Daily Security Briefing #197

Daily Security Briefing #197

Table of Contents

March 18, 2026 | Read Online

DarkSword iOS exploit chain proliferation, Interlock ransomware exploits Cisco flaw, and UIDAI’s bug bounty program…


Executive Summary

Cybersecurity threats continue to escalate with the emergence of new exploit chains and vulnerabilities. The DarkSword iOS exploit chain has been adopted by multiple threat actors, compromising devices through zero-day vulnerabilities. Meanwhile, the Interlock ransomware gang is exploiting a critical Cisco flaw in zero-day attacks. Additionally, the Unique Identification Authority of India (UIDAI) has launched its first bug bounty program to strengthen Aadhaar security.



Top Articles

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors Google Threat Intelligence Group has identified a new iOS full-chain exploit called DarkSword, leveraging multiple zero-day vulnerabilities. Since November 2025, GTIG has observed commercial surveillance vendors and suspected state-sponsored actors utilizing DarkSword in distinct campaigns. Google Cloud Blog

The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report Rapid7 Labs has released its 2026 Global Threat Landscape Report, analyzing how attacker behavior is evolving across vulnerability exploitation, ransomware operations, identity abuse, and AI-driven tradecraft. The data shows a clear pattern: exposure is being identified and weaponized faster than most organizations are set up to defend. Source

UIDAI Introduces Bug Bounty Program to Strengthen Aadhaar Defenses The Unique Identification Authority of India (UIDAI) has launched its first structured bug bounty program to fortify the Aadhaar system. This initiative invites top cybersecurity experts to proactively identify and responsibly disclose potential vulnerabilities within UIDAI’s digital platforms. GBHackers

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned six individuals and two entities for their involvement in the Democratic People’s Republic of Korea (DPRK) information technology (IT) worker scheme with an aim to defraud U.S. businesses and generate illicit revenue for the regime. The Hacker News

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that’s exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software. The vulnerability in question is CVE-2026-20131, allowing unauthenticated remote attackers to gain root access. The Hacker News

UIDAI Launches Bug Bounty Program to Boost Aadhaar Security The Unique Identification Authority of India (UIDAI) has introduced its first structured bug bounty programme as part of ongoing efforts to strengthen the security of the Aadhaar ecosystem. The initiative aims to proactively identify vulnerabilities across critical digital platforms by engaging trusted cybersecurity researchers and ethical hackers. CyberPress

Fake Telegram Site Delivers Multi-Stage Malware Using In-Memory Execution Cybersecurity researchers have identified a malicious campaign that spreads malware through a fake Telegram download website. The site, hosted on the typosquatted domain telegram [.]com, impersonates the official Telegram download portal and tricks users into installing a malicious installer disguised as legitimate software. CyberPress

Marquis: Ransomware gang stole data of 672K people in cyberattack A ransomware gang has stolen the data of over 670,000 individuals in an August 2025 cyberattack that also disrupted operations at 74 banks across the United States. The attack targeted Marquis, a Texas-based financial services provider. BleepingComputer

Ransomware gang exploits Cisco flaw in zero-day attacks since January The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco’s Secure Firewall Management Center (FMC) software in zero-day attacks since late January. BleepingComputer


AI Transparency: This newsletter uses AI to curate, rank, and summarize cybersecurity content from leading industry blogs. All articles link directly to original authors. Executive summaries are AI-generated based on article content. I curate the sources and deliver the digest—the original authors deserve the credit for their excellent work.

Share :
comments powered by Disqus

Related Posts

Daily Security Briefing #192

Daily Security Briefing #192

March 13, 2026 | Read Online GRIDTIDE disrupted, Claude Code vulnerabilities exposed, and AI training data poisoning…

Read More
Daily Security Briefing #193

Daily Security Briefing #193

March 14, 2026 | Read Online Critical vulnerabilities exposed, supply-chain attacks escalate, and data breaches continue…

Read More
Daily Security Briefing #195

Daily Security Briefing #195

March 16, 2026 | Read Online Ransomware campaigns disrupted, Google Looker Studio vulnerabilities exposed, and AI-powered attacks on the rise…

Read More