# Archive
Browse past daily curated stories
Tuesday, March 17, 2026
-
1The Hacker News generalGlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
The GlassWorm malware campaign leverages stolen GitHub tokens to force-push malicious code into hundreds of Python repositories, targeting Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to setup.py, main.py, and app.py files. StepSecurity researchers identified dozens of malicious GlassWorm extensions using new evasion techniques to hide in dependencies and avoid detection.
-
2BleepingComputer generalStryker attack wiped tens of thousands of devices, no malware needed
Medical technology giant Stryker suffered a cyberattack that remotely wiped tens of thousands of employee devices without using malware, limiting the impact to its internal Microsoft environment. The attack occurred last week and demonstrates a novel destructive technique that bypasses traditional malware-based detection methods.
-
3BleepingComputer generalCISA flags Wing FTP Server flaw as actively exploited in attacks
CISA added a Wing FTP Server vulnerability to its Known Exploited Vulnerabilities catalog, warning U.S. government agencies that the flaw is being actively exploited and may be chained with other vulnerabilities for remote code execution attacks. Federal agencies must secure their Wing FTP Server instances to prevent compromise.
-
4The Record threat-intelRussia-linked espionage campaign targeting Ukraine using Starlink and charity lures
A Russia-linked threat group launched a cyber-espionage campaign against Ukrainian organizations using fake documents about Starlink satellite internet terminals and a well-known Ukrainian charity as lures to infect devices with spyware. The campaign demonstrates continued Russian intelligence targeting of Ukrainian infrastructure and humanitarian organizations.
-
5SecurityWeek generalChina-Linked Hackers Hit Asian Militaries in Patient Espionage Operation
China-linked state-sponsored hackers deployed custom tools against Asian military organizations in a patient espionage operation, remaining dormant in compromised environments for months before activating their payloads. The campaign used novel backdoors and familiar evasion techniques to maintain persistent access to regional defense targets.
-
6SecurityWeek generalThreat Actor Targeting VPN Users in New Credential Theft Campaign
The Storm-2561 threat actor is distributing fake VPN clients through SEO poisoning techniques, deploying trojans to steal login credentials from users seeking VPN services. The campaign targets users searching for legitimate VPN solutions, compromising their authentication data through malicious software disguised as security tools.
-
7BleepingComputer generalUK’s Companies House confirms security flaw exposed business data
UK's Companies House confirmed a security flaw in its WebFiling service exposed business registration data since October 2025, prompting the temporary shutdown of the service on Friday for remediation. The vulnerability affected the government agency that operates the registry for all UK companies, potentially exposing sensitive corporate information.
-
8SecurityWeek generalOracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact
Following the Oracle EBS hack, only four major corporations—Broadcom, Bechtel, Estée Lauder, and Abbott Technologies—have yet to issue public statements about potential impact from the breach. The silence from these corporate giants raises questions about the scope of data exposure and customer notification obligations.
-
9SecurityWeek generalSecurity Firm Executive Targeted in Sophisticated Phishing Attack
A security firm executive was targeted in a sophisticated phishing attack using DKIM-signed emails, trusted redirect infrastructure, compromised servers, and Cloudflare-protected phishing pages to bypass security controls. The attack demonstrates advanced techniques specifically designed to target cybersecurity professionals with enhanced technical defenses.
-
10Dark Reading generalAttackers Abuse LiveChat to Phish Credit Card, Personal Data
Attackers are abusing LiveChat customer support platforms to conduct social engineering campaigns impersonating PayPal and Amazon, using fake customer service interactions to steal credit card information and personal data. The technique leverages trusted customer support channels to bypass user suspicion and security awareness training.