<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-02T23:36:05Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Cyber Security News (RSS Feed)</title>
  <author>
    <name>Cyber Security News (RSS Feed)</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub13pstz4yme247djhn5cqs8wdrnwq26n5x8cvnt03dlep843la84ns0p5djv.rss" />
  <link href="https://yabu.me/npub13pstz4yme247djhn5cqs8wdrnwq26n5x8cvnt03dlep843la84ns0p5djv" />
  <id>https://yabu.me/npub13pstz4yme247djhn5cqs8wdrnwq26n5x8cvnt03dlep843la84ns0p5djv</id>
  <icon>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</icon>
  <logo>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</logo>




  <entry>
    <id>https://yabu.me/nevent1qqs9050fatlj3xhrau7l6ck6ma2a29kvl5h73retepwpfml2g84pgnqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw9yt80e</id>
    
      <title type="html">How Elite SOCs Cut Escalation Rates by Arming Tier 1 With Better ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9050fatlj3xhrau7l6ck6ma2a29kvl5h73retepwpfml2g84pgnqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw9yt80e" />
    <content type="html">
      How Elite SOCs Cut Escalation Rates by Arming Tier 1 With Better Threat Intelligence&lt;br/&gt;&lt;br/&gt;In a mature Security Operations Center, escalation is supposed to work like a scalpel, precise, intentional, and reserved for alerts that genuinely demand deeper expertise. But across many teams today, it has become something far less disciplined: a reflex, a pressure valve, a way to pass uncertainty up the chain. The consequences are predictable. Tier […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/reduce-soc-escalation-rates-tier-1-alert-triage/&#34;&gt;https://cybersecuritynews.com/reduce-soc-escalation-rates-tier-1-alert-triage/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/reduce-soc-escalation-rates-tier-1-alert-triage/&#34;&gt;https://cybersecuritynews.com/reduce-soc-escalation-rates-tier-1-alert-triage/&lt;/a&gt;
    </content>
    <updated>2026-04-02T16:58:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxuqdj6w50nyqprqa7ge5mmklsjyyq6z60ns4qw07gdcym8h3nn5czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkgqh5y</id>
    
      <title type="html">Hackers Clone CERT-UA Site to Trick Victims Into Installing ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxuqdj6w50nyqprqa7ge5mmklsjyyq6z60ns4qw07gdcym8h3nn5czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkgqh5y" />
    <content type="html">
      Hackers Clone CERT-UA Site to Trick Victims Into Installing Go-Based RAT&lt;br/&gt;&lt;br/&gt;A threat group recently set up a convincing fake version of Ukraine’s official cybersecurity authority website to trick targets into downloading a dangerous remote access tool. The campaign, now tracked under the identifier UAC-0255, relied on a mix of phishing emails and a cloned government website to push malware onto the computers of government workers, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-clone-cert-ua-site/&#34;&gt;https://cybersecuritynews.com/hackers-clone-cert-ua-site/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-clone-cert-ua-site/&#34;&gt;https://cybersecuritynews.com/hackers-clone-cert-ua-site/&lt;/a&gt;
    </content>
    <updated>2026-04-02T16:15:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0xl36t60g3zy68djv359w2zgqe9cl8jcwuahme85l0rttmvl2phqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcpxwm8</id>
    
      <title type="html">New Akira Lookalike Ransomware Campaign Targeting Windows Users ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0xl36t60g3zy68djv359w2zgqe9cl8jcwuahme85l0rttmvl2phqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcpxwm8" />
    <content type="html">
      New Akira Lookalike Ransomware Campaign Targeting Windows Users in South America&lt;br/&gt;&lt;br/&gt;A new and dangerous ransomware campaign has surfaced across South America, targeting Windows users with a carefully crafted strain that closely imitates the well-known Akira ransomware. While the two may appear nearly identical on the surface, this new threat is built on an entirely different foundation — one that quietly borrows from another notorious ransomware […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-akira-lookalike-ransomware-campaign/&#34;&gt;https://cybersecuritynews.com/new-akira-lookalike-ransomware-campaign/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-akira-lookalike-ransomware-campaign/&#34;&gt;https://cybersecuritynews.com/new-akira-lookalike-ransomware-campaign/&lt;/a&gt;
    </content>
    <updated>2026-04-02T16:12:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz4ewl6004nxacqc6akc6xtp8cwh2h3r93l0ehr3u5up77rse99aczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhu3ca9</id>
    
      <title type="html">Qilin Ransomware Uses Malicious DLL to Kill Almost Every ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz4ewl6004nxacqc6akc6xtp8cwh2h3r93l0ehr3u5up77rse99aczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhu3ca9" />
    <content type="html">
      Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions&lt;br/&gt;&lt;br/&gt;Qilin ransomware group is deploying a sophisticated, multi-stage infection chain via a malicious msimg32.dll that can disable over 300 endpoint detection and response (EDR) drivers from virtually every major security vendor. As organizations increasingly rely on EDR solutions, which offer far greater behavioral visibility than legacy antivirus, threat actors have adapted by weaponizing EDR killers […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/qilin-ransomware-kill-edr/&#34;&gt;https://cybersecuritynews.com/qilin-ransomware-kill-edr/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/qilin-ransomware-kill-edr/&#34;&gt;https://cybersecuritynews.com/qilin-ransomware-kill-edr/&lt;/a&gt;
    </content>
    <updated>2026-04-02T15:42:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2q60j9387j8wzhv4wcgap277na3dckav24jcmlr45w26a7558esczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwsmgm9c</id>
    
      <title type="html">OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2q60j9387j8wzhv4wcgap277na3dckav24jcmlr45w26a7558esczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwsmgm9c" />
    <content type="html">
      OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security Issues&lt;br/&gt;&lt;br/&gt;The OpenSSH project released version 10.3 and 10.3p1 on April 2, 2026, addressing a shell injection vulnerability and introducing several security-hardening changes that administrators should review before upgrading. The most notable security fix targets a shell injection vulnerability in the -J (ProxyJump) command-line option. Prior to this release, user and host names passed via -J […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/openssh-10-3-release/&#34;&gt;https://cybersecuritynews.com/openssh-10-3-release/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/openssh-10-3-release/&#34;&gt;https://cybersecuritynews.com/openssh-10-3-release/&lt;/a&gt;
    </content>
    <updated>2026-04-02T14:54:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq66tazjz70nw3wf5fzk96k7cadfl33zw4fy0nc9jfs9nzeal73qczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw03ssx9</id>
    
      <title type="html">Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq66tazjz70nw3wf5fzk96k7cadfl33zw4fy0nc9jfs9nzeal73qczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw03ssx9" />
    <content type="html">
      Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ Malware Campaign&lt;br/&gt;&lt;br/&gt;A seemingly routine procurement email has become the entry point for a sophisticated six-stage malware attack targeting industrial suppliers and procurement teams. The campaign, tracked as NKFZ5966PURCHASE, disguises itself as a Boeing Request for Quotation (RFQ) from a person named “Joyce Malave,” luring victims into opening a malicious Word document. Once opened, the file silently […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-abuse-docx-rtf-js-and-python-in-boeing-rfq/&#34;&gt;https://cybersecuritynews.com/hackers-abuse-docx-rtf-js-and-python-in-boeing-rfq/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-abuse-docx-rtf-js-and-python-in-boeing-rfq/&#34;&gt;https://cybersecuritynews.com/hackers-abuse-docx-rtf-js-and-python-in-boeing-rfq/&lt;/a&gt;
    </content>
    <updated>2026-04-02T14:53:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspgl2ws360da552yh4a87qkfuc69fepjnm0s3uzls9xf0re6z0mnszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwc0dvss</id>
    
      <title type="html">CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspgl2ws360da552yh4a87qkfuc69fepjnm0s3uzls9xf0re6z0mnszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwc0dvss" />
    <content type="html">
      CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in Attacks&lt;br/&gt;&lt;br/&gt;A critical warning has been issued over a newly discovered zero-day vulnerability in Google Chrome, raising serious concerns for users worldwide. This flaw is actively exploited in the wild, allowing attackers to bypass security protections and execute malicious code, and was added to the Known Exploited Vulnerabilities (KEV) catalog on April 1, 2026. The discovery […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/chrome-0-day-flaw-exploited/&#34;&gt;https://cybersecuritynews.com/chrome-0-day-flaw-exploited/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/chrome-0-day-flaw-exploited/&#34;&gt;https://cybersecuritynews.com/chrome-0-day-flaw-exploited/&lt;/a&gt;
    </content>
    <updated>2026-04-02T14:31:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszdm5p8q2hs2w24pmmz05k2r3fegwp49sjrpmmdctuhu9v8g4n97qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlqv4ka</id>
    
      <title type="html">NoVoice on Google Play with 22 Exploits Attacks Millions of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszdm5p8q2hs2w24pmmz05k2r3fegwp49sjrpmmdctuhu9v8g4n97qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlqv4ka" />
    <content type="html">
      NoVoice on Google Play with 22 Exploits Attacks Millions of Android Users&lt;br/&gt;&lt;br/&gt;A dangerous Android rootkit named NoVoice has been hiding inside over 50 apps on Google Play, compromising more than 2.3 million devices worldwide. Tracked as Operation NoVoice, the malware uses 22 exploits to take full control of a device without raising any alerts, making it one of the most destructive Android threats uncovered in recent […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/novoice-on-google-play/&#34;&gt;https://cybersecuritynews.com/novoice-on-google-play/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/novoice-on-google-play/&#34;&gt;https://cybersecuritynews.com/novoice-on-google-play/&lt;/a&gt;
    </content>
    <updated>2026-04-02T13:50:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrhdtgsspx972thfmqa0qsq5hu7tc3ruy0ux6d4l3ceq0t4m992dgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwl69xn2</id>
    
      <title type="html">Microsoft Details Steps to Mitigate the Axios npm Supply Chain ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrhdtgsspx972thfmqa0qsq5hu7tc3ruy0ux6d4l3ceq0t4m992dgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwl69xn2" />
    <content type="html">
      Microsoft Details Steps to Mitigate the Axios npm Supply Chain Compromise&lt;br/&gt;&lt;br/&gt;A widely used JavaScript library called Axios was at the center of a serious supply chain attack that came to light on March 31, 2026. Two updated versions of the Axios npm package — version 1.14.1 and version 0.30.4 — were found to contain malicious code built to silently install harmful software on developer machines, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/microsoft-details-steps-to-mitigate-the-axios/&#34;&gt;https://cybersecuritynews.com/microsoft-details-steps-to-mitigate-the-axios/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/microsoft-details-steps-to-mitigate-the-axios/&#34;&gt;https://cybersecuritynews.com/microsoft-details-steps-to-mitigate-the-axios/&lt;/a&gt;
    </content>
    <updated>2026-04-02T12:37:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0wpenp5tkclft3xt7hzvtn4yd0ad8dynyp3kulf8pvmcgyypry5gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkqpj2l</id>
    
      <title type="html">Apple Expands iOS 18.7.7 Update to More Devices to Shield Users ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0wpenp5tkclft3xt7hzvtn4yd0ad8dynyp3kulf8pvmcgyypry5gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkqpj2l" />
    <content type="html">
      Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit&lt;br/&gt;&lt;br/&gt;Apple has taken the rare step of expanding the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader set of devices on April 1, 2026, pushing critical backported security patches to millions of users still running iOS 18 who remain exposed to DarkSword, a sophisticated, web-delivered exploit chain capable of silently stealing vast amounts […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/apple-expands-ios-18-7-7-update/&#34;&gt;https://cybersecuritynews.com/apple-expands-ios-18-7-7-update/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/apple-expands-ios-18-7-7-update/&#34;&gt;https://cybersecuritynews.com/apple-expands-ios-18-7-7-update/&lt;/a&gt;
    </content>
    <updated>2026-04-02T11:54:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs08ld23nyzhx26m7ue6ve9gclpcnlg6y2hhf06slcvv5rmv04t6xczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw46tadn</id>
    
      <title type="html">New ZAP PTK Add-On Maps Browser-Based Security Findings as Native ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs08ld23nyzhx26m7ue6ve9gclpcnlg6y2hhf06slcvv5rmv04t6xczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw46tadn" />
    <content type="html">
      New ZAP PTK Add-On Maps Browser-Based Security Findings as Native Alert Into ZAP&lt;br/&gt;&lt;br/&gt;The OWASP Zed Attack Proxy (ZAP) team has rolled out version 0.3.0 of the OWASP PenTest Kit (PTK) add-on, introducing a transformative workflow upgrade for application security testing. This new release bridges the critical gap between traditional proxy-level scanning and modern client-side execution by mapping in-browser security findings directly into native ZAP alerts. ZAP has […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/zap-ptk-add-on/&#34;&gt;https://cybersecuritynews.com/zap-ptk-add-on/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/zap-ptk-add-on/&#34;&gt;https://cybersecuritynews.com/zap-ptk-add-on/&lt;/a&gt;
    </content>
    <updated>2026-04-02T11:27:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspgfhc2jdthww3hhwxsc2xkl809nvav7jmjq5p9mkxtq87a3s46mszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kww8r9wn</id>
    
      <title type="html">Cisco Smart Software Manager Vulnerability Let Attackers Execute ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspgfhc2jdthww3hhwxsc2xkl809nvav7jmjq5p9mkxtq87a3s46mszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kww8r9wn" />
    <content type="html">
      Cisco Smart Software Manager Vulnerability Let Attackers Execute Arbitrary Commands&lt;br/&gt;&lt;br/&gt;Cisco has issued an urgent security warning regarding a critical vulnerability in its Smart Software Manager On-Prem (SSM On-Prem) platform. Enterprise organizations widely use this tool to manage their Cisco software licenses locally. Tracked as CVE-2026-20160, the flaw carries a near-perfect CVSS severity score of 9.8 out of 10. If exploited, it allows an unauthenticated, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/cisco-smart-software-manager-vulnerability/&#34;&gt;https://cybersecuritynews.com/cisco-smart-software-manager-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/cisco-smart-software-manager-vulnerability/&#34;&gt;https://cybersecuritynews.com/cisco-smart-software-manager-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-04-02T10:13:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgmgg48k5tvt50thpm0ews7vrt22q78lvf7faznsd4mqrpkj3dgzszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwg5gfkt</id>
    
