# Archive

Browse past daily curated stories

Mar 15 Mar 14 Mar 13 Mar 12 Mar 11 Mar 10 Mar 09 Mar 08 Mar 07 Mar 06 Mar 05 Mar 04 Mar 03 Mar 02 Mar 01 Feb 28 Feb 27 Feb 26 Feb 25 Feb 24 Feb 23 Feb 21 Feb 20 Feb 18

Saturday, March 14, 2026

  1. 1
    1
    BleepingComputer general
    Google fixes two new Chrome zero-days exploited in attacks

    Google released emergency Chrome 146 updates patching CVE-2026-3909 (Skia out-of-bounds write) and another high-severity V8 vulnerability, both actively exploited in zero-day attacks. These flaws enable remote attackers to perform out-of-bounds memory access and potentially execute code via crafted HTML pages.

  2. 2
    0
    The Hacker News general
    Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

    International law enforcement dismantled the SocksEscort proxy botnet that infected 369,000 residential routers across 163 countries since 2020, generating $5.8 million for cybercriminals. The operation used AVrecon malware to compromise home and business routers, creating a massive proxy network for fraud operations.

  3. 3
    0
    BleepingComputer general
    Police sinkholes 45,000 IP addresses in cybercrime crackdown

    Operation Synergia III resulted in law enforcement sinkholing 45,000 malicious IP addresses and seizing servers linked to phishing, malware, and ransomware campaigns across 72 countries. INTERPOL coordinated the international effort that also led to 94 arrests of cybercriminals worldwide.

  4. 4
    0
    The Hacker News general
    Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

    Qualys disclosed nine "CrackArmor" vulnerabilities in Linux AppArmor that allow unprivileged users to escalate to root privileges and bypass container isolation. These confused deputy flaws affect the kernel's security module and enable attackers to circumvent fundamental Linux protections.

  5. 5
    1
    BleepingComputer general
    Veeam warns of critical flaws exposing backup servers to RCE attacks

    Veeam patched multiple critical remote code execution vulnerabilities in its Backup & Replication solution that could expose backup servers to attacks. The flaws allow attackers to compromise backup infrastructure, potentially destroying recovery capabilities during ransomware incidents.

  6. 6
    0
    BleepingComputer general
    Fake enterprise VPN downloads used to steal company credentials

    Storm-2561 threat actors distribute fake VPN clients impersonating Ivanti, Cisco, and Fortinet through SEO poisoning to steal enterprise credentials. Microsoft identified this campaign uses digitally signed trojans delivered via malicious ZIP files from attacker-controlled websites.

  7. 7
    0
    The Hacker News general
    Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

    Palo Alto Networks Unit 42 identified Chinese espionage group CL-STA-1087 targeting Southeast Asian militaries with AppleChris and MemFun malware since 2020. The campaign demonstrates strategic operational patience typical of state-sponsored cyber espionage operations.

  8. 8
    0
    The Record threat-intel
    Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges

    DOJ charged incident responder Angelo Martino for allegedly providing information to BlackCat ransomware operators during victim negotiations and conducting cyberattacks on the same clients he was hired to help. Prosecutors claim this insider scheme resulted in higher ransom payouts for attackers.

  9. 9
    0
    BleepingComputer general
    Telus Digital confirms breach after hacker claims 1 petabyte data theft

    Telus Digital confirmed a security breach after threat actors claimed to steal nearly 1 petabyte of data from the Canadian business process outsourcing company. The multi-month breach represents one of the largest data theft claims in recent cybersecurity incidents.

  10. 10
    0
    BleepingComputer general
    AI-generated Slopoly malware used in Interlock ransomware attack

    IBM researchers identified "Slopoly" malware, likely generated using AI tools, deployed by Hive0163 in Interlock ransomware attacks. The AI-assisted malware enabled threat actors to maintain persistent access on compromised servers for over a week before data exfiltration.