# Archive

Browse past daily curated stories

May 09 May 08 May 05 May 03 May 02 May 01 Apr 30 Apr 28 Apr 26 Apr 25 Apr 24 Apr 23 Apr 22 Apr 21 Apr 20 Apr 19 Apr 18 Apr 17 Apr 16 Apr 15 Apr 14 Apr 12 Apr 11 Apr 10 Apr 09 Apr 08 Apr 07 Apr 05 Apr 04 Apr 03

Saturday, March 14, 2026

  1. 1
    1
    BleepingComputer general
    Google fixes two new Chrome zero-days exploited in attacks

    Google released emergency Chrome 146 updates patching CVE-2026-3909 (Skia out-of-bounds write) and another high-severity V8 vulnerability, both actively exploited in zero-day attacks. These flaws enable remote attackers to perform out-of-bounds memory access and potentially execute code via crafted HTML pages.

  2. 2
    0
    The Hacker News general
    Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

    International law enforcement dismantled the SocksEscort proxy botnet that infected 369,000 residential routers across 163 countries since 2020, generating $5.8 million for cybercriminals. The operation used AVrecon malware to compromise home and business routers, creating a massive proxy network for fraud operations.

  3. 3
    0
    BleepingComputer general
    Police sinkholes 45,000 IP addresses in cybercrime crackdown

    Operation Synergia III resulted in law enforcement sinkholing 45,000 malicious IP addresses and seizing servers linked to phishing, malware, and ransomware campaigns across 72 countries. INTERPOL coordinated the international effort that also led to 94 arrests of cybercriminals worldwide.

  4. 4
    0
    The Hacker News general
    Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

    Qualys disclosed nine "CrackArmor" vulnerabilities in Linux AppArmor that allow unprivileged users to escalate to root privileges and bypass container isolation. These confused deputy flaws affect the kernel's security module and enable attackers to circumvent fundamental Linux protections.

  5. 5
    1
    BleepingComputer general
    Veeam warns of critical flaws exposing backup servers to RCE attacks

    Veeam patched multiple critical remote code execution vulnerabilities in its Backup & Replication solution that could expose backup servers to attacks. The flaws allow attackers to compromise backup infrastructure, potentially destroying recovery capabilities during ransomware incidents.

  6. 6
    0
    BleepingComputer general
    Fake enterprise VPN downloads used to steal company credentials

    Storm-2561 threat actors distribute fake VPN clients impersonating Ivanti, Cisco, and Fortinet through SEO poisoning to steal enterprise credentials. Microsoft identified this campaign uses digitally signed trojans delivered via malicious ZIP files from attacker-controlled websites.

  7. 7
    0
    The Hacker News general
    Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

    Palo Alto Networks Unit 42 identified Chinese espionage group CL-STA-1087 targeting Southeast Asian militaries with AppleChris and MemFun malware since 2020. The campaign demonstrates strategic operational patience typical of state-sponsored cyber espionage operations.

  8. 8
    0
    The Record threat-intel
    Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges

    DOJ charged incident responder Angelo Martino for allegedly providing information to BlackCat ransomware operators during victim negotiations and conducting cyberattacks on the same clients he was hired to help. Prosecutors claim this insider scheme resulted in higher ransom payouts for attackers.

  9. 9
    0
    BleepingComputer general
    Telus Digital confirms breach after hacker claims 1 petabyte data theft

    Telus Digital confirmed a security breach after threat actors claimed to steal nearly 1 petabyte of data from the Canadian business process outsourcing company. The multi-month breach represents one of the largest data theft claims in recent cybersecurity incidents.

  10. 10
    0
    BleepingComputer general
    AI-generated Slopoly malware used in Interlock ransomware attack

    IBM researchers identified "Slopoly" malware, likely generated using AI tools, deployed by Hive0163 in Interlock ransomware attacks. The AI-assisted malware enabled threat actors to maintain persistent access on compromised servers for over a week before data exfiltration.