      <title type="html">Oracle Lays Off 30,000 Employees to Ramp Up Investment in AI ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgmgg48k5tvt50thpm0ews7vrt22q78lvf7faznsd4mqrpkj3dgzszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwg5gfkt" />
    <content type="html">
      Oracle Lays Off 30,000 Employees to Ramp Up Investment in AI Technologies&lt;br/&gt;&lt;br/&gt;Oracle has executed a massive workforce reduction, eliminating between 20,000 and 30,000 employees globally to free up cash flow for its aggressive artificial intelligence infrastructure investments. The layoffs, representing roughly 18% of its workforce, were communicated abruptly via email, highlighting the company’s urgent shift in financial strategy amid mounting debt. On Tuesday morning, up to […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/oracle-lays-off-30000-employees/&#34;&gt;https://cybersecuritynews.com/oracle-lays-off-30000-employees/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/oracle-lays-off-30000-employees/&#34;&gt;https://cybersecuritynews.com/oracle-lays-off-30000-employees/&lt;/a&gt;
    </content>
    <updated>2026-04-02T10:06:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvdnanngnhcegttvlk655j55u6t7ul2433uqmrq243lasrewgqyggzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwwp6fa4</id>
    
      <title type="html">FBI Warns of Chinese Mobile Apps May Expose User Data to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvdnanngnhcegttvlk655j55u6t7ul2433uqmrq243lasrewgqyggzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwwp6fa4" />
    <content type="html">
      FBI Warns of Chinese Mobile Apps May Expose User Data to Cyberattacks&lt;br/&gt;&lt;br/&gt;Millions of Americans use mobile apps daily without thinking much about where their data actually goes. The Federal Bureau of Investigation has stepped forward to address that. On March 31, 2026, the FBI released a Public Service Announcement outlining serious data security risks connected to mobile applications developed by foreign companies — particularly those based […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/fbi-warns-of-chinese-mobile-apps/&#34;&gt;https://cybersecuritynews.com/fbi-warns-of-chinese-mobile-apps/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/fbi-warns-of-chinese-mobile-apps/&#34;&gt;https://cybersecuritynews.com/fbi-warns-of-chinese-mobile-apps/&lt;/a&gt;
    </content>
    <updated>2026-04-02T09:35:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz005tq02ffcl3cyj5ppyclqy9sq8usah0749y6emg65g4tkhw53szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwesealm</id>
    
      <title type="html">TA416 Expands Espionage Operations Across Europe With Web Bug ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz005tq02ffcl3cyj5ppyclqy9sq8usah0749y6emg65g4tkhw53szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwesealm" />
    <content type="html">
      TA416 Expands Espionage Operations Across Europe With Web Bug Recon and Malware Delivery&lt;br/&gt;&lt;br/&gt;TA416 has returned to Europe with a fresh wave of espionage emails aimed at government and diplomatic staff. The campaign mixes quiet reconnaissance with malware delivery, showing how a patient threat actor can test who opens a message before sending a more dangerous follow-up. From mid-2025 into early 2026, the China-aligned group targeted diplomatic missions […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/ta416-expands-espionage-operations-across-europe/&#34;&gt;https://cybersecuritynews.com/ta416-expands-espionage-operations-across-europe/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/ta416-expands-espionage-operations-across-europe/&#34;&gt;https://cybersecuritynews.com/ta416-expands-espionage-operations-across-europe/&lt;/a&gt;
    </content>
    <updated>2026-04-02T09:16:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspkmjr2wl83p2mtgjeqeap2jr9cj06trey9sftpt8ced2gspd6dugzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw3242sm</id>
    
      <title type="html">Microsoft Copilot Terms of Service Label Copilot is for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspkmjr2wl83p2mtgjeqeap2jr9cj06trey9sftpt8ced2gspd6dugzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw3242sm" />
    <content type="html">
      Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only&lt;br/&gt;&lt;br/&gt;Microsoft’s terms of service for its Copilot AI assistant include a notable disclaimer that has sparked renewed scrutiny from security and enterprise communities: the product is intended solely for entertainment purposes. According to the official Copilot terms of use, Microsoft explicitly states that Copilot can make mistakes, may not function as intended, and should not […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/microsoft-copilot-terms-of-service/&#34;&gt;https://cybersecuritynews.com/microsoft-copilot-terms-of-service/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/microsoft-copilot-terms-of-service/&#34;&gt;https://cybersecuritynews.com/microsoft-copilot-terms-of-service/&lt;/a&gt;
    </content>
    <updated>2026-04-02T08:45:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszulqupzluaevt9xjpr2l2txjvt02gcrhscjqvuhm6fdljpruza9szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwydda8j</id>
    
      <title type="html">New WhatsApp Attack Chain Uses VBS Scripts, Cloud Downloads, and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszulqupzluaevt9xjpr2l2txjvt02gcrhscjqvuhm6fdljpruza9szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwydda8j" />
    <content type="html">
      New WhatsApp Attack Chain Uses VBS Scripts, Cloud Downloads, and MSI Backdoors&lt;br/&gt;&lt;br/&gt;A new malware campaign is actively using WhatsApp to deliver harmful files directly to Windows users, exploiting the widespread trust placed in everyday messaging apps. The threat actors send malicious Visual Basic Script (VBS) files through WhatsApp messages, knowing that users rarely question attachments from familiar platforms. Once a recipient runs one of these files, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-whatsapp-attack-chain-uses-vbs-scripts/&#34;&gt;https://cybersecuritynews.com/new-whatsapp-attack-chain-uses-vbs-scripts/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-whatsapp-attack-chain-uses-vbs-scripts/&#34;&gt;https://cybersecuritynews.com/new-whatsapp-attack-chain-uses-vbs-scripts/&lt;/a&gt;
    </content>
    <updated>2026-04-02T08:24:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2ka7wq7fe7fwenfve54ykwh5734p7r02lmnslmysw7nhjqc7sktqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwdx9dgd</id>
    
      <title type="html">Critical Cisco IMC Vulnerability Let Attackers Bypass ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2ka7wq7fe7fwenfve54ykwh5734p7r02lmnslmysw7nhjqc7sktqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwdx9dgd" />
    <content type="html">
      Critical Cisco IMC Vulnerability Let Attackers Bypass Authentication&lt;br/&gt;&lt;br/&gt;Cisco has recently disclosed a critical security flaw affecting its Integrated Management Controller (IMC), prompting the release of urgent software updates. The vulnerability, officially tracked as CVE-2026-20093, has been assigned a critical Base CVSS score of 9.8, indicating the highest level of severity. This security weakness is located in the password change functionality of the […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/cisco-imc-vulnerability-2/&#34;&gt;https://cybersecuritynews.com/cisco-imc-vulnerability-2/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/cisco-imc-vulnerability-2/&#34;&gt;https://cybersecuritynews.com/cisco-imc-vulnerability-2/&lt;/a&gt;
    </content>
    <updated>2026-04-02T07:26:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2qvfjk8z6mjqklhtzhr8245yzfryvnp5pn8drdkh5rd5cjsuff4szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhs929m</id>
    
      <title type="html">Remcos RAT Infection Chain Hides Behind Obfuscated Scripts and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2qvfjk8z6mjqklhtzhr8245yzfryvnp5pn8drdkh5rd5cjsuff4szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhs929m" />
    <content type="html">
      Remcos RAT Infection Chain Hides Behind Obfuscated Scripts and Trusted Windows Binaries&lt;br/&gt;&lt;br/&gt;Cybercriminals are getting better at hiding their tracks, and a recently uncovered Remcos RAT campaign is proof of that. This attack does not rely on a single malicious file dropped onto a system. Instead, it uses a carefully built, multi-stage chain that starts with a simple phishing email and ends with a full, in-memory system […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/remcos-rat-infection-chain-hides-behind-obfuscated/&#34;&gt;https://cybersecuritynews.com/remcos-rat-infection-chain-hides-behind-obfuscated/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/remcos-rat-infection-chain-hides-behind-obfuscated/&#34;&gt;https://cybersecuritynews.com/remcos-rat-infection-chain-hides-behind-obfuscated/&lt;/a&gt;
    </content>
    <updated>2026-04-02T07:06:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0x0zucz27mep6yp76pdlvpvar8wnqvtnfpfx96km3u82ue3z3fuczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwg7pllx</id>
    
      <title type="html">Symantec DLP Agent Vulnerability Let Attackers Escalate ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0x0zucz27mep6yp76pdlvpvar8wnqvtnfpfx96km3u82ue3z3fuczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwg7pllx" />
    <content type="html">
      Symantec DLP Agent Vulnerability Let Attackers Escalate Privileges&lt;br/&gt;&lt;br/&gt;A high-severity security flaw has been identified in the Symantec Data Loss Prevention (DLP) Agent for Windows. Tracked as CVE-2026-3991, this vulnerability allows a low-privileged local attacker to escalate their system privileges to the highest level. Security researcher Manuel Feifel discovered the flaw, and Broadcom has recently released patches to address the issue. The vulnerability […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/symantec-dlp-agent-vulnerability/&#34;&gt;https://cybersecuritynews.com/symantec-dlp-agent-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/symantec-dlp-agent-vulnerability/&#34;&gt;https://cybersecuritynews.com/symantec-dlp-agent-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-04-02T06:46:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxd54x2e5kqx9zqh2ju6yy5ddr3r88qgfxyfrew24r5z32cp8tdmczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkw4tex</id>
    
      <title type="html">Starbucks Breach – Attacks Allegedly Claim 10GB of Stolen ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxd54x2e5kqx9zqh2ju6yy5ddr3r88qgfxyfrew24r5z32cp8tdmczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkw4tex" />
    <content type="html">
      Starbucks Breach – Attacks Allegedly Claim 10GB of Stolen Source Code&lt;br/&gt;&lt;br/&gt;The threat group ShadowByt3s has claimed responsibility for a new cyberattack on Starbucks, allegedly stealing 10GB of proprietary source code and operational firmware. The data was reportedly scraped from a misconfigured Amazon S3 bucket named “sbux-assets” as part of a broader campaign targeting cloud vulnerabilities. A threat actor operating under the moniker “BlackVortex1” posted on […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/starbucks-breach/&#34;&gt;https://cybersecuritynews.com/starbucks-breach/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/starbucks-breach/&#34;&gt;https://cybersecuritynews.com/starbucks-breach/&lt;/a&gt;
    </content>
    <updated>2026-04-02T06:28:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdmhs9teqw6waru6sge0m8dcl0jzn9kfeazjfvefqwfum795zzddgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwshn6rm</id>
    
      <title type="html">10 Best VPN For Privacy In 2026 When it comes to privacy-focused ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdmhs9teqw6waru6sge0m8dcl0jzn9kfeazjfvefqwfum795zzddgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwshn6rm" />
    <content type="html">
      10 Best VPN For Privacy In 2026&lt;br/&gt;&lt;br/&gt;When it comes to privacy-focused VPNs, several providers stand out in 2026. NordVPN, based in Panama, offers robust security features including Double VPN, Onion over VPN, and an independently audited no-logs policy. Proton VPN, founded by CERN scientists and based in Switzerland, is known for its strong commitment to privacy and its Secure Core servers […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/best-vpn-for-privacy/&#34;&gt;https://cybersecuritynews.com/best-vpn-for-privacy/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/best-vpn-for-privacy/&#34;&gt;https://cybersecuritynews.com/best-vpn-for-privacy/&lt;/a&gt;
    </content>
    <updated>2026-04-02T05:39:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqghpj9gh62ncx68zesfyj9tvuxxvgdc4tf8jc9gcd66uuxncpdfszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw09al2v</id>
    
      <title type="html">Top 20 Best Digital Forensic Tools in 2026 Digital forensic tools ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqghpj9gh62ncx68zesfyj9tvuxxvgdc4tf8jc9gcd66uuxncpdfszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw09al2v" />
    <content type="html">
      Top 20 Best Digital Forensic Tools in 2026&lt;br/&gt;&lt;br/&gt;Digital forensic tools are specialized software designed to analyze, recover, and investigate data from digital devices. They help uncover crucial evidence in cybercrime investigations and legal proceedings. These tools can extract data from various sources, including computers, smartphones, and storage devices, ensuring comprehensive digital footprints and activities analysis. They offer features like data carving, metadata […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/best-digital-forensic-tools/&#34;&gt;https://cybersecuritynews.com/best-digital-forensic-tools/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/best-digital-forensic-tools/&#34;&gt;https://cybersecuritynews.com/best-digital-forensic-tools/&lt;/a&gt;
    </content>
    <updated>2026-04-02T05:30:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxg74ns2czfu0wjtjwtc2d9l3z5sq3ts0wc73qxvpz5m4ctxxmr2gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw25kk6q</id>
    
      <title type="html">Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxg74ns2czfu0wjtjwtc2d9l3z5sq3ts0wc73qxvpz5m4ctxxmr2gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw25kk6q" />
    <content type="html">
      Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands&lt;br/&gt;&lt;br/&gt;A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system. Tracked as CVE-2026-34982, the flaw relies on a modeline sandbox bypass that triggers when a victim opens a specially crafted file. Security researchers “dfwjj x” and Avishay Matayev identified a vulnerability chain that affects […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/vim-modeline-bypass-vulnerability/&#34;&gt;https://cybersecuritynews.com/vim-modeline-bypass-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/vim-modeline-bypass-vulnerability/&#34;&gt;https://cybersecuritynews.com/vim-modeline-bypass-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-04-02T02:31:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs22uwa33wfewsnke7aqrlns4gjszesgfhkh9eca42rjjcgdupdmvszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkf3lqu</id>
    
      <title type="html">Public PoC Exploit Released for Nginx-UI Backup Restore ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs22uwa33wfewsnke7aqrlns4gjszesgfhkh9eca42rjjcgdupdmvszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkf3lqu" />
    <content type="html">
      Public PoC Exploit Released for Nginx-UI Backup Restore Vulnerability&lt;br/&gt;&lt;br/&gt;A critical security flaw has been disclosed in the Nginx-UI backup restore mechanism, tracked as CVE-2026-33026. This vulnerability allows threat actors to tamper with encrypted backup archives and inject malicious configurations during the restoration process. With a public Proof-of-Concept (PoC) exploit now available, unpatched deployments are at immediate risk of full system compromise. Cryptographic Flaw […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/nginx-ui-backup-restore-vulnerability/&#34;&gt;https://cybersecuritynews.com/nginx-ui-backup-restore-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/nginx-ui-backup-restore-vulnerability/&#34;&gt;https://cybersecuritynews.com/nginx-ui-backup-restore-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-04-02T02:29:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgzkarzrwhkehcznkcnw3jf5c0anxwx2a5a6a7fe2k4x4r9um742szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwx83g0t</id>
    
