Artificial IntelligenceCybersecurityNewswireTechnology

Self-Spreading npm Malware & Cisco SD-WAN 0-Day Exploited

Originally published on: March 2, 2026
▼ Summary

– Synthetic fraud is challenging identity verification systems, particularly in industries that rely on fast, remote onboarding with automated document checks.
– AI tools are being integrated into both criminal operations, such as drafting phishing emails, and enterprise security, with autonomous agents gaining significant access to core business systems.
– Major security risks include exposed industrial networks on the internet, growing open-source security debt in software, and ransomware attacks targeting critical infrastructure like file transfer solutions.
– Law enforcement is actively disrupting cybercrime through international operations, arrests of hacking group members, and seizures related to phishing and fraud networks.
– The role of the CISO is becoming more burdensome with increased personal liability concerns, while the security industry is shifting toward AI-driven, autonomous defense strategies to manage scale.

The digital threat landscape is constantly shifting, with novel supply chain attacks and critical zero-day vulnerabilities demanding immediate attention from security teams. Recent incidents highlight a troubling trend of malware designed to propagate automatically within developer ecosystems and the active exploitation of flaws in widely used enterprise networking solutions. These developments underscore the persistent challenge of securing complex software dependencies and internet-facing infrastructure against determined adversaries.

Identity verification systems are increasingly failing to detect sophisticated synthetic fraud. Counterfeit and expired identification documents routinely slip through automated checks, particularly in industries that prioritize rapid customer onboarding and remote transactions. This vulnerability stems from an over-reliance on scanned documents and automated workflows that struggle to distinguish highly convincing forgeries.

Within corporate environments, AI assistants are being granted extensive access to core business systems, linking directly to ticketing platforms, source code repositories, and cloud dashboards. This integration creates new attack surfaces, as these agents can autonomously trigger workflows, query databases, and even initiate code changes with minimal human oversight. Security strategies must evolve to govern this level of automated access.

A significant security misstep involves treating operational technology labs like standard IT data centers. Compromise in these sensitive environments can corrupt scientific data integrity and create physical safety risks that traditional data backups cannot remediate. The security protocols for these research and development spaces must account for their unique role in innovation and product development.

Criminal actors are systematically incorporating AI tools into their daily operations. Underground forum analysis reveals extensive discussions on using chatbots to draft phishing emails, generate malicious code, and even coach social engineering phone calls. This adoption lowers the barrier to entry for cybercrime and scales the efficiency of common attacks.

In application security, AI-driven dynamic analysis is reducing manual effort and uncovering exploitable vulnerabilities more effectively. Modern testing automates attack surface discovery and supports complex business-logic testing in pre-production environments, moving beyond simple scan completion metrics to provide actionable security insights.

Open-source security debt continues to accumulate within commercial software. Nearly every audited codebase now contains open-source components, with the average number of dependencies rising sharply. This creates a sprawling and often unmanaged attack surface that organizations struggle to track and patch.

Insider risks, stemming from routine employee activity, carry a staggering average annual cost of $19.5 million per organization. These incidents, often unintentional, highlight the immense financial impact of internal data handling and system access policies that lack sufficient controls.

A persistent and dangerous exposure comes from industrial networks and operational technology services inadvertently connected to public internet ranges. Remote access portals and building automation servers remain discoverable online, presenting a direct pathway for attackers to target critical infrastructure.

The education sector faces the unique challenge of balancing academic openness with necessary cybersecurity controls. Effective strategies often involve architecturally separating student-facing systems from core administrative and research networks to limit the blast radius of any potential breach.

In recent attack news, a Japanese chip-testing toolmaker confirmed a ransomware incident after detecting unusual activity within its corporate IT environment. Meanwhile, a deceptive campaign on the OpenClaw AI agent’s repository tricked users with a fake troubleshooting tip that delivered information-stealing malware.

More alarmingly, researchers uncovered a self-propagating npm malware campaign using typosquatting packages. These malicious modules steal developer credentials, infect projects, and automatically spread across environments, representing a sophisticated software supply chain attack.

Authorities are urging immediate action regarding an actively exploited command injection flaw in a secure file transfer solution. The vulnerability has been added to a catalog of known exploited bugs, with the vendor confirming multiple reports of damage.

SolarWinds addressed four critical remote code execution vulnerabilities in its Serv-U file transfer solution. These flaws could allow attackers to create administrative users or execute commands with high-level privileges, affecting a wide range of organizations.

