Cybersecurity Newsfeed - 19/03/26
Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.
Cybersecurity Newsfeed
📅 19/03/26
🛡️ Vulnerabilities
CISA Updates KEV Catalog: CISA added a critical vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, signaling active exploitation in the wild. Federal agencies are mandated to remediate this flaw to mitigate risks of unauthorized access or RCE. More info
ConnectWise ScreenConnect Hijacking Flaw: Critical security patches address a vulnerability in ScreenConnect that could allow attackers to bypass authentication and hijack active sessions, granting administrative control over managed endpoints. More info
CVE-2025-66376 Exploitation: CISA documented the active exploitation of this critical flaw impacting enterprise systems. It allows for significant privilege escalation and deep persistence within target networks. More info
Ubuntu Local Privilege Escalation: A flaw in the system’s handling of specific kernel modules enables local users to gain root-level access by manipulating system memory. More info
Unpatched Telnetd Critical Flaw: Researchers warn of an unpatched vulnerability affecting all versions of the telnetd daemon. It allows for remote code execution without authentication, posing risks to legacy industrial and IoT systems. More info
Apple Patches WebKit Cross-Origin Bug (CVE-2026-20643): Apple released a “Background Security Improvement” for iOS and macOS to address a flaw in the Navigation API that could allow malicious sites to bypass the same-origin policy. More info
🎯 Adversaries
Claudy Day Malvertising Campaign: Attackers are using fraudulent Claude AI advertisements on Google and social media to lure users into downloading installers bundled with info-stealing malware. More info
Interlock Ransomware Targets Cisco FMC: The group has been exploiting a zero-day vulnerability in Cisco Firepower Management Center since January to gain unauthorized access and disable security controls. More info
DarkSword iOS Exploit Kit: State-sponsored hackers are utilizing a sophisticated “zero-click” exploit chain to install spyware on iOS devices, enabling silent exfiltration of messages and location data. More info
Russian iOS Exploit Kit Discovered: A second iOS exploit kit, likely of Russian origin, has emerged. It appears to utilize tools originally developed by the U.S. government to achieve remote code execution. More info
SideWinder Espionage Expansion: The India-linked actor is targeting government and military sectors in Indonesia and Thailand, using infrastructure that derives C2 addresses dynamically to avoid detection. More info
Handala Group Breach of Stryker: Iranian-linked threat actors claimed responsibility for a disruptive attack on Stryker, using Microsoft Intune to issue mass wipe commands to 80,000 devices. More info
Vidar Stealer 2.0 Exploits GitHub: A new campaign uses GitHub Pages and Reddit to distribute Vidar Stealer 2.0 disguised as game cheats, targeting credentials and 2FA data. More info
📈 Trends
Font Rendering Malicious Command Hiding: A novel technique uses ligatures and specialized glyph mapping to hide malicious scripts from security scanners while appearing benign to human analysts. More info
Refund Fraud Economy Exploitation: A burgeoning “Refund-as-a-Service” (RaaS) economy is targeting major retailers by automating fake return requests using social engineering or stolen credentials. More info
Glassworm Malware Hits Repositories: The Glassworm campaign has compromised over 400 repositories across GitHub, npm, and VS Code using typosquatting and dependency confusion. More info
Nordstrom Email System Exploitation: Threat actors abused Nordstrom’s legitimate email infrastructure to bypass filters and send high-credibility cryptocurrency scams to customers. More info
.NET AOT Malware Evasion: New malware is using .NET Ahead-of-Time (AOT) compilation to remove metadata, significantly complicating reverse-engineering and static analysis. More info
ClickFix Social Engineering Tactics: Attackers are using fake browser updates to trick users into pasting and executing malicious PowerShell scripts via the Windows Run dialog. More info
WhatsApp View Once Bypass Refusal: Meta has stated it will not patch a newly discovered method to bypass “View Once” media protections, arguing that unofficial clients are outside its security model. More info
💥 Breaches & Leaks
Marquis Ransomware Data Theft: The group linked to a major 2025 cyberattack has exfiltrated personal data belonging to 672,000 individuals, including social security numbers and financial details. More info
ShieldGuard Crypto Scam Dismantled: Law enforcement successfully took down a massive cryptocurrency fraud operation that used phishing websites to defraud thousands of investors. More info
🛠️ Tools & Defense
Veracode Fix for SCA: Veracode introduced an AI-powered engine to automate the patching of open-source vulnerabilities by generating cohesive pull requests in developer environments. More info
Claude Code Security vs Magecart: A new report highlights why AI-driven static analysis often misses Magecart attacks that hide in third-party assets like favicon EXIF metadata. More info
DispatchLogger for COM Analysis: Cisco Talos released an open-source tool to intercept and log malicious COM (Component Object Model) automation used by script-based malware. More info
