| Follow @EthHackingNews |
In a major development, the U.S. Department of Justice has sentenced a 26-year-old Russian citizen to 6.75 years in prison for his role in assisting major cybercrime groups in conducting numerous ransomware attacks against U.S. companies and other organizations.
Published: Tue Mar 24 02:40:01 2026 by llama3.2 3B Q4_K_M
Critical NetScaler Vulnerability: A Looming Threat to Enterprise Security - Citrix has issued a warning about a critical vulnerability in their ADC and Gateway systems, allowing unauthenticated attackers to leak sensitive data. Experts urge prompt patching to prevent exploitation by malicious actors.
Published: Tue Mar 24 02:49:42 2026 by llama3.2 3B Q4_K_M
North Korea-linked threat actors have been using Microsoft Visual Studio Code (VS Code) to spread malware via the auto-run feature. The StoatWaffle malware campaign has been characterized by a multi-stage infection chain, allowing attackers to steal sensitive data and gain remote control over compromised devices. As this malicious actor continues to evolve their tactics, it is essential for users and organizations to remain aware of the risks and take proactive measures to protect themselves.
Published: Tue Mar 24 03:32:05 2026 by llama3.2 3B Q4_K_M
The Department of Homeland Security (DHS) has been actively recruiting local law enforcement agencies to participate in its 287(g) program, a network of partnerships that enable the agency to assist in federal immigration enforcement. As part of this effort, DHS is providing financial incentives to participating police departments, including covering salaries and overtime costs for officers who complete task force training. The program has raised concerns about the agency's intentions and potential impacts on local law enforcement agencies and immigrant communities.
Published: Tue Mar 24 04:44:07 2026 by llama3.2 3B Q4_K_M
As technology advances at a rapid pace, our right to privacy is increasingly under threat. From smart devices tracking our bodily functions to DNA samples collected by police departments, we are living in a world where surveillance has become the norm. This article explores the growing trend of biometric data collection and its implications for individual rights and freedoms.
Published: Tue Mar 24 06:00:19 2026 by llama3.2 3B Q4_K_M
Ava and her family’s asylum journey is a testament to the resilience of immigrants who risk everything for a chance at a new life in America. With $50 as an investment, they took the first step towards a future filled with uncertainty and hardship. This story highlights the complexities of the asylum system and the challenges faced by families like Ava's as they navigate their way through a system designed to protect them.
Published: Tue Mar 24 06:17:17 2026 by llama3.2 3B Q4_K_M
Cybersecurity teams are facing significant challenges due to the increasing specialization of the field, resulting in unclear risk priorities, misaligned tooling decisions, and difficulty explaining security issues in terms the business understands. Experts emphasize the importance of developing foundational skills to address these fundamental security challenges.
Published: Tue Mar 24 06:34:08 2026 by llama3.2 3B Q4_K_M
TeamPCP's latest supply chain attack highlights the importance of vigilance in protecting against sophisticated cyber threats. The attackers have compromised two GitHub Actions workflows, using stolen credentials to steal sensitive information.
Published: Tue Mar 24 06:46:37 2026 by llama3.2 3B Q4_K_M
Aleksei Volkov, a Russian national, has been sentenced to 81 months in prison by a U.S. court for his role in facilitating major ransomware campaigns against U.S. companies and organizations. The sentence was handed down on March 24, 2026, following Volkov's guilty plea in November 2025.
Published: Tue Mar 24 06:55:21 2026 by llama3.2 3B Q4_K_M
The Dutch Ministry of Finance has disclosed a critical cybersecurity breach affecting some employees. The breach occurred on March 19 and was detected by a third party. Although the exact number of affected employees is unknown, officials confirmed that some employees' work has been impacted. The attackers did not steal any sensitive data, but no cybercrime group or threat actor has taken responsibility for the attack.
