HomeWeekly DigestsThis Week
LiveThreat Threat Intelligence

Weekly Threat Intelligence Digest — Mar 23 to Mar 30, 2026

Weekly threat intelligence digest from 449 items (32 critical, 233 high).

📅 March 30, 2026 📊 449 articles analyzed
LIVETHREAT WEEKLY THREAT DIGEST March 23 – March 30, 2026 This week reinforced a shift we’ve been tracking: attackers are bypassing traditional perimeters by hijacking trusted third‑party accounts and privileged services. From the ShinyHunters exfiltration of EU Commission data via a cloud host to the LiteLLM and Trivy supply‑chain backdoors that silently stole cloud tokens, the common thread is exploitation of vendor‑owned access rather than novel vulnerabilities. Ransomware groups continue to target MSPs and SaaS admin consoles, amplifying downstream impact across hundreds of downstream customers. The net result is a wave of data loss and service disruption that spreads through the supply chain faster than any patch cycle. 👉 Access, not vulnerability, is now the primary risk driver 🚨 EXECUTIVE RISK SNAPSHOT * Supply‑chain entry points dominate → MSPs, CI/CD tools, SaaS admin consoles, and cloud hosting providers were primary compromise paths. * Privileged credentials amplify impact → One compromised admin account led to 350 GB of EU data loss, 6.8 M Crunchyroll records, and credential harvest across multiple vendors. * Visibility gaps persist → Many incidents (e.g., API provider LiteLLM, container scanner Trivy) were invisible until after exploitation, highlighting blind spots in vendor inventories. 🔍 WHAT CHANGED THIS WEEK * Surge in third‑party dependency exploits – LiteLLM, Trivy, and Checkmarx were compromised via stolen CI/CD tokens. * Credential‑theft attacks on SaaS SSO accounts (Okta, Microsoft Entra) used to pivot into partner environments. * Ransomware targeting MSPs and managed services to achieve multi‑vendor reach, as seen in Bearlyfy and Trio‑Tech cases. * Active exploitation of newly disclosed zero‑days (Langflow, Azure MCP) within hours of advisory release. 🎯 WHERE YOU ARE MOST LIKELY EXPOSED * Cloud hosting providers with shared admin accounts (e.g., AWS, Azure, EU Europa.cloud). * API and AI platform providers (LiteLLM, Langflow, Anthropic, OpenAI) that integrate third‑party code. * CI/CD pipelines and container‑scanning tools (Aqua Trivy, GitHub Actions, Checkmarx) used across development lifecycles. * Managed service providers and BPOs (Telus International, other MSPs) that hold privileged SSO credentials. * Legacy IoT and OT devices (WAGO switches, industrial routers) still exposed to remote exploits. ⚡ WHAT TPRM LEADERS SHOULD DO THIS WEEK 1. Audit privileged access across all third‑party relationships • Request a full list of admin, service‑account, and API‑key holders from each vendor. • 👉 Ask: “Which of your staff or sub‑vendors have direct access to our cloud or SaaS environments?” 2. Verify supply‑chain integrity of third‑party code and tools #Cybersecurity #TPRM #VendorRisk #SupplyChainSecurity #ThreatIntel #LiveThreat #VerisqAI

📋 Articles Referenced in This Digest 449 items

📋 Advisory (189)

