Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The U.S. Department of Justice Cracks Down on Cybercrime: A Case of Ransomware and Identity Theft

In a major development, the U.S. Department of Justice has sentenced a 26-year-old Russian citizen to 6.75 years in prison for his role in assisting major cybercrime groups in conducting numerous ransomware attacks against U.S. companies and other organizations.

Published: Tue Mar 24 02:40:01 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical NetScaler Vulnerability: A Looming Threat to Enterprise Security

Critical NetScaler Vulnerability: A Looming Threat to Enterprise Security - Citrix has issued a warning about a critical vulnerability in their ADC and Gateway systems, allowing unauthenticated attackers to leak sensitive data. Experts urge prompt patching to prevent exploitation by malicious actors.

Published: Tue Mar 24 02:49:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's Insidious Use of VS Code Auto-Run: Unpacking the StoatWaffle Malware Campaign


North Korea-linked threat actors have been using Microsoft Visual Studio Code (VS Code) to spread malware via the auto-run feature. The StoatWaffle malware campaign has been characterized by a multi-stage infection chain, allowing attackers to steal sensitive data and gain remote control over compromised devices. As this malicious actor continues to evolve their tactics, it is essential for users and organizations to remain aware of the risks and take proactive measures to protect themselves.

Published: Tue Mar 24 03:32:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Homeland Security Program: A Network of Local Officers Assisting in Immigration Enforcement


The Department of Homeland Security (DHS) has been actively recruiting local law enforcement agencies to participate in its 287(g) program, a network of partnerships that enable the agency to assist in federal immigration enforcement. As part of this effort, DHS is providing financial incentives to participating police departments, including covering salaries and overtime costs for officers who complete task force training. The program has raised concerns about the agency's intentions and potential impacts on local law enforcement agencies and immigrant communities.

Published: Tue Mar 24 04:44:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Surveillance State: How Our Bodies Are Being Tracked and Monitored

As technology advances at a rapid pace, our right to privacy is increasingly under threat. From smart devices tracking our bodily functions to DNA samples collected by police departments, we are living in a world where surveillance has become the norm. This article explores the growing trend of biometric data collection and its implications for individual rights and freedoms.

Published: Tue Mar 24 06:00:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Irresistible Pitch: How a $50 Investment Became a Lifeline for a Mexican Family's Asylum Journey

Ava and her family’s asylum journey is a testament to the resilience of immigrants who risk everything for a chance at a new life in America. With $50 as an investment, they took the first step towards a future filled with uncertainty and hardship. This story highlights the complexities of the asylum system and the challenges faced by families like Ava's as they navigate their way through a system designed to protect them.

Published: Tue Mar 24 06:17:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Threat Intelligence Newsletter

Cybersecurity teams are facing significant challenges due to the increasing specialization of the field, resulting in unclear risk priorities, misaligned tooling decisions, and difficulty explaining security issues in terms the business understands. Experts emphasize the importance of developing foundational skills to address these fundamental security challenges.

Published: Tue Mar 24 06:34:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

TeamPCP's Latest Supply Chain Attack: Exploiting GitHub Actions to Steal Credentials

TeamPCP's latest supply chain attack highlights the importance of vigilance in protecting against sophisticated cyber threats. The attackers have compromised two GitHub Actions workflows, using stolen credentials to steal sensitive information.

Published: Tue Mar 24 06:46:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Aleksei Volkov Sentenced to 81 Months in Prison for Role in Ransomware Campaigns

Aleksei Volkov, a Russian national, has been sentenced to 81 months in prison by a U.S. court for his role in facilitating major ransomware campaigns against U.S. companies and organizations. The sentence was handed down on March 24, 2026, following Volkov's guilty plea in November 2025.

Published: Tue Mar 24 06:55:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dutch Ministry of Finance Exposes a Critical Cybersecurity Breach: A Threat to Sensitive Data and Employee Trust


The Dutch Ministry of Finance has disclosed a critical cybersecurity breach affecting some employees. The breach occurred on March 19 and was detected by a third party. Although the exact number of affected employees is unknown, officials confirmed that some employees' work has been impacted. The attackers did not steal any sensitive data, but no cybercrime group or threat actor has taken responsibility for the attack.

