Tuesday, March 31, 2026

Axios npm Package Compromised, ChatGPT Flaws, AtlasCross RAT and DeepLoad Malware

THN Daily Updates
Newsletter
cover

Webinar ➞ Identity Maturity Under Pressure: 2026 Findings and How to Catch Up

Identity Maturity Under Pressure: 2026 Findings and How to Catch Up

Download Now Sponsored
LATEST NEWS Mar 31, 2026

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted software brands to deliver a previously undocumented remote access trojan named AtlasCross RAT. "The opera...

Read More
Twitter Facebook LinkedIn

The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply a rise in the number of vulnerabilities or tools, but a dramatic increase in speed. Speed of attack, speed of exploita...

Read More
Twitter Facebook LinkedIn

Training + NetWars Tournament at SANS Austin

Play the ultimate hands-on cyber challenge. Included with course.

Read More
Twitter Facebook LinkedIn

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency that delivers a trojan capable of targeting Windows, macO...

Read More
Twitter Facebook LinkedIn

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without user knowledge or consent, according to new findings from Check Point. "A single malicious prompt could ...

Read More
Twitter Facebook LinkedIn

The Real Problem Isn't That AI Can't Write Secure Code - It's That It's Expanding Attack Surface

AI-driven development accelerated credential sprawl in 2025, with 28.65M secrets detected, expanding attack surface and remediation strain.

Read More
Twitter Facebook LinkedIn

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a previously undocumented malware loader referred to as DeepLoad. "It likely uses AI-assisted obfuscation and process injection ...

Read More
Twitter Facebook LinkedIn

⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and research that stopped being theoretical right...

Read More
Twitter Facebook LinkedIn
cover

Webinar ➞ Identity Maturity Under Pressure: 2026 Findings and How to Catch Up

Identity Maturity Under Pressure: 2026 Findings and How to Catch Up

Download Now Sponsored

This email was sent to edwardlorilla1998.tower@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi

No comments:

Post a Comment