HighApple issues urgent lock screen warnings for unpatched iPhones and iPads
HighAI Agents Redefine Enterprise Cybersecurity Risk
HighAI Is Outpacing Enterprise Security Controls
HighISMG Editors: Panel Wraps Up RSAC 2026 on AI, OT Risks
HighEuropean Parliament rejects extension of CSAM scanning rules for tech platforms
HighApple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits
HighGoogle's 2029 Quantum Deadline Is a Wake-Up Call
HighUS Treasury Weighs Cyber Insurance Backstop
HighEurope Girds for Looming IoT Security Regulations
HighGoogle Sets 2029 Deadline as Quantum Computers Threaten Encryption
HighDutch court threatens xAI with fines over Grok's nonconsensual nude images
HighUK weighs new limits on political donations as reports warn of hard-to-trace foreign interference
HighFor Financial Services, a Wake-Up Call for Reclaiming IAM Control
HighAutomotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles
HighAI-Powered Dependency Decisions Introduce, Ignore Security Bugs
HighMission to smuggle $170 million worth of AI tech to China collapsed for three men
HighEU investigating Snapchat and pornography sites in child safety crackdown
High Landmark verdicts put Meta’s “addiction machine” platforms on trial
HighWho owns AI agent access? At most companies, nobody knows
HighCISA's acting chief warns shutdown is increasing cyber risks, causing resignations
HighUS Bans New Foreign-Made Home Routers Over National Security Fears
HighSen. Wyden Warns of Another Section 702 Abuse
HighCISA Forced Into 'Reactive' Cyber Posture Amid Shutdown
HighWhy CISOs Need to Start Taking AI Third-Party Risk Seriously
HighUK cyber chief urges ‘full court press’ to counter rising cyber threats
HighFCC targets foreign router imports amid rising cybersecurity concerns
HighFCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns
HighUS Bans New Foreign-Made Routers, Citing ‘Unacceptable’ Security Risks
HighYour security stack looks fine from the dashboard and that’s the problem
HighFCC bans new routers made outside the USA over security risks
HighFCC bans foreign-made routers from US market over ‘unacceptable risk’
HighVibe coding could reshape SaaS industry and add security risks, warns UK cyber agency
HighUS FCC Targets Foreign Routers in Supply-Chain Crackdown
HighBuying a router? A new US ban just shrank your choices - here's why
HighI cracked open cheap charging gadgets from Temu - and it was worse than I expected
High32% of top-exploited vulnerabilities are over a decade old
HighUncle Sam closes the door on all new foreign-made routers
HighThe End of Static Security: Why AI Demands Real-Time Microsegmentation
High1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now
HighMicrosoft Exchange Online service change causes email access issues
HighWindows 11 Patch Triggers Sign-In Failures Across Microsoft Apps
HighThe Broken Physics of Remediation
Medium5 reasons you should be more tight-lipped with your chatbot (and how to fix past mistakes)
MediumIs the FCC's Router Ban the Wrong Fix?
MediumThe Next Identity Shift
MediumGoogle races to secure encryption before quantum threats arrive
MediumReddit declares war on bad bot activity
MediumGitHub jumps on the bandwagon and will use your data to train AI
MediumApple rolls out age verification to UK iPhone users
MediumYour facilities run on fragile supply chains and nobody wants to admit it
Medium New FCC router ban could leave home networks less secure
MediumBlame Game: Why Public Cyber Attribution Carries Risks
MediumAnthropic trims action approval loop, lets Claude Code make the call
MediumUK pilot program to test social media restrictions on families before government decides on ban
MediumThe AI safety conversation is focused on the wrong layer
MediumGoogle Reinvents Android Sideloading to Thwart Scammers
MediumAI in the SOC: What Could Go Wrong?
Medium3 ways Cisco's DefenseClaw aims to make agentic AI safer
MediumAstrix advances AI agent security platform to govern shadow and enterprise agents
MediumWhy Your Weather-Powered Design Tool Needs More Than Just an API Key
MediumNew KB5085516 emergency update fixes Microsoft account sign-in
LowIf Microsoft really wants to fix Windows 11, it should do these four things ASAP
InformationalWhere AI Labs Will and Won't Disrupt Cybersecurity
InformationalWhat Happens When AI Stops Being Artificially Cheap
LowBest Amazon Spring Sale tablet deals 2026
LowBest Buy is selling last year's LG OLED TV for 50% off right now - and I highly recommend it
LowI've tested every MacBook Air in recent years - here's why the time to upgrade is now
InformationalThese RayNeo XR glasses effectively replaced my TV with HDR support - and they're on sale