Published: Tue Mar 24 08:08:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unraveling of National Security Concerns: The FCC's Ban on Foreign-Made Consumer Routers

The FCC has banned the approval of any new consumer-grade network routers made abroad, citing concerns about national security and supply chain vulnerabilities. The move follows a thorough assessment by a White House-convened interagency body, which concluded that foreign-produced routers pose an unacceptable risk to US citizens.

Published: Tue Mar 24 08:23:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Aleksei Volkov's Descent into Notorious Ransomware Crimes: A Look at the Rise and Fall of a Russian Initial Access Broker

Aleksei Volkov, a Russian national, has been sentenced to nearly seven years in prison for his role as an initial access broker. His case highlights the growing importance of tracking down those who enable cybercrime and serves as a reminder of the need for vigilance in the face of evolving cyber threats.

Published: Tue Mar 24 08:37:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

ICE's Task Force Model: A Network of Local Law Enforcement Assisting in Federal Immigration Enforcement

ICE's Task Force Model: A Network of Local Law Enforcement Assisting in Federal Immigration Enforcement

In a shocking revelation, a small town in New Hampshire has been receiving significant financial incentives from the Department of Homeland Security for its cooperation with Immigration and Customs Enforcement in assisting with federal immigration enforcement. This article explores the details of the Task Force Model program, including its history, goals, and implications for local law enforcement agencies and the communities they serve.

WIRED's investigation reveals that Carroll, a town with a population of 820 residents, received a $122,515 wire transfer from DHS as part of its participation in the agency's "Task Force Model" program. The agreement was reached in April 2025, four months before the payment was made, and all four of the town's full-time police officers signed up as task force officers.

The program allows local law enforcement agencies to participate in the administration's efforts to build out a network of local officers assisting in federal immigration enforcement. As of March 23, 920 law enforcement agencies have signed up for this program, including 500 town, village, and city police departments.

This article will provide a comprehensive understanding of the Task Force Model program and its impact on local law enforcement agencies and the communities they serve.

Published: Tue Mar 24 08:48:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Sophisticated Ghost Campaign: Unpacking the Malicious npm Packages Targeting Crypto Wallets and Sensitive Data



A sophisticated Ghost campaign has been discovered using seven malicious npm packages to steal cryptocurrency wallets and sensitive data from unsuspecting developers. The campaign utilizes AI-assisted development workflows, impersonates legitimate tools, and leverages trusted ecosystems to introduce malicious code with minimal friction. This marks a significant shift in attacker tradecraft, highlighting the need for developers and organizations to stay vigilant against these types of threats.

Published: Tue Mar 24 09:03:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Gartner Market Guide for Guardian Agents: A New Era in AI Governance


The Gartner Market Guide for Guardian Agents provides a comprehensive overview of the market and outlines key features and capabilities of vendors addressing the need for AI governance. Learn more about the importance of Guardian Agents, the rapid adoption of AI agents across enterprises, and the challenges of ensuring their secure operation.

Published: Tue Mar 24 09:16:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix NetScaler Vulnerability Alert: Protecting Sensitive Data from Unauthenticated Attackers

Citrix NetScaler users are urged to apply urgent security updates due to a critical memory overread vulnerability that could leak sensitive data, leaving their systems vulnerable to attack.

Published: Tue Mar 24 09:24:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of TeamPCP: A Persistent Campaign of Devastating Consequences

TeamPCP has launched a new wave of devastating malware on the Internet, targeting organizations' CI/CD pipelines and software repositories managed by npm. The attack, dubbed CanisterWorm, has significant implications for development organizations and highlights TeamPCP's relentless pursuit of compromising infrastructure and stealing sensitive information.

Published: Tue Mar 24 10:44:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

HackerOne Discloses Devastating Employee Data Breach Following Navia Hack


HackerOne has disclosed a devastating employee data breach following a hack on Navia, one of its U.S. benefits administrators. The breach left hundreds of employees with sensitive information stolen from them, highlighting the need for companies to prioritize employee data protection and cybersecurity measures.

Published: Tue Mar 24 11:03:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Infinite Campus Warns of Data Breach After ShinyHunters Claims Extortion


Infinite Campus has warned of a data breach following an extortion attempt by ShinyHunters, who claimed to have stolen 6.8 million users' data. The company has disabled customer-facing services and is scanning compromised Salesforce data to minimize risk. Despite the incident, Infinite Campus stated that no customer databases were accessed.

