Cybersecurity News
Understand the Threats. Protect What Matters.
- Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Webby Lily Hay Newman, Matt Burgess on March 17, 2026 at 10:00 am
Customer conversations with chatbots can include contact information and personal details that make it easier for scammers to launch phishing attacks and commit fraud.
- Models Are Applying to Be the Face of AI Scamsby Matt Burgess on March 16, 2026 at 9:00 am
Dozens of Telegram channels reviewed by WIRED include job listings for “AI face models.” The (mostly) women who land these gigs are likely being used to dupe victims out of their money.
- A Hacker Accidentally Broke Into the FBI’s Epstein Filesby Andy Greenberg, Maddy Varner, Andrew Couts on March 14, 2026 at 10:30 am
Plus: A porn-quitting app exposed the masturbation habits of hundreds of thousands of users, Russian hackers are trying to take over people’s Signal accounts, and more.
- US Lawmakers Move to Kill the FBI’s Warrantless Wiretap Accessby Dell Cameron on March 12, 2026 at 6:00 pm
A bipartisan bill would force the FBI to get a warrant to read Americans’ messages and ban the federal purchase of commercial data on US residents ahead of a critical April deadline.
- How ‘Handala’ Became the Face of Iran’s Hacker Counterattacksby Andy Greenberg, Matt Burgess, Lily Hay Newman on March 12, 2026 at 4:14 pm
Amid a paralyzing breach of medical tech firm Stryker, the group has come to represent Iran’s use of “hacktivism” as cover for chaotic, retaliatory state-sponsored cyberattacks.
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCEby [email protected] (The Hacker News) on March 17, 2026 at 4:39 pm
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries. In a report published Monday, BeyondTrust revealed that Amazon Bedrock AgentCore Code Interpreter’s sandbox mode permits outbound DNS queries that an attacker can exploit to enable interactive shells
- LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loaderby [email protected] (The Hacker News) on March 17, 2026 at 2:34 pm
The ransomware operation known as LeakNet has adopted the ClickFix social engineering tactic delivered through compromised websites as an initial access method. The use of ClickFix, where users are tricked into manually running malicious commands to address non-existent errors, is a departure from relying on traditional methods for obtaining initial access, such as through stolen credentials
- AI is Everywhere, But CISOs are Still Securing It with Yesterday’s Skills and Tools, Study Findsby [email protected] (The Hacker News) on March 17, 2026 at 11:30 am
A majority of security leaders are struggling to defend AI systems with tools and skills that are not fit for the challenge, according to the AI and Adversarial Testing Benchmark Report 2026 from Pentera. The report, based on a survey of 300 US CISOs and senior security leaders, examines how organizations are securing AI infrastructure and highlights critical gaps tied to skills shortages and
- Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malwareby [email protected] (The Hacker News) on March 17, 2026 at 9:53 am
North Korean threat actors have been observed sending phishing to compromise targets and obtain access to a victim’s KakaoTalk desktop application to distribute malicious payloads to certain contacts. The activity has been attributed by South Korean threat intelligence firm Genians to a hacking group referred to as Konni. “Initial access was achieved through a spear-phishing email disguised as a
- CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Pathsby [email protected] (The Hacker News) on March 17, 2026 at 5:23 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2025-47813 (CVSS score: 4.3), is an information disclosure vulnerability that leaks the installation path of the application under certain conditions