      <title type="html">Microsoft to Remove EXIF Data for Images Shared on Teams In a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgzkarzrwhkehcznkcnw3jf5c0anxwx2a5a6a7fe2k4x4r9um742szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwx83g0t" />
    <content type="html">
      Microsoft to Remove EXIF Data for Images Shared on Teams&lt;br/&gt;&lt;br/&gt;In a significant move to enhance corporate privacy and operational security, Microsoft has announced an important update for its Teams platform. As part of the March 2026 feature rollout, Microsoft Teams will now automatically remove EXIF metadata from all images shared across chats and channels. This privacy-by-default measure aims to protect users from unintentionally leaking […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/microsoft-remove-exif-data-teams/&#34;&gt;https://cybersecuritynews.com/microsoft-remove-exif-data-teams/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/microsoft-remove-exif-data-teams/&#34;&gt;https://cybersecuritynews.com/microsoft-remove-exif-data-teams/&lt;/a&gt;
    </content>
    <updated>2026-04-02T02:05:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv30tjvf45cuf3phleusxlwsjhdwszegp37yu42qck58938guskgqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwn4zfrp</id>
    
      <title type="html">Magecart Hackers Uses 100&#43; Domains to Hijack eStores Checkouts ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv30tjvf45cuf3phleusxlwsjhdwszegp37yu42qck58938guskgqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwn4zfrp" />
    <content type="html">
      Magecart Hackers Uses 100&#43; Domains to Hijack eStores Checkouts and Steal Card Data&lt;br/&gt;&lt;br/&gt;A sophisticated and long-running Magecart campaign has been quietly operating for over 24 months, infecting e-commerce websites across at least 12 countries using more than 100 malicious domains to steal payment card data in real time and banks, not merchants, are bearing the heaviest financial blow. Security researchers at ANY.RUN has uncovered a large-scale Magecart […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/magecart-hijack-estore-checkouts/&#34;&gt;https://cybersecuritynews.com/magecart-hijack-estore-checkouts/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/magecart-hijack-estore-checkouts/&#34;&gt;https://cybersecuritynews.com/magecart-hijack-estore-checkouts/&lt;/a&gt;
    </content>
    <updated>2026-04-01T17:13:13Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0zktmwc7q77k97guqrs3w9np7fnzymxrh9jq9dast5hk4hec94hszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlgcdcw</id>
    
      <title type="html">Google Cloud’s Vertex AI platform Vulnerability Allow Attackers ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0zktmwc7q77k97guqrs3w9np7fnzymxrh9jq9dast5hk4hec94hszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlgcdcw" />
    <content type="html">
      Google Cloud’s Vertex AI platform Vulnerability Allow Attackers to Access Sensitive Data&lt;br/&gt;&lt;br/&gt;Artificial intelligence agents are rapidly becoming integral to enterprise workflows, but they also introduce new attack surfaces. Security researchers recently uncovered a significant vulnerability within Google Cloud Platform’s Vertex AI Agent Engine. By exploiting default permission scoping, attackers could weaponize deployed AI agents into “double agents” that secretly exfiltrate data and compromise cloud infrastructure. Exploiting […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/google-clouds-vertex-ai-platform-vulnerability/&#34;&gt;https://cybersecuritynews.com/google-clouds-vertex-ai-platform-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/google-clouds-vertex-ai-platform-vulnerability/&#34;&gt;https://cybersecuritynews.com/google-clouds-vertex-ai-platform-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-04-01T13:06:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs24v4cuxk6at90uhlrwhlhwnycx3h8tma8kky2cpu8qhl95heqd3czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwljd32e</id>
    
      <title type="html">Hackers Actively Exploiting Critical WebLogic RCE Vulnerabilities ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs24v4cuxk6at90uhlrwhlhwnycx3h8tma8kky2cpu8qhl95heqd3czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwljd32e" />
    <content type="html">
      Hackers Actively Exploiting Critical WebLogic RCE Vulnerabilities in Attacks&lt;br/&gt;&lt;br/&gt;A recent cybersecurity study reveals that threat actors are moving faster than ever to weaponize new software flaws. According to data collected from a high-interaction honeypot, hackers are actively exploiting a newly disclosed, maximum-severity vulnerability in Oracle WebLogic Server. The critical flaw, tracked as CVE-2026-21962, carries a CVSS score of 10.0. It allows unauthenticated attackers […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-exploiting-weblogic-rce-vulnerabilities/&#34;&gt;https://cybersecuritynews.com/hackers-exploiting-weblogic-rce-vulnerabilities/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-exploiting-weblogic-rce-vulnerabilities/&#34;&gt;https://cybersecuritynews.com/hackers-exploiting-weblogic-rce-vulnerabilities/&lt;/a&gt;
    </content>
    <updated>2026-04-01T13:01:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqp484jwuutecf4dl4msqla6aaeprcddex8y7zcysy4c5k243we9czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw4q0wxe</id>
    
      <title type="html">Russian Hackers Using Remote Access Toolkit “CTRL” for RDP ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqp484jwuutecf4dl4msqla6aaeprcddex8y7zcysy4c5k243we9czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw4q0wxe" />
    <content type="html">
      Russian Hackers Using Remote Access Toolkit “CTRL” for  RDP Hijacking&lt;br/&gt;&lt;br/&gt;A newly disclosed Russian-linked remote access toolkit called “CTRL” is being used to hijack Remote Desktop Protocol sessions and steal credentials from Windows systems. According to Censys ARC, the malware is a custom .NET framework that combines phishing, keylogging, reverse tunneling, and persistence into one attack chain. Censys ARC said the toolkit was discovered during […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/ctrl-for-rdp-hijacking/&#34;&gt;https://cybersecuritynews.com/ctrl-for-rdp-hijacking/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/ctrl-for-rdp-hijacking/&#34;&gt;https://cybersecuritynews.com/ctrl-for-rdp-hijacking/&lt;/a&gt;
    </content>
    <updated>2026-04-01T12:58:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd5n9ug0ceyse77truvkk67wlmgt3glrfvzemlar6rl9pfu092dfczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwclh3qf</id>
    
      <title type="html">New Chrome Zero-Day Vulnerability Actively Exploited in Attacks ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd5n9ug0ceyse77truvkk67wlmgt3glrfvzemlar6rl9pfu092dfczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwclh3qf" />
    <content type="html">
      New Chrome Zero-Day Vulnerability Actively Exploited in Attacks — Patch Now&lt;br/&gt;&lt;br/&gt;Google has released an emergency security update for its Chrome browser, patching a zero-day vulnerability that is already being actively exploited in the wild. The Stable channel has been updated to version 146.0.7680.177/178 for Windows and Mac, and 146.0.7680.177 for Linux, with the rollout expected to reach all users over the coming days and weeks. […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/chrome-zero-day-vulnerability-exploited/&#34;&gt;https://cybersecuritynews.com/chrome-zero-day-vulnerability-exploited/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/chrome-zero-day-vulnerability-exploited/&#34;&gt;https://cybersecuritynews.com/chrome-zero-day-vulnerability-exploited/&lt;/a&gt;
    </content>
    <updated>2026-04-01T12:53:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqvwyxp385lcr9d2vsfvunr8duwycr5huezy0tum0n5u8xyw3kcsczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwmvuyzz</id>
    
      <title type="html">HSBC India Asks Customers to use All-Uppercase Passwords ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqvwyxp385lcr9d2vsfvunr8duwycr5huezy0tum0n5u8xyw3kcsczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwmvuyzz" />
    <content type="html">
      HSBC India Asks Customers to use All-Uppercase Passwords&lt;br/&gt;&lt;br/&gt;Beginning April 6, 2026, HSBC India will require its internet banking customers to enter their passwords in uppercase letters only. The mandate, communicated via official customer emails, has sparked widespread concern among technical experts regarding the bank’s credential storage practices and overall security posture. The Uppercase Migration According to the bank’s recent communications, customers must […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hsbc-india-uppercase-passwords/&#34;&gt;https://cybersecuritynews.com/hsbc-india-uppercase-passwords/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hsbc-india-uppercase-passwords/&#34;&gt;https://cybersecuritynews.com/hsbc-india-uppercase-passwords/&lt;/a&gt;
    </content>
    <updated>2026-04-01T12:32:24Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstmzu6gyypgmya6h06jynl2my2yvlhddqrps7r835vz705a4la3fqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw0fwalq</id>
    
      <title type="html">Hackers Use EtherRAT and EtherHiding to Hide Malware ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstmzu6gyypgmya6h06jynl2my2yvlhddqrps7r835vz705a4la3fqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw0fwalq" />
    <content type="html">
      Hackers Use EtherRAT and EtherHiding to Hide Malware Infrastructure on Ethereum&lt;br/&gt;&lt;br/&gt;A sophisticated backdoor called EtherRAT is actively targeting organizations across multiple sectors by hiding its command infrastructure inside the Ethereum blockchain — a move that makes it uniquely hard to track and shut down. The malware runs on Node.js and gives attackers full remote control over compromised machines, enabling them to execute commands, steal cryptocurrency […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-use-etherrat-and-etherhiding/&#34;&gt;https://cybersecuritynews.com/hackers-use-etherrat-and-etherhiding/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-use-etherrat-and-etherhiding/&#34;&gt;https://cybersecuritynews.com/hackers-use-etherrat-and-etherhiding/&lt;/a&gt;
    </content>
    <updated>2026-04-01T12:21:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd6lly9ftv2hyvtnan3udp8umr75l3ces0ctffktrwzzj438vyluczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwr57ucf</id>
    
      <title type="html">Hackers Push CrystalX Malware-as-a-Service Through Telegram With ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd6lly9ftv2hyvtnan3udp8umr75l3ces0ctffktrwzzj438vyluczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwr57ucf" />
    <content type="html">
      Hackers Push CrystalX Malware-as-a-Service Through Telegram With Stealer and RAT Features&lt;br/&gt;&lt;br/&gt;A new and dangerous piece of malware has surfaced and is being marketed openly to cybercriminals through private Telegram channels. Named CrystalX, this Malware-as-a-Service (MaaS) platform combines a remote access trojan (RAT), credential stealer, keylogger, clipboard hijacker, spyware, and an unusual set of prankware tools into one capable package. Discovered in March 2026, the malware […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-push-crystalx-malware-as-a-service/&#34;&gt;https://cybersecuritynews.com/hackers-push-crystalx-malware-as-a-service/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-push-crystalx-malware-as-a-service/&#34;&gt;https://cybersecuritynews.com/hackers-push-crystalx-malware-as-a-service/&lt;/a&gt;
    </content>
    <updated>2026-04-01T11:36:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs20tn24nn4zyznncqns9a9hyetx4k25324puu465g46zeud60x27szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwujd7gd</id>
    
      <title type="html">Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs20tn24nn4zyznncqns9a9hyetx4k25324puu465g46zeud60x27szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwujd7gd" />
    <content type="html">
      Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM &amp;amp; AppSec&lt;br/&gt;&lt;br/&gt;New York, New York, April 1st, 2026, CyberNewswire TAC Infosec, a global leader in cybersecurity (NSE: TAC), with presence across 100&#43; countries, announced a historic milestone by crossing 10,000 clients – 6,500&#43; of TAC Security and 3,500&#43; of CyberScope, since April 2024, delivering on its commitment to shareholders to achieve this by 2026. While building […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/tac-security-10000-clients-top-5/&#34;&gt;https://cybersecuritynews.com/tac-security-10000-clients-top-5/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/tac-security-10000-clients-top-5/&#34;&gt;https://cybersecuritynews.com/tac-security-10000-clients-top-5/&lt;/a&gt;
    </content>
    <updated>2026-04-01T10:36:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf6gzm3l8ksza9fmmcr5u6c5xk2cqu49grkx2yukn4fc245utj0lszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwtwfdx5</id>
    
      <title type="html">Windows 11 Emergency Update to Fix Installation Loop Issues ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf6gzm3l8ksza9fmmcr5u6c5xk2cqu49grkx2yukn4fc245utj0lszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwtwfdx5" />
    <content type="html">
      Windows 11 Emergency Update to Fix Installation Loop Issues&lt;br/&gt;&lt;br/&gt;Microsoft just released an emergency out-of-band update to resolve a persistent installation failure affecting Windows 11 users. Released on March 31, 2026, update KB5086672 specifically targets systems running Windows 11 versions 25H2 and 24H2. This patch addresses a critical setup bug introduced in late March that prevented users from successfully applying recent system improvements and […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/windows-11-emergency-update/&#34;&gt;https://cybersecuritynews.com/windows-11-emergency-update/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/windows-11-emergency-update/&#34;&gt;https://cybersecuritynews.com/windows-11-emergency-update/&lt;/a&gt;
    </content>
    <updated>2026-04-01T09:59:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdg2wahz86hxgfuyt0uxty4ag9mm96udvpe0f3cxgpkyydeyfde6qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwnwfwuv</id>
    
      <title type="html">North Korean Hackers Compromise Widely Used Axios Package to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdg2wahz86hxgfuyt0uxty4ag9mm96udvpe0f3cxgpkyydeyfde6qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwnwfwuv" />
    <content type="html">
      North Korean Hackers Compromise Widely Used Axios Package to Infect Windows, macOS, and Linux Systems&lt;br/&gt;&lt;br/&gt;A major software supply chain attack has struck the JavaScript ecosystem after threat actors slipped a malicious dependency into the widely used axios NPM package. The poisoned releases, axios 1.14.1 and 0.30.4, pulled in plain-crypto-js and quietly delivered the WAVESHAPER.V2 backdoor to Windows, macOS, and Linux systems during installation. The incident is serious because axios […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/north-korean-hackers-compromise-widely-used-axios-package/&#34;&gt;https://cybersecuritynews.com/north-korean-hackers-compromise-widely-used-axios-package/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/north-korean-hackers-compromise-widely-used-axios-package/&#34;&gt;https://cybersecuritynews.com/north-korean-hackers-compromise-widely-used-axios-package/&lt;/a&gt;
    </content>
    <updated>2026-04-01T09:00:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8l0zemnd0uw295mhnfyxp2pvv85nrjpwx6ltj0cm7yksraxpwxzqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw5m463y</id>
    
