National Cyber Warfare Foundation (NCWF)


Warning: Undefined array key "PeopleID" in /var/www/html/includes/libUser.php on line 492

Security Affairs newsletter Round 566 by Pierluigi Paganini INTERNATIONAL EDITION


0 user ratings
2026-03-08 09:40:50
milo
Blue Team (CND)
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. FBI probing intrusion into a system managing sensitive surveillance information Reading White House President Trump’s Cyber […


A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box.





Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.





FBI probing intrusion into a system managing sensitive surveillance information
Reading White House President Trump’s Cyber Strategy for America (March 2026)
Iran-linked hackers target IP cameras across Israel and Gulf states for military intelligence
Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations
Cisco flags ongoing exploitation of two recently patched Catalyst SD-WAN flaws
Microsoft warns of ClickFix campaign exploiting Windows Terminal to deliver Lumma Stealer
Iran-nexus APT Dust Specter targets Iraq officials with new malware
U.S. CISA adds Apple, Rockwell, and Hikvision  flaws to its Known Exploited Vulnerabilities catalog
Google GTIG: 90 zero-day flaws exploited in 2025 as enterprise targets grow
Phobos Ransomware admin faces up to 20 years after guilty plea
Russian APT targets Ukraine with BadPaw and MeowMeow malware
Operation Leak: FBI and Europol dismantle LeakBase Cybercrime forum
Google uncovers Coruna iOS Exploit Kit targeting iOS 13–17.2.1
Cisco fixes maximum-severity Secure FMC bugs threatening firewall security
Automate or orchestrate? Implementing a streamlined remediation program to shorten MTTR
LastPass warns of spoofed alerts aimed at stealing master passwords
From phishing to Google Drive C2: Silver Dragon expands APT41 playbook
U.S. CISA adds Qualcomm and Broadcom VMware Aria Operations flaws to its Known Exploited Vulnerabilities catalog
Data breach at University of Hawaiʻi Cancer Center impacts 1.2 Million individuals
Facebook is experiencing a global outage
Ariomex, Iran-based crypto exchange, suffers data leak
Oracle EBS 2025 campaign impacts Madison Square Garden, sensitive data leaked
Phishing campaign exploits OAuth redirection to bypass defenses
Android devices hit by exploited Qualcomm flaw CVE-2026-21385
Chrome security flaw enabled spying via Gemini Live assistant
Middle east crisis prompts UK NCSC warning on potential Iranian cyber activity
Russia-linked APT28 exploited MSHTML zero-day CVE-2026-21513 before patch
APT37 combines cloud storage and USB implants to infiltrate air-gapped systems
Europol’s Project Compass nets 30 arrests in crackdown on “The Com”
ClawJacked flaw exposed OpenClaw users to data theft
Ukrainian hacker pleads guilty to running OnlyFake AI ID scam site
ShinyHunters leaked the full Odido dataset
Claude code abused to steal 150GB in cyberattack on Mexican agencies
CVE-2025-64328 exploitation impacts 900 Sangoma FreePBX instances




International Press – Newsletter





Cybercrime





Project Compass: first operational results against The Com network  





Creator Of “OnlyFake” Charged And Pleads Guilty To Selling More Than 10,000 Digital Fake Identification Documents  





U.S. Attorney’s Office EDNC Announces Seizure of $61 Million Dollars’ Worth of Cryptocurrency  





OAuth redirection abuse enables phishing  





LastPass Alerts Customers of Fake Email Chains Used in New Phishing Campaign; No Impact to LastPass Systems  





Major data leak forum dismantled in global action against cybercrime forum  





Global phishing-as-a-service platform taken down in coordinated public-private action 





Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy  





FBI arrests suspect linked to $46M crypto theft from US Marshals  





Malware





Malware Reverse Engineering is no longer a human problem!  





Inside a fake Google security check that becomes a browser RAT  





InstallFix: How attackers are weaponizing malvertized install guides  





New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages 





Hacking





Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit





Claude didn’t just plan an attack on Mexico’s government. It executed one for a month — across four domains your security stack can’t see  





OpenClaw Vulnerability: Website-to-Local Agent Takeover  





Hundreds of Thousands of Mobile Apps May Now Be Exposing AI Access  





Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel  





Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited 





Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2  





Defending the gates: How a global coalition disrupted Tycoon 2FA, a major driver of initial access and large-scale online impersonation  





Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion  





Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild





Intelligence and Information Warfare





StegaBin: 26 Malicious npm Packages Use Pastebin Steganography to Deploy Multi-Stage Credential Stealer





Inside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513  





Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran  





UK firms in Middle East face heightened threat from Iran hackers, agency warns 





Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes  





Alert: NCSC advises UK organisations to take action following conflict in the Middle East 





SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh 





Silver Dragon Targets Organizations in Southeast Asia and Europe  





Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion  





Exposing a Russian Campaign Targeting Ukraine Using New Malware Duo: BadPaw and MeowMeow  





Dust Specter APT Targets Government Officials in Iraq  





Iranian APT Hacked US Airport, Bank, Software Company





Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company  





Threat Advisory Special Report: Iranian Threat Actor Group Update





Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East      





UAT-9244 targets South American telecommunication providers with three new malware implants





Cybersecurity





Cyber Battlefield: Ariomex, Iran-Based Crypto Exchange, Suffers Data Leak 





Quantum Decryption of RSA Is Much Closer Than Expected





Now is a good time for doing crime  





iVerify Details First Known Mass iOS Attack  





Meta Ray-Ban Smart Glasses Are Sending Footage of People Having Sex, Undressing, and Using the Bathroom to Workers in Kenya





Look What You Made Us Patch: 2025 Zero-Days in Review





US banks on high alert for cyberattacks as Iran war escalates         





White House Unveils President Trump’s Cyber Strategy for America  





FBI investigating ‘suspicious’ cyber activity on system holding sensitive surveillance information  





Follow me on Twitter: @securityaffairs and Facebook and Mastodon





Pierluigi Paganini





(SecurityAffairs – hacking, newsletter)







Source: SecurityAffairs
Source Link: https://securityaffairs.com/189094/breaking-news/security-affairs-newsletter-round-566-by-pierluigi-paganini-international-edition.html


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.