InformationalSymantec CBX Rocked RSAC 2026 Conference
InformationalHow Microsoft Defender protects high-value assets in real-world attack scenarios
InformationalGoogle Sets 2029 Deadline for Quantum-Safe Cryptography
LowWhy Noi may be the best way to run ChatGPT and Claude side-by-side on your desktop
InformationalHow NiCE Cognigy envisions the human-agent balancing act for delivering top customer service
LowGemini just made it super easy for you to switch from ChatGPT  - here's how
LowI didn't have to drill these renter-friendly smart lights into my wall - and I love them for it
InformationalWindows 11 KB5079391 update rolls out Smart App Control improvements
InformationalISMG Editors: AI Security, Risk and Readiness Trends at RSAC
InformationalA puppet made me cry and all I got was this t-shirt
InformationalThe best $5 I've spent this year is on these breakaway USB-C connectors that overdeliver
LowWhatsApp's March update finally fixes the big iPhone-to-Android concern (and more)
LowThis quirky little device solved my biggest gripe with my Apple Watch
InformationalTails 7.6 ships automatic Tor bridge retrieval and a new password manager
InformationalTop product launches at RSAC 2026
InformationalMake OpenAI’s models misbehave and earn a reward
InformationalAcalvio ShadowPlex Review: Deception-Based Preemptive Cybersecurity
InformationalBest AI Security Solutions for Enterprises in 2026
InformationalAs the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters
LowWhatsApp rolls out more AI features, iOS multi-account support
LowUniversity of North Georgia Triumphs in DOD Hacking Contest
InformationalPentagon Piloting Skills-Based Assessments for Cyber Workers
InformationalTalos Takes: 2025 insights from Talos and Splunk
InformationalHow Organizations Can Use Blunders to Level Up Their Security Programs
LowYouTube Premium cost me 30% extra for months until I noticed - check your plan ASAP
LowAI SOC vendors are selling a future that production deployments haven’t reached yet
InformationalDataBahn brings AI-driven intelligence into the security pipeline
LowDeduplication, done right: Full control, full context, one entity
InformationalDisarming disinformation: How EclecticIQ helps you analyze and track influence operations with the DISARM Framework
LowFree TIP Bundles to test, validate, and operationalize threat intelligence faster
InformationalIntroducing Intelligence Center 3.7: Faster decisions with clearer context across defense and enterprise
Informational[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
InformationalRSAC 2026 Proved the Industry Agrees on the Problem — Now Comes the Hard Part
InformationalAt RSAC, the EU Leads While US Officials Are Sidelined
LowThis digital photo frame is my favorite gift to give (and it's on sale)
InformationalI stopped stressing about public Wi-Fi after using this pocket router - why it works
LowiOS 26.4 brings meaningful upgrades to your iPhone - including a long-awaited keyboard fix
InformationalUnbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair
InformationalHow AI Translation Fixes Multilingual Content Chaos
InformationalBest Klaviyo Alternatives for Revenue Growth and Advanced Analytics
LowKali Linux 2026.1 released with 8 new tools, new BackTrack mode
InformationalGitHub adds AI-powered bug detection to expand security coverage
Low4 Best Free VPNs in 2026
InformationalInside RSA 2026: Security Leaders Grapple With AI’s Growing Role and Risks
InformationalCSA Launches CSAI Foundation for AI Security
InformationalEx-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks
InformationalWhy a 'Near Miss' Database Is Key to Improving Information Sharing
LowBest Walmart deals to compete with Amazon's Big Spring Sale 2026
LowSony's new theater system lets you upgrade your TV setup gradually - how it works
InformationalStop telling AI your secrets - 5 reasons why, and what to do if you already overshared
InformationalThis tiny device quietly monitors your home for electrical hazards - and it's on sale
Informational5 ways to use AI when your budget is tight
InformationalWine 11 might be the tipping point that finally pushes gamers from Windows to Linux
InformationalWhat is antivirus software and do you still need it in 2026?
InformationalCodenotary introduces AgentX for autonomous Linux infrastructure security
InformationalMicrosoft hands Entra ID users new option for MFA
InformationalNjordium AI blocks fake invoices and fraudulent payments
InformationalDigiCert Document Trust Manager enhancements improve document security and compliance
InformationalVorlon adds forensics and response to secure AI agents
InformationalCyber Legends: Behinds the Scenes of CBX