      <title type="html">Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8l0zemnd0uw295mhnfyxp2pvv85nrjpwx6ltj0cm7yksraxpwxzqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw5m463y" />
    <content type="html">
      Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials Across Windows, macOS, and Linux&lt;br/&gt;&lt;br/&gt;A threat actor group known as TeamPCP has been caught backdooring the Telnyx Python SDK on PyPI — a popular cloud communications library with over 700,000 downloads in February alone. On March 27, 2026, two malicious versions of the package, 4.87.1 and 4.87.2, were quietly published to the Python Package Index without any matching commits […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk-on-pypi/&#34;&gt;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk-on-pypi/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk-on-pypi/&#34;&gt;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk-on-pypi/&lt;/a&gt;
    </content>
    <updated>2026-04-01T08:48:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9yzs6zzgctekwe6sapcr3asledrfq2v0w2urq76fmp6q0xt9ypvszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw53q7d8</id>
    
      <title type="html">New npm Supply Chain Attack Uses undicy-http to Deploy ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9yzs6zzgctekwe6sapcr3asledrfq2v0w2urq76fmp6q0xt9ypvszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw53q7d8" />
    <content type="html">
      New npm Supply Chain Attack Uses undicy-http to Deploy Screen-Streaming RAT and Browser Injector&lt;br/&gt;&lt;br/&gt;A malicious npm package named undicy-http has surfaced inside the Node.js developer ecosystem, quietly compromising machines of developers who mistakenly install it. The package impersonates undici, the official HTTP client library bundled with Node.js that handles millions of weekly downloads. Despite sharing a near-identical name, undicy-http contains zero HTTP client functionality. Instead, it launches a two-stage attack capable of stealing […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-npm-supply-chain-attack-uses-undicy-http/&#34;&gt;https://cybersecuritynews.com/new-npm-supply-chain-attack-uses-undicy-http/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-npm-supply-chain-attack-uses-undicy-http/&#34;&gt;https://cybersecuritynews.com/new-npm-supply-chain-attack-uses-undicy-http/&lt;/a&gt;
    </content>
    <updated>2026-04-01T07:55:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvaxuy2w5vx2xgk39gzd6687mwhx9hmgrx0vz5n693p8g39aq3n5gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcek4fa</id>
    
      <title type="html">PNG Vulnerabilities Allow Attackers to Trigger Process Crashes, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvaxuy2w5vx2xgk39gzd6687mwhx9hmgrx0vz5n693p8g39aq3n5gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcek4fa" />
    <content type="html">
      PNG Vulnerabilities Allow Attackers to Trigger Process Crashes, Leak Sensitive Information&lt;br/&gt;&lt;br/&gt;Two high-severity vulnerabilities have been discovered in libpng, the widely used reference library for reading and writing PNG images. These flaws allow attackers to trigger process crashes, leak sensitive information, and potentially execute arbitrary code by convincing a system to process a crafted PNG file. The vulnerabilities affect any software that parses malformed images, making […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/png-vulnerabilities/&#34;&gt;https://cybersecuritynews.com/png-vulnerabilities/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/png-vulnerabilities/&#34;&gt;https://cybersecuritynews.com/png-vulnerabilities/&lt;/a&gt;
    </content>
    <updated>2026-04-01T07:21:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfy3mrnzuypjvqkcj3zhwtlv9dyetqweytmenf6hq6wsppect92jqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwxeaj7e</id>
    
      <title type="html">XLoader Malware Upgrades Obfuscation Tactics and Hides C2 Traffic ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfy3mrnzuypjvqkcj3zhwtlv9dyetqweytmenf6hq6wsppect92jqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwxeaj7e" />
    <content type="html">
      XLoader Malware Upgrades Obfuscation Tactics and Hides C2 Traffic Behind Decoy Servers&lt;br/&gt;&lt;br/&gt;A well-known information-stealing malware called XLoader has received significant upgrades in its latest versions, making it considerably harder to detect and analyze than before. Originally derived from a malware family known as FormBook, which first surfaced in 2016, XLoader was rebranded and relaunched in early 2020, and since then, its developers have consistently pushed new […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/xloader-malware-upgrades-obfuscation-tactics/&#34;&gt;https://cybersecuritynews.com/xloader-malware-upgrades-obfuscation-tactics/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/xloader-malware-upgrades-obfuscation-tactics/&#34;&gt;https://cybersecuritynews.com/xloader-malware-upgrades-obfuscation-tactics/&lt;/a&gt;
    </content>
    <updated>2026-04-01T06:46:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszqvtvhxx2qpq2pqevh74dddgxglepp0hlhh79j46ay3fuqj4slhgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwt5hfz8</id>
    
      <title type="html">Mercor AI Confirms Data Breach Following Lapsus$ Claims of 4TB ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszqvtvhxx2qpq2pqevh74dddgxglepp0hlhh79j46ay3fuqj4slhgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwt5hfz8" />
    <content type="html">
      Mercor AI Confirms Data Breach Following Lapsus$ Claims of 4TB Data Theft&lt;br/&gt;&lt;br/&gt;Mercor AI has officially confirmed a severe data breach following claims by the notorious Lapsus$ hacking group that they stole 4 terabytes of sensitive company data. The incident, stemming from a recent supply chain attack on the open-source LiteLLM project, has exposed proprietary source code, internal databases, and massive amounts of user-verification data. The hacking […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/mercor-ai-data-breach/&#34;&gt;https://cybersecuritynews.com/mercor-ai-data-breach/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/mercor-ai-data-breach/&#34;&gt;https://cybersecuritynews.com/mercor-ai-data-breach/&lt;/a&gt;
    </content>
    <updated>2026-04-01T04:31:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0n6eh60t6su2py5u0epm9vlkup8045qdsdadfe2zm4ylv9la80lczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwaxe4nd</id>
    
      <title type="html">Google Now Allows You to Change your @gmail.com Address in few ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0n6eh60t6su2py5u0epm9vlkup8045qdsdadfe2zm4ylv9la80lczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwaxe4nd" />
    <content type="html">
      Google Now Allows You to Change your @gmail.com Address in few Simple Steps&lt;br/&gt;&lt;br/&gt;For over two decades, the permanence of a Google Account username has been a strict rule of the digital landscape. Many users found it frustrating to create new accounts and transfer data after outgrowing their childhood email addresses or changing their names. However, Google has recently updated its support documentation to announce that it will […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/google-change-gmail-address/&#34;&gt;https://cybersecuritynews.com/google-change-gmail-address/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/google-change-gmail-address/&#34;&gt;https://cybersecuritynews.com/google-change-gmail-address/&lt;/a&gt;
    </content>
    <updated>2026-04-01T04:04:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspugm6j0tn3y9qme6gelcrl3rf8svj9r0dwzpljjzz7kcnpa5yukczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcjhht4</id>
    
      <title type="html">Hackers Weaponize Legitimate Windows Tools to Disable Antivirus ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspugm6j0tn3y9qme6gelcrl3rf8svj9r0dwzpljjzz7kcnpa5yukczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcjhht4" />
    <content type="html">
      Hackers Weaponize Legitimate Windows Tools to Disable Antivirus Before Ransomware Attacks&lt;br/&gt;&lt;br/&gt;Ransomware attacks have gone far beyond simple malicious code. Today, attackers operate with the precision of a well-planned business, using trusted Windows tools to quietly tear down defenses before ransomware even enters the picture. This shift has made modern ransomware campaigns harder to detect and significantly more damaging. The tools at the center of this […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-weaponize-legitimate-windows-tools/&#34;&gt;https://cybersecuritynews.com/hackers-weaponize-legitimate-windows-tools/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-weaponize-legitimate-windows-tools/&#34;&gt;https://cybersecuritynews.com/hackers-weaponize-legitimate-windows-tools/&lt;/a&gt;
    </content>
    <updated>2026-03-31T13:02:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgg2j7qjuql6fdyxyvx8zfzlllfr9s6a3fqtu7jwc92e00hfmpnegzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwvmf6k0</id>
    
      <title type="html">Google Unveils Ransomware Detection and File Restoration for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgg2j7qjuql6fdyxyvx8zfzlllfr9s6a3fqtu7jwc92e00hfmpnegzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwvmf6k0" />
    <content type="html">
      Google Unveils Ransomware Detection and File Restoration for Google Drive&lt;br/&gt;&lt;br/&gt;Google has officially moved its ransomware detection and file restoration features for Google Drive into General Availability. Originally launched in beta in September 2025, the updated security controls offer organizations enhanced defenses against malware attacks targeting local machines and cloud synchronization. The updated artificial intelligence model driving this release features significant performance improvements. The system […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/google-drive-ransomware-detection-2/&#34;&gt;https://cybersecuritynews.com/google-drive-ransomware-detection-2/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/google-drive-ransomware-detection-2/&#34;&gt;https://cybersecuritynews.com/google-drive-ransomware-detection-2/&lt;/a&gt;
    </content>
    <updated>2026-03-31T12:47:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrptm27p0w0yd9gsut5a7q6rrg0qwpx3sjt7z5ahzlvrhqnld0r0szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw2w4yxn</id>
    
      <title type="html">A new remote access trojan known as ResokerRAT has come to light, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrptm27p0w0yd9gsut5a7q6rrg0qwpx3sjt7z5ahzlvrhqnld0r0szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw2w4yxn" />
    <content type="html">
      A new remote access trojan known as ResokerRAT has come to light, using Telegram’s bot API as its core communication channel to silently monitor and control infected Windows machines. What makes this threat stand out is that it does not rely on a traditional command-and-control server. Instead, it misuses a widely trusted messaging platform to […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-deploy-telegram-based-resokerrat/&#34;&gt;https://cybersecuritynews.com/hackers-deploy-telegram-based-resokerrat/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-deploy-telegram-based-resokerrat/&#34;&gt;https://cybersecuritynews.com/hackers-deploy-telegram-based-resokerrat/&lt;/a&gt;
    </content>
    <updated>2026-03-31T12:39:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs25nudsx5ya25v7eccsc8y5n00g6vslfce22yy6knm27a5ac4stjczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kws4kxen</id>
    
      <title type="html">Anthropic’s Claude Code Source Code Reportedly Leaked Via Their ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs25nudsx5ya25v7eccsc8y5n00g6vslfce22yy6knm27a5ac4stjczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kws4kxen" />
    <content type="html">
      Anthropic’s Claude Code Source Code Reportedly Leaked Via Their npm Registry&lt;br/&gt;&lt;br/&gt;Anthropic’s proprietary Claude Code CLI tool has had its full TypeScript source code inadvertently exposed through a misconfigured npm package, after a security researcher discovered a leaked .map file referencing the unobfuscated codebase stored on Anthropic’s own cloud infrastructure. On March 31, 2026, researcher Chaofan Shou made the disclosure public, posting: “Claude code source code […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/claude-code-source-code-leaked/&#34;&gt;https://cybersecuritynews.com/claude-code-source-code-leaked/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/claude-code-source-code-leaked/&#34;&gt;https://cybersecuritynews.com/claude-code-source-code-leaked/&lt;/a&gt;
    </content>
    <updated>2026-03-31T11:29:13Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxzh9kdu2rpu7q935mcy8j38gw6ysy923vu8d54knck5yq7envgegzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwddjsz6</id>
    
      <title type="html">ChatGPT Vulnerability Let Attackers Silently Exfiltrate User ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxzh9kdu2rpu7q935mcy8j38gw6ysy923vu8d54knck5yq7envgegzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwddjsz6" />
    <content type="html">
      ChatGPT Vulnerability Let Attackers Silently Exfiltrate User Prompts and Other Sensitive Data&lt;br/&gt;&lt;br/&gt;Users routinely trust AI assistants with highly sensitive information, including medical records, financial documents, and proprietary business code. Check Point Research recently disclosed a critical vulnerability in ChatGPT’s architecture that allowed attackers to extract this exact type of user data silently. By abusing a covert outbound channel in ChatGPT’s isolated code execution environment, attackers could […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/chatgpt-vulnerability/&#34;&gt;https://cybersecuritynews.com/chatgpt-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/chatgpt-vulnerability/&#34;&gt;https://cybersecuritynews.com/chatgpt-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-03-31T10:48:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8zpxy0k590cxa6mcjuh9alnc2cq0mmw3vs9v3yqrk57t3ux932qczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw0p7ulh</id>
    
      <title type="html">CareCloud Data Breach – Hackers Accessed IT Infrastructure and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8zpxy0k590cxa6mcjuh9alnc2cq0mmw3vs9v3yqrk57t3ux932qczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw0p7ulh" />
    <content type="html">
      CareCloud Data Breach – Hackers Accessed IT Infrastructure and Stole Patient Data&lt;br/&gt;&lt;br/&gt;A prominent healthcare technology provider has formally disclosed a significant cybersecurity incident involving unauthorized access to its IT infrastructure. An unauthorized actor compromised one of the company’s electronic health record (EHR) systems, raising concerns over possible exposure of sensitive patient data. The security breach initially unfolded on March 16, 2026. The intrusion caused a temporary […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/carecloud-data-breach/&#34;&gt;https://cybersecuritynews.com/carecloud-data-breach/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/carecloud-data-breach/&#34;&gt;https://cybersecuritynews.com/carecloud-data-breach/&lt;/a&gt;
    </content>
    <updated>2026-03-31T10:40:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfyguv7pt5zq9zqgeggft025dwg0ynfpdz3u7avg4uvwqdxlg7vaqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkzty84</id>
    
      <title type="html">Apple New macOS Tahoe Feature Warns Users on ClickFix Attacks ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfyguv7pt5zq9zqgeggft025dwg0ynfpdz3u7avg4uvwqdxlg7vaqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkzty84" />
    <content type="html">
      Apple New macOS Tahoe Feature Warns Users on ClickFix Attacks&lt;br/&gt;&lt;br/&gt;Apple has introduced a new security mechanism in the macOS Tahoe 26.4 release candidate to protect users against social engineering campaigns known as ClickFix attacks. Discovered by users testing the latest OS build and highlighted in a popular Reddit post on r/MacOSBeta, the undocumented feature actively blocks the execution of potentially malicious commands pasted into […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/clickfix-protection-macos-tahoe-26-4/&#34;&gt;https://cybersecuritynews.com/clickfix-protection-macos-tahoe-26-4/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/clickfix-protection-macos-tahoe-26-4/&#34;&gt;https://cybersecuritynews.com/clickfix-protection-macos-tahoe-26-4/&lt;/a&gt;
    </content>
    <updated>2026-03-31T09:03:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyefj0uj6sz299njwxp0ezgq87wccpnx63ua5n0rc8ulgpe7mz50qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwpmlxux</id>
    
