Tuesday, March 31, 2026

Cyber Security News

Windows Tools Abused to Kill AV Ahead of Ransomware Attacks

Windows Tools Abused to Kill AV Ahead of Ransomware Attacks

0
Hackers are increasingly turning legitimate Windows administration tools into stealthy weapons to disable antivirus and EDR before launching ransomware, making attacks faster, quieter, and...

Axios NPM Packages Breached in Ongoing Supply Chain Attack

0
A severe supply chain attack has compromised the widely used Axios HTTP client on the npm registry. Attackers injected a malicious dependency into specific...

Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline

0
The Dutch Ministry of Finance is actively managing a significant cybersecurity incident after discovering unauthorized access to its internal Information and Communication Technology (ICT)...
Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence

Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence

0
Hackers are deploying a new Windows malware called ResokerRAT, a Telegram‑based Remote Access Trojan (RAT) that gives attackers stealthy remote control over infected systems. Instead...

PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data

0
Security researchers have disclosed two high-severity vulnerabilities in libpng, the widely deployed reference library used for processing Portable Network Graphics (PNG) image files. These critical...
EvilTokens Launches New Phishing Service Targeting Microsoft Accounts

EvilTokens Launches New Phishing Service Targeting Microsoft Accounts

0
EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that industrialises Microsoft account takeover by abusing the OAuth device code flow rather than traditional credential phishing. The...

Google Introduces Advanced Ransomware Defense and Recovery Features in Drive

0
Google has officially moved its advanced ransomware detection and file restoration features for Google Drive out of beta, making them generally available to organizations...
CSN

Recent News

Microsoft Releases Key WinRE and Setup Updates to Prepare for 2026 Secure Boot Changes

0
Microsoft has rolled out a critical Setup Dynamic Update, designated as KB5081494, for Windows 11 versions 24H2 and 25H2. Released on March 26, 2026,...
Telnyx Python SDK Backdoored on PyPI to Steal Cloud Credentials

Telnyx Python SDK Backdoored on PyPI to Steal Cloud Credentials

0
The popular Telnyx Python SDK on PyPI to deploy a multi‑stage credential‑stealing operation that targets cloud infrastructure, Kubernetes clusters, and developer environments at scale....
Fake Cloudflare CAPTCHA Pages Deliver Infiniti Stealer Malware on macOS

Fake Cloudflare CAPTCHA Pages Deliver Infiniti Stealer Malware on macOS

0
A newly discovered macOS infostealer dubbed Infiniti Stealer is being actively distributed through deceptive Cloudflare-style CAPTCHA pages, marking a notable evolution in social engineering attacks targeting...

PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data

0
Security researchers have disclosed two high-severity vulnerabilities in libpng, the widely deployed reference library used for processing Portable Network Graphics (PNG) image files. These critical...

Google Introduces Advanced Ransomware Defense and Recovery Features in Drive

0
Google has officially moved its advanced ransomware detection and file restoration features for Google Drive out of beta, making them generally available to organizations...
RoadK1ll Malware Turns Hacked Devices Into Network Relays

RoadK1ll Malware Turns Hacked Devices Into Network Relays

0
Hackers are deploying a new Node. js-based implant dubbed RoadK1ll to quietly turn compromised hosts into on-demand network relays, enabling stealthy pivoting deeper into victim environments...

Critical Ivanti EPMM Vulnerabilities Expose Systems to Arbitrary Code Execution Attacks

0
In February 2026, threat actors actively exploited two critical remote code execution (RCE) vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). A recent incident response...
Fake npm Install Messages Conceal RAT Malware in New Open Source Supply Chain Attack

Fake npm Install Messages Conceal RAT Malware in New Open Source Supply Chain Attack

0
Fake npm install messages are the latest social engineering trick in the open source supply chain, with attackers abusing npm post‑install scripts to silently...

Red Hat Warns of Malware Embedded in Popular Linux Tool, Opening Doors for Unauthorized...

0
Red Hat has issued an urgent security alert regarding a highly sophisticated supply chain attack targeting the popular xz compression utility. Cybersecurity researchers discovered malicious code embedded...

RoadK1ll Malware Turns Hacked Devices Into Network Relays

Hackers are deploying a new Node. js-based implant dubbed RoadK1ll to quietly turn compromised hosts into on-demand network relays, enabling stealthy pivoting deeper into victim environments...

Windows Tools Abused to Kill AV Ahead of Ransomware Attacks

Hackers are increasingly turning legitimate Windows administration tools into stealthy weapons to disable antivirus and EDR before launching ransomware, making attacks faster, quieter, and...

Axios NPM Packages Breached in Ongoing Supply Chain Attack

A severe supply chain attack has compromised the widely used Axios HTTP client on the npm registry. Attackers injected a malicious dependency into specific...

Dutch Finance Ministry Responds to Cyberattack by Taking Systems Offline

The Dutch Ministry of Finance is actively managing a significant cybersecurity incident after discovering unauthorized access to its internal Information and Communication Technology (ICT)...

Telegram-Based ResokerRAT Adds Screenshot Capture and Persistence

Hackers are deploying a new Windows malware called ResokerRAT, a Telegram‑based Remote Access Trojan (RAT) that gives attackers stealthy remote control over infected systems. Instead...

PNG Vulnerabilities Allow Attackers to Trigger Crashes and Leak Sensitive Data

Security researchers have disclosed two high-severity vulnerabilities in libpng, the widely deployed reference library used for processing Portable Network Graphics (PNG) image files. These critical...

EvilTokens Launches New Phishing Service Targeting Microsoft Accounts

EvilTokens is a new Phishing-as-a-Service (PhaaS) platform that industrialises Microsoft account takeover by abusing the OAuth device code flow rather than traditional credential phishing. The...

Google Introduces Advanced Ransomware Defense and Recovery Features in Drive

Google has officially moved its advanced ransomware detection and file restoration features for Google Drive out of beta, making them generally available to organizations...

Apple Adds ClickFix Attack Warnings in New macOS Tahoe Security Feature

Apple has silently introduced a new security mechanism in macOS Tahoe 26.4 to protect users against social engineering campaigns known as ClickFix attacks. This...

Cyber Attack News