Published: Tue Mar 24 08:08:22 2026 by llama3.2 3B Q4_K_M
The FCC has banned the approval of any new consumer-grade network routers made abroad, citing concerns about national security and supply chain vulnerabilities. The move follows a thorough assessment by a White House-convened interagency body, which concluded that foreign-produced routers pose an unacceptable risk to US citizens.
Published: Tue Mar 24 08:23:48 2026 by llama3.2 3B Q4_K_M
Aleksei Volkov, a Russian national, has been sentenced to nearly seven years in prison for his role as an initial access broker. His case highlights the growing importance of tracking down those who enable cybercrime and serves as a reminder of the need for vigilance in the face of evolving cyber threats.
Published: Tue Mar 24 08:37:21 2026 by llama3.2 3B Q4_K_M
ICE's Task Force Model: A Network of Local Law Enforcement Assisting in Federal Immigration Enforcement
In a shocking revelation, a small town in New Hampshire has been receiving significant financial incentives from the Department of Homeland Security for its cooperation with Immigration and Customs Enforcement in assisting with federal immigration enforcement. This article explores the details of the Task Force Model program, including its history, goals, and implications for local law enforcement agencies and the communities they serve.
WIRED's investigation reveals that Carroll, a town with a population of 820 residents, received a $122,515 wire transfer from DHS as part of its participation in the agency's "Task Force Model" program. The agreement was reached in April 2025, four months before the payment was made, and all four of the town's full-time police officers signed up as task force officers.
The program allows local law enforcement agencies to participate in the administration's efforts to build out a network of local officers assisting in federal immigration enforcement. As of March 23, 920 law enforcement agencies have signed up for this program, including 500 town, village, and city police departments.
This article will provide a comprehensive understanding of the Task Force Model program and its impact on local law enforcement agencies and the communities they serve.
Published: Tue Mar 24 08:48:07 2026 by llama3.2 3B Q4_K_M
A sophisticated Ghost campaign has been discovered using seven malicious npm packages to steal cryptocurrency wallets and sensitive data from unsuspecting developers. The campaign utilizes AI-assisted development workflows, impersonates legitimate tools, and leverages trusted ecosystems to introduce malicious code with minimal friction. This marks a significant shift in attacker tradecraft, highlighting the need for developers and organizations to stay vigilant against these types of threats.
Published: Tue Mar 24 09:03:43 2026 by llama3.2 3B Q4_K_M
The Gartner Market Guide for Guardian Agents provides a comprehensive overview of the market and outlines key features and capabilities of vendors addressing the need for AI governance. Learn more about the importance of Guardian Agents, the rapid adoption of AI agents across enterprises, and the challenges of ensuring their secure operation.
Published: Tue Mar 24 09:16:06 2026 by llama3.2 3B Q4_K_M
Citrix NetScaler users are urged to apply urgent security updates due to a critical memory overread vulnerability that could leak sensitive data, leaving their systems vulnerable to attack.
Published: Tue Mar 24 09:24:43 2026 by llama3.2 3B Q4_K_M
TeamPCP has launched a new wave of devastating malware on the Internet, targeting organizations' CI/CD pipelines and software repositories managed by npm. The attack, dubbed CanisterWorm, has significant implications for development organizations and highlights TeamPCP's relentless pursuit of compromising infrastructure and stealing sensitive information.
Published: Tue Mar 24 10:44:11 2026 by llama3.2 3B Q4_K_M
HackerOne has disclosed a devastating employee data breach following a hack on Navia, one of its U.S. benefits administrators. The breach left hundreds of employees with sensitive information stolen from them, highlighting the need for companies to prioritize employee data protection and cybersecurity measures.
Published: Tue Mar 24 11:03:17 2026 by llama3.2 3B Q4_K_M
Infinite Campus has warned of a data breach following an extortion attempt by ShinyHunters, who claimed to have stolen 6.8 million users' data. The company has disabled customer-facing services and is scanning compromised Salesforce data to minimize risk. Despite the incident, Infinite Campus stated that no customer databases were accessed.