      <title type="html">CISA Warns of Citrix NetScaler Vulnerability Actively Exploited ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyefj0uj6sz299njwxp0ezgq87wccpnx63ua5n0rc8ulgpe7mz50qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwpmlxux" />
    <content type="html">
      CISA Warns of Citrix NetScaler Vulnerability Actively Exploited in Attacks&lt;br/&gt;&lt;br/&gt;The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical vulnerability affecting Citrix NetScaler products. Identified as CVE-2026-3055, this security flaw has been officially added to CISA’s Known Exploited Vulnerabilities (KEV) catalog following confirmed evidence of active exploitation in the wild. Network defenders and system administrators are urged to take […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/citrix-netscaler-vulnerability-exploited/&#34;&gt;https://cybersecuritynews.com/citrix-netscaler-vulnerability-exploited/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/citrix-netscaler-vulnerability-exploited/&#34;&gt;https://cybersecuritynews.com/citrix-netscaler-vulnerability-exploited/&lt;/a&gt;
    </content>
    <updated>2026-03-31T08:58:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgdg8kk3qwf2vtwzgu732faunsje7jtntngdg36zv9zfu5na7d8jczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw8lwadp</id>
    
      <title type="html">Cybercriminals Abuse IRS and Tax Filing Lures to Push Malware in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgdg8kk3qwf2vtwzgu732faunsje7jtntngdg36zv9zfu5na7d8jczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw8lwadp" />
    <content type="html">
      Cybercriminals Abuse IRS and Tax Filing Lures to Push Malware in New Campaigns&lt;br/&gt;&lt;br/&gt;Tax season brings a reliable wave of phishing attacks, but 2026 has already shown a bigger and more organized push than in previous years. Cybercriminals are actively impersonating the Internal Revenue Service (IRS), national tax authorities, and company HR departments to trick people into installing malware or handing over login credentials. Over a hundred campaigns […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/&#34;&gt;https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/&#34;&gt;https://cybersecuritynews.com/cybercriminals-abuse-irs-and-tax-filing-lures/&lt;/a&gt;
    </content>
    <updated>2026-03-31T08:37:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsws4a7hejly55l9ama5akqcj4dn5awgwvu7umtdscgzthduwvgyeszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwfwdcmt</id>
    
      <title type="html">Hackers Deploy RoadK1ll Pivoting Malware to Turn Compromised ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsws4a7hejly55l9ama5akqcj4dn5awgwvu7umtdscgzthduwvgyeszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwfwdcmt" />
    <content type="html">
      Hackers Deploy RoadK1ll Pivoting Malware to Turn Compromised Hosts Into Network Relays&lt;br/&gt;&lt;br/&gt;A new piece of malware called RoadK1ll has been found silently converting compromised machines into controllable network relay points. Unlike most malware that arrives loaded with commands and attack tools, RoadK1ll is deliberately lean, built around one goal: giving attackers a reliable and silent path deeper into a network after initial compromise. That narrow focus […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-deploy-roadk1ll-pivoting-malware/&#34;&gt;https://cybersecuritynews.com/hackers-deploy-roadk1ll-pivoting-malware/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-deploy-roadk1ll-pivoting-malware/&#34;&gt;https://cybersecuritynews.com/hackers-deploy-roadk1ll-pivoting-malware/&lt;/a&gt;
    </content>
    <updated>2026-03-31T07:41:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrepa9gknmdqrh3g8crxarjmvgfmh0ruxqzyajnu8apxfm5myrdcgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw8dv5x9</id>
    
      <title type="html">GhostSocks Turns Victim Systems Into Residential Proxies for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrepa9gknmdqrh3g8crxarjmvgfmh0ruxqzyajnu8apxfm5myrdcgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw8dv5x9" />
    <content type="html">
      GhostSocks Turns Victim Systems Into Residential Proxies for Evasive Cyberattacks&lt;br/&gt;&lt;br/&gt;A new malware called GhostSocks has been quietly spreading through compromised systems, turning home and office devices into residential proxies that threat actors use to conceal their malicious traffic. Unlike traditional malware that simply steals data or locks files, GhostSocks hijacks the victim’s internet connection to make attacker traffic appear as though it is coming […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/ghostsocks-turns-victim-systems/&#34;&gt;https://cybersecuritynews.com/ghostsocks-turns-victim-systems/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/ghostsocks-turns-victim-systems/&#34;&gt;https://cybersecuritynews.com/ghostsocks-turns-victim-systems/&lt;/a&gt;
    </content>
    <updated>2026-03-31T06:31:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2j3af4h4nns6u7hez09u75fahh6z86vrkspkh7ycvd26tyu2gqugzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwm7jghe</id>
    
      <title type="html">Notepad&#43;&#43; v8.9.3 Released Addressing cURL Security Vulnerability ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2j3af4h4nns6u7hez09u75fahh6z86vrkspkh7ycvd26tyu2gqugzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwm7jghe" />
    <content type="html">
      Notepad&#43;&#43; v8.9.3 Released Addressing cURL Security Vulnerability and Crash Issues&lt;br/&gt;&lt;br/&gt;Notepad&#43;&#43; has officially released version 8.9.3, delivering critical security patches, structural performance enhancements, and resolutions for persistent crash issues. This update finalizes the text editor’s transition to a highly optimized XML parser, addressing multiple recent regressions while fortifying the application’s auto-update mechanism against documented vulnerabilities. Notepad&#43;&#43; v8.9.3 Release The most notable security implementation in version […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/notepad-v8-9-3-released/&#34;&gt;https://cybersecuritynews.com/notepad-v8-9-3-released/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/notepad-v8-9-3-released/&#34;&gt;https://cybersecuritynews.com/notepad-v8-9-3-released/&lt;/a&gt;
    </content>
    <updated>2026-03-31T04:09:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqclhlm2pum3hfapeht8hvf325m56p7gza7a7wqzsdv36cva77azczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwc4l6td</id>
    
      <title type="html">Axios NPM Packages Compromised to Inject Malicious Codes in an ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqclhlm2pum3hfapeht8hvf325m56p7gza7a7wqzsdv36cva77azczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwc4l6td" />
    <content type="html">
      Axios NPM Packages Compromised to Inject Malicious Codes in an Active Supply Chain Attack&lt;br/&gt;&lt;br/&gt;A sophisticated supply chain attack has targeted Axios, one of the most heavily adopted HTTP clients within the JavaScript ecosystem, by introducing a malicious transitive dependency into the official npm registry. Serving as a critical component across frontend frameworks, backend microservices, and enterprise applications, Axios records approximately 83 million weekly downloads on npm. The compromise […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/axios-npm-packages-compromised/&#34;&gt;https://cybersecuritynews.com/axios-npm-packages-compromised/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/axios-npm-packages-compromised/&#34;&gt;https://cybersecuritynews.com/axios-npm-packages-compromised/&lt;/a&gt;
    </content>
    <updated>2026-03-31T03:39:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxfpds7a2ugrkuyvnq965fk5p8pef6g368q00zqf7lecx4530vrgszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwwqkpp2</id>
    
      <title type="html">Claude AI Discovers Zero-Day RCE Vulnerabilities in Vim and Emacs ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxfpds7a2ugrkuyvnq965fk5p8pef6g368q00zqf7lecx4530vrgszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwwqkpp2" />
    <content type="html">
      Claude AI Discovers Zero-Day RCE Vulnerabilities in Vim and Emacs&lt;br/&gt;&lt;br/&gt;Anthropic’s Claude AI successfully discovered zero-day Remote Code Execution (RCE) flaws in both Vim and GNU Emacs. The discoveries highlight a massive paradigm shift in bug hunting, demonstrating that AI models can uncover critical vulnerabilities in legacy software with simple natural-language prompts. The Vim RCE: Compromise Upon File Open The research initiative began with a […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/claude-ai-0-day-rce-vim/&#34;&gt;https://cybersecuritynews.com/claude-ai-0-day-rce-vim/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/claude-ai-0-day-rce-vim/&#34;&gt;https://cybersecuritynews.com/claude-ai-0-day-rce-vim/&lt;/a&gt;
    </content>
    <updated>2026-03-31T03:24:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsghhcz62ytg7n40un99l5twvsmxyqvwf2y5mn54jz56gesym7ne6szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwn3t4mk</id>
    
      <title type="html">12 Best AWS Monitoring Tools in 2026 Amazon Web Services (AWS) is ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsghhcz62ytg7n40un99l5twvsmxyqvwf2y5mn54jz56gesym7ne6szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwn3t4mk" />
    <content type="html">
      12 Best AWS Monitoring Tools in 2026&lt;br/&gt;&lt;br/&gt;Amazon Web Services (AWS) is a cloud computing platform for businesses of all sizes and types. AWS’s architecture is robust and scalable, but dependability, performance, and security must be monitored. These aims guide AWS’s monitoring tools and services, which help you understand your cloud infrastructure and applications, analyze data, identify outliers, and maintain smooth operations. […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/best-aws-monitoring-tools/&#34;&gt;https://cybersecuritynews.com/best-aws-monitoring-tools/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/best-aws-monitoring-tools/&#34;&gt;https://cybersecuritynews.com/best-aws-monitoring-tools/&lt;/a&gt;
    </content>
    <updated>2026-03-30T18:08:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsy5tlt9hzdflces3saqx8pqtf3tzq00vjl25l5jdxc5mw22w7ufkgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwtggq35</id>
    
      <title type="html">Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsy5tlt9hzdflces3saqx8pqtf3tzq00vjl25l5jdxc5mw22w7ufkgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwtggq35" />
    <content type="html">
      Exposed Server Reveals TheGentlemen Ransomware Toolkit, Victim Credentials, and Ngrok Tokens&lt;br/&gt;&lt;br/&gt;A misconfigured server hosted on a Russian bulletproof hosting provider has exposed the complete operational toolkit of a TheGentlemen ransomware affiliate, including harvested victim credentials and plaintext authentication tokens used to establish hidden remote access tunnels. TheGentlemen ransomware group operates as a Ransomware-as-a-Service, or RaaS, operation where affiliates carry out attacks using shared tools and […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/&#34;&gt;https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/&#34;&gt;https://cybersecuritynews.com/exposed-server-reveals-thegentlemen-ransomware-toolkit/&lt;/a&gt;
    </content>
    <updated>2026-03-30T17:30:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq08ujp60c5r8er0gy397udayhctc5vv9r3ly9dw0pfccppt05huczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwpmmxvg</id>
    
      <title type="html">North Korean IT Worker Allegedly Used Stolen Identity and AI ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq08ujp60c5r8er0gy397udayhctc5vv9r3ly9dw0pfccppt05huczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwpmmxvg" />
    <content type="html">
      North Korean IT Worker Allegedly Used Stolen Identity and AI Resume in Job Application Scam&lt;br/&gt;&lt;br/&gt;A suspected North Korean operative tried to sneak into a remote job at a cybersecurity firm by using a stolen identity, a fake AI-generated resume, and a VoIP phone number. The case, uncovered in June 2025, shows how North Korea’s state-sponsored IT worker scheme has grown more sophisticated and harder to spot without proper screening. […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/north-korean-it-worker-allegedly-used-stolen-identity/&#34;&gt;https://cybersecuritynews.com/north-korean-it-worker-allegedly-used-stolen-identity/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/north-korean-it-worker-allegedly-used-stolen-identity/&#34;&gt;https://cybersecuritynews.com/north-korean-it-worker-allegedly-used-stolen-identity/&lt;/a&gt;
    </content>
    <updated>2026-03-30T16:52:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd7gptmx4wgat82kgwwlruau9qysfh04shvp0yqlfeg2scnjtu3qgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwv7mlm9</id>
    
      <title type="html">CrySome RAT Emerges as Advanced .NET Malware With AV Killer and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd7gptmx4wgat82kgwwlruau9qysfh04shvp0yqlfeg2scnjtu3qgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwv7mlm9" />
    <content type="html">
      CrySome RAT Emerges as Advanced .NET Malware With AV Killer and HVNC Capabilities&lt;br/&gt;&lt;br/&gt;A new and dangerous piece of malware has surfaced in the threat landscape, and it is built to stay hidden, stay running, and stay in control of any system it infects. CrySome RAT is written in C# and targets the .NET ecosystem, giving attackers complete remote control over compromised Windows machines. From stealing passwords and […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/crysome-rat-emerges-as-advanced-net-malware/&#34;&gt;https://cybersecuritynews.com/crysome-rat-emerges-as-advanced-net-malware/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/crysome-rat-emerges-as-advanced-net-malware/&#34;&gt;https://cybersecuritynews.com/crysome-rat-emerges-as-advanced-net-malware/&lt;/a&gt;
    </content>
    <updated>2026-03-30T16:30:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd4yht4udjzstj66rgwe0s4fu0ucl7mt743z4v6sdahpcwsvhaqeqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwx98a3p</id>
    
      <title type="html">New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd4yht4udjzstj66rgwe0s4fu0ucl7mt743z4v6sdahpcwsvhaqeqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwx98a3p" />
    <content type="html">
      New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell Detection&lt;br/&gt;&lt;br/&gt;A new and more dangerous version of the ClickFix attack technique has been found actively targeting Windows users. Unlike older versions that used PowerShell or mshta to run malicious commands, this new variant takes a different path. It uses rundll32.exe and WebDAV, two built-in Windows components, to quietly deliver and execute harmful payloads without triggering […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-clickfix-variant-uses-rundll32/&#34;&gt;https://cybersecuritynews.com/new-clickfix-variant-uses-rundll32/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-clickfix-variant-uses-rundll32/&#34;&gt;https://cybersecuritynews.com/new-clickfix-variant-uses-rundll32/&lt;/a&gt;
    </content>
    <updated>2026-03-30T16:01:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw8ng9nxjtdvsdc7lwunrjzejemaad80a7s0jt5rq04v84e0wv2eqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw8ss9hy</id>
    
      <title type="html">TA446 Hackers Deploying DarkSword Exploit Kit to Attack iOS Users ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw8ng9nxjtdvsdc7lwunrjzejemaad80a7s0jt5rq04v84e0wv2eqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw8ss9hy" />
    <content type="html">
      TA446 Hackers Deploying DarkSword Exploit Kit to Attack iOS Users&lt;br/&gt;&lt;br/&gt;A known threat group called TA446 has been caught using a newly discovered exploit kit called DarkSword to target iOS users. This development marks a significant shift in the group’s tactics, as previous activity from TA446 showed no signs of exploit kit use at all. The campaign came to light around March 26, 2026, when […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/ta446-hackers-deploying-darksword-exploit-kit/&#34;&gt;https://cybersecuritynews.com/ta446-hackers-deploying-darksword-exploit-kit/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/ta446-hackers-deploying-darksword-exploit-kit/&#34;&gt;https://cybersecuritynews.com/ta446-hackers-deploying-darksword-exploit-kit/&lt;/a&gt;
    </content>
    <updated>2026-03-30T15:43:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgs5vckl7xh9z62wu3g2gwkr44nj3c94pchcqsavv202ksm5gzmrgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwypfq55</id>
    
