Cyber Feed
- Critical flaw in Protobuf library enables JavaScript code executionby Bill Toulas on April 18, 2026 at 3:09 pm
Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used JavaScript implementation of Google’s Protocol Buffers. […]
- Microsoft Teams right-click paste broken by Edge update bugby Lawrence Abrams on April 18, 2026 at 2:11 pm
Microsoft is warning that a recent Microsoft Edge browser update introduced a bug that breaks right-click paste in chats in the Microsoft Teams desktop client. […]
- NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, and Proxmox VE 9.0 Supportby Sponsored by NAKIVO on April 18, 2026 at 1:45 pm
NAKIVO Inc. announced the general availability of NAKIVO Backup & Replication v11.2, focused on fast, reliable, and proactive data protection. […]
- Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacksby Ionut Arghire on April 18, 2026 at 10:30 am
Threat actors are reusing Tycoon 2FA tools across other phishing kits following the platform’s disruption. The post Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks appeared first on SecurityWeek.
- [Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Databy info@thehackernews.com (The Hacker News) on April 18, 2026 at 8:07 am
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, and OAuth grants. When projects end or employees leave, most
- $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claimsby info@thehackernews.com (The Hacker News) on April 18, 2026 at 7:59 am
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it’s suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The exchange said it fell victim to what it described as a large-scale cyber attack that bore hallmarks of foreign intelligence agency involvement. This attack led to the theft of over 1
- Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnetby info@thehackernews.com (The Hacker News) on April 18, 2026 at 6:01 am
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability affecting
- How NIST’s Cutback of CVE Handling Impacts Cyber Teamsby Becky Bracken on April 17, 2026 at 7:51 pm
Industry and ad hoc coalitions appear poised to help fill the gap created by NIST’s decision to cut back on CVE data enrichment.
- Payouts King ransomware uses QEMU VMs to bypass endpoint securityby Bill Toulas on April 17, 2026 at 7:10 pm
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security. […]
- Tycoon 2FA Phishers Scatter, Adopt Device Code Phishingby Nate Nelson on April 17, 2026 at 7:05 pm
In embracing device code phishing, attackers trick victims into handing over account access by using a service’s legitimate new-device login flow.
- White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technologyby Associated Press on April 17, 2026 at 7:00 pm
A White House official said the administration is engaging with advanced AI labs about their models and the security of software. The post White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology appeared first on SecurityWeek.
- TP-Link routers face exploitation attempt linked to high-severity flawby David Jones on April 17, 2026 at 3:16 pm
Researchers warn a potential botnet is targeting a vulnerability in end-of-life devices.
- Grinex exchange blames “Western intelligence” for $13.7M crypto hackby Bill Toulas on April 17, 2026 at 3:08 pm
Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies. […]
- CoChat Launches AI Collaboration Platform to Combat Shadow AIby Kevin Townsend on April 17, 2026 at 3:00 pm
CoChat is fundamentally an AI collaboration platform designed for teamwork and to bring visibility and governance into enterprise AI shadows. The post CoChat Launches AI Collaboration Platform to Combat Shadow AI appeared first on SecurityWeek.
- Every Old Vulnerability Is Now an AI Vulnerabilityby Nik Kale on April 17, 2026 at 2:47 pm
AI’s danger isn’t that it’s creating new bugs, it’s that it’s amplifying old ones.
- US joins nearly two dozen other countries in striking back against DDoS-for-hire platformsby Eric Geller on April 17, 2026 at 2:09 pm
Authorities around the world seized more than 50 websites associated with DDoS “booter” services.
- Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shopsby Sponsored by Flare on April 17, 2026 at 2:01 pm
In cybercrime markets, trust isn’t assumed, it’s verified. Flare reveals how underground guides teach actors to evaluate carding shops based on data quality, reputation, and survivability. […]
- Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatchedby info@thehackernews.com (The Hacker News) on April 17, 2026 at 1:21 pm
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse (
- Coast Guard’s New Cybersecurity Rules Offers Lessons for CISOsby Robert Lemos on April 17, 2026 at 1:00 pm
The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role.
