Go to listing page

Daily Cybersecurity Roundup, March 10, 2026

Threat actors are increasingly blending social engineering with specialized malware to compromise systems and monetize attacks. In one example, Termite ransomware intrusions have been traced back to ClickFix social engineering campaigns that deploy the CastleRAT malware to secure initial access and maintain persistent control over targeted networks. Similarly, the InstallFix technique manipulates users into running malicious commands disguised as legitimate troubleshooting steps, ultimately leading to malware installation. Expanding the scope of these threats, the ClipXDaemon malware targets Linux environments by silently hijacking the X11 clipboard, monitoring copied data and replacing cryptocurrency wallet addresses to redirect digital payments. Keep reading for more.

01

Security researchers linked Termite ransomware attacks to ClickFix social engineering campaigns that deploy the CastleRAT malware to gain initial access and maintain control over victim networks.

02

The InstallFix attack technique tricks users into executing malicious commands disguised as software fixes, allowing attackers to install malware through social engineering.

03

Researchers identified a VIP Keylogger Malware-as-a-Service (MaaS) campaign distributing credential-stealing malware to capture keystrokes and sensitive user information.

04

The ClipXDaemon malware acts as an autonomous X11 clipboard hijacker, monitoring and replacing cryptocurrency wallet addresses copied to the clipboard on Linux systems.

05

The APT36 threat group has been linked to the Nightmare VibeWare malware campaign, targeting victims with espionage-focused implants designed for surveillance and data exfiltration.

06

Okta uncovered a Vietnamese cybercrime operation that automated large-scale fraudulent account signups across online services using bot infrastructure and identity abuse techniques.

07

Threat actors are abusing the .arpa DNS domain and IPv6 addressing to evade traditional phishing detection mechanisms and make malicious domains harder to block.

08

A critical flaw in ExifTool could allow attackers to achieve remote code execution on macOS systems by processing malicious image metadata files.

09

Multiple vulnerabilities discovered in Hikvision products could enable attackers to bypass authentication, execute remote code, and compromise surveillance infrastructure.

10

A one-click vulnerability in ZITADEL, an identity and access management platform, could allow attackers to take over accounts or escalate privileges through crafted requests.

Get the Daily Cybersecurity Roundup delivered to your email!