      <title type="html">New Homoglyph Attack Techniques Help Cybercriminals Spoof Trusted ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgs5vckl7xh9z62wu3g2gwkr44nj3c94pchcqsavv202ksm5gzmrgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwypfq55" />
    <content type="html">
      New Homoglyph Attack Techniques Help Cybercriminals Spoof Trusted Domains&lt;br/&gt;&lt;br/&gt;Cybercriminals have found a clever way to trick people by swapping real letters in website addresses with characters that look almost the same. These are called homoglyph attacks, and they are becoming a growing problem across the internet. A single character swap — like replacing a Latin “o” with a Greek omicron — can fool […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-homoglyph-attack-techniques/&#34;&gt;https://cybersecuritynews.com/new-homoglyph-attack-techniques/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-homoglyph-attack-techniques/&#34;&gt;https://cybersecuritynews.com/new-homoglyph-attack-techniques/&lt;/a&gt;
    </content>
    <updated>2026-03-30T14:28:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8v4y358zw4pawtwwf6pdweyczyez7fwx8l8a5u9rd483rtevylpqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwqd8u0j</id>
    
      <title type="html">Hackers Backdoor Telnyx Python SDK on PyPI to Steal Cloud and Dev ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8v4y358zw4pawtwwf6pdweyczyez7fwx8l8a5u9rd483rtevylpqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwqd8u0j" />
    <content type="html">
      Hackers Backdoor Telnyx Python SDK on PyPI to Steal Cloud and Dev Credentials&lt;br/&gt;&lt;br/&gt;A widely used Python package was quietly turned into a weapon, and most developers who got hit had no idea it happened. On March 27, 2026, a threat actor known as TeamPCP uploaded two malicious versions of the Telnyx Python SDK to PyPI, the main repository where Python developers download software packages. The compromised versions, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/&#34;&gt;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/&#34;&gt;https://cybersecuritynews.com/hackers-backdoor-telnyx-python-sdk/&lt;/a&gt;
    </content>
    <updated>2026-03-30T14:15:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsy0pdfr6q4s4p439kq4g0tcjhsxm0xkfpu502wmjw0l9l499ud76qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhs3qvv</id>
    
      <title type="html">Open VSX’s New Scanner Vulnerability Allows Malicious Extension ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsy0pdfr6q4s4p439kq4g0tcjhsxm0xkfpu502wmjw0l9l499ud76qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhs3qvv" />
    <content type="html">
      Open VSX’s New Scanner Vulnerability Allows Malicious Extension Goes Live&lt;br/&gt;&lt;br/&gt;A serious security flaw was recently found in Open VSX, the extension marketplace used by popular code editors like Cursor and Windsurf, as well as the broader VS Code fork ecosystem. The vulnerability was found inside the platform’s newly introduced pre-publish scanning pipeline, a security layer built to check every extension before it becomes available […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/open-vsxs-new-scanner-vulnerability/&#34;&gt;https://cybersecuritynews.com/open-vsxs-new-scanner-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/open-vsxs-new-scanner-vulnerability/&#34;&gt;https://cybersecuritynews.com/open-vsxs-new-scanner-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-03-30T13:58:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrg4jpy3u0253f5l02p63t8rgxg56ycmaesnn94qu5vw6aewh94ggzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe3cary</id>
    
      <title type="html">BlankGrabber Stealer Uses Fake Certificate Loader to Hide Malware ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrg4jpy3u0253f5l02p63t8rgxg56ycmaesnn94qu5vw6aewh94ggzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe3cary" />
    <content type="html">
      BlankGrabber Stealer Uses Fake Certificate Loader to Hide Malware Delivery Chain&lt;br/&gt;&lt;br/&gt;A Python-based information stealer known as BlankGrabber has been caught using a deceptive certificate loader trick to hide a multi-stage malware delivery chain. First identified in 2023, this threat has grown more complex over time and keeps targeting everyday users through widely used online platforms. BlankGrabber is designed to steal as much sensitive data as […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/blankgrabber-stealer-uses-fake-certificate-loader/&#34;&gt;https://cybersecuritynews.com/blankgrabber-stealer-uses-fake-certificate-loader/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/blankgrabber-stealer-uses-fake-certificate-loader/&#34;&gt;https://cybersecuritynews.com/blankgrabber-stealer-uses-fake-certificate-loader/&lt;/a&gt;
    </content>
    <updated>2026-03-30T13:11:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp2cwmndf4zxnv4da0sfdwxgvgyply33gs9qqadqjvq6aqqzye0pqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhvcs9q</id>
    
      <title type="html">Stored XSS Bug in Jira Work Management Could Lead to Full ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp2cwmndf4zxnv4da0sfdwxgvgyply33gs9qqadqjvq6aqqzye0pqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwhvcs9q" />
    <content type="html">
      Stored XSS Bug in Jira Work Management Could Lead to Full Organization Takeover&lt;br/&gt;&lt;br/&gt;A popular collaboration tool within the Atlassian ecosystem is widely used by organizations to track projects, manage approvals, and manage daily tasks. Recently, security researchers at Snapsec uncovered a critical Stored Cross-Site Scripting (XSS) vulnerability within the platform. By exploiting a seemingly low-risk configuration field, the team demonstrated how a low-privileged user could achieve a full […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/stored-xss-bug-in-jira-work-management/&#34;&gt;https://cybersecuritynews.com/stored-xss-bug-in-jira-work-management/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/stored-xss-bug-in-jira-work-management/&#34;&gt;https://cybersecuritynews.com/stored-xss-bug-in-jira-work-management/&lt;/a&gt;
    </content>
    <updated>2026-03-30T12:42:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswttt82mul4jtjatj8x85v4ccu896qyfnvc6n507dpj3vltteyf9czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw5dx6lj</id>
    
      <title type="html">CanisterWorm Malware Attacking Docker/K8s/Redis to Gain Access ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswttt82mul4jtjatj8x85v4ccu896qyfnvc6n507dpj3vltteyf9czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw5dx6lj" />
    <content type="html">
      CanisterWorm Malware Attacking Docker/K8s/Redis to Gain Access and Steal Secrets&lt;br/&gt;&lt;br/&gt;A financially motivated cybercrime group has been quietly compromising cloud environments since late 2025, and its activities are now drawing serious concern across the security community. The group, known as TeamPCP, operates a self-propagating worm called CanisterWorm that hunts for poorly secured Docker APIs, Kubernetes clusters, Redis servers, and systems vulnerable to the React2Shell flaw. […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/canisterworm-malware-attacking-docker/&#34;&gt;https://cybersecuritynews.com/canisterworm-malware-attacking-docker/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/canisterworm-malware-attacking-docker/&#34;&gt;https://cybersecuritynews.com/canisterworm-malware-attacking-docker/&lt;/a&gt;
    </content>
    <updated>2026-03-30T12:29:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf8fzfpth6fdgjslhjqdxk3xf02lc3sjdyhryxmqynygfmkex49kszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe5k7qv</id>
    
      <title type="html">Vim Vulnerability Let Attackers Execute Arbitrary Command Via ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf8fzfpth6fdgjslhjqdxk3xf02lc3sjdyhryxmqynygfmkex49kszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe5k7qv" />
    <content type="html">
      Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files&lt;br/&gt;&lt;br/&gt;A high-severity security flaw has been discovered in Vim, one of the most widely used text editors among developers. This vulnerability allows attackers to execute arbitrary operating system commands simply by tricking a user into opening a specially crafted file. Discovered by security researcher Hung Nguyen, the bug chain highlights the persistent risks associated with how […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/vim-vulnerability/&#34;&gt;https://cybersecuritynews.com/vim-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/vim-vulnerability/&#34;&gt;https://cybersecuritynews.com/vim-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-03-30T12:08:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs04hflrj4x5hlur2nlddqn3myug3c82kqgf6xl0yg2ug7y8a2xdqszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwetxmql</id>
    
      <title type="html">Critical Fortinet Forticlient EMS Vulnerability Exploited in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs04hflrj4x5hlur2nlddqn3myug3c82kqgf6xl0yg2ug7y8a2xdqszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwetxmql" />
    <content type="html">
      Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks&lt;br/&gt;&lt;br/&gt;A critical SQL injection vulnerability in Fortinet’s FortiClient Endpoint Management Server (EMS), tracked as CVE-2026-21643, is actively being exploited in the wild. Threat actors have been leveraging this flaw in attacks starting four days ago, despite it not yet appearing on the CISA Known Exploited Vulnerabilities catalog. The security flaw affects FortiClient EMS version 7.4.4, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/forticlient-ems-vulnerability-exploited/&#34;&gt;https://cybersecuritynews.com/forticlient-ems-vulnerability-exploited/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/forticlient-ems-vulnerability-exploited/&#34;&gt;https://cybersecuritynews.com/forticlient-ems-vulnerability-exploited/&lt;/a&gt;
    </content>
    <updated>2026-03-30T09:32:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszayuzfxf4jw7eqa4hw2e0g6wtm6vvgg2tsfkfgel9ht989gsrlsgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw69cg04</id>
    
      <title type="html">India Set to Ban Sale of Hikvision, TP-Link, CCTV Products From ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszayuzfxf4jw7eqa4hw2e0g6wtm6vvgg2tsfkfgel9ht989gsrlsgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw69cg04" />
    <content type="html">
      India Set to Ban Sale of Hikvision, TP-Link, CCTV Products From April&lt;br/&gt;&lt;br/&gt;Starting April 1, 2026, the Indian government will effectively ban Chinese video surveillance giants, including Hikvision, Dahua, and TP-Link, from selling internet-connected CCTV cameras in the country. This decisive market restriction stems from new mandatory certification rules driven by national security concerns regarding foreign hardware. The Ministry of Electronics and Information Technology (MeitY) has implemented […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/india-ban-cctv-products/&#34;&gt;https://cybersecuritynews.com/india-ban-cctv-products/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/india-ban-cctv-products/&#34;&gt;https://cybersecuritynews.com/india-ban-cctv-products/&lt;/a&gt;
    </content>
    <updated>2026-03-30T08:09:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswuv47ur75x7p5tdwsvha32l4ry5umzmjuc7nq555229xy8mgruggzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlwrvua</id>
    
      <title type="html">New “Prompt Poaching” Attack Steals Users’ AI Conversations ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswuv47ur75x7p5tdwsvha32l4ry5umzmjuc7nq555229xy8mgruggzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlwrvua" />
    <content type="html">
      New “Prompt Poaching” Attack Steals Users’ AI Conversations via Malicious Browser Extensions&lt;br/&gt;&lt;br/&gt;For many users, engaging with an AI assistant requires opening a dedicated browser tab, which inherently isolates the AI from other browsing activities. While this separation improves privacy, it reduces usefulness and context. To bridge this gap, AI-powered browser extensions have surged in popularity, allowing AI agents to seamlessly interact with emails, corporate portals, and […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/prompt-poaching-attack/&#34;&gt;https://cybersecuritynews.com/prompt-poaching-attack/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/prompt-poaching-attack/&#34;&gt;https://cybersecuritynews.com/prompt-poaching-attack/&lt;/a&gt;
    </content>
    <updated>2026-03-30T07:45:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfu4d25f42f62xnzufrglql6axe49nsgugzkmw4znuf0x67pe77dgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwda72vg</id>
    
      <title type="html">VoidLink Malware Framework Shows that AI-assisted Malware is Not ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfu4d25f42f62xnzufrglql6axe49nsgugzkmw4znuf0x67pe77dgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwda72vg" />
    <content type="html">
      VoidLink Malware Framework Shows that AI-assisted Malware is Not Experimental Anymore&lt;br/&gt;&lt;br/&gt;For years, cybersecurity professionals debated whether AI could truly be weaponized to build dangerous malware at scale. That debate is now settled. VoidLink, a Linux-based malware framework discovered in early 2026, has crossed a threshold the security community long feared — AI-assisted malware has moved from a theoretical concept to a fully operational threat. VoidLink […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/voidlink-malware-framework-2/&#34;&gt;https://cybersecuritynews.com/voidlink-malware-framework-2/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/voidlink-malware-framework-2/&#34;&gt;https://cybersecuritynews.com/voidlink-malware-framework-2/&lt;/a&gt;
    </content>
    <updated>2026-03-30T06:41:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs853hyl5aky0r9vhnmjwap083qp2slw5lyyfu6ur76869awv7pe8szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw87sxng</id>
    
      <title type="html">10 Best Spam Filter Tools 2026 Spam filter tools use advanced ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs853hyl5aky0r9vhnmjwap083qp2slw5lyyfu6ur76869awv7pe8szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw87sxng" />
    <content type="html">
      10 Best Spam Filter Tools 2026&lt;br/&gt;&lt;br/&gt;Spam filter tools use advanced algorithms and machine learning techniques to detect and block unwanted email messages. They analyze email content, sender reputation, and patterns to effectively identify and filter out spam, ensuring inboxes remain clutter-free. These tools offer customizable filtering rules, allowing users to set specific criteria for identifying spam. This flexibility helps tailor […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/best-spam-filter-tools/&#34;&gt;https://cybersecuritynews.com/best-spam-filter-tools/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/best-spam-filter-tools/&#34;&gt;https://cybersecuritynews.com/best-spam-filter-tools/&lt;/a&gt;
    </content>
    <updated>2026-03-30T03:59:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs08lv3hgqkgunknp57km55qff7hjls86y5kenftvdvdykt9kg3vmqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw6zmzr4</id>
    
      <title type="html">10 Best Log Monitoring Tools in 2026 As enterprises adopt more ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs08lv3hgqkgunknp57km55qff7hjls86y5kenftvdvdykt9kg3vmqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw6zmzr4" />
    <content type="html">
      10 Best Log Monitoring Tools in 2026&lt;br/&gt;&lt;br/&gt;As enterprises adopt more cloud-native technologies, containers, and microservices-based architectures, log monitoring and management are now critical. According to many market research assessments, the global log management industry is anticipated to increase from $1.9 billion in 2020 to $4.1 billion in 2026. This expansion is driven by the increased adoption of hyper-scale cloud providers, such […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/best-log-monitoring-tools/&#34;&gt;https://cybersecuritynews.com/best-log-monitoring-tools/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/best-log-monitoring-tools/&#34;&gt;https://cybersecuritynews.com/best-log-monitoring-tools/&lt;/a&gt;
    </content>
    <updated>2026-03-30T03:46:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqrpex6jj9r20j5uld294rseasnzdap7n70aha8ul65g55c07qs3qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkl6xhj</id>
    
