# Archive
Browse past daily curated stories
Monday, March 16, 2026
-
1SecurityWeek generalForceMemo: Python Repositories Compromised in GlassWorm Aftermath
Hundreds of GitHub accounts were compromised using credentials stolen during the VS Code GlassWorm campaign, leading to the ForceMemo attack that targeted Python repositories. This supply chain attack demonstrates how initial credential theft can cascade into broader repository compromises, threatening the integrity of open-source Python packages that security teams rely on.
-
2The Hacker News generalClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
Three ClickFix campaigns are distributing the MacSync macOS infostealer through fake AI tool installers, using social engineering rather than exploits to trick users into executing malicious commands. The attack specifically targets macOS users by masquerading as legitimate AI software, highlighting how threat actors are adapting to target the growing macOS enterprise user base.
-
3The Hacker News generalDRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
The DRILLAPP backdoor campaign targeting Ukrainian entities in February 2026 abuses Microsoft Edge debugging features for stealth espionage, with overlaps to Russia-linked Laundry Bear (UAC-0190/Void Blizzard) operations. This sophisticated technique leverages legitimate browser debugging APIs to maintain persistence while evading detection, representing an evolution in living-off-the-land tactics.
-
4SecurityWeek generalHacking Attempt Reported at Poland’s Nuclear Research Center
A hacking attempt was reported at Poland's Nuclear Research Center with initial evidence pointing to Iran, though officials acknowledge it could be a false flag operation. This incident highlights the continued targeting of critical nuclear infrastructure by nation-state actors and the challenge of accurate attribution in geopolitically sensitive attacks.
-
5The Hacker News generalAndroid 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
Android 17 Beta 2 introduces a new security feature in Advanced Protection Mode (AAPM) that blocks non-accessibility apps from using the accessibility services API to prevent malware abuse. This change addresses a common attack vector where malicious apps exploit accessibility permissions to perform unauthorized actions, particularly impacting banking trojans and other mobile threats.
-
6SecurityWeek generalLoblaw Data Breach Impacts Customer Information
Loblaw suffered a data breach exposing customer personal information including names, email addresses, and phone numbers. The breach affects one of Canada's largest retail chains, potentially impacting millions of customers and demonstrating how retail infrastructure remains a high-value target for cybercriminals seeking personal data for identity theft and fraud.
-
7BleepingComputer generalMicrosoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
Microsoft released an out-of-band hotpatch update to fix a remote code execution vulnerability in Windows 11 Enterprise's Routing and Remote Access Service (RRAS). The OOB release indicates the severity of this RCE flaw, which could allow attackers to execute arbitrary code on affected Windows 11 Enterprise systems receiving hotpatch updates.
-
8The Hacker News generalOpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
China's CNCERT warned about security flaws in OpenClaw (formerly Clawdbot/Moltbot), an open-source AI agent platform with weak default configurations that enable prompt injection and data exfiltration attacks. The vulnerabilities affect organizations deploying autonomous AI agents and highlight the security risks of self-hosted AI systems with insufficient access controls.
-
9CyberScoop generalThe ransomware economy is shifting toward straight-up data extortion
Google's ransomware research report reveals the ransomware economy is shifting toward pure data extortion without encryption, complicating impact assessment and response strategies. This evolution means traditional backup-based recovery approaches may be insufficient as attackers focus on data theft and extortion rather than system encryption, requiring new defensive strategies.
-
10CyberScoop generalAttackers are exploiting AI faster than defenders can keep up, new report warns
A Booz Allen Hamilton report warns that cybersecurity has entered a new phase where threat actors adopt AI tools faster than defenders, significantly reducing response times for IT security teams. The research indicates attackers are leveraging mature AI capabilities to accelerate attack timelines, creating an asymmetric advantage that challenges traditional incident response frameworks.