- Webinar: From phishing to fallout — Why MSPs must rethink both security and recoveryby BleepingComputer on April 17, 2026 at 12:20 pm
Cyberattacks are evolving faster than many MSP and corporate defenses can keep up, with phishing driving much of today’s cybercrime. Join our upcoming webinar to learn how to combine security and recovery strategies to reduce risk and maintain business continuity. […]
- In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrestedby SecurityWeek News on April 17, 2026 at 12:00 pm
Other noteworthy stories that might have slipped under the radar: ShinyHunters targets Rockstar Games, ShowDoc vulnerability exploited in the wild, and EPA to boost cybersecurity budget to $19 million. The post In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested appeared first on SecurityWeek.
- Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaulby info@thehackernews.com (The Hacker News) on April 17, 2026 at 10:47 am
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing third-party apps to access the contact lists and a user’s location in
- Another DraftKings Hacker Sentenced to Prisonby Eduard Kovacs on April 17, 2026 at 10:45 am
Kamerin Stokes sold stolen credentials through an online marketplace even after pleading guilty to his role in the DraftKings attack. The post Another DraftKings Hacker Sentenced to Prison appeared first on SecurityWeek.
- Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followedby Associated Press on April 17, 2026 at 10:15 am
Thursday’s discussion comes as leaders on Capitol Hill grapple with the dizzying pace of global developments in which technology plays a central role. The post Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed appeared first on SecurityWeek.
- Recent Apache ActiveMQ Vulnerability Exploited in the Wildby Eduard Kovacs on April 17, 2026 at 9:50 am
The remote code execution vulnerability tracked as CVE-2026-34197 came to light in early April. The post Recent Apache ActiveMQ Vulnerability Exploited in the Wild appeared first on SecurityWeek.
- CISA flags Apache ActiveMQ flaw as actively exploited in attacksby Sergiu Gatlan on April 17, 2026 at 9:30 am
CISA warned that attackers are now exploiting a high-severity Apache ActiveMQ vulnerability, which was patched earlier this month after going undetected for 13 years. […]
- Two North Korean IT Worker Scheme Facilitators Jailed in the USby Ionut Arghire on April 17, 2026 at 9:21 am
Kejia Wang and Zhenxing Wang compromised the identities of dozens of US persons to help land jobs at over 100 companies. The post Two North Korean IT Worker Scheme Facilitators Jailed in the US appeared first on SecurityWeek.
- ZionSiphon Malware Targets ICS in Water Facilitiesby Eduard Kovacs on April 17, 2026 at 8:30 am
The malware is configured to operate on systems associated with Israeli water treatment and desalination plants. The post ZionSiphon Malware Targets ICS in Water Facilities appeared first on SecurityWeek.
- Microsoft: Some Windows servers enter reboot loops after April patchesby Sergiu Gatlan on April 17, 2026 at 7:59 am
Microsoft warns that some Windows domain controllers are entering restart loops after installing the April 2026 security updates. […]
- Cursor AI Vulnerability Exposed Developer Devicesby Ionut Arghire on April 17, 2026 at 7:29 am
An indirect prompt injection could be chained with a sandbox bypass and Cursor’s remote tunnel feature for shell access to machines. The post Cursor AI Vulnerability Exposed Developer Devices appeared first on SecurityWeek.
- NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissionsby info@thehackernews.com (The Hacker News) on April 17, 2026 at 7:14 am
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. “CVEs that do not meet those criteria will still be listed in the NVD but will not
- Man gets 30 months for selling thousands of hacked DraftKings accountsby Sergiu Gatlan on April 17, 2026 at 7:10 am
23-year-old Kamerin Stokes of Memphis, Tennessee, was sentenced to 30 months in prison for selling access to tens of thousands of hacked DraftKings accounts. […]
- Recently leaked Windows zero-days now exploited in attacksby Sergiu Gatlan on April 17, 2026 at 6:14 am
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissions. […]
- Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accountsby info@thehackernews.com (The Hacker News) on April 17, 2026 at 5:46 am
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to
- Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitationby info@thehackernews.com (The Hacker News) on April 17, 2026 at 3:22 am
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian
- Operation PowerOFF identifies 75k DDoS users, takes down 53 domainsby Bill Toulas on April 16, 2026 at 10:26 pm
The latest wave of “Operation PowerOFF,” on April 13, 2026, targeted the distributed denial-of-service (DDoS) ecosystem and its users across 21 countries. […]
- ZionSiphon malware designed to sabotage water treatment systemsby Bill Toulas on April 16, 2026 at 10:04 pm
A new malware called ZionSiphon, specifically designed for operational technology, is targeting water treatment and desalination environments to sabotage their operations. […]
- NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilitiesby Arielle Waldman on April 16, 2026 at 9:47 pm
The National Institute of Standards and Technology carved a new path for vulnerability remediation by changing the way it prioritizes software flaws.