InformationalISC Stormcast For Wednesday, March 25th, 2026 https://isc.sans.edu/podcastdetail/9864, (Wed, Mar 25th)
InformationalAnatomy of a Cyber World Global Report 2026
InformationalTurning Security Operations Over to AI Requires Trust
Informational78% Security Leaders Highlight the Urgent Need to Rethink Cyber Risk in an AI-Driven World
LowDoes your Android Auto keep disconnecting? What to do about it - for now
Informational5 ways to harden your network against the new speed of AI attacks
LowMicrosoft may finally remove its frustrating Windows 11 setup requirement
LowThis is the one smart home product everyone should have, and it's on sale
InformationalKali Linux 2026.1 ships BackTrack mode, eight new tools, and a kernel upgrade to 6.18
InformationalWhy your phishing simulations aren’t building a security culture
InformationalYou don’t have to choose between BAS or automated pentesting, you shouldn’t
InformationalAll AI and Security Teams Need Transparent Data Pipelines
InformationalUnderstanding Wiz’s Approach to Securing the AI Supply Chain
InformationalVibe check: AI may replace SaaS (but not for a while)
InformationalNCSC CEO: Seize 'disruptive' vibe coding opportunity to make software more secure
InformationalZero Trust: Bridging the Gap Between Authentication and Trust
LowMicrosoft fixes bug causing Classic Outlook sync issues with Gmail
LowFirefox now has a free built-in VPN with 50GB monthly data limit
Informational‘Your Data Will Be Used Against You’: Author of new book on the dangers of a surveillance society
InformationalGoverning AI agent behavior: Aligning user, developer, role, and organizational intent
InformationalHow 'Secure by Demand' Can Reset Cybersecurity
InformationalSecuring AI-Driven Code at Scale
InformationalCybersecurity M&A Is Surging as AI Reshapes the Market
InformationalMicrosoft Proposes Better Identity, Guardrails for AI Agents
InformationalChatGPT just got a library for all your files - how it works
LowAmazon Spring Sale live blog 2026: Real-time updates on the best deals
InformationalHow Claude Code's new auto mode prevents AI coding disasters - without slowing you down
InformationalDetectify uncovers hidden assets and risks across entire IP ranges
InformationalDarktrace expands MSSP offering with AI-driven managed email security
InformationalMimecast expands Incydr with runtime data security for AI and human risk
InformationalThe Rise of Managed Risk Operations: How the New Qualys mROC Portal Helps Partners Scale the Risk Operations Center
InformationalThe Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
Informational5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents
InformationalAI Disruption Fears Rattle Cybersecurity Stocks
LowStop paying for cable: How to access over 1,000 free streaming channels today
InformationalCybersecurity jobs available right now: March 24, 2026
InformationalProduct showcase: Cross-platform and third-party endpoint patching with Action1
Low Advanced Flow will make Android sideloading safer
LowTool updates: lots of security and logic fixes, (Mon, Mar 23rd)
InformationalReflections from the Second NIST Cyber AI Profile Workshop
InformationalVaronis Atlas: Securing AI and the Data That Powers It
LowOpenAI rolls out ChatGPT Library to store your personal files
InformationalZero Trust Anchors AI Security Strategy
InformationalDOE Sets 5-Year Plan to Harden US Grid Against Cyberattacks
InformationalZero Trust for Agentic AI: Safeguarding your Digital Workforce
LowThe 6 Best Free Antivirus Software Providers for Mac in 2026
LowThe 5 Best VoIP Routers (Wired, Wireless, and Mesh) in 2026
LowAI Dominates RSAC Innovation Sandbox
LowYour Samsung phone is getting AirDrop-style sharing with iPhone - these models first
LowFirefox is adding a free VPN for all users - but can you trust it?
LowHow I'm deleting myself from the internet without lifting a finger
LowDirty screens? This $15 cleaner is used in Apple stores - and now I see why
LowVivaldi's new feature should have every other browser taking note
InformationalRubrik SAGE enables semantic governance for enterprise AI agents at scale
InformationalBlack Duck Signal secures AI-generated code with agentic application security
InformationalStraiker enables visibility and runtime protection for enterprise AI agents
InformationalApiiro introduces AI Threat Modeling to identify risks before code exists
InformationalTop must-visit companies at RSAC 2026
InformationalBroadcom delivers XDR solution to under-resourced SOC teams
InformationalMeet Agent Val: Closing the Validation Gap in Exposure Management at Machine Speed with Agentic AI
InformationalBuilt for This Moment (and All Those to Come)