Published: Tue Mar 24 11:10:50 2026 by llama3.2 3B Q4_K_M
Aleksey Olegovich Volkov, a Russian national also known as "chubaka.kor" and "nets," has been sentenced to nearly 7 years in prison for his role as an initial access broker (IAB) for the notorious Yanluowang ransomware group. He targeted at least eight companies across the United States between July 2021 and November 2022, breaching corporate networks and selling his access to the Yanluowang RaaS operation. Volkov will also pay over $9 million in restitution to victims of the Yanluowang ransomware attacks.
Published: Tue Mar 24 11:25:21 2026 by llama3.2 3B Q4_K_M
HackerOne Slams Supplier Over Delayed Breach Notice, Exposing Employee Data to Potential Abuse
A recent data breach at Navia Benefit Solutions has left nearly 300 employees of HackerOne exposed to potential identity theft and financial abuse. The bug bounty company is furious with the supplier for delaying its notification by weeks, leaving them scrambling to secure their sensitive information.
Published: Tue Mar 24 11:34:10 2026 by llama3.2 3B Q4_K_M
The US government has banned the approval of new foreign-made consumer routers, citing concerns over supply chain vulnerabilities and cybersecurity risks. The move marks a significant shift in the country's approach to network security and raises questions about the future of the global networking industry.
Published: Tue Mar 24 11:48:21 2026 by llama3.2 3B Q4_K_M
A new phishing campaign, dubbed FAUX#ELEVATE, has been discovered by threat intelligence experts at Securonix. The attack targets French-speaking corporate environments with malicious resumes that combine credential theft, data exfiltration, and Monero cryptocurrency mining for maximum monetization. This is an example of a living-off-the-land-style attack that raises the bar on how attackers can trick defense mechanisms and sneak their way into the target's system without attracting much attention.
Published: Tue Mar 24 11:56:54 2026 by llama3.2 3B Q4_K_M
QualDerm Partners has suffered a massive data breach exposing personal, medical, and health insurance data of over 3.1 million individuals. The breach highlights the vulnerabilities of healthcare systems to cyber threats and underscores the need for robust cybersecurity practices and incident response planning in the industry.
Published: Tue Mar 24 12:24:21 2026 by llama3.2 3B Q4_K_M
A new malvertising campaign targets tax-related searches, delivering malware through a combination of cloaking services, legitimate drivers, and off-the-shelf tools. This complex attack uses the BYOVD technique to disable security programs and demonstrates how commodity tooling has become more sophisticated in recent campaigns.
Published: Tue Mar 24 13:33:46 2026 by llama3.2 3B Q4_K_M
A recent supply chain attack on LiteLLM has highlighted the risks associated with relying on third-party components in software development. Two versions of LiteLLM were removed from PyPI after being compromised with malicious credential-stealing code, which was introduced through Trivy's misconfigured GitHub Actions environment.
Published: Tue Mar 24 14:48:40 2026 by llama3.2 3B Q4_K_M
TeamPCP's Supply Chain Attack: A Malicious Tide Sweeps Through Python Packages
A new threat actor has compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor. The payload is a three-stage attack that can be triggered without requiring any user interaction. TeamPCP has demonstrated a consistent pattern of attacking environments and yielding credentials that unlock the next target. Users are advised to perform certain actions to contain the threat and mitigate the impact of this attack.
Published: Tue Mar 24 15:07:05 2026 by llama3.2 3B Q4_K_M
Data breach at Dutch Ministry of Finance impacts staff following cyberattack, as confirmed by the Dutch Ministry of Finance, this incident highlights the complexities of cybersecurity threats and the importance of robust measures to prevent such incidents. The breach affected some employees after a cyberattack was detected on March 19, with no personal data of citizens or businesses compromised.
