ICYMI: 2026-03-31
Latest Headlines
Android Developer Verification Rollout Begins Ahead of September Enforcement
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
Iran Threatens to Start Attacking Major US Tech Firms on April 1
The Broken System That Keeps Shipping Crews Stranded in the Strait of Hormuz
Censys Raises $70 Million for Internet Intelligence Platform
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks
Venom Stealer Raises Stakes With Continuous Credential Harvesting
Google Slashes Quantum Resource Requirements for Breaking Cryptocurrency Encryption
Exploitation of Critical Fortinet FortiClient EMS Flaw Begins
StrongSwan Flaw Allows Unauthenticated Attackers to Crash VPNs
Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks
Google Unveils Ransomware Detection and File Restoration for Google Drive
Hackers Deploy Telegram-Based ResokerRAT With Screenshot and Persistence Features
Anthropic’s Claude Code Source Code Reportedly Leaked Via Their npm Registry
WordPress Plugin Vulnerability Exposes Sensitive Data From 800,000+ Sites
EvilTokens Emerges as New Phishing-as-a-Service Platform for Microsoft Account Takeover
ChatGPT Vulnerability Let Attackers Silently Exfiltrate User Prompts and Other Sensitive Data
CareCloud Data Breach – Hackers Accessed IT Infrastructure and Stole Patient Data
Apple New macOS Tahoe Feature Warns Users on ClickFix Attacks
CISA Warns of Citrix NetScaler Vulnerability Actively Exploited in Attacks
Proton launches new “Meet” privacy-focused conferencing platform
GIGABYTE Control Center vulnerable to arbitrary file write flaw
Claude AI finds Vim, Emacs RCE bugs that trigger on file open
Cisco source code stolen in Trivy-linked dev environment breach
Hackers compromise Axios npm package to drop cross-platform malware
Microsoft fixes Outlook Classic crashes caused by Teams Meeting add-in
Hacker charged with stealing $53 million from Uranium crypto exchange
Dutch Finance Ministry takes treasury banking portal offline after breach
CISA orders feds to patch actively exploited Citrix flaw by Thursday
– MTZ