🔓 Breach (44)

CriticalShinyHunters claims the hack of the European Commission
HighFBI confirms hack of Director Patel's personal email inbox
HighWeek in review: NIST updates DNS security guidance, compromised LiteLLM PyPI packages
HighIran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
HighLloyds Group to Compensate 450,000 Customers After App Glitch
HighShinyHunters Claims 350GB Data Breach at European Commission
HighIran-linked group Handala hacked FBI Director Kash Patel’s personal email account
HighShinyHunters Walk Away from BreachForums, Leak 300,000-User Database
HighIran-Linked Handala Hackers Breach FBI Chief Kash Patel’s Gmail
HighThe European Commission confirmed a cyberattack affecting part of its cloud systems
HighEuropean Commission investigating breach after Amazon cloud account hack
HighAjax data breach exposed season tickets, supporter bans open to tampering
HighFBI confirms theft of director’s personal emails by Iran-linked hacking group
HighBreachForums Version 5 - 339,778 breached accounts
HighAjax football club hack exposed fan data, enabled ticket hijack
HighNYC Health Notifying Patients of 2 Third-Party Hacks
HighSmashing Security podcast #460: Never knock on the door of a nuclear submarine base and ask for a selfie
HighRecent Navia data breach impacts HackerOne employee data
High Hackers claim to have accessed data tied to millions of crime tipsters
HighNearly 7M Email Addresses Exposed in Crunchyroll Third-Party Breach
HighLiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
HighCybercrime group Lapsus$ claims the hack of pharma giant AstraZeneca
HighTeamPCP Hits Trivy, Checkmarx, and LiteLLM in Credential Theft Campaign
High44 Aqua Security repositories defaced after Trivy supply chain breach
HighQualDerm Partners December 2025 data breach impacts over 3 Million people
HighData breach at Dutch Ministry of Finance impacts staff following cyberattack
HighHackerOne, Mazda, Infinite Campus and Dutch Ministry Hit by Data Breaches
HighInfinite Campus warns of breach after ShinyHunters claims data theft
HighHackerOne discloses employee data breach after Navia hack
HighPopular LiteLLM PyPI package backdoored to steal credentials, auth tokens
HighStryker says malware was involved in recent cyberattack as production lines reopen
HighMillions of Anonymous Student and Crime Tips Exposed in Major Data Breach
HighHacker walks away with $24.5 million after breaching Resolv DeFi platform
HighNavia Data Breach Hits 2.7 Million People, Exposing Sensitive Personal Data
High44 Aqua Security repositories defaced after Trivy supply chain breach
HighCrunchyroll probes breach after hacker claims to steal 6.8M users' data
HighMazda discloses security breach exposing employee and partner data
HighEducation company Kaplan reports data breach impacting more than 230,000
HighStryker: Cyber Incident 'Contained,' Restoration Continues
MediumDutch Police discloses security breach after phishing attack
MediumSound Radix - 292,993 breached accounts
MediumDutch Ministry of Finance discloses breach affecting employees
MediumRuneScape Boards - 222,762 breached accounts
LowScuf Gaming - 128,683 breached accounts