      <title type="html">10 Best Fraud Detection Tools in 2026 Fraud management is ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqrpex6jj9r20j5uld294rseasnzdap7n70aha8ul65g55c07qs3qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwkl6xhj" />
    <content type="html">
      10 Best Fraud Detection Tools in 2026&lt;br/&gt;&lt;br/&gt;Fraud management is detecting, preventing, and responding to fraudulent activity. It entails spotting potential fraud, implementing procedures to prevent fraud, and lessening the effects of fraud. There are several strategies that organizations can use to manage fraud, including: What Does Fraud Detection Software Do? Fraud detection software is designed to identify fraudulent activity by analyzing […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/best-fraud-detection-tools/&#34;&gt;https://cybersecuritynews.com/best-fraud-detection-tools/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/best-fraud-detection-tools/&#34;&gt;https://cybersecuritynews.com/best-fraud-detection-tools/&lt;/a&gt;
    </content>
    <updated>2026-03-30T03:31:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs26k2czmkzk9wdcq5lmagcjaeshve5zln5yt2fua6nywjuj3eshdczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw6de8rp</id>
    
      <title type="html">Microsoft Issues Critical WinRE and Setup Updates Ahead of 2026 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs26k2czmkzk9wdcq5lmagcjaeshve5zln5yt2fua6nywjuj3eshdczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw6de8rp" />
    <content type="html">
      Microsoft Issues Critical WinRE and Setup Updates Ahead of 2026 Secure Boot Certificate Expiration&lt;br/&gt;&lt;br/&gt;Microsoft has rolled out two new dynamic updates, KB5081494 and KB5083482, designed for Windows 11 versions 24H2 and 25H2. Released on March 26, 2026, these patches deliver essential enhancements to setup binaries and the Windows Recovery Environment. Accompanying these technical releases is a critical advisory regarding the impending expiration of Windows Secure Boot certificates, urging […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/microsoft-critical-winre-update/&#34;&gt;https://cybersecuritynews.com/microsoft-critical-winre-update/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/microsoft-critical-winre-update/&#34;&gt;https://cybersecuritynews.com/microsoft-critical-winre-update/&lt;/a&gt;
    </content>
    <updated>2026-03-29T14:39:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs263mx2f29snj03xdlz8n4g6fv24ayx826hcjn0kpf6z2q6q7vnwszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwyekmz7</id>
    
      <title type="html">Hackers Probe Citrix NetScaler Instances Ahead of Likely ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs263mx2f29snj03xdlz8n4g6fv24ayx826hcjn0kpf6z2q6q7vnwszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwyekmz7" />
    <content type="html">
      Hackers Probe Citrix NetScaler Instances Ahead of Likely CVE-2026-3055 Exploitation&lt;br/&gt;&lt;br/&gt;Cybersecurity researchers are sounding the alarm over imminent in-the-wild exploitation of a recently disclosed critical vulnerability in Citrix NetScaler ADC and Gateway appliances. Threat intelligence firm watchTowr and Defused Cyber have detected active reconnaissance campaigns specifically targeting CVE-2026-3055, a high-severity memory overread flaw that could allow unauthenticated attackers to extract sensitive data. Organizations relying on […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/citrix-netscaler-instances-exploited/&#34;&gt;https://cybersecuritynews.com/citrix-netscaler-instances-exploited/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/citrix-netscaler-instances-exploited/&#34;&gt;https://cybersecuritynews.com/citrix-netscaler-instances-exploited/&lt;/a&gt;
    </content>
    <updated>2026-03-29T06:56:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8sefqanrv67hk78vr89lz3aeypxsecl6u78wnhkx2nsu0z0ngp4szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcqgldu</id>
    
      <title type="html">Cybersecurity Stocks Fall as Anthropic Tests Powerful New Model ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8sefqanrv67hk78vr89lz3aeypxsecl6u78wnhkx2nsu0z0ngp4szyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcqgldu" />
    <content type="html">
      Cybersecurity Stocks Fall as Anthropic Tests Powerful New Model&lt;br/&gt;&lt;br/&gt;Cybersecurity stocks declined sharply on Friday following revelations that Anthropic has begun testing “Mythos,” an extraordinarily powerful new AI model with advanced vulnerability-discovery capabilities. Anthropic is actively trialing a new tier of artificial intelligence models codenamed “Capybara,” with the flagship model operating under the moniker “Mythos”. Internal documents indicate that Mythos significantly outperforms the company’s […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/cybersecurity-stocks-anthropic/&#34;&gt;https://cybersecuritynews.com/cybersecurity-stocks-anthropic/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/cybersecurity-stocks-anthropic/&#34;&gt;https://cybersecuritynews.com/cybersecurity-stocks-anthropic/&lt;/a&gt;
    </content>
    <updated>2026-03-28T15:05:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgwqmmy0eyn39u5486u7008646l4wwuw3dyct899acl9qnsjcl36czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe6ftu5</id>
    
      <title type="html">CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgwqmmy0eyn39u5486u7008646l4wwuw3dyct899acl9qnsjcl36czyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe6ftu5" />
    <content type="html">
      CISA Warns of F5 BIG-IP Vulnerability Actively Exploited in Attacks&lt;br/&gt;&lt;br/&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly disclosed vulnerability affecting F5 BIG-IP systems to its Known Exploited Vulnerabilities (KEV) catalog, warning that the flaw is being actively leveraged in real-world attacks. The vulnerability, tracked as CVE-2025-53521, was officially listed on March 27, 2026, with a remediation deadline of March 30, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/f5-big-ip-vulnerability-actively-exploited/&#34;&gt;https://cybersecuritynews.com/f5-big-ip-vulnerability-actively-exploited/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/f5-big-ip-vulnerability-actively-exploited/&#34;&gt;https://cybersecuritynews.com/f5-big-ip-vulnerability-actively-exploited/&lt;/a&gt;
    </content>
    <updated>2026-03-28T14:26:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0n8j08c2qvgcpxghs6svqkqnqd8h43rcp23eavg2e4pex3ttgv2gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlq4k6t</id>
    
      <title type="html">European Commission Confirms Cyberattack Following AWS Account ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0n8j08c2qvgcpxghs6svqkqnqd8h43rcp23eavg2e4pex3ttgv2gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlq4k6t" />
    <content type="html">
      European Commission Confirms Cyberattack Following AWS Account Hack&lt;br/&gt;&lt;br/&gt;The European Commission has officially confirmed a cyberattack following a targeted cyberattack that compromised its Amazon Web Services (AWS) account. Discovered on March 24, the intrusion specifically affected the external cloud environment that hosts the Commission’s public web presence on the Europa.eu platform. Despite the severity of the unauthorized access, immediate containment procedures ensured that […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/european-commission-aws-hack/&#34;&gt;https://cybersecuritynews.com/european-commission-aws-hack/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/european-commission-aws-hack/&#34;&gt;https://cybersecuritynews.com/european-commission-aws-hack/&lt;/a&gt;
    </content>
    <updated>2026-03-28T03:20:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstzqee9jap4qr8gt0s7gh3rmnmvv2la4a823rjm73rj7zyexawpvqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw3m52ka</id>
    
      <title type="html">Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstzqee9jap4qr8gt0s7gh3rmnmvv2la4a823rjm73rj7zyexawpvqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw3m52ka" />
    <content type="html">
      Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed Kernel Drivers by Default&lt;br/&gt;&lt;br/&gt;Microsoft is taking a major step to harden the Windows operating system against kernel-level threats by removing trust for drivers signed by the deprecated cross-signed root program. Starting with the April 2026 update, Windows 11 and Windows Server 2025 will block these untrusted drivers by default. This policy ensures that only drivers certified through the […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/windows-11-and-server-2025-update/&#34;&gt;https://cybersecuritynews.com/windows-11-and-server-2025-update/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/windows-11-and-server-2025-update/&#34;&gt;https://cybersecuritynews.com/windows-11-and-server-2025-update/&lt;/a&gt;
    </content>
    <updated>2026-03-28T02:48:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvtru527627qdwqppy4e9w9tyqtt64dd207z783k726jqewn2rt4gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwqerkvh</id>
    
      <title type="html">CISA Adds Aquasecurity Trivy Scanner Vulnerability to KEV Catalog ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvtru527627qdwqppy4e9w9tyqtt64dd207z783k726jqewn2rt4gzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwqerkvh" />
    <content type="html">
      CISA Adds Aquasecurity Trivy Scanner Vulnerability to KEV Catalog&lt;br/&gt;&lt;br/&gt;CISA has officially added a critical vulnerability affecting Aquasecurity’s Trivy scanner to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2026-33634, this alarming security flaw poses a severe risk to software development pipelines. By exploiting this vulnerability, threat actors can gain unauthorized access to highly sensitive Continuous Integration and Continuous Deployment (CI/CD) environments. Organizations relying […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/aquasecurity-trivy-scanner-vulnerability/&#34;&gt;https://cybersecuritynews.com/aquasecurity-trivy-scanner-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/aquasecurity-trivy-scanner-vulnerability/&#34;&gt;https://cybersecuritynews.com/aquasecurity-trivy-scanner-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-03-28T02:24:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2dyn5y2sqks2ud0f55tr6ezcx8kep27mp5ch07yalxprrhpy08lszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlmkc49</id>
    
      <title type="html">FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2dyn5y2sqks2ud0f55tr6ezcx8kep27mp5ch07yalxprrhpy08lszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlmkc49" />
    <content type="html">
      FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers&lt;br/&gt;&lt;br/&gt;Iran-linked hackers have claimed responsibility for breaching FBI Director Kash Patel’s personal Gmail inbox, leaking photographs, documents, and email correspondence online. The hacker group Handala Hack Team announced the breach on their website, declaring that Patel “will now find his name among the list of successfully hacked victims.” The leaked materials, totaling approximately 800 megabytes, […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/fbi-chief-kash-patel-gmail-hacked/&#34;&gt;https://cybersecuritynews.com/fbi-chief-kash-patel-gmail-hacked/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/fbi-chief-kash-patel-gmail-hacked/&#34;&gt;https://cybersecuritynews.com/fbi-chief-kash-patel-gmail-hacked/&lt;/a&gt;
    </content>
    <updated>2026-03-27T17:21:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8hqxffgdfuw4y27e8af7xweuey2xmdfnrlv8dygzt7qy83teakzqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw2an4pm</id>
    
      <title type="html">New Silver Fox Campaign Hits Japanese Businesses With Tax-Themed ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8hqxffgdfuw4y27e8af7xweuey2xmdfnrlv8dygzt7qy83teakzqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw2an4pm" />
    <content type="html">
      New Silver Fox Campaign Hits Japanese Businesses With Tax-Themed Phishing Lures&lt;br/&gt;&lt;br/&gt;Japan’s tax season has become a hunting ground for a well-organized threat actor known as Silver Fox. As Japanese companies enter their annual cycle of tax filing, salary reviews, and personnel changes, this group is taking full advantage of the moment — sending highly targeted spearphishing emails designed to look like routine internal communications. The […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-silver-fox-campaign-hits-japanese-businesses/&#34;&gt;https://cybersecuritynews.com/new-silver-fox-campaign-hits-japanese-businesses/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-silver-fox-campaign-hits-japanese-businesses/&#34;&gt;https://cybersecuritynews.com/new-silver-fox-campaign-hits-japanese-businesses/&lt;/a&gt;
    </content>
    <updated>2026-03-27T14:00:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswf9wvvcw99rpccyejerwhxfs0p4r32l5crapqvcnu9wr6jv9tq3qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw03rjhp</id>
    
      <title type="html">Hackers Deploy BRUSHWORM and BRUSHLOGGER Against South Asian ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswf9wvvcw99rpccyejerwhxfs0p4r32l5crapqvcnu9wr6jv9tq3qzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw03rjhp" />
    <content type="html">
      Hackers Deploy BRUSHWORM and BRUSHLOGGER Against South Asian Financial Firm&lt;br/&gt;&lt;br/&gt;A South Asian financial institution has become the latest target of a focused cyberattack involving two custom-built malware tools — BRUSHWORM, a modular backdoor, and BRUSHLOGGER, a keylogger disguised as a trusted system file. The attack combined file theft, persistent system access, and real-time keystroke capture, underlining the growing risk that financial organizations across South […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-deploy-brushworm-and-brushlogger/&#34;&gt;https://cybersecuritynews.com/hackers-deploy-brushworm-and-brushlogger/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-deploy-brushworm-and-brushlogger/&#34;&gt;https://cybersecuritynews.com/hackers-deploy-brushworm-and-brushlogger/&lt;/a&gt;
    </content>
    <updated>2026-03-27T12:34:57Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0hqukklv45ydgz9l3huyadar80cvknk7ul6y3lgfjn6cyr42n9jczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwqfz8xl</id>
    
      <title type="html">Hackers Use Phishing ZIP Files to Deploy PXA Stealer Against ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0hqukklv45ydgz9l3huyadar80cvknk7ul6y3lgfjn6cyr42n9jczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwqfz8xl" />
    <content type="html">
      Hackers Use Phishing ZIP Files to Deploy PXA Stealer Against Financial Firms&lt;br/&gt;&lt;br/&gt;A new wave of cyberattacks is putting financial institutions on high alert, as threat actors ramp up the use of PXA Stealer — a powerful information-stealing malware — against organizations worldwide. The surge follows law enforcement’s successful dismantling of major infostealer operations, including Lumma, Rhadamanthys, and RedLine, throughout 2025. With those platforms gone, PXA Stealer […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/hackers-use-phishing-zip-files/&#34;&gt;https://cybersecuritynews.com/hackers-use-phishing-zip-files/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-use-phishing-zip-files/&#34;&gt;https://cybersecuritynews.com/hackers-use-phishing-zip-files/&lt;/a&gt;
    </content>
    <updated>2026-03-27T10:34:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsysjt8zu07zy42yclkegwc8unex357x4c3532u8fpx8guy0xnppcszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw9f22mk</id>
    