Published: Tue Mar 24 11:10:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unyielding Grip of Cybercrime: Aleksey Volkov's 81-Month Sentence in a Ransomware Access Broker Scandal


Aleksey Olegovich Volkov, a Russian national also known as "chubaka.kor" and "nets," has been sentenced to nearly 7 years in prison for his role as an initial access broker (IAB) for the notorious Yanluowang ransomware group. He targeted at least eight companies across the United States between July 2021 and November 2022, breaching corporate networks and selling his access to the Yanluowang RaaS operation. Volkov will also pay over $9 million in restitution to victims of the Yanluowang ransomware attacks.

Published: Tue Mar 24 11:25:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

HackerOne Slams Supplier Over Delayed Breach Notice, Exposing Employee Data to Potential Abuse


HackerOne Slams Supplier Over Delayed Breach Notice, Exposing Employee Data to Potential Abuse
A recent data breach at Navia Benefit Solutions has left nearly 300 employees of HackerOne exposed to potential identity theft and financial abuse. The bug bounty company is furious with the supplier for delaying its notification by weeks, leaving them scrambling to secure their sensitive information.


Published: Tue Mar 24 11:34:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The US Takes a Step Towards Total Network Control: The FCC's Ban on Foreign-Made Consumer Routers


The US government has banned the approval of new foreign-made consumer routers, citing concerns over supply chain vulnerabilities and cybersecurity risks. The move marks a significant shift in the country's approach to network security and raises questions about the future of the global networking industry.

Published: Tue Mar 24 11:48:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The FAUX#ELEVATE Campaign: A Living-Off-The-Land Phishing Attack that Exploits Enterprise Credentials


A new phishing campaign, dubbed FAUX#ELEVATE, has been discovered by threat intelligence experts at Securonix. The attack targets French-speaking corporate environments with malicious resumes that combine credential theft, data exfiltration, and Monero cryptocurrency mining for maximum monetization. This is an example of a living-off-the-land-style attack that raises the bar on how attackers can trick defense mechanisms and sneak their way into the target's system without attracting much attention.

Published: Tue Mar 24 11:56:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Massive Healthcare Data Breach Exposes Sensitive Information of Over 3 Million Individuals


QualDerm Partners has suffered a massive data breach exposing personal, medical, and health insurance data of over 3.1 million individuals. The breach highlights the vulnerabilities of healthcare systems to cyber threats and underscores the need for robust cybersecurity practices and incident response planning in the industry.

Published: Tue Mar 24 12:24:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malvertising Campaign Targets Tax-Related Searches, Delivers ScreenConnect Malware Using Huawei Driver


A new malvertising campaign targets tax-related searches, delivering malware through a combination of cloaking services, legitimate drivers, and off-the-shelf tools. This complex attack uses the BYOVD technique to disable security programs and demonstrates how commodity tooling has become more sophisticated in recent campaigns.

Published: Tue Mar 24 13:33:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

LiteLLM Infected with Credential-Stealing Code via Trivy: A Supply Chain Attack on Open Source Projects


A recent supply chain attack on LiteLLM has highlighted the risks associated with relying on third-party components in software development. Two versions of LiteLLM were removed from PyPI after being compromised with malicious credential-stealing code, which was introduced through Trivy's misconfigured GitHub Actions environment.

Published: Tue Mar 24 14:48:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

TeamPCP's Supply Chain Attack: A Malicious Tide Sweeps Through Python Packages


TeamPCP's Supply Chain Attack: A Malicious Tide Sweeps Through Python Packages

A new threat actor has compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor. The payload is a three-stage attack that can be triggered without requiring any user interaction. TeamPCP has demonstrated a consistent pattern of attacking environments and yielding credentials that unlock the next target. Users are advised to perform certain actions to contain the threat and mitigate the impact of this attack.

Published: Tue Mar 24 15:07:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach at Dutch Ministry of Finance: A Complex Web of Cybersecurity Threats


Data breach at Dutch Ministry of Finance impacts staff following cyberattack, as confirmed by the Dutch Ministry of Finance, this incident highlights the complexities of cybersecurity threats and the importance of robust measures to prevent such incidents. The breach affected some employees after a cyberattack was detected on March 19, with no personal data of citizens or businesses compromised.

