106 Followers
178 Following
7K Posts
The LockBit ransomware operation has allegedly hacked Charlie Bears, a popular cuddly toy maker, listing the company as a victim on its darknet leak site. The leaked data includes employee information, training documents, inventories, and novelty bear passports, with the breach impacting the Australian operation.
https://www.cyberdaily.au/security/13412-exclusive-cuddly-toy-maker-charlie-bears-allegedly-hacked
Exclusive: Cuddly toy maker Charlie Bears allegedly hacked

Not the bears! LockBit ransomware operation lists beloved teddy bear outlet as a victim on its darknet leak site. 

Cyber Daily
Attackers hijacked the Axios npm account to distribute RAT malware by publishing malicious package updates. Developers who installed compromised versions (1.14.1 and 0.30.4) should assume their systems are compromised, as the malware targets Linux, Windows, and macOS.
https://securityaffairs.com/190221/security/attackers-hijack-axios-npm-account-to-spread-rat-malware.html
Attackers hijack Axios npm account to spread RAT malware

Threat actors hijacked the npm account of Axios to distribute RAT malware via malicious package updates.

Security Affairs
The Truth or Fake show debunks a viral Bollywood dance video falsely linked to a hack of FBI Director Kash Patel's emails by an Iranian-linked group. The video, unrelated to Patel, has been circulating online since at least 2020.
https://www.france24.com/en/no-iranian-hackers-didn-t-leak-a-video-of-the-fbi-s-kash-patel-dancing
Truth or Fake - No, Iranian hackers didn’t leak a video of the FBI's Kash Patel dancing

FBI Director Kash Patel has been the subject of social media buzz this week, after his private emails were hacked by an Iranian-linked group. There's also a viral Bollywood dance video being falsely linked to the incident, despite no connection to Patel, as Vedika Bahl clears up in Truth or Fake.

FRANCE 24
AI recruiting startup Mercor has confirmed a cyberattack linked to a compromise of the open source project LiteLLM, potentially affecting thousands of companies. The extortion hacking group Lapsus$ has claimed responsibility for targeting Mercor and accessing its data, though the exact connection between the two incidents remains unclear.
https://techcrunch.com/2026/03/31/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/
Mercor says it was hit by cyberattack tied to compromise of open source LiteLLM project | TechCrunch

The AI recruiting startup confirmed a security incident after an extortion hacking crew took credit for stealing data from the company's systems.

TechCrunch
Rogers and Fido have confirmed a data breach that resulted in unauthorized access to customer information, including names, contact details, and account numbers. The companies stated that more sensitive data like social insurance numbers and financial information were not compromised, but the full scope of affected customers is still under investigation.
https://www.iphoneincanada.ca/2026/03/28/rogers-and-fido-confirm-data-breach-affecting-customer-information/
Rogers and Fido Confirm Data Breach Affecting Customer Information | iPhone in Canada

Rogers and its flanker brand Fido have been hit by a data breach involving unauthorized access to customer information. The company disclosed the incident on Friday, noting that the breach was caught through its own internal security monitoring systems. According to a report by The Globe and Mail, the breach specifically compromised customer names, contact

iPhone in Canada | Canada’s source for Apple, telecom, tech news, and deals
Hackers, identified as APT Iran, have reportedly stolen over 375TB of data from Lockheed Martin, a major US defense and aerospace firm. The attackers are allegedly demanding around $400 million to $600 million for the data, which may include sensitive information like F-35 blueprints, and are threatening to sell it to US adversaries.
https://www.cybersecurity-insiders.com/apt-iran-hackers-steal-over-375tb-of-data-from-lockheed-martine/
APT Iran hackers steal over 375TB of data from Lockheed Martine

AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is

Cybersecurity Insiders
The thrunt-god GitHub repository introduces a threat hunting command system designed for agentic IDEs, facilitating a five-phase process: Signal, Hunt, Swarm, Receipt, and Publish. It offers commands for managing hunts, mapping environments, shaping hypotheses, and publishing validated findings, with installation instructions provided for various IDEs like Claude Code and Copilot.
https://github.com/backbay-labs/thrunt-god
Unit 42 researchers have uncovered a cyberespionage campaign targeting a Southeast Asian government, involving three distinct threat clusters: Stately Taurus, CL-STA-1048, and CL-STA-1049. These clusters utilize various malware and tools, including backdoors, RATs, and loaders, with evidence suggesting coordination among China-aligned actors to achieve persistent access and data exfiltration.
https://unit42.paloaltonetworks.com/espionage-campaigns-target-se-asian-government-org/
Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government

Unit 42 uncovers multiple clusters of cyberespionage targeting a Southeast Asian government organization with USBFect, RATs and loaders.

Unit 42
Wikipedia has updated its policies to prohibit contributors from using AI to generate or rewrite content, citing concerns about verifiable sources and core content policies. While limited use for tasks like typo correction and translation is permitted under strict guidelines, the platform is developing methods to identify and address AI-generated text to maintain its standards.
https://siliconangle.com/2026/03/26/wikipedia-cracks-contributors-using-ai-generate-content/
The Tycoon2FA phishing platform has quickly resumed operations after a law enforcement takedown, while Trio-Tech International faces a material breach after ransomware data exposure. The FBI and CISA warn of Russian phishing campaigns targeting messaging apps, and a Russian national was sentenced for enabling ransomware attacks. Additionally, Iran-linked hackers are using Telegram malware against dissidents, Mazda disclosed a breach impacting employee and partner data, and Oracle issued a critical patch for its Identity Manager.
https://www.govinfosecurity.com/breach-roundup-tycoon2fa-phishing-platform-rebounds-a-31220