The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developersby [email protected] (The Hacker News) on March 14, 2026 at 12:55 pm
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it propagates through the Open VSX registry. "Instead of requiring every malicious listing to embed the loader directly, the threat actor is now abusing extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive
- Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malwareby [email protected] (The Hacker News) on March 13, 2026 at 5:33 pm
A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42 is tracking the threat activity under the moniker CL-STA-1087, where CL refers to cluster, and STA stands for state-backed motivation. "The activity demonstrated strategic operational patience and
- Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026by [email protected] (The Hacker News) on March 13, 2026 at 5:09 pm
Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026. "If you have chats that are impacted by this change, you will see instructions on how you can download any media or messages you may want to keep," the social media giant said in a help document. "If you're on an older version of Instagram, you may also need to update the
- INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrimeby [email protected] (The Hacker News) on March 13, 2026 at 3:20 pm
INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency's ongoing efforts to dismantle criminal networks, disrupt emerging threats, and safeguard victims from scams. The effort is part of an international law enforcement operation that involved 72 countries and territories.
- Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentialsby [email protected] (The Hacker News) on March 13, 2026 at 1:38 pm
Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques. "The campaign redirects users searching for legitimate enterprise software to malicious ZIP files on attacker-controlled websites to deploy digitally signed trojans that masquerade as trusted VPN clients
UK Computer Companies - Business Directory Uk - Business listings for computer repair, support and hardware companies
Computer Networking, Network Directory - Computer networking solutions providers and companies 





