Aggregator
New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell Detection
A new and more dangerous version of the ClickFix attack technique has been found actively targeting Windows users. Unlike older versions that used PowerShell or mshta to run malicious commands, this new variant takes a different path. It uses rundll32.exe and WebDAV, two built-in Windows components, to quietly deliver and execute harmful payloads without triggering […]
The post New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell Detection appeared first on Cyber Security News.
SecWiki News 2026-03-30 Review
【培训】开源情报分析师实战能力培训班-4月成都开班
【资料】美国以色列伊朗中东战争每日战况报告汇总
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
TA446 Hackers Deploying DarkSword Exploit Kit to Attack iOS Users
A known threat group called TA446 has been caught using a newly discovered exploit kit called DarkSword to target iOS users. This development marks a significant shift in the group’s tactics, as previous activity from TA446 showed no signs of exploit kit use at all. The campaign came to light around March 26, 2026, when […]
The post TA446 Hackers Deploying DarkSword Exploit Kit to Attack iOS Users appeared first on Cyber Security News.
Docker security advisory (AV26–301)
同形字符如何被滥用于网络欺诈
TeamPCP’s attack spree slows, but threat escalates with ransomware pivot
TeamPCP’s destructive run of supply chain breaches has stopped, for now: it has been three days since the group published malicious versions of Telnyx’s SDK on PyPI, and there haven’t been reports of new open-source project compromises. Partnership with emerging RaaS operation “The prior operational cadence was aggressive – a new target every 1-3 days (Trivy [on] March 19, CanisterWorm [on] March 20-22, Checkmarx [on] March 23, LiteLLM [on] March 24, Telnyx [on] March 27),” … More →
The post TeamPCP’s attack spree slows, but threat escalates with ransomware pivot appeared first on Help Net Security.