SecurityWeek Apr 21, 2026, 11:19 AM (UTC)
Read
CISA expanded the KEV catalog with eight flaws, but five of them have been flagged as exploited before. The post Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities appeared first on SecurityWeek.
BleepingComputer Apr 21, 2026, 11:17 AM (UTC)
Read
Nonprofit security organization Shadowserver found that over 6,400 Apache ActiveMQ servers exposed online are vulnerable to ongoing attacks exploiting a high-severity code injection vulnerability. [...]
SecurityWeek Apr 21, 2026, 11:02 AM (UTC)
Read
Data breaches were disclosed by Southern Illinois Dermatology, Saint Anthony Hospital, and North Texas Behavioral Health Authority. The post Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000 appeared first on SecurityWeek.
BleepingComputer Apr 21, 2026, 10:12 AM (UTC)
Read
41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023. [...]
SecurityWeek Apr 21, 2026, 10:02 AM (UTC)
Read
The hackers targeted LayerZero’s DVN, compromising certain RPCs and DDoSing others to trigger failover to the poisoned infrastructure. The post $290 Million Kelp DAO Crypto Heist Blamed on North Korea appeared first on SecurityWeek.
Infosecurity Magazine Apr 21, 2026, 09:10 AM (UTC)
Read
Cloud app developer Vercel appears to have suffered a security breach
BleepingComputer Apr 21, 2026, 09:00 AM (UTC)
Read
A new variant of the NGate malware that steals NFC payment data is targeting Android users by hiding in a trojanized version of HandyPay, a legitimate mobile payments processing tool. [...]
Infosecurity Magazine Apr 21, 2026, 08:30 AM (UTC)
Read
North Korea’s Lazarus Group is pegged for a $290m crypto theft at KelpDAO
The Hacker News Apr 21, 2026, 06:23 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitati…
BleepingComputer Apr 20, 2026, 10:23 PM (UTC)
Read
State-sponsored North Korean hackers are likely behind the $290 million crypto-heist that impacted the KelpDAO DeFi project on Saturday. [...]
BleepingComputer Apr 20, 2026, 09:52 PM (UTC)
Read
A set of 26 malicious apps on Apple App Store impersonate popular wallets, such as Metamask, Coinbase, Trust Wallet, and OneKey, to steal recovery or seed phrases and drain them of cryptocurrency assets. [...]
BleepingComputer Apr 20, 2026, 08:02 PM (UTC)
Read
A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate. [...]
BleepingComputer Apr 20, 2026, 06:22 PM (UTC)
Read
The Seiko USA website was defaced over the weekend, displaying a message from attackers claiming they stole its Shopify customer database and threatening to leak it unless a ransom is paid. [...]
The Hacker News Apr 20, 2026, 05:14 PM (UTC)
Read
A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems. The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been desc…
Infosecurity Magazine Apr 20, 2026, 04:00 PM (UTC)
Read
ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities
SecurityWeek Apr 20, 2026, 03:42 PM (UTC)
Read
Forescout researchers discovered 20 new vulnerabilities in Lantronix and Silex products and described theoretical attack scenarios. The post Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking appeared first on SecurityWeek.
BleepingComputer Apr 20, 2026, 03:11 PM (UTC)
Read
Microsoft is warning of threat actors increasingly abusing external Microsoft Teams collaboration and relying on legitimate tools for access and lateral movement on enterprise networks. [...]
Infosecurity Magazine Apr 20, 2026, 03:01 PM (UTC)
Read
Formbook attacks use combination of DLL Side-Loading and Obfuscated JavaScript to stay hidden, researchers at WatchGuard have uncovered
BleepingComputer Apr 20, 2026, 02:01 PM (UTC)
Read
Backups protect data, but don't keep your business running during downtime. Datto shows why BCDR is essential to keep operations running during ransomware and outages. [...]
The Hacker News Apr 20, 2026, 01:41 PM (UTC)
Read
Monday’s recap shows the same pattern in different places. A third-party tool becomes a way in, then leads to internal access. A trusted download path is briefly swapped to deliver malware. Browser extensions act normally while pulling data and running code. E…
BleepingComputer Apr 20, 2026, 01:33 PM (UTC)
Read
A British man, believed to be the leader of the Scattered Spider cybercrime collective, has pleaded guilty in the United States to charges of wire fraud and aggravated identity theft. [...]