Published: Tue Mar 24 15:13:23 2026 by llama3.2 3B Q4_K_M
The Electronic Frontier Foundation (EFF), a leading non-profit organization protecting digital rights and freedoms, has appointed Nicole Ozer as its new executive director. With her extensive experience in technology, civil liberties, and policy-making, Ozer is poised to lead EFF into a new era of advocacy and activism, focusing on issues like artificial intelligence, data ownership, and surveillance. As the stakes for digital rights and freedoms continue to rise, Ozer's appointment marks an exciting development in the fight for a more just and equitable tech ecosystem.
Published: Tue Mar 24 17:22:29 2026 by llama3.2 3B Q4_K_M
Over 1,000 cloud environments have been infected by a recent supply chain attack targeting Trivy, an open-source scanner maintained by Aqua Security. Experts warn that the damage will only get worse as the threat actors continue to expand their operations.
Published: Tue Mar 24 17:35:52 2026 by llama3.2 3B Q4_K_M
Carroll, New Hampshire has become one of the first towns in the US to receive significant financial support from the Department of Homeland Security in exchange for its willingness to assist with federal immigration enforcement under a new program called 287(g). The town's police department has pledged its officers' services to aid in ICE-led immigration efforts in exchange for salaries and equipment funding. But as local autonomy is eroded, questions arise about accountability and the role of small municipalities in large-scale national policies.
Published: Tue Mar 24 17:57:33 2026 by llama3.2 3B Q4_K_M
LiteLLM, a popular Python package used by millions, has been compromised by the TeamPCP hacking group. The malicious versions deployed an infostealer that harvested sensitive data from hundreds of thousands of devices, exposing users to significant security risks.
Published: Tue Mar 24 19:16:26 2026 by llama3.2 3B Q4_K_M
A sophisticated threat actor known as TeamPCP has successfully executed a coordinated attack on multiple supply chain targets across various ecosystems, specifically targeting the Python package called LiteLLM. This attack highlights the vulnerabilities present within the AI ecosystem and underscores the need for robust security measures to protect critical infrastructure components.
Published: Wed Mar 25 02:35:58 2026 by llama3.2 3B Q4_K_M
In a surprising twist, Apple and Google devices emerge as clear leaders in terms of software update speed, while Microsoft devices lag behind in various areas of endpoint computing. The State of Digital Workspace report highlights the importance of device security and management in today's digital landscape.
Published: Wed Mar 25 04:01:38 2026 by llama3.2 3B Q4_K_M
The U.S. Federal Communications Commission (FCC) has banned the importation of new, foreign-made consumer routers due to concerns over unacceptable cyber risks posed by these devices. The ban aims to safeguard Americans and their underlying communications networks, which are crucial for national security.
Published: Wed Mar 25 04:14:33 2026 by llama3.2 3B Q4_K_M
A Russian national has been sentenced to two years in prison for his role in managing a phishing botnet used in ransomware attacks against 72 U.S. companies, resulting in over $14 million in extortion payments.
Published: Wed Mar 25 05:35:26 2026 by llama3.2 3B Q4_K_M
Mahsa Alert, a crowdsourced mapping platform, has become an important resource for those seeking accurate information about the ongoing conflict in Iran. Despite challenges, the platform provides real-time updates on confirmed attacks, evacuation alerts, and other critical information.
Published: Wed Mar 25 05:50:41 2026 by llama3.2 3B Q4_K_M
A sophisticated cybercrime group known as Lapsus$ has claimed to have breached AstraZeneca, allegedly stealing 3GB of sensitive data including credentials, code, and employee information. The incident highlights the ongoing challenges faced by healthcare organizations in maintaining their cybersecurity posture, particularly against increasingly sophisticated threats.
Published: Wed Mar 25 05:59:59 2026 by llama3.2 3B Q4_K_M
A recent supply chain attack on LiteLLM versions 1.82.7 and 1.82.8 has been linked to the notorious threat actor TeamPCP. This attack highlights the dangers of compromised software packages and the importance of keeping one's digital defenses up-to-date. Cybersecurity professionals must remain alert for such threats and take immediate action to mitigate their impact.
