China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks Article Link: https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html FCC Bans New Foreign-Made Routers Over
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks Article Link: https://thehackernews.com/2026/03/china-linked-red-menshen-uses-stealthy.html FCC Bans New Foreign-Made Routers Over
CISA Urges US Orgs to Secure Microsoft Intune Systems After Stryker Breach Article Link: https://www.bleepingcomputer.com/news/security/cisa-warns-businesses-to-secure-microsoft-intune-systems-after-stryker-breach/ The Industrialization of Identity Compromise: How
MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack Article Link: https://www.securityweek.com/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/ ShinyHunters Claims Ongoing Salesforce Aura Data Theft Attacks Article Link:
Experts Warn Iran-Linked Hacktivists Could Target Governments Article Link: https://www.nextgov.com/cybersecurity/2026/03/iran-linked-hacktivists-could-target-governments-experts-warn/411876/ Iran-Linked MuddyWater Hackers Target U.S. Networks with New Dindoor Backdoor Article
CrowdStrike: Average Cyberattack Breakout Time Now Under 30 Minutes Article Link: https://www.scworld.com/news/crowdstrike-average-cyberattack-breakout-time-now-under-30-minutes Critical Cisco SD-WAN Bug Exploited in Zero-day Attacks Since
Unit 42: Nearly Two-Thirds of Breaches Now Start with Identity Abuse Article Link: https://cyberscoop.com/attackers-abuse-identity-unit42-palo-alto-networks-incident-response-report/ API Threats Grow in Scale as AI
Asian Government’s Espionage Campaign Breached Critical Infrastructure in 37 Countries Article Link: https://www.cybersecuritydive.com/news/asian-governments-espionage-campaign-breached-critical-infrastructure-in-3/811472/ CISA Tells Agencies to Stop Using Unsupported Edge
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs Article Link: https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/ U.S. Charges 31 Suspects in Nationwide ATM Jackpotting Scam
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time Article Link: https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/ NIST, MITRE