Infosecurity Magazine Apr 20, 2026, 01:01 PM (UTC)
Read
FortiGuard Labs has identified a Mirai-based Nexcorium campaign actively exploiting CVE-2024-3721 in TBK DVR devices
SecurityWeek Apr 20, 2026, 12:21 PM (UTC)
Read
Tyler Buchanan admitted in court to hacking into various companies, defrauding them, and stealing cryptocurrency from multiple individuals. The post British Scattered Spider Hacker Pleads Guilty in the US appeared first on SecurityWeek.
Cybersecurity Ventures Apr 20, 2026, 12:16 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 20, 2026 – Listen to the podcast The Cybercrime Magazine Podcast tops Million Podcast’s curated list of the best 60 cybercrime podcasts to listen to in 2026. These podc…
BleepingComputer Apr 20, 2026, 12:04 PM (UTC)
Read
Microsoft is rolling out multiple File Explorer changes to Windows 11 users in the Insider program, including improvements to launch speed and performance. [...]
SecurityWeek Apr 20, 2026, 11:35 AM (UTC)
Read
The machine emulator has been abused in at least two different campaigns distributing ransomware and remote access tools. The post Hackers Abuse QEMU for Defense Evasion appeared first on SecurityWeek.
The Hacker News Apr 20, 2026, 11:30 AM (UTC)
Read
The fastest way to fall in love with an AI tool is to watch the demo. Everything moves quickly. Prompts land cleanly. The system produces impressive outputs in seconds. It feels like the beginning of a new era for your team. But most AI initiatives don't fail…
SecurityWeek Apr 20, 2026, 11:06 AM (UTC)
Read
A pro-Iran hacker group has taken credit for the attack on Bluesky, which appears to have lasted 24 hours. The post Bluesky Disrupted by Sophisticated DDoS Attack appeared first on SecurityWeek.
The Hacker News Apr 20, 2026, 10:42 AM (UTC)
Read
Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture that could pave the way for remote code execution and have a cascading effect on the artificial intelligence (AI) supply chain. "This f…
SecurityWeek Apr 20, 2026, 10:32 AM (UTC)
Read
The Senate approved a short-term renewal until April 30 of a controversial surveillance program used by U.S. spy agencies. The post Senate Extends Surveillance Powers Until April 30 After Chaotic Votes in House appeared first on SecurityWeek.
SecurityWeek Apr 20, 2026, 09:41 AM (UTC)
Read
The continued use of the half-century-old protocol exposes enterprises and end users to various types of attacks. The post Half of the 6 Million Internet-Facing FTP Servers Lack Encryption appeared first on SecurityWeek.
BleepingComputer Apr 20, 2026, 09:40 AM (UTC)
Read
Microsoft has reverted a recent service update that was preventing some customers from launching the Microsoft Teams desktop client. [...]
Infosecurity Magazine Apr 20, 2026, 09:30 AM (UTC)
Read
The National Cyber Security Centre has shared an update of its resilience-building efforts for the NHS
Infosecurity Magazine Apr 20, 2026, 09:00 AM (UTC)
Read
Russian crypto-exchange Grinex claims Western intelligence agencies were behind a $13m heist
BleepingComputer Apr 20, 2026, 08:30 AM (UTC)
Read
Microsoft has released out-of-band (OOB) updates to fix issues affecting Windows Server systems after installing the April 2026 security updates. [...]
SecurityWeek Apr 20, 2026, 08:30 AM (UTC)
Read
Vercel confirmed suffering a breach after a hacker claiming to be part of ShinyHunters offered to sell stolen data for $2 million. The post Next.js Creator Vercel Hacked appeared first on SecurityWeek.
The Hacker News Apr 20, 2026, 07:34 AM (UTC)
Read
Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target Israeli water treatment and desalination systems. The malware has been codenamed ZionSiphon by Darktrace, highlighting its ability to set…
The Hacker News Apr 20, 2026, 03:35 AM (UTC)
Read
Web infrastructure provider Vercel has disclosed a security breach that allows bad actors to gain unauthorized access to "certain" internal Vercel systems. The incident stemmed from the compromise of Context.ai, a third-party artificial intelligence (AI) tool,…
BleepingComputer Apr 19, 2026, 05:32 PM (UTC)
Read
Cloud development platform Vercel has disclosed a security incident after threat actors claimed to have breached its systems and are attempting to sell stolen data. [...]
BleepingComputer Apr 19, 2026, 04:03 PM (UTC)
Read
Apple account change notifications are being abused to send fake iPhone purchase phishing scams within legitimate emails sent from Apple's servers, increasing legitimacy and potentially allowing them to bypass spam filters. [...]