Published: Tue Mar 24 15:13:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Electronic Frontier Foundation's New Executive Director: A Champion for Cyber Rights and Privacy



The Electronic Frontier Foundation (EFF), a leading non-profit organization protecting digital rights and freedoms, has appointed Nicole Ozer as its new executive director. With her extensive experience in technology, civil liberties, and policy-making, Ozer is poised to lead EFF into a new era of advocacy and activism, focusing on issues like artificial intelligence, data ownership, and surveillance. As the stakes for digital rights and freedoms continue to rise, Ozer's appointment marks an exciting development in the fight for a more just and equitable tech ecosystem.

Published: Tue Mar 24 17:22:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Ripple Effect: 1K+ Cloud Environments Infected in Trivy Supply Chain Attack

Over 1,000 cloud environments have been infected by a recent supply chain attack targeting Trivy, an open-source scanner maintained by Aqua Security. Experts warn that the damage will only get worse as the threat actors continue to expand their operations.

Published: Tue Mar 24 17:35:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Federalization of Local Law Enforcement: The Case of Carroll, New Hampshire

Carroll, New Hampshire has become one of the first towns in the US to receive significant financial support from the Department of Homeland Security in exchange for its willingness to assist with federal immigration enforcement under a new program called 287(g). The town's police department has pledged its officers' services to aid in ICE-led immigration efforts in exchange for salaries and equipment funding. But as local autonomy is eroded, questions arise about accountability and the role of small municipalities in large-scale national policies.

Published: Tue Mar 24 17:57:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great LiteLLM Betrayal: A Supply Chain Attack on a PyPI Package

LiteLLM, a popular Python package used by millions, has been compromised by the TeamPCP hacking group. The malicious versions deployed an infostealer that harvested sensitive data from hundreds of thousands of devices, exposing users to significant security risks.

Published: Tue Mar 24 19:16:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The LLM Supply Chain Attack: A Threat Actor's Masterclass in Coordinated Chaos


A sophisticated threat actor known as TeamPCP has successfully executed a coordinated attack on multiple supply chain targets across various ecosystems, specifically targeting the Python package called LiteLLM. This attack highlights the vulnerabilities present within the AI ecosystem and underscores the need for robust security measures to protect critical infrastructure components.

Published: Wed Mar 25 02:35:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Omnissa's State of Digital Workspace Report Reveals the Dark Side of Enterprise PCs


In a surprising twist, Apple and Google devices emerge as clear leaders in terms of software update speed, while Microsoft devices lag behind in various areas of endpoint computing. The State of Digital Workspace report highlights the importance of device security and management in today's digital landscape.

Published: Wed Mar 25 04:01:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Federal Communications Commission Bans New Foreign-Made Routers Due to Unacceptable Cybersecurity Risks

The U.S. Federal Communications Commission (FCC) has banned the importation of new, foreign-made consumer routers due to concerns over unacceptable cyber risks posed by these devices. The ban aims to safeguard Americans and their underlying communications networks, which are crucial for national security.

Published: Wed Mar 25 04:14:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Cybercrime: Ilya Angelov's Descent into Ransomware Infamy



A Russian national has been sentenced to two years in prison for his role in managing a phishing botnet used in ransomware attacks against 72 U.S. companies, resulting in over $14 million in extortion payments.



Published: Wed Mar 25 05:35:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mahsa Alert: A Crowdsourced Solution to Iran's Information Vacuum

Mahsa Alert, a crowdsourced mapping platform, has become an important resource for those seeking accurate information about the ongoing conflict in Iran. Despite challenges, the platform provides real-time updates on confirmed attacks, evacuation alerts, and other critical information.

Published: Wed Mar 25 05:50:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: AstraZeneca Allegedly Hacked by Sophisticated Group Lapsus$


A sophisticated cybercrime group known as Lapsus$ has claimed to have breached AstraZeneca, allegedly stealing 3GB of sensitive data including credentials, code, and employee information. The incident highlights the ongoing challenges faced by healthcare organizations in maintaining their cybersecurity posture, particularly against increasingly sophisticated threats.

