Palantir extends reach into British state as it gets access to sensitive FCA data

Exclusive: Allowing US tech firm to analyse intelligence in name of tackling fraud raises fresh concerns over privacy

The Guardian

Your iPhone can be hacked in minutes and DarkSword shows how easy it is

https://fed.brid.gy/r/https://nerds.xyz/2026/03/darksword-ios-exploit/

Your iPhone can be hacked in minutes and DarkSword shows how easy it is

A new DarkSword iOS exploit can steal your data and crypto wallets in minutes without leaving a trace. Here is what you need to know.

NERDS.xyz

Technical Analysis of SnappyClient

Zscaler ThreatLabz identified a new command-and-control framework implant called SnappyClient, delivered via HijackLoader. SnappyClient is a C++-based implant with data theft and remote access capabilities. It employs evasion techniques like AMSI bypass, Heaven's Gate, direct system calls, and transacted hollowing. The malware receives configuration files from its C2 server and uses a custom encrypted network protocol. SnappyClient's main functions include stealing browser data, taking screenshots, keylogging, and providing remote shell access. Analysis suggests potential ties to HijackLoader based on code similarities. The primary goal appears to be cryptocurrency theft, targeting wallet addresses and crypto-related applications.

Pulse ID: 69bac510532c2199bd470e30
Pulse Link: https://otx.alienvault.com/pulse/69bac510532c2199bd470e30
Pulse Author: AlienVault
Created: 2026-03-18 15:30:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #DataTheft #HijackLoader #InfoSec #Malware #OTX #OpenThreatExchange #RAT #ThreatLabz #Zscaler #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign

The Konni Group conducted a sophisticated multi-stage attack campaign, initiating with a spear-phishing email disguised as a North Korean human rights lecturer appointment. The attack progressed through execution of a malicious LNK file, installation of remote access malware, and long-term persistence for data theft. A key feature was the unauthorized access to victims' KakaoTalk PC applications, used to distribute additional malicious files to selected contacts. The campaign employed multiple RAT families, including EndRAT, RftRAT, and RemcosRAT, with a distributed C2 infrastructure across Finland, Japan, and the Netherlands. The threat actor's tactics included trust-based propagation, account session abuse, and modular payload deployment, highlighting the need for advanced behavior-based detection and multi-layered defense strategies.

Pulse ID: 69ba831f2287b29db4e4645e
Pulse Link: https://otx.alienvault.com/pulse/69ba831f2287b29db4e4645e
Pulse Author: AlienVault
Created: 2026-03-18 10:49:03

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DRat #DataTheft #Email #Finland #ICS #InfoSec #Japan #Konni #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #RAT #Remcos #RemcosRAT #Rust #SpearPhishing #TheNetherlands #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
DOGE Deposition Leaks & Gets Deleted After Exposing Gross Incompetence

YouTube
The Social Security Administration is investigating a new complaint against DOGE alleging that a former employee claimed he had access to two highly sensitive databases and planned to share the information with his new employer #DOGE #Saboteurs #Spies #Thieves #DataTheft youtube.com/watch?v=bUfd...

‘Worst case scenario’: Whistle...
‘Worst case scenario’: Whistleblower on how DOGE put social security data at risk

YouTube

MAAS VIP_Keylogger Campaign

A sophisticated keylogger campaign has been discovered, utilizing spear-phishing emails with attachments containing hidden malware. The campaign targets multiple countries, employing various packaging styles and execution methods. The malware, known as VIP_Keylogger, is delivered using steganography and process hollowing techniques. It focuses on stealing sensitive information from browsers, email clients, and other applications. The keylogger captures browser data, decrypts passwords, and exfiltrates information through multiple channels, including email. While some features appear disabled, the malware demonstrates advanced capabilities in data theft and evasion techniques.

Pulse ID: 69b7e0b1a4e3419dfc024013
Pulse Link: https://otx.alienvault.com/pulse/69b7e0b1a4e3419dfc024013
Pulse Author: AlienVault
Created: 2026-03-16 10:51:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #DataTheft #Email #InfoSec #KeyLogger #MaaS #Malware #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #SpearPhishing #Steganography #Word #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

#Doge #SSAdministration #DataTheft

Whistleblower claims ex-DOGE member says he took Social Security data to new job: Washington Post
Whistleblower claims ex-DOGE member says he took Social Security data to new job: Washington Post

https://ground.news/article/whistleblower-claims-ex-doge-member-says-he-took-social-security-data-to-new-job?utm_source=mobile-app&utm_medium=newsroom-share

Whistleblower claims ex-DOGE member says he took Social Security data to new job: Washington Post

The Social Security inspector general’s office is investigating allegations that the former DOGE engineer took sensitive data on a thumb drive in a major potential security breach, said people familiar with the process.

Ground News
🚨 Former Nuance employee pleads guilty to accessing 1.2M Geisinger patient records 🔒Employee exploited existing credentials after termination 📊 Names, birth dates, medical record numbers copied #InsiderThreat #Healthcare #DataTheft 👉 https://www.defensorum.com/nuance-employee-unauthorized-access-geisinger-patient-records/
Former Nuance Employee Pleads Guilty to Unauthorized Access of Geisinger Patient Records - Defensorum

A former Nuance Communications employee pleaded guilty in federal court to obtaining information from a protected computer without authorization after accessing and copying data associated with more than 1.2 million Geisinger Health System patient records. Guilty Plea in Federal Court Max Vance, 46, of El Cajon, California, entered a guilty plea on February 27, 2026 ... Read more

Defensorum