The Hacker News Apr 18, 2026, 08:07 AM (UTC)
Read
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials:…
The Hacker News Apr 18, 2026, 07:59 AM (UTC)
Read
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The exchange said it fell victim to what it descri…
The Hacker News Apr 18, 2026, 06:01 AM (UTC)
Read
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting…
Cybersecurity Ventures Apr 17, 2026, 01:35 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 17, 2026 – Listen to the podcast episode Kerem Albayrak from north London threatened to wipe 319 million accounts unless Apple gave him iTunes gift cards worth $100,000…
The Hacker News Apr 17, 2026, 01:21 PM (UTC)
Read
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHamme…
Infosecurity Magazine Apr 17, 2026, 01:20 PM (UTC)
Read
AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds
Infosecurity Magazine Apr 17, 2026, 11:30 AM (UTC)
Read
Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users
The Hacker News Apr 17, 2026, 10:47 AM (UTC)
Read
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy upd…
The Hacker News Apr 17, 2026, 07:14 AM (UTC)
Read
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain…
The Hacker News Apr 17, 2026, 05:46 AM (UTC)
Read
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation…
The Hacker News Apr 17, 2026, 03:22 AM (UTC)
Read
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CV…
The Hacker News Apr 16, 2026, 05:52 PM (UTC)
Read
Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized command-and-control (C2) bea…
Infosecurity Magazine Apr 16, 2026, 04:00 PM (UTC)
Read
US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms
Infosecurity Magazine Apr 16, 2026, 03:45 PM (UTC)
Read
APK malformation tactic now appears in over 3000 Android malware samples evading static analysis
Infosecurity Magazine Apr 16, 2026, 03:01 PM (UTC)
Read
Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data
The Hacker News Apr 16, 2026, 01:05 PM (UTC)
Read
You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow s…
Infosecurity Magazine Apr 16, 2026, 12:43 PM (UTC)
Read
NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs
The Hacker News Apr 16, 2026, 11:27 AM (UTC)
Read
Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilitie…
The Hacker News Apr 16, 2026, 10:20 AM (UTC)
Read
A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting indivi…
Infosecurity Magazine Apr 16, 2026, 09:40 AM (UTC)
Read
Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability
Infosecurity Magazine Apr 16, 2026, 08:35 AM (UTC)
Read
Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers
The Hacker News Apr 16, 2026, 06:20 AM (UTC)
Read
The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive da…
Cybersecurity Ventures Apr 15, 2026, 07:07 PM (UTC)
Read
New automation and AI-driven triage capabilities dramatically reduce alert noise and accelerate investigations for modern security teams San Jose, Calif. – Apr. 16, 2026 As security operations teams struggle to keep pace with escalating alert volumes and incre…
The Hacker News Apr 15, 2026, 05:09 PM (UTC)
Read
Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. "By leverag…
Infosecurity Magazine Apr 15, 2026, 04:00 PM (UTC)
Read
OpenAI’s new frontier model focused on cybersecurity comes following Anthropic’s launch of Claude Mythos Preview and Project Glasswing
Infosecurity Magazine Apr 15, 2026, 03:31 PM (UTC)
Read
The EU cybersecurity agency looks to become the third Top-Level Root CVE Numbering Authority, alongside CISA and MITRE
Infosecurity Magazine Apr 15, 2026, 02:40 PM (UTC)
Read
Huntress uncovers adware deploying AV-killing payloads via signed updates across 23,000 endpoints
Infosecurity Magazine Apr 15, 2026, 01:00 PM (UTC)
Read
Critical nginx-ui MCP authentication bypass CVE-2026-33032 actively exploited with CVSS 9.8
The Hacker News Apr 15, 2026, 12:56 PM (UTC)
Read
A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnera…
Cybersecurity Ventures Apr 15, 2026, 12:43 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 15, 2026 – Read the full story from RSAC The top line on chief information security officer pay packages in 2026 is that CISOs are earning more than ever, writes Steve…
The Hacker News Apr 15, 2026, 12:37 PM (UTC)
Read
A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April's Patch Tuesday releases. Topping the list is an SQL injection vulnerability impacting SAP Business Planning and Consolidation and…
The Hacker News Apr 15, 2026, 11:30 AM (UTC)
Read
Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations to adopt it across operatio…
Infosecurity Magazine Apr 15, 2026, 10:30 AM (UTC)
Read
At VulnCon, Lindsey Cerkovnik, head of vulnerability management at CISA, said AI companies should play a bigger role in vulnerability disclosures in the future