Published: Wed Mar 25 05:59:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malicious LiteLLM Versions Linked to TeamPCP Supply Chain Attack: A Deeper Dive into the Exploits



A recent supply chain attack on LiteLLM versions 1.82.7 and 1.82.8 has been linked to the notorious threat actor TeamPCP. This attack highlights the dangers of compromised software packages and the importance of keeping one's digital defenses up-to-date. Cybersecurity professionals must remain alert for such threats and take immediate action to mitigate their impact.

Published: Wed Mar 25 06:10:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Security Alert: TP-Link Issues Urgent Firmware Patch for Critical Router Auth Bypass Flaw

TP-Link has issued a critical security warning to its customers, advising them to download and install the latest firmware patch to prevent exploitation of a severe authentication bypass flaw in its Archer NX router series. Learn more about this critical security alert and how you can protect yourself from potential attacks exploiting these flaws.

Published: Wed Mar 25 07:30:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The AI Threat Landscape: A New Era for Cybersecurity

The traditional kill chain is no longer effective in detecting and responding to compromised AI agents. As cybersecurity threats continue to evolve, it's crucial to understand the AI threat landscape and take proactive steps to protect our systems.

Published: Wed Mar 25 07:39:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Russian National Behind the TA551 Botnet-Driven Ransomware Attacks Has Been Sentenced to Two Years in Prison


A Russian national responsible for managing a notorious botnet has been sentenced to two years in prison. The TA551 group was involved in launching ransomware attacks against U.S. companies, resulting in significant financial losses. This conviction marks an important milestone in the ongoing efforts to combat cybercrime globally.

Published: Wed Mar 25 07:51:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Device Code Phishing Campaign: A Threat to Microsoft 365 Identities Across Five Countries



A recent device code phishing campaign has targeted Microsoft 365 identities across five countries, with over 340 organizations affected. The attackers are leveraging Cloudflare Workers redirects and Railway to exploit legitimate infrastructure for credential harvesting. Users are advised to scan sign-in logs, revoke refresh tokens, and block authentication attempts from Railway infrastructure to combat this threat.

Published: Wed Mar 25 08:13:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Exposé: A Glimpse into the Navia Data Breach - How a Third-Party Benefits Provider Became the Unlikely Victim of a Cyberattack


A recent data breach at Navia Benefit Solutions has exposed the personal information of nearly 300 HackerOne employees, raising concerns about the company's security protocols. In this article, we will explore the circumstances surrounding the breach and examine the potential implications for organizations relying on third-party providers.

Published: Wed Mar 25 08:37:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Routers Under Siege: US FCC Cracks Down on Foreign- Made Consumer Routers Amid Rising Cybersecurity Concerns


The US Federal Communications Commission (FCC) has announced a ban on new foreign-made consumer routers being sold or marketed in the country, citing unacceptable cyber and national security risks. The move is part of a growing effort to address rising cybersecurity concerns and protect critical infrastructure from potential threats.



Published: Wed Mar 25 08:45:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Satellite Shield: How the Gulf's Sky Became a Battlefield


Satellite data has become a contested terrain in the Gulf region, with rising tensions between nations and private companies vying for control over the skies. The loss of Planet Labs highlights the fragility of these systems, which rely on precise timing and coordination to provide accurate information. As the conflict continues to escalate, it is essential to recognize the importance of open-source intelligence and transparency in monitoring conflicts around the world.

Published: Wed Mar 25 10:11:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unpacking the GlassWorm Malware Campaign: A Comprehensive Analysis of Its Evolution and Threat Implications

Unpacking the GlassWorm Malware Campaign: A Comprehensive Analysis of Its Evolution and Threat Implications

The GlassWorm campaign represents a sophisticated threat to cybersecurity enthusiasts and organizations alike. Its use of Solana transactions as dead drops, delivery of a multi-stage framework capable of comprehensive data theft, and incorporation of hardware wallet phishing make it nearly impossible to detect and prevent. Experts warn that its evolving nature makes it essential for users and organizations to remain vigilant and take proactive measures to protect themselves against this malware campaign.

Published: Wed Mar 25 10:24:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix NetScaler Vulnerability: A Growing Concern for Enterprise Security


Citrix has issued a critical security warning to administrators of its NetScaler ADC and Gateway solutions, urging them to patch two vulnerabilities as soon as possible. The flaws could potentially allow remote attackers to steal sensitive information such as session tokens and exploit user sessions. In this article, we will explore the details of the Citrix NetScaler vulnerability and provide guidance on how to identify and patch affected instances.