💀 Ransomware (11)

HighBianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks
HighBearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware
HighPro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware
HighRussian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
HighBotnet operator behind $14 million in ransomware extortion payments gets 24 months behind bars
HighRansomware attack disrupts operation at major Spanish fishing port
HighYanluowang ransomware access broker gets 81 months in prison
HighRussian initial access broker helped ransomware gangs extort millions, sentenced to 81 months
High81-month sentence for Russian hacker behind major ransomware campaigns
HighU.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
HighCalifornia-based semiconductor testing company reports ransomware attack to SEC

🕵️ ThreatIntel (152)

CriticalCoruna iOS exploit framework linked to Triangulation attacks
CriticalPolyShell attacks target 56% of all vulnerable Magento stores
HighTeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours, (Sat, Mar 28th)
HighHow Connected Vehicles Expand Cyber Risk Surface
HighNew Infinity Stealer malware grabs macOS data via ClickFix lures
HighTA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
High Bogus Avast website fakes virus scan, installs Venom Stealer instead
High Criminals are renting virtual phones to bypass bank security
HighNew AITM phishing wave hijacks TikTok Business accounts
HighTeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim, (Fri, Mar 27th)
HighAitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
HighTeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
HighFake VS Code alerts on GitHub spread malware to developers
HighBackdoored Telnyx PyPI package pushes malware hidden in WAV audio
HighCoruna, DarkSword & Democratizing Nation-State Exploit Kits
HighWartime Usage of Compromised IP Cameras Highlight Their Danger
HighChina Upgrades the Backdoor It Uses to Spy on Telcos Globally
HighTeamPCP strikes again: Backdoored Telnyx PyPI package delivers malware
HighLatvia accuses Russia of of disinformation campaign targeting Baltic states
HighChina-linked Red Menshen APT deploys stealthy BPFDoor implants in telecom networks
HighMicrosoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries
HighAI frenzy feeds credential chaos, secrets spread through code, tools, and infrastructure
HighAlleged RedLine malware developer extradited to US, faces up to 30 years
High GlassWorm attack installs fake browser extension for surveillance
High Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka
HighXiaomi Phishing Attempt - Red Flags You Can't Afford to Ignore
HighCoruna exploit reveals evolution of Triangulation iOS exploitation framework
HighNew PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data
HighQuish Splash QR Code Phishing Campaign Hits 1.6 Million Users
HighNew Ghost Campaign Uses Fake npm Progress Bars to Phish Sudo Passwords
HighTeamPCP Supply Chain Campaign: Update 001 - Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available, (Thu, Mar 26th)
HighConverging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government
HighThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
HighChina-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
HighRussia arrests suspected owner of LeakBase cybercrime forum
HighInside a Modern Fraud Attack: From Bot Signups to Account Takeovers
HighTikTok for Business accounts targeted in new phishing campaign
HighUK sanctions Xinbi marketplace linked to Asian scam centers
HighBreach Roundup: Tycoon2FA Phishing Platform Rebounds
HighThe Next Billion Users Won’t Be Human: Securing the Agentic Enterprise
HighIntermediaries Driving Global Spyware Market Expansion
HighResearchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks
HighSecond RedLine infostealer operator ends up in US custody
HighRussia detains alleged admin of LeakBase cybercrime forum weeks after global crackdown
HighUS official accuses China of supporting, exploiting cyber scam crisis in Southeast Asia
HighRussian authorities arrest alleged LeakBase admin behind stolen data marketplace
HighResearchers uncover WebRTC skimmer bypassing traditional defenses
HighSuspected Hijacked Developer Accounts Spread npm Malware
HighCoruna: the framework used in Operation Triangulation
HighAn AI gateway designed to steal your data
HighWebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
HighCoruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
HighSuspected RedLine infostealer malware admin extradited to US
HighAI-Based Threats Usher in 'Dark Period' for Cyber Defenders
HighHow Cyberattacks Can Turn Battery Farms Into Grid Blackouts
HighA nearly undetectable LLM attack needs only a handful of poisoned samples
HighRussian national convicted for running botnet used in attacks on U.S. firms
HighMirai Malware Evolves into Hundreds of Variants Driving Botnet Growth
HighDevice Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
HighThe Kill Chain Is Obsolete When Your AI Agent Is the Threat
HighGlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
HighLeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
HighPaid AI Accounts Are Now a Hot Underground Commodity
HighNew Torg Grabber infostealer malware targets 728 crypto wallets
HighBubble AI app builder abused to steal Microsoft account credentials
HighRSAC Cryptographers' Panel Highlights AI Defense Challenges
HighIdentity security is the new pressure point for modern cyberattacks
HighAI-Native Security Is a Must to Counter AI-Based Attacks
HighSANS: Top 5 Most Dangerous New Attack Techniques to Watch
HighPhishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam
HighAkamai Brand Guardian detects and removes AI-driven brand impersonation