- New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privilegesby Lawrence Abrams on April 16, 2026 at 8:19 pm
A researcher known as “Chaotic Eclipse” has published a proof-of-concept exploit for a second Microsoft Defender zero-day, dubbed “RedSun,” in the past two weeks, protesting how the company works with cybersecurity researchers. […]
- North Korea Uses ClickFix to Target macOS Users’ Databy Alexander Culafi on April 16, 2026 at 7:42 pm
Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.
- ‘Harmless’ Global Adware Transforms Into an AV Killerby Nate Nelson on April 16, 2026 at 7:07 pm
A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.
- Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Trafficby info@thehackernews.com (The Hacker News) on April 16, 2026 at 5:52 pm
Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. “PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,” Cisco Talos
- Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Faceby Bill Toulas on April 16, 2026 at 4:58 pm
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware hosted on Hugging Face Spaces. […]
- CIOs fret over rising security concerns amid AI adoptionby Scarlett Evans on April 16, 2026 at 3:45 pm
AI is emerging as a critical tool and a growing threat as CIOs struggle to balance innovation with risk, according to a new report.
- Two-Factor Authentication Breaks Free from the Desktopby Arielle Waldman on April 16, 2026 at 3:28 pm
Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.
- CISA cancels prestigious summer internships, citing government shutdownby Eric Geller on April 16, 2026 at 3:21 pm
Experts worry that recent chaos in the scholarship program could undermine vital workforce-development efforts.
- Microsoft’s Original Windows Secure Boot Certificate Is Expiringby Jeffrey Schwartz on April 16, 2026 at 3:16 pm
The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.
- NIST limits vulnerability analysis as CVE backlog swellsby Eric Geller on April 16, 2026 at 2:09 pm
The agency will stop adding detailed information to vulnerabilities that don’t meet certain criteria.
- ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Storiesby info@thehackernews.com (The Hacker News) on April 16, 2026 at 1:05 pm
You know that feeling when you open your feed on a Thursday morning and it’s just… a lot? Yeah. This week delivered. We’ve got hackers getting creative in ways that are almost impressive if you ignore the whole “crime” part, ancient vulnerabilities somehow still ruining people’s days, and enough supply chain drama to fill a season of television nobody asked for. Not
- Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Executionby info@thehackernews.com (The Hacker News) on April 16, 2026 at 11:27 am
Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below – CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on (SSO)
- Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacksby info@thehackernews.com (The Hacker News) on April 16, 2026 at 10:20 am
A “novel” social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage
- UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaignby info@thehackernews.com (The Hacker News) on April 16, 2026 at 6:20 am
The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April
- 6-Year Ransomware Campaign Targets Turkish Homes & SMBsby Nate Nelson on April 16, 2026 at 6:00 am
While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.
- Critical MCP Integration Flaw Puts NGINX at Riskby Jai Vijayan on April 15, 2026 at 9:45 pm
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration files.
- Navigating the Unique Security Risks of Asia’s Digital Supply Chainby Alexander Culafi on April 15, 2026 at 7:30 pm
Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian organizations must wrangle.
- n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emailsby info@thehackernews.com (The Hacker News) on April 15, 2026 at 5:09 pm
Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. “By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery
- Prepping for ‘Q-Day’: Why Quantum Risk Management Should Start Nowby Rob Wright on April 15, 2026 at 3:12 pm
Quantum computers are coming and may impact systems in unexpected ways, and it will “take years to be fully quantum-safe, if ever,” cryptography expert warns.
- FCC exempts Netgear from foreign router banby Eric Geller on April 15, 2026 at 3:05 pm
The commission did not explain its action beyond citing a Defense Department determination.
- Medium-severity flaw in Microsoft SharePoint exploitedby David Jones on April 15, 2026 at 3:05 pm
The flaw should be taken seriously, despite its relatively low score, according to researchers.
- Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requestsby Elizabeth Montalbano on April 15, 2026 at 2:38 pm
Google, Meta, and Microsoft about half the time don’t comply with requests to opt out of online tracking per a California law mandate, privacy watchdog finds.
- Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeoverby info@thehackernews.com (The Hacker News) on April 15, 2026 at 12:56 pm
A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It has been codenamed MCPwn by Pluto Security. “
- April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and Moreby info@thehackernews.com (The Hacker News) on April 15, 2026 at 12:37 pm
A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April’s Patch Tuesday releases. Topping the list is an SQL injection vulnerability impacting SAP Business Planning and Consolidation and SAP Business Warehouse (CVE-2026-27681, CVSS score: 9.9) that could result in the execution of arbitrary database
- Microsoft, Salesforce Patch AI Agent Data Leak Flawsby Alexander Culafi on April 15, 2026 at 12:00 pm
Two recently fixed prompt injections in Salesforce Agentforce and Microsoft Copilot would have enabled an external attacker to leak sensitive data.
- Deterministic + Agentic AI: The Architecture Exposure Validation Requiresby info@thehackernews.com (The Hacker News) on April 15, 2026 at 11:30 am
Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations to adopt it across operational and security functions. Pentera’s AI Security and Exposure Report 2026 reflects that momentum: every CISO surveyed
- Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilitiesby info@thehackernews.com (The Hacker News) on April 15, 2026 at 8:40 am
Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169 vulnerabilities, 157 are rated Important, eight are rated Critical, three are rated Moderate, and one is rated Low in severity. Ninety-three of the flaws are
- OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teamsby info@thehackernews.com (The Hacker News) on April 15, 2026 at 4:30 am
OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that’s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model, Mythos. “The progressive use of AI accelerates defenders – those responsible for keeping systems, data, and users safe – enabling them to find and fix problems
- Microsoft Bets $10B to Boost Japan’s AI, Cybersecurityby Robert Lemos on April 15, 2026 at 12:00 am
The deal aims to accelerate AI adoption, train workers, and develop cybersecurity partnerships — the latest move by a hyperscaler to compete for sovereign AI and data centers.
- Privilege Elevation Dominates Massive Microsoft Patch Updateby Jai Vijayan on April 14, 2026 at 9:22 pm
Elevation-of-privilege bugs accounted for more than half of the 165 vulnerabilities patched, with two zero-days in that mix.
- EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defensesby Rob Wright on April 14, 2026 at 8:20 pm
Stopping EDR killers, which employ bring-your-own-vulnerable-driver (BYOVD) attack techniques, is difficult, but not impossible.
- War Game Exercise Demonstrates How Social Media Manipulation Worksby Elizabeth Montalbano on April 14, 2026 at 4:06 pm
In an educational game called “Capture the Narrative,” students created bots to sway a fictional election, simulating influence in real-world political scenarios.
- New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Releasedby info@thehackernews.com (The Hacker News) on April 14, 2026 at 3:57 pm
Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been described as command injection flaws affecting the Perforce VCS (version control software) driver. Details of the two flaws are below – CVE-2026-40176 (CVSS
- Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Securityby info@thehackernews.com (The Hacker News) on April 14, 2026 at 2:56 pm
Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel devices and push memory-safe code at a more foundational level. “The new Rust-based DNS parser significantly reduces our security risk by mitigating an entire class of vulnerabilities in a risky area, while also laying
- Brute-force cyberattacks originating in Middle East surge in Q1by David Jones on April 14, 2026 at 2:44 pm
Hackers have primarily targeted SonicWall and Fortinet devices, according to researchers.
- AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraudby info@thehackernews.com (The Hacker News) on April 14, 2026 at 2:30 pm
Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories into Google’s Discover feed and trick users into enabling persistent browser notifications that lead to scareware and financial scams. The campaign, which has been
- FCC signals continued commitment to Cyber Trust Mark programby Eric Geller on April 14, 2026 at 2:24 pm
The government approved a new lead overseer for its IoT device security labeling initiative.
- Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Adsby info@thehackernews.com (The Hacker News) on April 14, 2026 at 10:20 am
A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta. “Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real
- Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)by info@thehackernews.com (The Hacker News) on April 14, 2026 at 10:00 am
OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by nearly 400%. The surge in AI-assisted development is creating a “velocity gap” where the density of high-impact vulnerabilities is scaling faster than
- 108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Usersby info@thehackernews.com (The Hacker News) on April 14, 2026 at 8:35 am
Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited. According to Socket, the extensions (complete list
- ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Serversby info@thehackernews.com (The Hacker News) on April 14, 2026 at 5:50 am
A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0. It relates to a case of unrestricted file upload that stems from improper validation of
- CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Softwareby info@thehackernews.com (The Hacker News) on April 14, 2026 at 5:39 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2026-21643 (CVSS score: 9.1) – An SQL injection vulnerability in Fortinet FortiClient EMS that could allow an
- Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loadsby Matthew Andriani on April 13, 2026 at 9:48 pm
Security teams can’t test distributed denial-of-service defenses in a vacuum. They need to test during periods of high demand, such as tax-filing deadlines.
- CSA: CISOs Should Prepare for Post-Mythos Exploit Stormby Alexander Culafi on April 13, 2026 at 9:29 pm
In a new report from the Cloud Security Alliance (CSA), experts warn of an “AI vulnerability storm” triggered by the introduction of Anthropic’s Claude Mythos.
- Adobe Patches Actively Exploited Zero-Day That Lingered for Monthsby Jai Vijayan on April 13, 2026 at 8:52 pm
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.
- Empty Attestations: OT Lacks the Tools for Cryptographic Readinessby Brad McInnis on April 13, 2026 at 7:10 pm
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.
- JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025by info@thehackernews.com (The Hacker News) on April 13, 2026 at 5:15 pm
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated with specific financial entities, as well as track mouse inputs, log keystrokes, take screenshots, and collect system metadata. “One of the
- CISOs see gaps in their incident response playbooksby David Jones on April 13, 2026 at 3:18 pm
A survey by Sygnia reveals that senior-level security leaders fear they are not prepared to respond to the next cyberattack.
- APT41 Delivers ‘Zero-Detection’ Backdoor to Harvest Cloud Credentialsby Elizabeth Montalbano on April 13, 2026 at 3:08 pm
The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.
- FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attemptsby info@thehackernews.com (The Hacker News) on April 13, 2026 at 2:46 pm
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims’ account credentials and attempt more than $20 million in fraud. In tandem, authorities detained the alleged developer, who has&
- ⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and Moreby info@thehackernews.com (The Hacker News) on April 13, 2026 at 1:01 pm
Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It is one of those mornings where the gap between a quiet shift and a full-blown incident response is basically
- Your MTTD Looks Great. Your Post-Alert Gap Doesn’tby info@thehackernews.com (The Hacker News) on April 13, 2026 at 11:41 am
Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks’ Wendi Whitmore warned that similar capabilities are weeks or months from proliferation. CrowdStrike’s 2026 Global Threat Report puts average eCrime breakout time at 29 minutes. Mandiant’s M-Trends
- North Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malwareby info@thehackernews.com (The Hacker News) on April 13, 2026 at 9:15 am
The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan called RokRAT. “The threat actor used two Facebook
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incidentby info@thehackernews.com (The Hacker News) on April 13, 2026 at 6:50 am
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised. “Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps,” OpenAI said in a post last week. “We found no
- CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloadsby info@thehackernews.com (The Hacker News) on April 12, 2026 at 5:54 am
Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT. The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with
- Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621by info@thehackernews.com (The Hacker News) on April 12, 2026 at 4:25 am
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations. It has been described as
- Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Databy info@thehackernews.com (The Hacker News) on April 11, 2026 at 6:02 am
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023
- Hims Breach Exposes the Most Sensitive Kinds of PHIby Nate Nelson on April 10, 2026 at 8:02 pm
Threat actors breached the telehealth brand, and now they may know patients’ personal health details. What could they do with that information?
- Your Next Breach Will Look Like Business as Usualby Jeanette Miller-Osborn on April 10, 2026 at 7:21 pm
These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.
- FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threatson April 10, 2026 at 3:52 pm
- Orange Business Reimagines Enterprise Voice Communications With Trust and AIon April 10, 2026 at 3:05 pm
- Industrial Controllers Still Vulnerable As Conflicts Move to Cyberby Robert Lemos on April 10, 2026 at 1:30 pm
The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.