Infosecurity Magazine Apr 15, 2026, 09:45 AM (UTC)
Read
Barracuda says 88% of brute-force attempts in Q1 were from the region
Infosecurity Magazine Apr 15, 2026, 09:10 AM (UTC)
Read
Microsoft has patched two zero-day flaws and over 160 others
The Hacker News Apr 15, 2026, 08:40 AM (UTC)
Read
Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169 vulnerabilities, 157 are rated Important, eight are rated Critical…
The Hacker News Apr 15, 2026, 04:30 AM (UTC)
Read
OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that's specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model, Mythos. "The progressive use of AI accel…
Krebs on Security Apr 14, 2026, 09:47 PM (UTC)
Read
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed "BlueHammer." Se…
The Hacker News Apr 14, 2026, 03:57 PM (UTC)
Read
Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been described as command injection flaws affecting th…
The Hacker News Apr 14, 2026, 02:56 PM (UTC)
Read
Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel devices and push memory-safe code at a more foundational level. "The new Rust-based DNS…
The Hacker News Apr 14, 2026, 02:30 PM (UTC)
Read
Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories into Google's Discover feed and trick use…
Infosecurity Magazine Apr 14, 2026, 01:00 PM (UTC)
Read
A new IANS report claims just 34% of cybersecurity professionals plan to stay put in the next 12 months
Cybersecurity Ventures Apr 14, 2026, 12:51 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 14, 2026 – Read the full story in Time For the past few years, it’s escaped no one that levels of Internet and telephone fraud have skyrocketed. TIME reports that one i…
Infosecurity Magazine Apr 14, 2026, 12:00 PM (UTC)
Read
Triad Nexus scales $200m scams, uses infrastructure laundering, localized fraud and US-access blocks
Infosecurity Magazine Apr 14, 2026, 11:30 AM (UTC)
Read
108 malicious Chrome extensions steal sessions, Google data, inject ads via single C2 infrastructure
The Hacker News Apr 14, 2026, 10:20 AM (UTC)
Read
A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta. "Mirax integr…
The Hacker News Apr 14, 2026, 10:00 AM (UTC)
Read
OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by nearly 400%. The surge in AI-assisted developm…
Infosecurity Magazine Apr 14, 2026, 09:30 AM (UTC)
Read
The AISI has issued its judgement on Anthropic’s Mythos Preview model
The Hacker News Apr 14, 2026, 08:35 AM (UTC)
Read
Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abu…
The Hacker News Apr 14, 2026, 05:50 AM (UTC)
Read
A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS sc…
The Hacker News Apr 14, 2026, 05:39 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2026-2164…
The Hacker News Apr 13, 2026, 05:15 PM (UTC)
Read
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated wit…
Infosecurity Magazine Apr 13, 2026, 03:00 PM (UTC)
Read
Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn
The Hacker News Apr 13, 2026, 02:46 PM (UTC)
Read
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims'…
Infosecurity Magazine Apr 13, 2026, 02:30 PM (UTC)
Read
Security researchers warn of Mirax, an emerging Android banking trojan using MaaS, remote access and residential proxies to target European users
The Hacker News Apr 13, 2026, 01:01 PM (UTC)
Read
Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming t…
Cybersecurity Ventures Apr 13, 2026, 12:31 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 13, 2026 – Read the full story in Barron’s Cybersecurity stocks could be set for a massive boost from risks tied to Anthropic’s latest advances in artificial intelligen…
The Hacker News Apr 13, 2026, 11:41 AM (UTC)
Read
Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that similar capabilities are weeks or months from…
Infosecurity Magazine Apr 13, 2026, 10:35 AM (UTC)
Read
The W3LL phishing kit has been associated with fraud attempts totaling $20m
The Hacker News Apr 13, 2026, 09:15 AM (UTC)
Read
The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the tr…
Infosecurity Magazine Apr 13, 2026, 09:15 AM (UTC)
Read
The UK Cyber Security Council has unveiled a new Associate Cyber Security Professional title aimed at supporting early‑career cybersecurity professionals
Infosecurity Magazine Apr 13, 2026, 08:00 AM (UTC)
Read
UK, US and Canadian authorities have identified over 20,000 victims of approval phishing scams that trick users into handing over full crypto wallet access
The Hacker News Apr 13, 2026, 06:50 AM (UTC)
Read
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised. "Out of an abundance of caution, we are taking steps to protec…
The Hacker News Apr 12, 2026, 05:54 AM (UTC)
Read
Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote ac…
The Hacker News Apr 12, 2026, 04:25 AM (UTC)
