SecurityWeek May 1, 2026, 08:41 AM (UTC)
Read
Threat actors are relying on social engineering to lure users into downloading files containing malicious instructions. The post Hugging Face, ClawHub Abused for Malware Distribution appeared first on SecurityWeek.
SecurityWeek May 1, 2026, 08:11 AM (UTC)
Read
A new alert from the FBI says criminal enterprises are hacking both brokers and carriers to steal cargo for resale. The post FBI Warns of Surge in Hacker-Enabled Cargo Theft appeared first on SecurityWeek.
BleepingComputer May 1, 2026, 07:47 AM (UTC)
Read
Two former employees of cybersecurity incident response companies Sygnia and DigitalMint were sentenced to four years in prison each for targeting U.S. companies in BlackCat (ALPHV) ransomware attacks. [...]
SecurityWeek May 1, 2026, 07:33 AM (UTC)
Read
The compromised Lightning and Intercom packages have a combined monthly download count of nearly 10 million. The post 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom appeared first on SecurityWeek.
BleepingComputer Apr 30, 2026, 06:58 PM (UTC)
Read
A new phishing kit named Bluekit offers more than 40 templates targeting popular services and includes basic AI features for generating campaign drafts. [...]
SecurityWeek Apr 30, 2026, 06:57 PM (UTC)
Read
With Mythos signaling a new era of near-instant exploitation, Anthropic positions Claude Security to help defenders keep pace. The post Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge appeared first on SecurityWeek.
SecurityWeek Apr 30, 2026, 06:54 PM (UTC)
Read
Industrialized cybercrime delivers attacks with greater scale, speed and success. Defenders must match this with use of AI and automation. The post AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours appeared first on SecurityWeek.
BleepingComputer Apr 30, 2026, 05:45 PM (UTC)
Read
A Romanian national who led an online swatting ring that targeted more than 75 public officials, multiple journalists, and four religious institutions was sentenced to 4 years in federal prison. [...]
BleepingComputer Apr 30, 2026, 04:32 PM (UTC)
Read
The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725 million in 2025. [...]
The Hacker News Apr 30, 2026, 04:31 PM (UTC)
Read
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido Security, OX Security, Socket, and StepSecurity, the two…
Infosecurity Magazine Apr 30, 2026, 04:00 PM (UTC)
Read
Suspects accused of distributing malware and selling access to stolen Roblox accounts on Russian marketplaces
BleepingComputer Apr 30, 2026, 03:23 PM (UTC)
Read
The April 2026 KB5083769 security update breaks third-party backup applications from multiple vendors on systems running Windows 11 24H2 and 25H2. [...]
Infosecurity Magazine Apr 30, 2026, 03:00 PM (UTC)
Read
Deep#Door Python RAT uses tunneling and obfuscation to evade detection and steal credentials
SecurityWeek Apr 30, 2026, 02:52 PM (UTC)
Read
The bugs could be exploited to bypass security controls, access restricted services, and crash firewalls. The post SonicWall Urges Immediate Patching of Firewall Vulnerabilities appeared first on SecurityWeek.
SecurityWeek Apr 30, 2026, 02:27 PM (UTC)
Read
The Mini Shai-Hulud attack introduced a preinstall hook to fetch and execute a Bun binary and bypass security monitoring. The post SAP NPM Packages Targeted in Supply Chain Attack appeared first on SecurityWeek.
Krebs on Security Apr 30, 2026, 02:04 PM (UTC)
Read
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity h…
BleepingComputer Apr 30, 2026, 02:02 PM (UTC)
Read
When a new asset goes live, attackers start scanning within minutes. Sprocket Security shows how automated attacks move from discovery to compromise in under 24 hours. [...]
Infosecurity Magazine Apr 30, 2026, 02:00 PM (UTC)
Read
A new CISA‑led guide explains how zero‑trust security can be applied to operational technology, balancing cyber defence with safety and system availability
The Hacker News Apr 30, 2026, 01:55 PM (UTC)
Read
The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a…
BleepingComputer Apr 30, 2026, 01:54 PM (UTC)
Read
An exploit has been published for a local privilege escalation vulnerability dubbed "Copy Fail" that impacts Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions. [...]
Infosecurity Magazine Apr 30, 2026, 01:30 PM (UTC)
Read
The British public education sector has faced the nation’s most dramatic increase in cyber breach prevalence over the past year
Cybersecurity Ventures Apr 30, 2026, 12:50 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 30, 2026 – Watch the YouTube video Flock Safety, an Atlanta, Ga.-based surveillance company, is facing increasing community pushback as it secures contracts with law en…
The Hacker News Apr 30, 2026, 12:36 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts. "The intrusion…
SecurityWeek Apr 30, 2026, 12:34 PM (UTC)
Read
An attacker could have planted a malicious configuration to execute commands outside the sandbox. The post Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks appeared first on SecurityWeek.
SecurityWeek Apr 30, 2026, 11:57 AM (UTC)
Read
Claroty researchers discovered two vulnerabilities that can be exploited for security bypass and remote code execution. The post EnOcean SmartServer Flaws Expose Buildings to Remote Hacking appeared first on SecurityWeek.
