ICYMI: 2026-03-26
Latest Headlines
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in Recent Mass Attacks
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
How Trump’s Plot to Grab Iran’s Nuclear Fuel Would Actually Work
A $20 Billion Crypto Scam Market Faces a New Government Crackdown
Anduril Wants to Own the Future of War Tech. Mishaps, Delays, and Challenges Abound
Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure
New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware
Leak Bazaar Turns Stolen Corporate Data Into a Structured Criminal Marketplace
VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside Linux Systems
CISA Warns of Langflow Code Injection Vulnerability Exploited in Attacks
IDrive for Windows Vulnerability Let Attackers Escalate Privileges
GhostClaw AI Assisted Malware Attacking macOS Users to Deploy Credential-Stealing Payloads
LeakBase Hacker Forum Admin Arrested in Russia by Law Enforcement Authorities
Hackers Plant Stealthy BPFdoor Backdoors in Telecom Networks for Long-Term Access
Tax Audit Phishing Campaign Tied to Silver Fox Shifts From RATs to Python Stealers
New Torg Grabber Stealer Moves From Telegram Exfiltration to Encrypted REST API C2
Ajax football club hack exposed fan data, enabled ticket hijack
CISA: New Langflow flaw actively exploited to hijack AI workflows
TikTok for Business accounts targeted in new phishing campaign
WhatsApp rolls out more AI features, iOS multi-account support
Inside a Modern Fraud Attack: From Bot Signups to Account Takeovers
Coruna iOS exploit framework linked to Triangulation attacks
Suspected RedLine infostealer malware admin extradited to US
– MTZ