      <title type="html">Telnyx PyPI Package With 742,000 downloads Compromised in TeamPCP ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsysjt8zu07zy42yclkegwc8unex357x4c3532u8fpx8guy0xnppcszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw9f22mk" />
    <content type="html">
      Telnyx PyPI Package With 742,000 downloads Compromised in TeamPCP Supply Chain Attack&lt;br/&gt;&lt;br/&gt;The official Telnyx Python SDK on PyPI was compromised this morning as part of an escalating, weeks-long supply chain campaign orchestrated by the threat actor group TeamPCP. Malicious versions 4.87.1 and 4.87.2 of the telnyx package were uploaded to PyPI at 03:51 UTC on March 27, 2026, with the payload executing silently at import time […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/telnyx-pypi-package-compromised/&#34;&gt;https://cybersecuritynews.com/telnyx-pypi-package-compromised/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/telnyx-pypi-package-compromised/&#34;&gt;https://cybersecuritynews.com/telnyx-pypi-package-compromised/&lt;/a&gt;
    </content>
    <updated>2026-03-27T10:18:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgj5vrjjfh6s54z4y8cmmcffd2ay066y9x6nay64tqwv0rlwlaxzczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwt57235</id>
    
      <title type="html">Red Hat Warns of Malware Code Embedded in Popular Linux Tool ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgj5vrjjfh6s54z4y8cmmcffd2ay066y9x6nay64tqwv0rlwlaxzczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwt57235" />
    <content type="html">
      Red Hat Warns of Malware Code Embedded in Popular Linux Tool Allow Unauthorized Access to Systems&lt;br/&gt;&lt;br/&gt;Red Hat has issued a critical security warning regarding malicious code discovered in recent versions of the “xz” compression tools and libraries. Tracked as CVE-2024-3094, this highly sophisticated supply chain compromise could allow threat actors to bypass authentication and gain unauthorized remote access to affected Linux systems. The xz utility is a fundamental data compression […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/linux-tool-malware-embedded/&#34;&gt;https://cybersecuritynews.com/linux-tool-malware-embedded/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/linux-tool-malware-embedded/&#34;&gt;https://cybersecuritynews.com/linux-tool-malware-embedded/&lt;/a&gt;
    </content>
    <updated>2026-03-27T09:30:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2uayhrm7k9chyjzfzvtw74u9wjutuy0wwungfnd5dxlsuf63w9wszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwmmad39</id>
    
      <title type="html">Critical Citrix NetScaler and Gateway Vulnerabilities Let Remote ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2uayhrm7k9chyjzfzvtw74u9wjutuy0wwungfnd5dxlsuf63w9wszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwmmad39" />
    <content type="html">
      Critical Citrix NetScaler and Gateway Vulnerabilities Let Remote Attackers Leak Sensitive Information&lt;br/&gt;&lt;br/&gt;Cloud Software Group has issued a critical security bulletin detailing two newly discovered vulnerabilities affecting customer-managed NetScaler ADC and NetScaler Gateway appliances. These flaws, tracked as CVE-2026-3055 and CVE-2026-4368, could allow remote attackers to leak sensitive information or cause user session mixups. Network administrators and security teams are strongly urged to apply the latest security […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/citrix-netscaler-and-gateway-vulnerabilities/&#34;&gt;https://cybersecuritynews.com/citrix-netscaler-and-gateway-vulnerabilities/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/citrix-netscaler-and-gateway-vulnerabilities/&#34;&gt;https://cybersecuritynews.com/citrix-netscaler-and-gateway-vulnerabilities/&lt;/a&gt;
    </content>
    <updated>2026-03-27T08:26:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfcp67wuz7883lr2uw0f6v2kzfk4jpcz49zctmxzfv5x9g4s2nzygzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw5x64zv</id>
    
      <title type="html">Fake Cloudflare CAPTCHA Pages Spread Infiniti Stealer Malware on ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfcp67wuz7883lr2uw0f6v2kzfk4jpcz49zctmxzfv5x9g4s2nzygzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw5x64zv" />
    <content type="html">
      Fake Cloudflare CAPTCHA Pages Spread Infiniti Stealer Malware on macOS Systems&lt;br/&gt;&lt;br/&gt;A new macOS malware that was undocumented previously, is quietly tricking users through fake Cloudflare human verification pages. Called Infiniti Stealer, this threat uses a well-known social engineering trick called ClickFix to convince Mac users into running dangerous commands directly on their own machines, bypassing the need for any software vulnerability or exploit. For a […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/fake-cloudflare-captcha-pages-spread-infiniti-stealer/&#34;&gt;https://cybersecuritynews.com/fake-cloudflare-captcha-pages-spread-infiniti-stealer/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/fake-cloudflare-captcha-pages-spread-infiniti-stealer/&#34;&gt;https://cybersecuritynews.com/fake-cloudflare-captcha-pages-spread-infiniti-stealer/&lt;/a&gt;
    </content>
    <updated>2026-03-27T07:50:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8em8e7fawgx9tn865sc6al3p7claf85t7g4e233uvlyq55k82xpgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwzp3a9g</id>
    
      <title type="html">New Windows Error Reporting Vulnerability Lets Attackers Escalate ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8em8e7fawgx9tn865sc6al3p7claf85t7g4e233uvlyq55k82xpgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwzp3a9g" />
    <content type="html">
      New Windows Error Reporting Vulnerability Lets Attackers Escalate to Gain SYSTEM Access&lt;br/&gt;&lt;br/&gt;A newly analyzed local privilege escalation vulnerability in the Windows Error Reporting (WER) service allows attackers to easily gain full SYSTEM access. The flaw, tracked as CVE-2026-20817, was considered so structurally dangerous that Microsoft completely removed the vulnerable feature rather than attempting a traditional code patch.​ The security flaw exists within the main executable library […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-windows-error-reporting-vulnerability/&#34;&gt;https://cybersecuritynews.com/new-windows-error-reporting-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-windows-error-reporting-vulnerability/&#34;&gt;https://cybersecuritynews.com/new-windows-error-reporting-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-03-27T07:14:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd0z79zntkv4zt89unld7400vg42jc9k04np44vy2z9x5k2wyttcqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwrfnr54</id>
    
      <title type="html">ISC Warns of High-Severity Kea DHCP Flaw That Can Crash Services ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd0z79zntkv4zt89unld7400vg42jc9k04np44vy2z9x5k2wyttcqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwrfnr54" />
    <content type="html">
      ISC Warns of High-Severity Kea DHCP Flaw That Can Crash Services Remotely&lt;br/&gt;&lt;br/&gt;The Internet Systems Consortium (ISC) has released a critical security advisory warning network administrators of a high-severity vulnerability affecting the Kea DHCP server. Tracked as CVE-2026-3608, this flaw allows unauthenticated remote attackers to trigger a stack overflow error. When successfully exploited, the vulnerability causes the receiving daemon to crash, resulting in a sudden and total […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/isc-warns-kea-dhcp-flaw/&#34;&gt;https://cybersecuritynews.com/isc-warns-kea-dhcp-flaw/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/isc-warns-kea-dhcp-flaw/&#34;&gt;https://cybersecuritynews.com/isc-warns-kea-dhcp-flaw/&lt;/a&gt;
    </content>
    <updated>2026-03-27T07:08:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyg7lq9sx2txeqcwz7f0dmna7gern3nx8jrc2l24f432n43xzskwgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlcgm9u</id>
    
      <title type="html">Anthropic’s Leaked Drafts Expose Powerful New AI Model ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyg7lq9sx2txeqcwz7f0dmna7gern3nx8jrc2l24f432n43xzskwgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwlcgm9u" />
    <content type="html">
      Anthropic’s Leaked Drafts Expose Powerful New AI Model “Claude Mythos”&lt;br/&gt;&lt;br/&gt;Anthropic has inadvertently exposed highly sensitive internal documents, revealing the existence of a powerful, unreleased AI model dubbed “Claude Mythos.” The leak, which stems from an unsecured and publicly searchable data cache, has raised immediate alarms within the cybersecurity community, particularly due to internal assessments indicating the new model presents unprecedented cybersecurity risks. According to […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/anthropic-claude-mythos/&#34;&gt;https://cybersecuritynews.com/anthropic-claude-mythos/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/anthropic-claude-mythos/&#34;&gt;https://cybersecuritynews.com/anthropic-claude-mythos/&lt;/a&gt;
    </content>
    <updated>2026-03-27T04:40:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfk7lf4l6nzwa22ufevwygzvvvqaqhj3eg2hjpcr05knedzf305rgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe58muy</id>
    
      <title type="html">Claude Chrome Extension 0-Click Vulnerability Enables Silent ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfk7lf4l6nzwa22ufevwygzvvvqaqhj3eg2hjpcr05knedzf305rgzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwe58muy" />
    <content type="html">
      Claude Chrome Extension 0-Click Vulnerability Enables Silent Prompt Injection Attacks&lt;br/&gt;&lt;br/&gt;A critical zero-click vulnerability in Anthropic’s Claude Chrome Extension exposed over 3 million users to silent prompt-injection attacks, allowing malicious websites to hijack the AI assistant without user interaction. The flaw, now patched, could have enabled attackers to steal Gmail access tokens, read Google Drive files, export chat history, and send emails all invisibly. The […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/claude-chrome-extension-0-click-vulnerability/&#34;&gt;https://cybersecuritynews.com/claude-chrome-extension-0-click-vulnerability/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/claude-chrome-extension-0-click-vulnerability/&#34;&gt;https://cybersecuritynews.com/claude-chrome-extension-0-click-vulnerability/&lt;/a&gt;
    </content>
    <updated>2026-03-27T03:09:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfp94wejam9nkche7ag28hhp2creevsyk0pndw6mx6xg05qcz9ylczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw3ae7zl</id>
    
      <title type="html">Critical NVIDIA Vulnerabilities Enables RCE and DoS Attacks ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfp94wejam9nkche7ag28hhp2creevsyk0pndw6mx6xg05qcz9ylczyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw3ae7zl" />
    <content type="html">
      Critical NVIDIA Vulnerabilities Enables RCE and DoS Attacks&lt;br/&gt;&lt;br/&gt;Critical March 2026 security updates have been released to fix multiple vulnerabilities across enterprise and AI software systems. The latest advisories highlight severe flaws that could enable attackers to execute arbitrary code, trigger denial-of-service (DoS) conditions, or escalate privileges within compromised systems. Organizations utilizing NVIDIA’s AI frameworks are strongly urged to review and patch their environments […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/nvidia-vulnerabilities-rce-attacks/&#34;&gt;https://cybersecuritynews.com/nvidia-vulnerabilities-rce-attacks/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/nvidia-vulnerabilities-rce-attacks/&#34;&gt;https://cybersecuritynews.com/nvidia-vulnerabilities-rce-attacks/&lt;/a&gt;
    </content>
    <updated>2026-03-27T02:00:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstxqgrnplz0ch5etsncxx8rxpmjgvw2t0a2ry6g4j950kg3kvedgszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw47pcnm</id>
    
      <title type="html">New ClickFix Attack Leverage Windows Run Dialog Box and macOS ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstxqgrnplz0ch5etsncxx8rxpmjgvw2t0a2ry6g4j950kg3kvedgszyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw47pcnm" />
    <content type="html">
      New ClickFix Attack Leverage Windows Run Dialog Box and macOS Terminal to Deploy Malware&lt;br/&gt;&lt;br/&gt;A social engineering technique called ClickFix has resurfaced with significant force, tricking users on both Windows and macOS into manually executing malicious commands that quietly install malware on their devices. First documented in late 2023, the method has rapidly grown from a niche tactic into one of the most widely adopted initial access strategies across […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/new-clickfix-attack-leverage-windows-run-dialog-box/&#34;&gt;https://cybersecuritynews.com/new-clickfix-attack-leverage-windows-run-dialog-box/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/new-clickfix-attack-leverage-windows-run-dialog-box/&#34;&gt;https://cybersecuritynews.com/new-clickfix-attack-leverage-windows-run-dialog-box/&lt;/a&gt;
    </content>
    <updated>2026-03-26T19:45:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyv958ymxrq5ck772q80rgj863pazlk40uhd2gq4ch0dk639a3gegzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw7qqrp0</id>
    
      <title type="html">Leak Bazaar Turns Stolen Corporate Data Into a Structured ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyv958ymxrq5ck772q80rgj863pazlk40uhd2gq4ch0dk639a3gegzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kw7qqrp0" />
    <content type="html">
      Leak Bazaar Turns Stolen Corporate Data Into a Structured Criminal Marketplace&lt;br/&gt;&lt;br/&gt;A threat actor known as “Snow” from SnowTeam posted an advertisement on the Russian-speaking TierOne (T1) cybercrime forum on March 25, 2026, introducing a new criminal service called Leak Bazaar. The platform is not a traditional data leak site. Instead, it presents itself as a post-exfiltration processing service — one that takes raw stolen corporate […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/leak-bazaar-turns-stolen-corporate-data/&#34;&gt;https://cybersecuritynews.com/leak-bazaar-turns-stolen-corporate-data/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/leak-bazaar-turns-stolen-corporate-data/&#34;&gt;https://cybersecuritynews.com/leak-bazaar-turns-stolen-corporate-data/&lt;/a&gt;
    </content>
    <updated>2026-03-26T19:38:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrw3576x3whtz67kepwfsq2z0v4qkwpqekyepzl2x8xclhzk22eeqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcg6vcz</id>
    
      <title type="html">VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrw3576x3whtz67kepwfsq2z0v4qkwpqekyepzl2x8xclhzk22eeqzyzyxpv25n092hek27wnqzqae5wdcpt2wsclpjdd79hlyy7k8l57kwcg6vcz" />
    <content type="html">
      VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside Linux Systems&lt;br/&gt;&lt;br/&gt;A new and technically advanced rootkit called VoidLink has emerged as a serious threat to Linux systems, blending Loadable Kernel Modules (LKMs) with extended Berkeley Packet Filter (eBPF) programs to hide deep inside the operating system’s core. First documented by Check Point Research in January 2026, VoidLink is a cloud-native Linux malware framework written in […]&lt;br/&gt;&lt;br/&gt;The post &lt;a href=&#34;https://cybersecuritynews.com/voidlink-rootkit-uses-ebpf-and-kernel-modules/&#34;&gt;https://cybersecuritynews.com/voidlink-rootkit-uses-ebpf-and-kernel-modules/&lt;/a&gt; appeared first on &lt;a href=&#34;https://cybersecuritynews.com&#34;&gt;https://cybersecuritynews.com&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://cybersecuritynews.com/voidlink-rootkit-uses-ebpf-and-kernel-modules/&#34;&gt;https://cybersecuritynews.com/voidlink-rootkit-uses-ebpf-and-kernel-modules/&lt;/a&gt;
    </content>
    <updated>2026-03-26T19:26:03Z</updated>
  </entry>

</feed>