Cisco Talos’ Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence…
Kubernetes Upgrades Are Eating Engineering Time: How to Get It Back
Kubernetes powers your products, but it quietly hijacks your engineering organization. Every year, you pay senior engineers to wrestle with version bumps, API deprecations, and broken add‑ons that don’t move a single KPI your customers care about. Numbers vary by…
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting and maintaining stealthy access mechanisms within critical environments, has been…
TeamPCP Supply Chain Campaign: Update 001 – Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available, (Thu, Mar 26th)
This is the first update to the TeamPCP supply chain campaign threat intelligence report, “When the Security Scanner Became the Weapon” (v3.0, March 25, 2026). That report covers the full campaign from the February 28 initial access through the March…
A puppet made me cry and all I got was this t-shirt
In this week’s newsletter, Amy draws parallels between the collaborative themes of “Project Hail Mary” and the massive team effort behind the newly released Talos Year in Review report. This article has been indexed from Cisco Talos Blog Read the…
MIWIC26: Kerlyn Manyi, Cybersecurity Practitioner, Nucleus Systems & Founder of CyberFoundHer Initiative
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected…
Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka
A new macOS infostealer, NukeChain (now Infiniti Stealer), uses fake CAPTCHA pages to trick users into running malicious commands. This article has been indexed from Malwarebytes Read the original article: Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka
Autonomous Development and AI: Speed vs. Security
AI-assisted development is changing how software gets built. What began as a productivity boost is quickly becoming something bigger. The post Autonomous Development and AI: Speed vs. Security appeared first on Security Boulevard. This article has been indexed from Security…
TeamPCP Supply Chain Campaign: Update 001 ? Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available, (Thu, Mar 26th)
This is the first update to the TeamPCP supply chain campaign threat intelligence report, “When the Security Scanner Became the Weapon†(v3.0, March 25, 2026). That report covers the full campaign from the February 28 initial access through the March…
Best AI Security Solutions for Enterprises in 2026
Enterprise AI security solutions in 2026, compare Check Point, Palo Alto, CrowdStrike, Fortinet, and Zscaler across cloud, endpoint, and network. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Best…
Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks
Leaked hacking tools threaten the security of millions of older iPhones. Cybersecurity experts weigh in. This article has been indexed from Security News | TechCrunch Read the original article: Apple made strides with iOS 26 security, but leaked hacking tools…
When Malware Talks Back: Real-Time Interaction with a Threat Actor During the Analysis of Kiss Loader
Talking to a malware author is a rare occurrence, something most analysts hear about but rarely experience themselves. Identifying the individual behind a malware campaign is often one of the most difficult aspects of threat research. In this case, what…
Silver Fox: The Only Tax Audit Where the Fine Print Installs Malware
Since early 2025, TDR has focused on tracking Silver Fox, a China-based intrusion set. Originally known for financially motivated attacks, the group has been shifting toward more sophisticated, APT-style operations since at least 2024. This dual focus reflects a broader…
Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks for Long-Term Access
A months-long investigation by Rapid7 Labs has exposed a sophisticated, state-sponsored espionage campaign by the China-nexus threat actor Red Menshen, which has embedded some of the most covert digital sleeper cells ever documented inside global telecommunications infrastructure. Released on March…
LeakBase Hacker Forum Admin Arrested in Russia by Law Enforcement Authorities
Russian law enforcement has arrested the suspected administrator of LeakBase, a prominent international hacker forum. The operation, coordinated by the Russian Ministry of Internal Affairs (MVD) alongside the Bureau of Special Technical Measures (BSTM), dismantled a platform that traded in…
GhostClaw AI Assisted Malware Attacking macOS Users to Deploy Credential-Stealing Payloads
A newly documented malware campaign called GhostClaw is actively targeting macOS users through fake GitHub repositories and AI-assisted development workflows. The campaign uses social engineering disguised as legitimate developer tools to steal user credentials and drop secondary payloads on infected…
IDrive for Windows Vulnerability Let Attackers Escalate Privileges
A critical local privilege escalation vulnerability has been identified in the IDrive Cloud Backup Client for Windows. Tracked as CVE-2026-1995, this local privilege escalation vulnerability affects the IDrive Cloud Backup Client for Windows, specifically targeting versions 7.0.0.63 and earlier. Security researchers…
CISA Warns of Langflow Code Injection Vulnerability Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the Langflow platform to its Known Exploited Vulnerabilities (KEV) catalog on March 25, 2026. The vulnerability, tracked as CVE-2026-33017, involves a highly dangerous code injection…
Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code
Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code This article has been indexed from www.infosecurity-magazine.com Read the original article: Security Researchers Sound the Alarm on Vulnerabilities in…
IT Security News Hourly Summary 2026-03-26 18h : 13 posts
13 posts were published in the last hour 16:34 : Quish Splash QR Code Phishing Campaign Hits 1.6 Million Users 16:34 : OpenCode Systems OC Messaging and USSD Gateway 16:34 : PTC Windchill Product Lifecycle Management 16:34 : WAGO GmbH…
Quish Splash QR Code Phishing Campaign Hits 1.6 Million Users
7AI research reveals a massive QR code phishing attack that evaded SPF, DKIM, and DMARC. Find out how 1.6 million emails went undetected. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the…
OpenCode Systems OC Messaging and USSD Gateway
View CSAF Summary Successful exploitation of this vulnerability could allow an authenticated low-privileged user to gain access to SMS messages outside of their authorized tenant scope via a crafted company or tenant identifier parameter. The following versions of OpenCode Systems…
PTC Windchill Product Lifecycle Management
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to achieve remote code execution. The following versions of PTC Windchill Product Lifecycle Management are affected: Windchill PDMLink 11.0_M030 (CVE-2026-4681) Windchill PDMLink 11.1_M020 (CVE-2026-4681) Windchill PDMLink 11.2.1.0 (CVE-2026-4681)…
WAGO GmbH & Co. KG Industrial Managed Switches
View CSAF Summary An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device. The following versions of WAGO GmbH & Co. KG Industrial Managed Switches…