Cisco disclosed that a highly sophisticated threat actor has been exploiting a zero-day authentication bypass in its SD-WAN management controllers since 2023. The vulnerability affects critical components for managing software-defined wide area networks.

In the threat actor space, a hacking collective is specifically recruiting women to conduct voice-phishing attacks, offering cash payments for participating in social-engineering phone operations. This tactic aims to exploit perceived trust and lower victim suspicion during calls.

On the defensive front, a veteran engineer is developing an open-source safeguard layer designed to prevent autonomous AI agents from taking unauthorized actions. This “Iron Curtain” approach seeks to add crucial oversight to increasingly independent AI systems.

Facing a crisis of scale, security operations centers are moving toward autonomous, AI-driven strategies to cope with exponentially growing alert volumes and automated attacks. This shift is viewed as essential for operational survival.

New regulations are setting strict deadlines for federal agencies to replace unsupported internet-facing devices like firewalls, routers, and switches, recognizing these as prime targets for exploitation.

Law enforcement scored several victories, including a Polish cybercrime unit dismantling a group that phished Facebook accounts to extract payment codes, and Spanish police arresting suspected members of a hacktivist group over DDoS attacks on government sites.

Enterprise adoption of AI agents is progressing but faces significant headwinds from security concerns and system complexity as deployments scale from pilot to production. Managing risk and integration remains a substantial challenge.

With support ending for several legacy Windows products, Microsoft is offering extended security updates at a cost, a move that will impact many organizations still running these systems.

An international operation coordinated by Eurojust dismantled a fraudulent call centre network, arresting 11 suspects and seizing a significant sum of cash. In South Korea, teenagers were charged in connection with a breach of a public bike service that exposed millions of user records.

Airline brands are being heavily impersonated for phishing and crypto fraud, with criminals registering thousands of lookalike domains to target travelers and employees, especially during peak booking seasons.

The cybersecurity investment landscape shows venture capital concentrating in fewer, larger deals, driving up valuations across the board as funding focuses heavily on AI security and platform companies.

In a case of corporate espionage, a former cyber division executive was sentenced to prison for selling stolen trade secrets to a Russian broker, highlighting the lucrative black market for offensive security capabilities.

On the product front, Anthropic introduced a feature allowing developers to remotely control a local coding session from a mobile device, while Samsung’s latest smartphone lineup emphasizes privacy with a built-in display designed to shield content from sidelong glances.

Encrypted messaging app Telegram has risen to the top spot for job scam activity, becoming a primary channel for authorized push payment fraud. In a positive development for Apple, NATO approved the iPhone and iPad for handling classified information in restricted environments without special modifications.

Microsoft is expanding its cloud PC strategy with new hardware partners and introducing a platform that gives AI agents secure access to managed cloud desktops for completing automated tasks. The company is also enhancing its sovereign cloud offerings with new disconnected and AI capabilities for sensitive government workloads.

Analysis confirms that internet-facing edge systems bear the brunt of exploitation attempts, with billions of malicious sessions recorded targeting VPNs, routers, and remote access services as attackers seek initial footholds.

Apple is implementing expanded age assurance tools to block adult app downloads in regulated markets, and Reddit faced a major fine for failing to protect children’s data and exposing them to harmful content.

The latest update to the essential network analysis tool Wireshark resolved critical dissector flaws, while threat reports detail how fraudsters are integrating ChatGPT into global scam campaigns for romance scams, fake services, and harassment.

AWS launched a consolidated plan to simplify enterprise security procurement, and a sobering survey reveals that nearly 80% of CISOs are concerned about personal liability for security incidents, a significant increase that is changing how leaders approach risk and communication.

A new Android app attempts to detect nearby smart glasses via Bluetooth signals, addressing growing privacy concerns. Incident response data indicates ransomware actors predominantly execute their attacks outside of standard business hours to avoid detection.

Google’s latest Android beta expands privacy controls for sensitive data, and a major international law enforcement operation targeted “The Com,” a decentralized network of young individuals linked to ransomware and the coercion of children.

The cybersecurity job market remains robust, and February saw a wave of new product releases from security vendors, focusing on everything from code security and attack simulation to identity management and cloud observability.

(Source: HelpNet Security)

Topics

cybersecurity threats 98% ai security 95% vulnerability management 90% privacy protection 85% law enforcement 85% cloud security 80% security operations 80% open source security 80% Regulatory Compliance 75% identity fraud 75%