Read
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful explo…
The Hacker News Apr 11, 2026, 06:02 AM (UTC)
Read
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by…
The Hacker News Apr 10, 2026, 01:23 PM (UTC)
Read
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine. The technique has been…
Cybersecurity Ventures Apr 10, 2026, 12:54 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 10, 2026 – Read the full story in BusinessWorld Cybercrime operates like a legitimate, profit-driven economy, writes Subhalakshmi Ganapathy, chief IT security evangelis…
Infosecurity Magazine Apr 10, 2026, 12:00 PM (UTC)
Read
Qilin, Akira and Dragonforce were responsible for 40% of 672 ransomware incidents reported in March, says Check Point
Infosecurity Magazine Apr 10, 2026, 11:25 AM (UTC)
Read
Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie
The Hacker News Apr 10, 2026, 11:00 AM (UTC)
Read
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extens…
The Hacker News Apr 10, 2026, 07:58 AM (UTC)
Read
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome…
The Hacker News Apr 10, 2026, 07:37 AM (UTC)
Read
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score:…
The Hacker News Apr 10, 2026, 06:28 AM (UTC)
Read
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security co…
The Hacker News Apr 9, 2026, 05:26 PM (UTC)
Read
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. "This flaw allows apps on the same dev…
The Hacker News Apr 9, 2026, 04:23 PM (UTC)
Read
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. "LucidRook is a s…
Infosecurity Magazine Apr 9, 2026, 03:00 PM (UTC)
Read
STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods
Infosecurity Magazine Apr 9, 2026, 02:01 PM (UTC)
Read
Bitcoin Depot has disclosed a cyber-attack that led to the theft of more than 50 Bitcoin, worth $3.66m, after hackers accessed its internal systems
Cybersecurity Ventures Apr 9, 2026, 01:21 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 9, 2026 – Read the full story in Illumio “Gartner says we are all going to spend $240 billion USD (on cybersecurity this year), but Cybersecurity Ventures says that cyb…
Infosecurity Magazine Apr 9, 2026, 11:20 AM (UTC)
Read
macOS 26.4 update introduced security warnings into Terminal to prevent ClickFix attacks, so attackers have shifted to Script Editor instead
Infosecurity Magazine Apr 9, 2026, 10:45 AM (UTC)
Read
A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group
Infosecurity Magazine Apr 9, 2026, 10:00 AM (UTC)
Read
SANS Institute reveals that AI agents are behind a 76% surge in non-human identities
Infosecurity Magazine Apr 9, 2026, 08:35 AM (UTC)
Read
Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises
Infosecurity Magazine Apr 8, 2026, 04:00 PM (UTC)
Read
Google API key flaw exposes mobile apps to Gemini AI access, private files and billing risks
Infosecurity Magazine Apr 8, 2026, 03:10 PM (UTC)
Read
Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.27 immediately
Cybersecurity Ventures Apr 8, 2026, 12:57 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 8, 2026 – Watch the YouTube video Why did Cybercrime Magazine meet up with Charlie Thomas, CEO at Mitiga, at RSAC Conference 2026? Because attackers will get in. Cloud,…
Infosecurity Magazine Apr 8, 2026, 11:30 AM (UTC)
Read
Anthropic launches Project Glasswing, using its Claude Mythos Preview AI to autonomously identify and fix undiscovered vulnerabilities in critical software
Infosecurity Magazine Apr 8, 2026, 10:03 AM (UTC)
Read
The FBI deployed a method to unplug US-based routers compromised by APT28 from the threat actor’s malicious network
Infosecurity Magazine Apr 8, 2026, 09:15 AM (UTC)
Read
Anthropic’s Claude AI has helped researchers find a vulnerability in Apache ActiveMQ Classic
Infosecurity Magazine Apr 8, 2026, 08:15 AM (UTC)
Read
CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms
Krebs on Security Apr 7, 2026, 05:02 PM (UTC)
Read
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to…
Infosecurity Magazine Apr 7, 2026, 03:30 PM (UTC)
Read
Newly identified malicious campaigns are linked to virtual private servers modified by APT28 to operate as malicious DNS servers
Infosecurity Magazine Apr 7, 2026, 03:05 PM (UTC)
Read
GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root
Infosecurity Magazine Apr 7, 2026, 02:00 PM (UTC)
Read
GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data
Cybersecurity Ventures Apr 7, 2026, 12:47 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 7, 2026 – Listen to the podcast SoundCloud knows music… and cybersecurity. Late last year, the giant music streaming and sharing platform suffered a data breach that re…
Infosecurity Magazine Apr 7, 2026, 12:00 PM (UTC)
Read
Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI