Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
High An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link routers
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
High Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity
Windows 11 KB5079391 update rolls out Smart App Control improvements
High Microsoft has released the KB5079391 preview cumulative update for Windows 11 24H2 and 25H2, which includes 29 changes, such as Smart App Control and Display improvements. [...]
Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
High The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular 'LiteLLM' Python package on PyPI and claiming to have stolen data from hundreds of thousands of dev
Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks
High A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware a
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
Mar 10, 2026
Vulnerability
Trending
High Microsoft has released the Windows 10 KB5078885 extended security update to fix the March 2026 Patch Tuesday vulnerabilities, including 2 zero-days and an issue that prevent some devices from shutting
New 'LeakyLooker' Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
High A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store. [...]
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
Mar 10, 2026
Threat Actor High The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. [...]
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
High A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge de
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
High Google Chrome will shift from a four-week to a two-week release cycle to roll out new features, bug fixes, and performance improvements more frequently. [...]
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
Mar 3, 2026
Vulnerability High Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero-day flaw in a Qualcomm display component. [...]