Published: Wed Mar 25 11:34:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Patch Now: TP-Link Archer NX Routers Vulnerable to Firmware Takeover


TP-Link has recently released security patches for its Archer NX routers to address several high-severity vulnerabilities that could allow attackers to bypass authentication and install malicious firmware. The patches aim to fix multiple issues, including CVE-2025-15517 and CVE-2025-15605, which impact multiple models of the Archer NX series. To protect themselves, users are urged to download and install the latest firmware version as soon as possible.

Published: Wed Mar 25 11:44:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Torg Grabber Malware Steals Sensitive Data from 850 Browser Extensions


New Torg Grabber is a highly sophisticated malware campaign that targets 850 browser extensions across multiple platforms, with over 728 of them specifically designed for cryptocurrency wallets. The malware steals sensitive data from these wallets and other storage solutions, including credentials, cookies, and autofill data. Gen Digital researchers have identified several anti-analysis mechanisms, multi-layered obfuscation, and uses direct syscalls and reflective loading for evasion, running the final payload entirely in memory.


Published: Wed Mar 25 14:44:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jen Easterly: Cybersecurity's Relentless Optimist Sees a Brighter Future

Jen Easterly, the new CEO of RSA Conference, is bringing a message of hope and collaboration to the cybersecurity industry. With her background in the military and experience as the director of CISA, she believes that AI can help solve complex problems and create a more secure digital world.

Published: Wed Mar 25 14:55:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Red Line of Cyber Warfare: Experts Weigh In on the Ethics of Physical Retaliation


The conversation surrounding what constitutes a red line for physical retaliation in response to cyber attacks highlights the complexities of modern warfare. Experts weigh in on whether clear guidelines should be established for when military action is warranted. The debate underscores the need for international dialogue and cooperation in addressing these challenges.

Published: Wed Mar 25 15:09:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Web's Latest Victim: The Demise of LeakBase and Its Implications for Cybersecurity


LeakBase, one of the world's largest hubs for buying and selling stolen data, has been dismantled in a law enforcement operation led by Russian authorities. The alleged administrator, identified as Chucky, is believed to be a 33-year-old resident of Taganrog. With hundreds of millions of user accounts and bank details traded on the platform, the takedown marks an important step towards disrupting cybercrime forums like itself.

Published: Wed Mar 25 15:18:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Vulnerability in Context Hub: How a Simple API Documentation Service Became a Gateway for Supply Chain Attacks

A new vulnerability in Context Hub has been discovered, exposing a significant risk for developers who rely on the service to keep their AI models up to date. The vulnerability allows attackers to poison AI agents with malicious instructions, without even needing malware. But how can developers protect themselves from this threat? Find out more about the incident and how you can stay safe in the world of AI.

Published: Wed Mar 25 16:31:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Cloud Phone Scams: A Growing Threat to Financial Security

Cloud phone scams have become a growing threat to financial security, with scammers using virtual smartphones to impersonate legitimate institutions and carry out authorized push payment fraud. As losses are expected to rise to $14.9 billion by 2028, financial institutions must take steps to identify and prevent these types of scams.

Published: Wed Mar 25 16:39:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian National's Botnet Reign Ends: A Cautionary Tale of Cybercrime and Accountability


A Russian national has been sentenced to 24 months in prison for his role in running a botnet used in ransomware attacks on dozens of U.S. firms. The sentence comes with a hefty fine of $100,000 and a judgment of $1.6 million, which will be paid by the convicted individual to compensate his victims. This case serves as a stark reminder of the devastating impact that cybercrime can have on individuals, businesses, and society as a whole.

Published: Wed Mar 25 16:49:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

PolyShell: A Critical Vulnerability Exposed, Leaving 56% of Magento Stores at Risk



PolyShell attacks have been reported on a staggering 56.7% of all vulnerable Magento stores, leaving thousands of e-commerce businesses exposed to critical security risks due to a previously undisclosed vulnerability in Magento's REST API known as PolyShell. Experts warn that hackers are exploiting this issue with malicious intent to achieve remote code execution or account takeover via stored cross-site scripting (XSS), if the web server configuration allows it. To mitigate the risk, store owners must take immediate action to patch their stores and prevent further exploitation.



