⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More on March 23, 2026 Posted by The Hacker News
We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them on March 23, 2026 Posted by The Hacker News
Running Tesla Model 3’s Computer on My Desk Using Parts From Crashed Cars on March 23, 2026 Posted by David Schütz
Posted in Hacking news Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It on February 25, 2026 The Hacker News
Posted in Hacking news Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware on February 25, 2026 The Hacker News
Posted in Hacking news Manual Processes Are Putting National Security at Risk on February 25, 2026 The Hacker News
Posted in Hacking news Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker on February 25, 2026 The Hacker News
Posted in Hacking news SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution on February 25, 2026 The Hacker News
Posted in Hacking news CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability on February 24, 2026 The Hacker News
Posted in Hacking news RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN on February 24, 2026 The Hacker News
Posted in Hacking news UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware on February 24, 2026 The Hacker News
Posted in Hacking news Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem on February 24, 2026 The Hacker News
Posted in Hacking news Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks on February 24, 2026 The Hacker News