisted coding has brought real value to developers around the world, but it has also opened a new door for cybercriminals to exploit. A concept known as “vibe coding” — where users simply describe what they want…
Entro Security AGA brings governance and control to enterprise AI agents and access
Entro Security has launched its Agentic Governance & Administration (AGA), a new pillar of the Entro platform designed to help security and identity teams govern AI agents and AI access across enterprise systems. Applied to the new realities of AI-driven…
Discern deploys six AI agents to streamline security analysis, prioritization, and remediation
Discern Security has introduced new agentic AI capabilities across its proactive security platform, designed to help security teams move faster from data to action. As environments become more complex and security teams face growing tool sprawl, fragmented workflows, and too…
Cobalt adds continuous pentesting AI capabilities to scale offensive security and real-world risk
Cobalt has released new AI capabilities for continuous pentesting. Delivered through the Cobalt Offensive Security Platform, these next-generation components integrate AI with human pentesters and more than a decade of proprietary pentesting intelligence to accelerate the speed, scale, and depth…
IT Security News Hourly Summary 2026-03-19 15h : 11 posts
11 posts were published in the last hour 13:32 : CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026 13:32 : 5 Best Rootkit Scanners and Removers: Anti-Rootkit Tools in 2026 13:32 :…
CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026
Austin, United States, 19th March 2026, CyberNewswire This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA…
5 Best Rootkit Scanners and Removers: Anti-Rootkit Tools in 2026
Rootkit scanners identify stealthy malware that hides by manipulating the operating system. Compare the top rootkit scanners for 2026. The post 5 Best Rootkit Scanners and Removers: Anti-Rootkit Tools in 2026 appeared first on eSecurity Planet. This article has been…
Consumer-focused privacy company Cloaked raises $375M as it expands to enterprise
Cloaked’s latest round is a mix of equity and growth funding. This article has been indexed from Security News | TechCrunch Read the original article: Consumer-focused privacy company Cloaked raises $375M as it expands to enterprise
Russian APT Exploits Zimbra Vulnerability Against Ukraine
Insufficient sanitization of CSS content within HTML emails leads to inline script execution when the message is opened in a browser. The post Russian APT Exploits Zimbra Vulnerability Against Ukraine appeared first on SecurityWeek. This article has been indexed from…
Hacker Conversations: Ben Harris, from Unintentional Young Hacker to Intentional Adult CEO
Harris is a hacker with a rebellious spirit and a willingness to break rules in the pursuit of his purpose – but without causing harm or damage. The post Hacker Conversations: Ben Harris, from Unintentional Young Hacker to Intentional Adult…
Komodor unveils Klaudia AI extensibility framework to power multi-agent incident resolution
Komodor has unveiled a new extensibility framework that transforms its Klaudia AI technology into a universal multi-agent platform for troubleshooting and optimizing the performance of complex cloud native infrastructures and applications. This new architecture enables organizations to extend Klaudia AI…
New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
Cybersecurity researchers have disclosed a new Android malware family called Perseus that’s being actively distributed in the wild with an aim to conduct device takeover (DTO) and financial fraud. Perseus is built upon the foundations of Cerberus and Phoenix, at…
SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft
Austin, TX, USA, 19th March 2026, CyberNewswire This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft
CISA Calls on Organizations to Strengthen Microsoft Intune Security After Stryker Incident
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert calling on organizations to aggressively harden their endpoint management systems. Released on March 18, 2026, the critical warning follows a significant cyberattack against U.S.-based medical technology provider Stryker…
The Agentic Era Arrives: How AI Is Transforming the Cyber Threat Landscape
The cyber security landscape is undergoing a significant shift. Between January and February 2026, we observed a major evolution in how threat actors adopt, weaponize, and operationalize AI. What was once experimental is now mature. What once required coordinated teams can now be executed…
A DarkSword hangs over unpatched iPhones
Researchers have identified multiple state-level attacks using DarkSword, a chain of vulnerabilities, to infect unpatches iPhones. This article has been indexed from Malwarebytes Read the original article: A DarkSword hangs over unpatched iPhones
Fake Tools and CDNs Power New “Vibe-Coded” Malware Campaign
‘Vibe coding’ has moved from buzzword to battleground, and a new malware campaign shows how attackers are abusing AI-assisted development to scale their operations with minimal effort. Vibe coding, a term popularized in early 2025 to describe programming by prompting…
Claude Vulnerabilities Allow Data Exfiltration and Malicious Redirect Attacks
Security researchers recently uncovered a critical attack chain within Anthropic’s Claude.ai platform. Dubbed “Claudy Day,” this vulnerability sequence allows attackers to silently extract sensitive user data through prompt manipulation and malicious redirects. The exploit requires no external integrations or specialized…
Tackling the Uncontrolled Growth of AI Agents in Modern SaaS Environments
By 2026, AI agent sprawl has become a critical SaaS security risk. With 80% of organizations reporting unintended agent actions, the “visibility gap” is the new frontier for cyber threats. Learn how to govern autonomous agents using comprehensive inventories, permission…
Teleport announced Beams, wants to remove major barrier to agentic AI
Teleport today announced Beams, a trusted runtime designed to solve the security and IAM challenges blocking teams from designing and running AI agents in production infrastructure. Beams runs each agent in an isolated Firecracker VM with built-in identity. Each Beam…