Published: Wed Mar 25 18:08:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

GitHub Unveils AI-Powered Bug Detection Tool to Enhance Security Coverage

GitHub has introduced an AI-powered bug detection tool as part of its Code Security platform, expanding vulnerability detections beyond traditional static analysis to cover a broader range of languages and frameworks. The new feature promises enhanced security coverage and improved productivity for developers worldwide.

Published: Wed Mar 25 19:21:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

India's CCTV Surveillance Under Scrutiny Amid Allegations of Pakistani Espionage

India has launched an audit of its vast network of CCTV cameras following allegations that Pakistani-backed operatives may have been involved in installing and operating cameras near critical infrastructure. The probe aims to identify potential vulnerabilities and assess the overall impact on national security.

Published: Wed Mar 25 22:33:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New WebRTC Skimmer Bypasses Security Controls, Exploits PolyShell Vulnerability to Steal Payment Data


A new payment skimmer has been discovered that bypasses security controls by leveraging WebRTC data channels to steal sensitive payment data from e-commerce websites. The attack exploits the PolyShell vulnerability in Adobe Commerce and Magento Open Source, allowing unauthenticated attackers to upload arbitrary executables via the REST API and achieve code execution. To mitigate this threat, website owners should block access to the "pub/media/custom_options/" directory and scan for web shells, backdoors, and other malware.

Published: Thu Mar 26 03:49:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Quantum Computing Security Apocalypse: Google's Warning About Q-Day

Google has issued a new warning about the potential for a "quantum computing security apocalypse," with Q-Day now expected to occur in 2029. This means that experts will need to prepare for a time when quantum computers can break all cryptographic security, potentially creating a catastrophic situation for cybersecurity.

Published: Thu Mar 26 04:59:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's Experiment with Social Media Restrictions: A Study on its Impact on Teenagers' Mental Health



The UK government has launched a trial to restrict access to various online platforms for individuals under 16 in an effort to address concerns about the potential negative impact of social media on teenagers' mental health. The six-week pilot study will assess the impact of different restrictions on family life, sleep patterns, schoolwork, and overall mental health among teenagers.

Published: Thu Mar 26 05:08:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Takedown of LeakBase: A Global Effort to Combat Cybercrime


The LeakBase operation marked a major blow to cybercrime groups worldwide, with Russian authorities arresting an alleged administrator behind the stolen data marketplace. The takedown of LeakBase serves as a stark reminder of the global nature of cybercrime and the importance of cooperation in combatting this threat. Read more about this developing story and the impact it will have on the cybersecurity landscape.

Published: Thu Mar 26 05:21:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Suspected RedLine Infostealer Malware Admin Extradited to the United States: A New Chapter in Cybercrime Suppression

Armenian national extradited to the United States on charges related to his alleged involvement in managing the RedLine infostealer malware operation. Hambardzum Minasyan faces multiple charges, including access device fraud, Computer Fraud and Abuse Act violation, money laundering conspiracy, and a maximum sentence of 30 years in prison if convicted.

Published: Thu Mar 26 07:37:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Deepfake Debacle: The Failsafe Fiasco of Big Tech

A deepfake campaign against a UK Parliamentarian has highlighted the critical need for Big Tech companies and governments to take urgent action to prevent the spread of AI-generated misinformation, emphasizing the importance of greater cooperation, coordination, and regulatory clarity in addressing this complex issue.

Published: Thu Mar 26 07:47:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The AI Arms Race: How the Defense Industry's Ambitions Are Redefining Modern Warfare


The defense tech industry is experiencing rapid growth and development, driven by advancements in artificial intelligence (AI) and its applications in military operations. As tensions rise between major players, concerns about safety and security are growing, while instances of fake or manipulated information are spreading misinformation about real-world conflicts. This article delves into the complexities and challenges of developing AI systems for military applications, exploring the implications for global security and stability.

Published: Thu Mar 26 07:57:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cybersecurity Landscape Shifts: A Growing Concern for Defense and Resilience

Global cybersecurity is facing a critical juncture, with new threats emerging daily. As companies and governments adapt to this evolving landscape, defense and resilience will become increasingly important. Stay up-to-date with the latest developments in our coverage of global cybersecurity concerns.

