<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 3/19/2026

SHARE

Top News

'Claudy Day' Trio of Flaws Exposes Claude Users to Data Theft

An attack chain featuring three separate flaws found in Anthropic's Claude artificial intelligence (AI) agent could have allowed attackers to embed malicious hidden instructions in a pre-filled chat URL via a Google search, steal sensitive user data, and expose users to malicious links that appear like legitimate search results. Researchers from Oasis Security discovered the flaws, which individually were concerning on their own, according to a report published Wednesday. READ MORE...

Breaches

Marquis Data Breach Affects 672,000 Individuals

Marquis, a provider of marketing and compliance solutions for credit unions and banks, revealed this week that a data breach disclosed last year affects roughly 672,000 individuals. The Texas-based company discovered in August 2025 that hackers had gained access to its systems. In a notification made public in December, it reported that the attackers had stolen personal information such as names, addresses, SSNs, dates of birth, taxpayer identification numbers, and financial information. READ MORE...


900,000 contact records exposed in Aura data breach

Aura, the online safety service, confirmed that an unauthorized party accessed about 900,000 records, mostly names and email addresses from a marketing tool linked to a company it acquired in 2021. The incident occurred as a result of a targeted phone phishing attack that tricked one of the employees. Aura believes that contact information related to less than 20,000 active customers and less than 15,000 former customers was accessed. READ MORE...

Hacking

Russian hackers exploit Zimbra flaw in Ukrainian govt attacks

Hackers part of APT28, a state-backed threat group linked to Russia's military intelligence service (GRU), are exploiting a Zimbra Collaboration Suite (ZCS) vulnerability in attacks targeting Ukrainian government entities. This high-severity security flaw (tracked as CVE-2025-66376 and patched in early November) stems from a stored cross-site scripting (XSS) that unauthenticated attackers can exploit to gain remote code execution (RCE) and compromise the Zimbra server. READ MORE...

Malware

New 'Perseus' Android malware checks user notes for secrets

A new Android malware called Perseus is checking user-curated notes to steal sensitive information, like passwords, recovery phrases, or financial data. Distributed over unofficial stores disguised as IPTV, Perseus allows complete device takeover, screenshot capturing , and overlay attacks. By posing as IPTV apps, which are often used to stream pirated content, the threat actor relies on the user's familiarity with sideloading APKs from outside the Google Play store. READ MORE...


C2 Implant 'SnappyClient' Targets Crypto Wallets

Technical analysis of a command-and-control (C2) implant that first surfaced in December 2025 provides fresh insight into how such tools enable threat actors to maintain stealthy, persistent access, exfiltrate data, and remotely control compromised systems. The malware, which researchers at Zscaler ThreatLabz are tracking as "SnappyClient," is a C++-based C2 implant. It supports an extensive set of commands including the ability to take screenshots, log keystrokes, and steal data. READ MORE...


Second iOS exploit kit now in use by suspected Russian hackers

Researchers have discovered a second instance of suspected Russian hackers using iOS exploits, pointing to what they say are several foreboding trends. iVerify, Lookout and Google collaborated on the research published Wednesday, a follow-up to earlier revelations about a similar exploit kit, Coruna. While the second kit - dubbed DarkSword - also targeted users in Ukraine, the scale is significant: iVerify estimated up to 270 million iPhone users could be susceptible. READ MORE...

Information Security

New research unpacks North Korea's stealthy, sophisticated remote IT worker schemes

North Korea's remote IT worker schemes rely heavily on Western collaborators, an elaborate hierarchy of roles and the extensive use of an open-source messaging application, IBM and the cybersecurity vendor Flare said in a report published on Wednesday. The new research details the tactics and technologies that North Korean operatives use to trick companies into hiring them and fly under the radar while they funnel their salaries to Pyongyang. READ MORE...

Exploits/Vulnerabilities

CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability

A recently patched Microsoft SharePoint vulnerability has been exploited in the wild, according to the cybersecurity agency CISA. The vulnerability, tracked as CVE-2026-20963, was disclosed on January 13, when Microsoft released its January 2026 Patch Tuesday updates. CISA added CVE-2026-20963 to its Known Exploited Vulnerabilities (KEV) catalog on March 18, instructing federal agencies to address it by March 21. READ MORE...


Researchers found font-rendering trick to hide malicious commands

Researchers have published a proof-of-concept (PoC) that uses custom fonts to fool many popular Artificial Intelligence (AI) assistants, including ChatGPT, Claude, Copilot, Gemini, Leo, Grok, Perplexity, Sigma, Dia, Fellou, and Genspark. Imagine a book where the visible text is harmless, but hidden between the lines is a second message written in special, human-only ink. Humans can see both layers. AI can't, and it only reads the visible part. READ MORE...

On This Date

  • ...in 1918, the US Congress establishes time zones and approves daylight savings time.
  • ...in 1928, Irish actor and screenwriter Patrick McGoohan, famous as "Number Six" in the 1960s TV series "The Prisoner", is born in New York City.
  • ...in 1931, gambling is legalized in Nevada.
  • ...in 1979, the US House of Representatives begins broadcasting its proceedings via the cable TV network C-SPAN.