HighRussian botnet operator linked to major ransomware attacks sentenced in US
HighPuerto Rico government agency cancels driver’s license appointments after cyberattack
HighSupply chain attack hits widely-used AI package, risks impacting thousands of companies
HighThe Unintentional Enabler: How Cloudflare Services are Abused for Credential Theft and Malware Distribution
HighMalicious LiteLLM versions linked to TeamPCP supply chain attack
HighSmartApeSG campaign pushes Remcos RAT, NetSupport RAT, StealC, and Sectop RAT (ArechClient2), (Wed, Mar 25th)
HighClickFix Campaigns Targeting Windows and macOS
HighThreat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team
HighManager of botnet used in ransomware attacks gets 2 years in prison
HighGuidance for detecting, investigating, and defending against the Trivy supply chain compromise
HighBeyond Intel Sharing: The Push Toward Cyber Disruption
HighHow AI Coding Tools Crushed the Endpoint Security Fortress
HighCheckmarx KICS Code Scanner Targeted in Widening Supply Chain Hit
High Scam compounds hiring “AI models” to seal the deal in deepfake video calls
High FBI, CISA warn of Russian hackers hijacking Signal and WhatsApp accounts
HighFBI Warns of Iran’s Handala Hack Group Using Fake Apps to Spy on Windows Users
HighDetecting IP KVMs, (Tue, Mar 24th)
HighHackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
HighTax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
HighTeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise
HighGitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead
HighMicrosoft details AI prompt abuse techniques targeting AI assistants
HighNorth Korea-linked threat actors abuse VS Code auto-run to spread StoatWaffle malware
HighGcore Radar report reveals 150% surge in DDoS attacks year-on-year
HighGoogle Authenticator: The Hidden Mechanisms of Passwordless Authentication
HighTeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
HighGhost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
HighAI Redefines Trust in Global Payments
HighRansomware's New Era: Moving at AI Speed
HighTrivy Supply Chain Attack Targets CI/CD Secrets
HighAttackers are handing off access in 22 seconds, Mandiant finds
High FriendlyDealer mimics official app stores to push unvetted gambling apps
HighPro-Iranian Nasir Security is targeting energy companies in the Gulf
HighNorth Korean Hacker Lands Remote IT Job, Caught After VPN Slip
HighNew CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper
HighMicrosoft Xbox One Hacked
High⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
HighNorth Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
HighTrivy supply-chain attack spreads to Docker, GitHub repos
HighTeamPCP deploys Iran-targeted wiper in Kubernetes attacks
HighTycoon2FA phishing platform returns after recent police disruption
HighRussia-linked malware operation collapses after security failures, developer’s arrest
HighUS sentences Nigerian national to 7 years in $6 million email fraud scheme
HighFBI warns of Russian, Iranian cyber activity involving messaging platforms
HighAttackers Hide Infostealer in Copyright Infringement Notices
HighThe devices winning the race to get hacked in 2026
HighQuantum threats are already active and the defense response remains fragmented
HighInternational police Operation Alice take down 373,000 dark web sites exploiting children
HighIran-linked actors use Telegram as C2 in malware attacks on dissidents
HighGlobal Crackdown Dismantles 4 Botnets Behind Major DDoS Attacks
HighTrivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
HighMicrosoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
HighFBI warns of Handala hackers using Telegram in malware attacks
MediumSecurity Affairs newsletter Round 569 by Pierluigi Paganini – INTERNATIONAL EDITION
MediumDealing with silent robocalls? This is why scam callers keep quiet
MediumIn WAF we (should not) trust
MediumThese warning signs could mean spyware is on your phone - and 9 ways to keep it secure
MediumAI-Based Coding Redefines Software Development
MediumIran Hacktivists Make Noise but Have Little Impact on War
Medium The March Madness scam playbook
InformationalSECURITY AFFAIRS MALWARE NEWSLETTER ROUND 90
InformationalDShield (Cowrie) Honeypot Stats and When Sessions Disconnect, (Mon, Mar 30th)
InformationalAI Versus AI: The Future of Cyber Defense
InformationalAI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech
InformationalInfrastructure Attacks With Physical Consequences Down 25%
InformationalISC Stormcast For Friday, March 27th, 2026 https://isc.sans.edu/podcastdetail/9868, (Fri, Mar 27th)
InformationalMillions of UK iPhone Users Will Need to Verify Their Age — Here’s Why
Informational1-15 March 2026 Cyber Attacks Timeline
InformationalISC Stormcast For Thursday, March 26th, 2026 https://isc.sans.edu/podcastdetail/9866, (Thu, Mar 26th)
Informational5 telltale signs that your phone has been compromised (and how to combat them)
InformationalGemini picks up criminal activity buried in dark web noise
LowOVHcloud Founder Denies Massive 590TB Data Breach Claims
InformationalWeekly Update 496
InformationalHow a Large Bank Uses AI Digital Twins for Threat Hunting
InformationalNovee introduces autonomous AI red teaming to hunt LLM vulnerabilities
InformationalISC Stormcast For Tuesday, March 24th, 2026 https://isc.sans.edu/podcastdetail/9862, (Tue, Mar 24th)
InformationalCase study: How predictive shielding in Defender stopped GPO-based ransomware before it started
Informational2025 Talos Year in Review: Speed, scale, and staying power
InformationalBeers with Talos breaks down the 2025 Talos Year in Review
InformationalThe Agent Trust gap: What Our Research Reveals About Agentic AI Security
InformationalFrom Vision to Real-time Threat Intelligence: TruLens for ETM