Published: Thu Mar 26 08:05:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Exploitation: The Coruna iOS Kit's Triangulation Roots


A recent discovery by Kaspersky has revealed that the Coruna iOS kit reuses exploit code from a previously uncovered Apple iOS exploit kit known as Operation Triangulation. This finding highlights the ongoing evolution of cyber threats and underscores the continued relevance of zero-day exploits in modern cybersecurity.

Published: Thu Mar 26 08:33:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rise of WebRTC Skimmers: A New Threat to Payment Security


A new vulnerability in the WebRTC protocol has been discovered, allowing malicious actors to bypass traditional security controls and steal sensitive payment data. The attackers use a WebRTC skimmer that creates a connection with an attacker's server using encrypted DataChannels, making it challenging for security teams to detect and mitigate the threat.

The discovery marks a significant escalation in the threat landscape, as this new type of skimmer is able to infiltrate websites and exfiltrate sensitive information with ease. It is essential for organizations to stay vigilant and implement robust security measures to protect themselves against this new type of attack.

Published: Thu Mar 26 08:42:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coruna iOS Exploit Kit: A Sophisticated Espionage Tool Evolved

Coruna, an iOS exploit kit linked to the Operation Triangulation espionage campaign, has been expanded to target modern hardware and operating systems. Kaspersky researchers have found that the attack begins in Safari and uses multiple zero-day exploits to silently infect iPhones and deploy spyware implants.

Published: Thu Mar 26 10:03:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia Targets LeakBase Cybercrime Forum: A Glimpse into the Dark World of Online Crime


Russian law enforcement agencies have arrested a suspect believed to be the owner and administrator of LeakBase, a notorious online forum used by cybercriminals to buy and sell stolen data and hacking tools. This operation marks a significant development in the ongoing battle against cybercrime and highlights the growing cooperation between law enforcement agencies across the globe.



Published: Thu Mar 26 10:14:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of VPNs: How American Privacy is Being Compromised by Foreign Surveillance

US lawmakers are pressing Tulsi Gabbard to reveal whether using a VPN that connects to overseas servers can strip Americans of their constitutional protections against warrantless surveillance, raising concerns about the potential risks associated with foreign-based server usage.

Published: Thu Mar 26 10:30:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise and Challenges of Anduril: A Startup's Quest to Revolutionize Defense Production

Anduril, a cutting-edge defense technology company, is facing numerous challenges as it expands its production capacity and delivery of innovative systems to the US military. Despite these hurdles, the company remains committed to its mission of providing affordable and reliable solutions to counter emerging threats.

Published: Thu Mar 26 10:41:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI-Powered Warfare: The Intersection of Technology and Global Conflict


In an era where technology is increasingly being used to inform decision-making and execute operations in modern warfare, the intersection of AI-powered systems and global conflict is becoming a major concern. This article explores the complex relationship between the tech industry and the American political apparatus, highlighting the need for clear guidelines and regulations around the use of AI-powered systems in defense agencies. With developments such as Palantir's new focus on developing chatbots that can generate war plans, the stakes are higher than ever.

Published: Thu Mar 26 11:03:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShadowPrompt: A Novel Zero-Click XSS Vulnerability in Anthropic's Claude Google Chrome Extension

A newly disclosed vulnerability known as ShadowPrompt, in Anthropic's popular Claude Google Chrome extension, poses a significant risk to user security. By exploiting this flaw, attackers can inject malicious prompts into the browser without any user interaction or permission.

Published: Thu Mar 26 11:12:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Art of Deception: How Hackers Perfect the Art of Mimicry in Modern Cyberattacks


The art of mimicry has become an essential skill for hackers in modern cybersecurity, using AI-powered tools to create fake identities, code, and behaviors that can be used to infiltrate legitimate systems. Defenders must stay one step ahead of these evolving threat tactics by adopting layered defense strategies that extend protection across software supply chains and federated identities.

Published: Thu Mar 26 11:26:03 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cloud Phone Scam: A Growing Threat to Personal Finance and Corporate Security


Cloud phone scams have become a significant threat to personal finance and corporate security, with threat actors using these internet-based virtual phone systems to engage in various types of scams. This article provides an in-depth look at the rise of cloud phone scams and highlights the need for improved security measures to protect individuals and organizations from these types of threats.

Published: Thu Mar 26 12:06:46 2026 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us