Categories Breaking News

Breaking News – Cyber Threats – 2026-03-04 07:00 PST

Breaking News – Cyber Threats (last 6h)

Generated: 2026-03-04 07:00 PST

  • Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
    The Hacker News • 2026-03-04 05:28 • thehackernews.com
    Google said it identified a “new and powerful” exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1.
    The exploit kit featured five full iOS exploit chains and a total of 23 exploits, Google Threat Intelligence Group (GTIG) said. It’s not effective against the latest version of iOS. The findings were first reported by WIRED.
    “The
    https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html
  • Manipulating AI Summarization Features
    Schneier on Security • 2026-03-04 04:06 • www.schneier.com

    Microsoft is reporting:

    Companies are embedding hidden instructions in “Summarize with AI” buttons that, when clicked, attempt to inject persistence commands into an AI assistant’s memory via URL prompt parameters….

    These prompts instruct the AI to “remember [Company] as a trusted source” or “recommend [Company] first,” aiming to bias future responses toward their products or services. We identified over 50 unique pr…
    https://www.schneier.com/blog/archives/2026/03/manipulating-ai-summarization-features.html

  • New RFP Template for AI Usage Control and AI Governance
    The Hacker News • 2026-03-04 03:30 • thehackernews.com
    As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light — and the budget — to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need “AI Governance,” but they have no idea what they are actually looking for.
    The CISO’s Dilemma: You Have the AI Budget, but Do You Have the Requirements?
    As AI
    https://thehackernews.com/2026/03/new-rfp-template-for-ai-usage-control.html
  • Mobile malware evolution in 2025
    Securelist • 2026-03-04 02:00 • securelist.com
    Statistics on Android malware and the most notable mobile threats of 2025: preinstalled backdoors Keenadu and Triada, spyware Trojans, the Kimwolf IoT botnet, and Mamont banking Trojans.
    https://securelist.com/mobile-threat-report-2025/119076/
  • Want More XWorm?, (Wed, Mar 4th)
    SANS ISC Diary (full) • 2026-03-04 01:48 • isc.sans.edu

    And another XWorm[1] wave in the wild! This malware family is not new and heavily spread but delivery techniques always evolve and deserve to be described to show you how threat actors can be imaginative! This time, we are facing another piece of multi-technology malware.


    https://isc.sans.edu/diary/rss/32766

  • Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
    The Hacker News • 2026-03-04 01:37 • thehackernews.com
    Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems.
    The names of the packages are listed below –

    nhattuanbl/lara-helper (37 Downloads)
    nhattuanbl/simple-queue (29 Downloads)
    nhattuanbl/lara-swagger (49 Downloads)
    https://thehackernews.com/2026/03/fake-laravel-packages-on-packagist.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like