⚠️ Vulnerability (53)

CriticalUrgent Alert: NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data
CriticalU.S. CISA adds a flaw in F5 BIG-IP AMP to its Known Exploited Vulnerabilities catalog
CriticalAttackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)
CriticalCISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
CriticalCitrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
CriticalCISA Adds One Known Exploited Vulnerability to Catalog
CriticalCISA and BSI warn orgs of critical PTC Windchill and FlexPLM flaw
CriticalCISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation
CriticalU.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog
CriticalCritical Flaw in Langflow AI Platform Under Attack
CriticalU.S. CISA adds a Langflow flaw to its Known Exploited Vulnerabilities catalog
CriticalCISA: New Langflow flaw actively exploited to hijack AI workflows
CriticalWAGO GmbH & Co. KG Industrial Managed Switches
CriticalPTC Windchill Product Lifecycle Management
CriticalCitrix urges admins to patch NetScaler flaws as soon as possible
CriticalGerman Police Rouse System Admins From Sleep Over IT Flaw
CriticalTP-Link warns users to patch critical router auth bypass flaw
CriticalCitrix NetScaler critical flaw could leak data, update now
CriticalZDI-26-226: (0Day) Microsoft Azure MCP AzureCliService Command Injection Remote Code Execution Vulnerability
CriticalPTC warns of imminent threat from critical Windchill, FlexPLM RCE bug
CriticalSchneider Electric Plant iT/Brewmaxx
CriticalPharos Controls Mosaic Show Controller
CriticalNew ‘DarkSword’ Leak Puts Millions of iPhones at Risk After Initial Attack
CriticalCritical NetScaler ADC, Gateway flaw may soon be exploited (CVE-2026-3055)
CriticalDarkSword iPhone Exploit Leaked Online, Hundreds of Millions at Risk
CriticalCitrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
Critical A week in security (March 16 – March 22)
CriticalQNAP fixed four vulnerabilities demonstrated at Pwn2Own Ireland 2025
CriticalHackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
HighFile read flaw in Smart Slider plugin impacts 500K WordPress sites
HighOpen VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
HighCISA Flags Critical Flaw in Grassroots DICOM Imaging Library
HighGoogle Issues High-Risk Security Patch for 3.5 Billion Chrome Users: What You Need to Know
HighLangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
HighTP-Link, Canva, HikVision vulnerabilities
HighClaude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
HighTP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password
HighOpenCode Systems OC Messaging and USSD Gateway
HighCISA Adds One Known Exploited Vulnerability to Catalog
HighCISA Adds One Known Exploited Vulnerability to Catalog
HighPatch now: TP-Link Archer NX routers vulnerable to firmware takeover
HighApple Patches (almost) everything again. March 2026 edition., (Wed, Mar 25th)
HighVulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway
High Meet Khaled Mohamed: the bug hunter who found a Microsoft flaw
HighGrassroots DICOM (GDCM)
HighA Vulnerability in Oracle Products Could Allow for Remote Code Execution
HighZDI-26-222: (Pwn2Own) Canon imageCLASS MF654Cdw BJNP Memory Corruption Remote Code Execution Vulnerability
HighWe Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them
HighCISA orders feds to patch DarkSword iOS flaws exploited attacks
MediumSchneider Electric EcoStruxure Foxboro DCS
MediumZDI-26-223: (Pwn2Own) Samsung Galaxy S25 Smart Touch Call Application Protection Mechanism Failure Information Disclosure Vulnerability
MediumZDI-26-224: (Pwn2Own) Samsung Galaxy S25 Samsung Account Cross-Site Scripting Remote Code Execution Vulnerability
MediumZDI-26-225: (Pwn2Own) Samsung Galaxy S25 Samsung Account Open Redirect Security Bypass Vulnerability

Daily breach, advisory, and vulnerability briefs publish every weekday.

View Live Breach Feed ← All Weekly Digests