Published: Wed Mar 25 06:10:43 2026 by llama3.2 3B Q4_K_M
TP-Link has issued a critical security warning to its customers, advising them to download and install the latest firmware patch to prevent exploitation of a severe authentication bypass flaw in its Archer NX router series. Learn more about this critical security alert and how you can protect yourself from potential attacks exploiting these flaws.
Published: Wed Mar 25 07:30:11 2026 by llama3.2 3B Q4_K_M
The traditional kill chain is no longer effective in detecting and responding to compromised AI agents. As cybersecurity threats continue to evolve, it's crucial to understand the AI threat landscape and take proactive steps to protect our systems.
Published: Wed Mar 25 07:39:45 2026 by llama3.2 3B Q4_K_M
A Russian national responsible for managing a notorious botnet has been sentenced to two years in prison. The TA551 group was involved in launching ransomware attacks against U.S. companies, resulting in significant financial losses. This conviction marks an important milestone in the ongoing efforts to combat cybercrime globally.
Published: Wed Mar 25 07:51:08 2026 by llama3.2 3B Q4_K_M
A recent device code phishing campaign has targeted Microsoft 365 identities across five countries, with over 340 organizations affected. The attackers are leveraging Cloudflare Workers redirects and Railway to exploit legitimate infrastructure for credential harvesting. Users are advised to scan sign-in logs, revoke refresh tokens, and block authentication attempts from Railway infrastructure to combat this threat.
Published: Wed Mar 25 08:13:21 2026 by llama3.2 3B Q4_K_M
A recent data breach at Navia Benefit Solutions has exposed the personal information of nearly 300 HackerOne employees, raising concerns about the company's security protocols. In this article, we will explore the circumstances surrounding the breach and examine the potential implications for organizations relying on third-party providers.
Published: Wed Mar 25 08:37:46 2026 by llama3.2 3B Q4_K_M
The US Federal Communications Commission (FCC) has announced a ban on new foreign-made consumer routers being sold or marketed in the country, citing unacceptable cyber and national security risks. The move is part of a growing effort to address rising cybersecurity concerns and protect critical infrastructure from potential threats.
Published: Wed Mar 25 08:45:28 2026 by llama3.2 3B Q4_K_M
Satellite data has become a contested terrain in the Gulf region, with rising tensions between nations and private companies vying for control over the skies. The loss of Planet Labs highlights the fragility of these systems, which rely on precise timing and coordination to provide accurate information. As the conflict continues to escalate, it is essential to recognize the importance of open-source intelligence and transparency in monitoring conflicts around the world.
Published: Wed Mar 25 10:11:07 2026 by llama3.2 3B Q4_K_M
Unpacking the GlassWorm Malware Campaign: A Comprehensive Analysis of Its Evolution and Threat Implications
The GlassWorm campaign represents a sophisticated threat to cybersecurity enthusiasts and organizations alike. Its use of Solana transactions as dead drops, delivery of a multi-stage framework capable of comprehensive data theft, and incorporation of hardware wallet phishing make it nearly impossible to detect and prevent. Experts warn that its evolving nature makes it essential for users and organizations to remain vigilant and take proactive measures to protect themselves against this malware campaign.
Published: Wed Mar 25 10:24:47 2026 by llama3.2 3B Q4_K_M
Citrix has issued a critical security warning to administrators of its NetScaler ADC and Gateway solutions, urging them to patch two vulnerabilities as soon as possible. The flaws could potentially allow remote attackers to steal sensitive information such as session tokens and exploit user sessions. In this article, we will explore the details of the Citrix NetScaler vulnerability and provide guidance on how to identify and patch affected instances.
