Press "Enter" to skip to content

OSINT / CyberSec report 28.03.2026 11:35

1. A new payment skimmer uses WebRTC data channels to bypass security controls and exfiltrate payment data from e-commerce sites (thehackernews.com).

2. A Magento vulnerability identified as APSB25-94 allows unauthenticated file uploads leading to remote code execution (reddit.com).

3. The GlassWorm malware campaign has evolved to use Solana blockchain dead drops to deliver remote access trojans and steal sensitive browser and crypto data (thehackernews.com).

4. A device code phishing campaign has successfully targeted over 340 Microsoft 365 organizations across five countries by abusing OAuth permissions (reddit.com).

5. Hackers claim to have breached LexisNexis, exposing the personal data of 400,000 users, including federal judges (reddit.com).

6. A macOS specific ClickFix campaign is actively targeting users of Claude Code (reddit.com).

7. TP-Link has issued a warning regarding a critical authentication bypass vulnerability in its routers and urges users to apply patches (reddit.com).

8. A Russian national was sentenced to two years in prison for managing the TA551 botnet used in ransomware attacks against U.S. companies (thehackernews.com).

9. The administrator of the LeakBase cybercrime forum was arrested in Russia for managing a marketplace for stolen credentials (thehackernews.com).

10. State sponsored actors have been observed using AI coding agents to execute autonomous cyber espionage campaigns against global targets (thehackernews.com).

11. Researchers identified a supply chain attack involving the LiteLLM library (reddit.com).

12. A new GlassWorm variant is distributing fake Trezor Suite and Ledger Live applications for macOS using polymorphic builds (reddit.com).

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *