SecurityWeek Apr 14, 2026, 09:35 AM (UTC)
Read
The company said in an SEC filing that an IDOR vulnerability affecting RCI Internet Services exposed contractor data. The post Nightclub Giant RCI Hospitality Reports Data Breach appeared first on SecurityWeek.
SecurityWeek Apr 14, 2026, 08:57 AM (UTC)
Read
The security defects allow attackers to escalate privileges and execute arbitrary code remotely. The post Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities appeared first on SecurityWeek.
The Hacker News Apr 14, 2026, 08:35 AM (UTC)
Read
Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abu…
The Hacker News Apr 14, 2026, 05:50 AM (UTC)
Read
A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS sc…
The Hacker News Apr 14, 2026, 05:39 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2026-2164…
BleepingComputer Apr 13, 2026, 09:50 PM (UTC)
Read
Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers. [...]
BleepingComputer Apr 13, 2026, 08:08 PM (UTC)
Read
Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking the stolen data on its data leak site. [...]
BleepingComputer Apr 13, 2026, 07:56 PM (UTC)
Read
A critical vulnerability in the wolfSSL SSL/TLS library can weaken security via improper verification of the hash algorithm or its size when checking Elliptic Curve Digital Signature Algorithm (ECDSA) signatures. [...]
BleepingComputer Apr 13, 2026, 06:55 PM (UTC)
Read
The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arresting the alleged developer in what is described as the first coordinated enforcement action between the United States a…
BleepingComputer Apr 13, 2026, 05:39 PM (UTC)
Read
OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package during a recent supply chain attack. [...]
BleepingComputer Apr 13, 2026, 05:30 PM (UTC)
Read
Booking.com has confirmed via a statement to BleepingComputer that it has detected unauthorized access to its systems that has exposed sensitive reservation and user data. [...]
The Hacker News Apr 13, 2026, 05:15 PM (UTC)
Read
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated wit…
BleepingComputer Apr 13, 2026, 03:37 PM (UTC)
Read
Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in zero-day attacks since at least December. [...]
Infosecurity Magazine Apr 13, 2026, 03:00 PM (UTC)
Read
Attackers are abusing Microsoft 365 mailbox rules to hide activity, exfiltrate data and retain access after account compromise, researchers warn
The Hacker News Apr 13, 2026, 02:46 PM (UTC)
Read
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims'…
Infosecurity Magazine Apr 13, 2026, 02:30 PM (UTC)
Read
Security researchers warn of Mirax, an emerging Android banking trojan using MaaS, remote access and residential proxies to target European users
SecurityWeek Apr 13, 2026, 02:25 PM (UTC)
Read
The online travel platform has not said how many customers’ booking information was exposed, but said the issue has been contained. The post Booking.com Says Hackers Accessed User Information appeared first on SecurityWeek.
BleepingComputer Apr 13, 2026, 02:05 PM (UTC)
Read
New "Storm" infostealer skips local decryption, sending browser data to attacker servers. Varonis shows how server-side decryption enables session hijacking, bypassing passwords and MFA. [...]
SecurityWeek Apr 13, 2026, 02:00 PM (UTC)
Read
Claims that “Microsoft is running one of the largest corporate espionage operations in modern history” face scrutiny as researchers analyze LinkedIn’s browser extension probing The post BrowserGate: Claims of LinkedIn ‘Spying’ Clash With Security Research Find…
The Hacker News Apr 13, 2026, 01:01 PM (UTC)
Read
Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming t…
SecurityWeek Apr 13, 2026, 12:34 PM (UTC)
Read
The AI giant is taking action after determining that a macOS code signing certificate may have been compromised. The post OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack appeared first on SecurityWeek.
Cybersecurity Ventures Apr 13, 2026, 12:31 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 13, 2026 – Read the full story in Barron’s Cybersecurity stocks could be set for a massive boost from risks tied to Anthropic’s latest advances in artificial intelligen…
The Hacker News Apr 13, 2026, 11:41 AM (UTC)
Read
Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that similar capabilities are weeks or months from…
SecurityWeek Apr 13, 2026, 11:34 AM (UTC)
Read
Law enforcement in the US, UK and Canada identified more than $45 million in cryptocurrency and froze $12 million. The post International Operation Targets Multimillion-Dollar Crypto Theft Schemes appeared first on SecurityWeek.
SecurityWeek Apr 13, 2026, 10:52 AM (UTC)
Read
Download links were replaced by a Russian-speaking threat actor to distribute a recently emerged malware named STX RAT. The post CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads appeared first on SecurityWeek.
Infosecurity Magazine Apr 13, 2026, 10:35 AM (UTC)
Read
The W3LL phishing kit has been associated with fraud attempts totaling $20m
SecurityWeek Apr 13, 2026, 09:52 AM (UTC)
Read
The malware mimics the legitimate Anthropic installation, relies on DLL sideloading, and cleans up after itself. The post Fake Claude Website Distributes PlugX RAT appeared first on SecurityWeek.
The Hacker News Apr 13, 2026, 09:15 AM (UTC)
Read
The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the tr…
Infosecurity Magazine Apr 13, 2026, 09:15 AM (UTC)
Read
The UK Cyber Security Council has unveiled a new Associate Cyber Security Professional title aimed at supporting early‑career cybersecurity professionals
SecurityWeek Apr 13, 2026, 08:31 AM (UTC)
Read
The feature allows enterprise users to compose and read end-to-end encrypted messages natively on their mobile devices. The post Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users appeared first on SecurityWeek.
Infosecurity Magazine Apr 13, 2026, 08:00 AM (UTC)
Read
UK, US and Canadian authorities have identified over 20,000 victims of approval phishing scams that trick users into handing over full crypto wallet access
The Hacker News Apr 13, 2026, 06:50 AM (UTC)
Read
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised. "Out of an abundance of caution, we are taking steps to protec…
BleepingComputer Apr 12, 2026, 02:20 PM (UTC)
Read
A critical pre-authentication remote code execution (RCE) vulnerability in Marimo is now under active exploitation, leveraged for credential theft. [...]
SecurityWeek Apr 12, 2026, 07:45 AM (UTC)
Read
The vulnerability is tracked as CVE-2026-34621 and Adobe has confirmed that it can be exploited for arbitrary code execution. The post Adobe Patches Reader Zero-Day Exploited for Months appeared first on SecurityWeek.
The Hacker News Apr 12, 2026, 05:54 AM (UTC)
Read
Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote ac…
The Hacker News Apr 12, 2026, 04:25 AM (UTC)
Read
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful explo…
BleepingComputer Apr 11, 2026, 02:20 PM (UTC)
Read
An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States. [...]
The Hacker News Apr 11, 2026, 06:02 AM (UTC)
Read
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by…
BleepingComputer Apr 11, 2026, 02:08 AM (UTC)
Read
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan. [...]
BleepingComputer Apr 10, 2026, 03:52 PM (UTC)
Read
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation. [...]
BleepingComputer Apr 10, 2026, 02:01 PM (UTC)
Read
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before defenders can patch them. [...]
The Hacker News Apr 10, 2026, 01:23 PM (UTC)
Read
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine. The technique has been…
BleepingComputer Apr 10, 2026, 01:12 PM (UTC)
Read
Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools. [...]
Cybersecurity Ventures Apr 10, 2026, 12:54 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 10, 2026 – Read the full story in BusinessWorld Cybercrime operates like a legitimate, profit-driven economy, writes Subhalakshmi Ganapathy, chief IT security evangelis…
Infosecurity Magazine Apr 10, 2026, 12:00 PM (UTC)
Read
Qilin, Akira and Dragonforce were responsible for 40% of 672 ransomware incidents reported in March, says Check Point
BleepingComputer Apr 10, 2026, 11:56 AM (UTC)
Read
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking their accounts in payroll pirate attacks. [...]
Infosecurity Magazine Apr 10, 2026, 11:25 AM (UTC)
Read
Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie
The Hacker News Apr 10, 2026, 11:00 AM (UTC)
Read
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extens…
The Hacker News Apr 10, 2026, 07:58 AM (UTC)
Read
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome…
The Hacker News Apr 10, 2026, 07:37 AM (UTC)
Read
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score:…
The Hacker News Apr 10, 2026, 06:28 AM (UTC)
Read
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security co…
The Hacker News Apr 9, 2026, 05:26 PM (UTC)
Read
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. "This flaw allows apps on the same dev…
The Hacker News Apr 9, 2026, 04:23 PM (UTC)
Read
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. "LucidRook is a s…
Infosecurity Magazine Apr 9, 2026, 03:00 PM (UTC)
Read
STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods
Infosecurity Magazine Apr 9, 2026, 02:01 PM (UTC)
Read
Bitcoin Depot has disclosed a cyber-attack that led to the theft of more than 50 Bitcoin, worth $3.66m, after hackers accessed its internal systems
Cybersecurity Ventures Apr 9, 2026, 01:21 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 9, 2026 – Read the full story in Illumio “Gartner says we are all going to spend $240 billion USD (on cybersecurity this year), but Cybersecurity Ventures says that cyb…
The Hacker News Apr 9, 2026, 12:57 PM (UTC)
Read
Thursday. Another week, another batch of things that probably should've been caught sooner but weren't. This one's got some range — old vulnerabilities getting new life, a few "why was that even possible" moments, attackers leaning on platforms and tools you'd…
The Hacker News Apr 9, 2026, 11:31 AM (UTC)
Read
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of securi…
Infosecurity Magazine Apr 9, 2026, 11:20 AM (UTC)
Read
macOS 26.4 update introduced security warnings into Terminal to prevent ClickFix attacks, so attackers have shifted to Script Editor instead
The Hacker News Apr 9, 2026, 11:15 AM (UTC)
Read
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophisticated PDF e…
Infosecurity Magazine Apr 9, 2026, 10:45 AM (UTC)
Read
A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group
The Hacker News Apr 9, 2026, 10:40 AM (UTC)
Read
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access No…
Infosecurity Magazine Apr 9, 2026, 10:00 AM (UTC)
Read
SANS Institute reveals that AI agents are behind a 76% surge in non-human identities
Infosecurity Magazine Apr 9, 2026, 08:35 AM (UTC)
Read
Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises
The Hacker News Apr 8, 2026, 05:51 PM (UTC)
Read
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure. "Chaos malware is increasingly targeting misconfigured cloud dep…
The Hacker News Apr 8, 2026, 04:30 PM (UTC)
Read
Cybersecurity researchers have lifted the curtain on a stealthy botnet that's designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It'…
Infosecurity Magazine Apr 8, 2026, 04:00 PM (UTC)
Read
Google API key flaw exposes mobile apps to Gemini AI access, private files and billing risks
Infosecurity Magazine Apr 8, 2026, 03:10 PM (UTC)
Read
Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.27 immediately
The Hacker News Apr 8, 2026, 01:50 PM (UTC)
Read
The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. "PRISMEX combines advanced ste…
Cybersecurity Ventures Apr 8, 2026, 12:57 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 8, 2026 – Watch the YouTube video Why did Cybercrime Magazine meet up with Charlie Thomas, CEO at Mitiga, at RSAC Conference 2026? Because attackers will get in. Cloud,…
The Hacker News Apr 8, 2026, 11:30 AM (UTC)
Read
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous system…
Infosecurity Magazine Apr 8, 2026, 11:30 AM (UTC)
Read
Anthropic launches Project Glasswing, using its Claude Mythos Preview AI to autonomously identify and fix undiscovered vulnerabilities in critical software
Infosecurity Magazine Apr 8, 2026, 10:03 AM (UTC)
Read
The FBI deployed a method to unplug US-based routers compromised by APT28 from the threat actor’s malicious network
The Hacker News Apr 8, 2026, 09:16 AM (UTC)
Read
Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities. The model will be used by a…
Infosecurity Magazine Apr 8, 2026, 09:15 AM (UTC)
Read
Anthropic’s Claude AI has helped researchers find a vulnerability in Apache ActiveMQ Classic
Infosecurity Magazine Apr 8, 2026, 08:15 AM (UTC)
Read
CISA has revealed Iranian attacks causing disruption and financial loss at US critical infrastructure firms
The Hacker News Apr 8, 2026, 07:47 AM (UTC)
Read
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. "The threat actor's packages were designed to impersonate legitimate developer toolin…
The Hacker News Apr 8, 2026, 04:23 AM (UTC)
Read
Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. "These attacks…
Krebs on Security Apr 7, 2026, 05:02 PM (UTC)
Read
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to…
The Hacker News Apr 7, 2026, 04:48 PM (UTC)
Read
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part…
The Hacker News Apr 7, 2026, 04:29 PM (UTC)
Read
In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet the risk is actually increasing. According to new research from the Ponemon Institute, hundreds of applic…
Infosecurity Magazine Apr 7, 2026, 03:30 PM (UTC)
Read
Newly identified malicious campaigns are linked to virtual private servers modified by APT28 to operate as malicious DNS servers
The Hacker News Apr 7, 2026, 03:15 PM (UTC)
Read
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incompl…
Infosecurity Magazine Apr 7, 2026, 03:05 PM (UTC)
Read
GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root
Infosecurity Magazine Apr 7, 2026, 02:00 PM (UTC)
Read
GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data
Cybersecurity Ventures Apr 7, 2026, 12:47 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 7, 2026 – Listen to the podcast SoundCloud knows music… and cybersecurity. Late last year, the giant music streaming and sharing platform suffered a data breach that re…
The Hacker News Apr 7, 2026, 12:46 PM (UTC)
Read
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. "A purpose-built Python scanner continuously sweeps major cloud IP ran…
Infosecurity Magazine Apr 7, 2026, 12:00 PM (UTC)
Read
Cryptocurrency scams alone cost victims over $7 billion, while AI-enabled fraud threats are on the rise, says FBI
The Hacker News Apr 7, 2026, 11:30 AM (UTC)
Read
When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the average cost of a breach at $4.4 million. Avoiding even one major incident is enough to justify most se…
Infosecurity Magazine Apr 7, 2026, 10:02 AM (UTC)
Read
Microsoft has released a new report about the Storm-1175 group and its connection to Medusa ransomware
Infosecurity Magazine Apr 7, 2026, 09:26 AM (UTC)
Read
Fortinet has updated its FortiClient EMS product after zero-day attacks surfaced
The Hacker News Apr 7, 2026, 08:38 AM (UTC)
Read
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of a host. The efforts have been codenamed GPUBr…
The Hacker News Apr 7, 2026, 06:35 AM (UTC)
Read
A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate "high-velocity" attacks and break into susceptible internet-facing systems. "The threat…
The Hacker News Apr 7, 2026, 05:56 AM (UTC)
Read
Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulne…
The Hacker News Apr 6, 2026, 06:37 PM (UTC)
Read
An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East. The activity, assessed to be ongoing, was carried out in three distinct at…
The Hacker News Apr 6, 2026, 04:24 PM (UTC)
Read
Threat actors likely associated with the Democratic People's Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea. The attack chain, per Fortinet Forti…
The Hacker News Apr 6, 2026, 01:00 PM (UTC)
Read
Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux infrastructure, and mobile devices, taking advantage of the f…
The Hacker News Apr 6, 2026, 12:46 PM (UTC)
Read
This week had real hits. The key software got tampered with. Active bugs showed up in the tools people use every day. Some attacks didn’t even need much effort because the path was already there. One weak spot now spreads wider than before. What starts small c…
Cybersecurity Ventures Apr 6, 2026, 12:43 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 6, 2026 – Watch the YouTube video In 2021, Nicole Perlroth wrote “This Is How They Tell Me the World Ends: The Cyberweapons Arms Race“, a New York Times Bestseller. The…
The Hacker News Apr 6, 2026, 11:45 AM (UTC)
Read
The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are created, tested, cached, copied, and reused across services, bots, build tools, and now local AI agents. In March 2026, the Tea…
The Hacker News Apr 6, 2026, 10:07 AM (UTC)
Read
Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro…
The Hacker News Apr 6, 2026, 06:59 AM (UTC)
Read
Germany's Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identities of two of the key figures associated with the now-defunct REvil (aka Sodinokibi) ransomware-as-a-service (RaaS) operation. One of the threat actors, wh…
Krebs on Security Apr 6, 2026, 02:07 AM (UTC)
Read
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry o…
The Hacker News Apr 5, 2026, 06:25 PM (UTC)
Read
Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the Democratic People's Republic of Korea (DPRK) that bega…
The Hacker News Apr 5, 2026, 05:07 AM (UTC)
Read
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop…
The Hacker News Apr 5, 2026, 04:32 AM (UTC)
Read
Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS score: 9.1), has been described as a pre-authentication API access…
The Hacker News Apr 3, 2026, 05:34 PM (UTC)
Read
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a cluster of activity that overlaps w…
The Hacker News Apr 3, 2026, 03:32 PM (UTC)
Read
Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. "Instead of exposing command execut…
Cybersecurity Ventures Apr 3, 2026, 03:15 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 3, 2026 – Listen to the podcast Daniel Bernard, aka “DB”, Chief Business Officer at CrowdStrike, told Cybercrime Magazine that cybersecurity is a team sport, and that a…
Infosecurity Magazine Apr 3, 2026, 08:00 AM (UTC)
Read
A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom
Infosecurity Magazine Apr 2, 2026, 03:00 PM (UTC)
Read
This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls
Infosecurity Magazine Apr 2, 2026, 02:15 PM (UTC)
Read
The UK’s cybersecurity agency offered advice to “high-risk’ individuals” on how to protect against social engineering and cyber-attacks
Infosecurity Magazine Apr 2, 2026, 01:30 PM (UTC)
Read
iOS/iPadOS 18.7.7 updates expanded to protect older devices from DarkSword web exploit kit
Cybersecurity Ventures Apr 2, 2026, 01:03 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 2, 2026 – Read the full report The 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos is out, with the latest chief information security officer co…
Infosecurity Magazine Apr 2, 2026, 01:00 PM (UTC)
Read
Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour
Infosecurity Magazine Apr 2, 2026, 01:00 PM (UTC)
Read
LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration
Infosecurity Magazine Apr 2, 2026, 08:30 AM (UTC)
Read
E2e-assure says 80% of critical infrastructure providers could face millions in downtime from cyber-attacks
Infosecurity Magazine Apr 1, 2026, 03:00 PM (UTC)
Read
Android requires dev identity verification for sideloaded apps; phased global rollout from September
Infosecurity Magazine Apr 1, 2026, 01:30 PM (UTC)
Read
Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration
Cybersecurity Ventures Apr 1, 2026, 12:35 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 1, 2026 – Read the full story in Forbes In 2025, the global damage cost resulting from cybercrime was an estimated $10.5 trillion USD, up from just $3 trillion annually…
Infosecurity Magazine Apr 1, 2026, 12:05 PM (UTC)
Read
Chinese state-backed group TA416 had suspended its cyber espionage operations in Europe since 2023, noted Proofpoint
Infosecurity Magazine Apr 1, 2026, 09:30 AM (UTC)
Read
Most UK manufacturers compromised last year suffered financial loss, says ESET
Infosecurity Magazine Apr 1, 2026, 09:00 AM (UTC)
Read
Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn
Infosecurity Magazine Mar 31, 2026, 03:30 PM (UTC)
Read
Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds
Infosecurity Magazine Mar 31, 2026, 02:00 PM (UTC)
Read
Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service
Infosecurity Magazine Mar 31, 2026, 01:01 PM (UTC)
Read
OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
Cybersecurity Ventures Mar 31, 2026, 12:19 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. 31, 2026 – Read the full story in Forbes One message has persisted over the past few years: cybersecurity is no longer an IT concern; it has become a fundamental busine…
Infosecurity Magazine Mar 31, 2026, 12:15 PM (UTC)
Read
TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs
Infosecurity Magazine Mar 31, 2026, 10:01 AM (UTC)
Read
Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches