New.
Sophos: Incident responders, s'il vous plait: Invites lead to odd malware events https://www.sophos.com/en-us/blog/incident-responders-s-il-vous-plait @SophosXOps #infosec #threatresearch #phishing #malware
New.
Sophos: Incident responders, s'il vous plait: Invites lead to odd malware events https://www.sophos.com/en-us/blog/incident-responders-s-il-vous-plait @SophosXOps #infosec #threatresearch #phishing #malware
New.
Sekoia: New widespread EvilTokens kit: device code phishing as-a-service – Part 1 https://blog.sekoia.io/new-widespread-eviltokens-kit-device-code-phishing-as-a-service-part-1/ @sekoia_io #infosec #threatresearch #phishing #cybercrime
New.
"A single malicious prompt could activate a hidden exfiltration channel inside a regular ChatGPT conversation."
Check Point: ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime https://research.checkpoint.com/2026/chatgpt-data-leakage-via-a-hidden-outbound-channel-in-the-code-execution-runtime/ #infosec #vulnerability #threatresearch #ChatGPT #OpenAI

Key Takeaways What Happened AI assistants now handle some of the most sensitive data people own. Users discuss symptoms and medical history. They ask questions about taxes, debts, and personal finances, upload PDFs, contracts, lab results, and identity-rich documents that contain names, addresses, account details, and private records. That trust depends on a simple expectation: […]
Posted yesterday, if you missed it.
WatchTower: Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2) https://labs.watchtowr.com/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2/ #infosec #Citrix #threatresearch

Today, we woke up with a nagging feeling: what if Citrix had, in fact, patched multiple Memory Overread vulnerabilities as part of CVE-2026-3055? While we've been using our analysis from Part 1 (please read it first, as this post will be brief) to accurately identify exploitable Citrix NetScaler appliances across
New.
ReliaQuest: DeepLoad Malware Pairs ClickFix Delivery with AI-Generated Evasion https://reliaquest.com/blog/threat-spotlight-deepload-malware-pairs-clickfix-delivery-with-ai-generated-evasion/
More:
Infosecurity-Magazine: https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/ #infosec #threatresearch #malware
New. This relates to CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182.
VulnCheck: The Return of the Kinsing https://www.vulncheck.com/blog/return-of-the-kinsing @vulncheck #infosec #threatresearch #botnet

Canary Intelligence linked exploitation of CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182 to the same Kinsing infrastructure, including a shared staging host and attacker IP first seen in the canary network on March 12, 2026. The research shows how an older malware family is still adapting by adding new exploit paths while continuing to rely on established infrastructure.
New.
Kaspersky: An AI gateway designed to steal your data https://securelist.com/litellm-supply-chain-attack/119257/ @Kaspersky #infosec #Python #LLM #threatresearch
New.
CISA: MAR-25993211-r1.v2 Ivanti Connect Secure (RESURGE) https://www.cisa.gov/news-events/analysis-reports/ar25-087a
Summary: CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat https://www.cisa.gov/news-events/news/cisa-issues-updated-resurge-malware-analysis-highlighting-stealthy-active-threat #CISA #malware #infosec #threatresearch
New.
Kaspsersky: Coruna: the framework used in Operation Triangulation https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
More:
The Hacker News: Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks https://thehackernews.com/2026/03/coruna-ios-kit-reuses-2023.html @thehackernews #iOS #Apple #infosec #threatresearch