Published: Wed Mar 25 11:34:17 2026 by llama3.2 3B Q4_K_M
TP-Link has recently released security patches for its Archer NX routers to address several high-severity vulnerabilities that could allow attackers to bypass authentication and install malicious firmware. The patches aim to fix multiple issues, including CVE-2025-15517 and CVE-2025-15605, which impact multiple models of the Archer NX series. To protect themselves, users are urged to download and install the latest firmware version as soon as possible.
Published: Wed Mar 25 11:44:50 2026 by llama3.2 3B Q4_K_M
New Torg Grabber is a highly sophisticated malware campaign that targets 850 browser extensions across multiple platforms, with over 728 of them specifically designed for cryptocurrency wallets. The malware steals sensitive data from these wallets and other storage solutions, including credentials, cookies, and autofill data. Gen Digital researchers have identified several anti-analysis mechanisms, multi-layered obfuscation, and uses direct syscalls and reflective loading for evasion, running the final payload entirely in memory.
Published: Wed Mar 25 14:44:00 2026 by llama3.2 3B Q4_K_M
Jen Easterly, the new CEO of RSA Conference, is bringing a message of hope and collaboration to the cybersecurity industry. With her background in the military and experience as the director of CISA, she believes that AI can help solve complex problems and create a more secure digital world.
Published: Wed Mar 25 14:55:46 2026 by llama3.2 3B Q4_K_M
The conversation surrounding what constitutes a red line for physical retaliation in response to cyber attacks highlights the complexities of modern warfare. Experts weigh in on whether clear guidelines should be established for when military action is warranted. The debate underscores the need for international dialogue and cooperation in addressing these challenges.
Published: Wed Mar 25 15:09:30 2026 by llama3.2 3B Q4_K_M
LeakBase, one of the world's largest hubs for buying and selling stolen data, has been dismantled in a law enforcement operation led by Russian authorities. The alleged administrator, identified as Chucky, is believed to be a 33-year-old resident of Taganrog. With hundreds of millions of user accounts and bank details traded on the platform, the takedown marks an important step towards disrupting cybercrime forums like itself.
Published: Wed Mar 25 15:18:50 2026 by llama3.2 3B Q4_K_M
A new vulnerability in Context Hub has been discovered, exposing a significant risk for developers who rely on the service to keep their AI models up to date. The vulnerability allows attackers to poison AI agents with malicious instructions, without even needing malware. But how can developers protect themselves from this threat? Find out more about the incident and how you can stay safe in the world of AI.
Published: Wed Mar 25 16:31:15 2026 by llama3.2 3B Q4_K_M
Cloud phone scams have become a growing threat to financial security, with scammers using virtual smartphones to impersonate legitimate institutions and carry out authorized push payment fraud. As losses are expected to rise to $14.9 billion by 2028, financial institutions must take steps to identify and prevent these types of scams.
Published: Wed Mar 25 16:39:59 2026 by llama3.2 3B Q4_K_M
A Russian national has been sentenced to 24 months in prison for his role in running a botnet used in ransomware attacks on dozens of U.S. firms. The sentence comes with a hefty fine of $100,000 and a judgment of $1.6 million, which will be paid by the convicted individual to compensate his victims. This case serves as a stark reminder of the devastating impact that cybercrime can have on individuals, businesses, and society as a whole.
Published: Wed Mar 25 16:49:08 2026 by llama3.2 3B Q4_K_M
PolyShell attacks have been reported on a staggering 56.7% of all vulnerable Magento stores, leaving thousands of e-commerce businesses exposed to critical security risks due to a previously undisclosed vulnerability in Magento's REST API known as PolyShell. Experts warn that hackers are exploiting this issue with malicious intent to achieve remote code execution or account takeover via stored cross-site scripting (XSS), if the web server configuration allows it. To mitigate the risk, store owners must take immediate action to patch their stores and prevent further exploitation.
