NASA Begins Building Dragonfly Drone; Nuclear-Powered ‘Octocopter’ Enters Testing Ahead of 2028 Launch

NASA has begun construction of the Dragonfly mission, which will utilise a nuclear-powered rotorcraft lander to investigate Saturn’s largest moon, Titan. The car-sized drone is scheduled to launch in 2028 and will conduct a comprehensive surface survey using its Multi-Mission Radioisotope Thermoelectric Generator (MMRTG). The spacecraft will complete a six-year cruise…

Continue Reading

OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

Ravie LakshmananMar 14, 2026Artificial Intelligence / Endpoint Security China’s National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw (formerly Clawdbot and Moltbot), an open-source and self-hosted autonomous artificial intelligence (AI) agent. In a post shared on WeChat, CNCERT noted that the platform’s “inherently […]

Continue Reading

Scientists Trace Rare Cosmic Outburst to a Massive Planetary Collision Around Gaia20ehk

Astronomers have reported evidence of two planets colliding around a distant Sun-like star, Gaia20ehk, located about 11,000 light-years away. The star’s light output remained steady until 2016, when it exhibited three minor dimming events; by 2021, the light curve reportedly “went completely bonkers.” Follow-up infrared observations revealed a burst of heat coinciding…

Continue Reading

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a “significant escalation” in how it propagates through the Open VSX registry. “Instead of requiring every malicious listing to embed the loader directly, the threat actor is now abusing extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery […]

Continue Reading

Apple’s Foldable Tipped to Launch as ‘iPhone Ultra’; Price and Memory Configurations Leaked

Apple’s first foldable iPhone has appeared in several leaks detailing its possible pricing, storage options, and hardware. A tipster claims the handset could launch in China with 256GB, 512GB, and 1TB variants priced at CNY 15,999 (roughly Rs. 2,14,400), CNY 17,999 (roughly Rs. 2,41,100), and CNY 19,999 (roughly Rs. 2,67,900). Estimated US pricing could start […]

Continue Reading

INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime

Ravie LakshmananMar 13, 2026Ransomware / Cybercrime INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency’s ongoing efforts to dismantle criminal networks, disrupt emerging threats, and safeguard victims from scams. The effort is part of an international law […]

Continue Reading

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020. Palo Alto Networks Unit 42 is tracking the threat activity under the moniker CL-STA-1087, where CL refers to cluster, and STA stands for state-backed motivation. “The activity demonstrated strategic operational […]

Continue Reading

Nvidia may soon unveil a brand-new AI chip. A closer look at the $20 billion bet to make it happen

On the day before Christmas, when few stocks were stirring, a pricey and pivotal transaction jolted the AI computing race: Nvidia was spending a reported $20 billion to license technology from chip startup Groq and hire key employees, including its CEO, who previously helped Google create what’s become the leading alternative to Nvidia’s AI processors. […]

Continue Reading

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Ravie LakshmananMar 13, 2026VPN Security / Malware Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques. “The campaign redirects users searching for legitimate enterprise software to malicious ZIP files on attacker-controlled websites to deploy digitally signed trojans that masquerade […]

Continue Reading

Investigating a New Click-Fix Variant

Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on independent research and observations of the current threat landscape available at the time of publication. The content is intended for informational and preparedness purposes only. Read more blogs around […]

Continue Reading

Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

Ravie LakshmananMar 13, 2026Linux / Vulnerability Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel’s AppArmor module that could be exploited by unprivileged users to circumvent kernel protections, escalate to root, and undermine container isolation guarantees. The nine confused deputy vulnerabilities have been collectively codenamed CrackArmor by the Qualys Threat Research Unit (TRU). […]

Continue Reading

$100 oil, PCE data, MLB valuations and more in Morning Squawk

This is CNBC’s Morning Squawk newsletter. Subscribe here to receive future editions in your inbox. Happy Friday. The U.S. launched 60 more trade investigations last night, as the Trump administration continues to look for ways to replace the president’s now-overturned duties. The new probes focus on forced labor trade practices. Stock futures are higher this morning after […]

Continue Reading