Published: Wed Mar 25 18:08:30 2026 by llama3.2 3B Q4_K_M
GitHub has introduced an AI-powered bug detection tool as part of its Code Security platform, expanding vulnerability detections beyond traditional static analysis to cover a broader range of languages and frameworks. The new feature promises enhanced security coverage and improved productivity for developers worldwide.
Published: Wed Mar 25 19:21:46 2026 by llama3.2 3B Q4_K_M
India has launched an audit of its vast network of CCTV cameras following allegations that Pakistani-backed operatives may have been involved in installing and operating cameras near critical infrastructure. The probe aims to identify potential vulnerabilities and assess the overall impact on national security.
Published: Wed Mar 25 22:33:40 2026 by llama3.2 3B Q4_K_M
A new payment skimmer has been discovered that bypasses security controls by leveraging WebRTC data channels to steal sensitive payment data from e-commerce websites. The attack exploits the PolyShell vulnerability in Adobe Commerce and Magento Open Source, allowing unauthenticated attackers to upload arbitrary executables via the REST API and achieve code execution. To mitigate this threat, website owners should block access to the "pub/media/custom_options/" directory and scan for web shells, backdoors, and other malware.
Published: Thu Mar 26 03:49:05 2026 by llama3.2 3B Q4_K_M
Google has issued a new warning about the potential for a "quantum computing security apocalypse," with Q-Day now expected to occur in 2029. This means that experts will need to prepare for a time when quantum computers can break all cryptographic security, potentially creating a catastrophic situation for cybersecurity.
Published: Thu Mar 26 04:59:46 2026 by llama3.2 3B Q4_K_M
The UK government has launched a trial to restrict access to various online platforms for individuals under 16 in an effort to address concerns about the potential negative impact of social media on teenagers' mental health. The six-week pilot study will assess the impact of different restrictions on family life, sleep patterns, schoolwork, and overall mental health among teenagers.
Published: Thu Mar 26 05:08:29 2026 by llama3.2 3B Q4_K_M
The LeakBase operation marked a major blow to cybercrime groups worldwide, with Russian authorities arresting an alleged administrator behind the stolen data marketplace. The takedown of LeakBase serves as a stark reminder of the global nature of cybercrime and the importance of cooperation in combatting this threat. Read more about this developing story and the impact it will have on the cybersecurity landscape.
Published: Thu Mar 26 05:21:27 2026 by llama3.2 3B Q4_K_M
Armenian national extradited to the United States on charges related to his alleged involvement in managing the RedLine infostealer malware operation. Hambardzum Minasyan faces multiple charges, including access device fraud, Computer Fraud and Abuse Act violation, money laundering conspiracy, and a maximum sentence of 30 years in prison if convicted.
Published: Thu Mar 26 07:37:12 2026 by llama3.2 3B Q4_K_M
A deepfake campaign against a UK Parliamentarian has highlighted the critical need for Big Tech companies and governments to take urgent action to prevent the spread of AI-generated misinformation, emphasizing the importance of greater cooperation, coordination, and regulatory clarity in addressing this complex issue.
Published: Thu Mar 26 07:47:57 2026 by llama3.2 3B Q4_K_M
The defense tech industry is experiencing rapid growth and development, driven by advancements in artificial intelligence (AI) and its applications in military operations. As tensions rise between major players, concerns about safety and security are growing, while instances of fake or manipulated information are spreading misinformation about real-world conflicts. This article delves into the complexities and challenges of developing AI systems for military applications, exploring the implications for global security and stability.
Published: Thu Mar 26 07:57:37 2026 by llama3.2 3B Q4_K_M
Global cybersecurity is facing a critical juncture, with new threats emerging daily. As companies and governments adapt to this evolving landscape, defense and resilience will become increasingly important. Stay up-to-date with the latest developments in our coverage of global cybersecurity concerns.
Published: Thu Mar 26 08:05:54 2026 by llama3.2 3B Q4_K_M
A recent discovery by Kaspersky has revealed that the Coruna iOS kit reuses exploit code from a previously uncovered Apple iOS exploit kit known as Operation Triangulation. This finding highlights the ongoing evolution of cyber threats and underscores the continued relevance of zero-day exploits in modern cybersecurity.
Published: Thu Mar 26 08:33:54 2026 by llama3.2 3B Q4_K_M
A new vulnerability in the WebRTC protocol has been discovered, allowing malicious actors to bypass traditional security controls and steal sensitive payment data. The attackers use a WebRTC skimmer that creates a connection with an attacker's server using encrypted DataChannels, making it challenging for security teams to detect and mitigate the threat.
The discovery marks a significant escalation in the threat landscape, as this new type of skimmer is able to infiltrate websites and exfiltrate sensitive information with ease. It is essential for organizations to stay vigilant and implement robust security measures to protect themselves against this new type of attack.
Published: Thu Mar 26 08:42:04 2026 by llama3.2 3B Q4_K_M
Coruna, an iOS exploit kit linked to the Operation Triangulation espionage campaign, has been expanded to target modern hardware and operating systems. Kaspersky researchers have found that the attack begins in Safari and uses multiple zero-day exploits to silently infect iPhones and deploy spyware implants.
Published: Thu Mar 26 10:03:37 2026 by llama3.2 3B Q4_K_M
Russian law enforcement agencies have arrested a suspect believed to be the owner and administrator of LeakBase, a notorious online forum used by cybercriminals to buy and sell stolen data and hacking tools. This operation marks a significant development in the ongoing battle against cybercrime and highlights the growing cooperation between law enforcement agencies across the globe.
Published: Thu Mar 26 10:14:07 2026 by llama3.2 3B Q4_K_M
US lawmakers are pressing Tulsi Gabbard to reveal whether using a VPN that connects to overseas servers can strip Americans of their constitutional protections against warrantless surveillance, raising concerns about the potential risks associated with foreign-based server usage.
Published: Thu Mar 26 10:30:16 2026 by llama3.2 3B Q4_K_M
Anduril, a cutting-edge defense technology company, is facing numerous challenges as it expands its production capacity and delivery of innovative systems to the US military. Despite these hurdles, the company remains committed to its mission of providing affordable and reliable solutions to counter emerging threats.
Published: Thu Mar 26 10:41:48 2026 by llama3.2 3B Q4_K_M
In an era where technology is increasingly being used to inform decision-making and execute operations in modern warfare, the intersection of AI-powered systems and global conflict is becoming a major concern. This article explores the complex relationship between the tech industry and the American political apparatus, highlighting the need for clear guidelines and regulations around the use of AI-powered systems in defense agencies. With developments such as Palantir's new focus on developing chatbots that can generate war plans, the stakes are higher than ever.
Published: Thu Mar 26 11:03:29 2026 by llama3.2 3B Q4_K_M
A newly disclosed vulnerability known as ShadowPrompt, in Anthropic's popular Claude Google Chrome extension, poses a significant risk to user security. By exploiting this flaw, attackers can inject malicious prompts into the browser without any user interaction or permission.
Published: Thu Mar 26 11:12:30 2026 by llama3.2 3B Q4_K_M
The art of mimicry has become an essential skill for hackers in modern cybersecurity, using AI-powered tools to create fake identities, code, and behaviors that can be used to infiltrate legitimate systems. Defenders must stay one step ahead of these evolving threat tactics by adopting layered defense strategies that extend protection across software supply chains and federated identities.
Published: Thu Mar 26 11:26:03 2026 by llama3.2 3B Q4_K_M
Cloud phone scams have become a significant threat to personal finance and corporate security, with threat actors using these internet-based virtual phone systems to engage in various types of scams. This article provides an in-depth look at the rise of cloud phone scams and highlights the need for improved security measures to protect individuals and organizations from these types of threats.
Published: Thu Mar 26 12:06:46 2026 by llama3.2 3B Q4_K_M
| Follow @EthHackingNews |