BleepingComputer Apr 30, 2026, 11:40 AM (UTC)
Read
The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts since late February. [...]
The Hacker News Apr 30, 2026, 11:30 AM (UTC)
Read
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers, and securi…
BleepingComputer Apr 30, 2026, 11:21 AM (UTC)
Read
A joint international operation involving U.S. and Chinese authorities arrested at least 276 suspects and shut down nine cryptocurrency investment fraud centers. [...]
SecurityWeek Apr 30, 2026, 11:10 AM (UTC)
Read
The authentication bypass flaw allows attackers to gain administrative access to vulnerable servers. The post Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months appeared first on SecurityWeek.
Infosecurity Magazine Apr 30, 2026, 10:00 AM (UTC)
Read
European police arrested 10 suspects after dismantling Albanian scam call centers linked to a €50m ($58m) online investment fraud operation
The Hacker News Apr 30, 2026, 09:24 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fa…
Infosecurity Magazine Apr 30, 2026, 09:10 AM (UTC)
Read
Marsh’s 2026 People Risks survey finds cyber‑related challenges dominate, as cyber‑threat literacy tops risks and cyber and AI skills shortages rise
The Hacker News Apr 30, 2026, 07:07 AM (UTC)
Read
Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the "google-github-actions/run-gemini-cli" GitHub Actions workflow -- that could have allowed attackers to execute arbitrary commands on host system…
BleepingComputer Apr 29, 2026, 10:43 PM (UTC)
Read
Multiple official SAP npm packages were compromised in what is believed to be a TeamPCP supply-chain attack to steal credentials and authentication tokens from developers' systems. [...]
BleepingComputer Apr 29, 2026, 10:13 PM (UTC)
Read
The Quick Page/Post Redirect plugin, installed on more than 70,000 WordPress sites, had a backdoor added five years ago that allows injecting arbitrary code into users' sites. [...]
BleepingComputer Apr 29, 2026, 08:50 PM (UTC)
Read
Hackers are exploiting two authentication bypass vulnerabilities in the Qinglong open-source task scheduling tool to deploy cryptominers on developers' servers. [...]
BleepingComputer Apr 29, 2026, 06:32 PM (UTC)
Read
The Ukrainian police have arrested three individuals who hacked more than 610,000 Roblox gaming accounts and sold them for a profit of $225,000. [...]
The Hacker News Apr 29, 2026, 04:26 PM (UTC)
Read
Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to reports from Aikido Security, Onapsis, OX Security, SafeDep, Socket, StepSecurity, and G…
BleepingComputer Apr 29, 2026, 03:51 PM (UTC)
Read
A critical vulnerability affecting all but the latest versions of cPanel and the WebHost Manager (WHM) dashboard could be exploited to obtain access to the control panel without authentication. [...]
Infosecurity Magazine Apr 29, 2026, 03:00 PM (UTC)
Read
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX
The Hacker News Apr 29, 2026, 02:43 PM (UTC)
Read
Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic's Claude Opus large language model (LLM). The package in question is "@validate-sdk/v2," which is listed on npm as…
BleepingComputer Apr 29, 2026, 02:27 PM (UTC)
Read
Austrian and Albanian authorities dismantled a criminal ring accused of running a large-scale cryptocurrency investment fraud operation that caused estimated losses of over €50 million ($58.5 million) to victims worldwide. [...]
Infosecurity Magazine Apr 29, 2026, 02:00 PM (UTC)
Read
Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes crypto wallets
Cybersecurity Ventures Apr 29, 2026, 01:14 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 29, 2026 – Watch the YouTube video Executive risk management has evolved far beyond physical protection and travel security. Today, the most pressing threats to leaders…
Infosecurity Magazine Apr 29, 2026, 01:00 PM (UTC)
Read
KELA claims infostealers remained the primary access vector for attacks in 2025
The Hacker News Apr 29, 2026, 12:02 PM (UTC)
Read
In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren't just talking about AI writing better phishing emails anymore. We’re talki…
The Hacker News Apr 29, 2026, 11:30 AM (UTC)
Read
Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: "So, are we actually safer now?" Crickets. The room goes quiet bec…
Infosecurity Magazine Apr 29, 2026, 10:45 AM (UTC)
Read
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the attackers
Infosecurity Magazine Apr 29, 2026, 10:05 AM (UTC)
Read
RunSafe report reveals most attacks on medical devices disrupt patient care
The Hacker News Apr 29, 2026, 09:37 AM (UTC)
Read
cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software. The problem affects all currently supported versions of cPanel and WebHost Mana…
The Hacker News Apr 29, 2026, 08:46 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The v…
The Hacker News Apr 29, 2026, 05:34 AM (UTC)
Read
In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python package has come under active exploitation in the wild within 36 hours of the bug becoming public knowl…
The Hacker News Apr 28, 2026, 06:19 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single "git push" command. The flaw, tracked a…
The Hacker News Apr 28, 2026, 05:39 PM (UTC)
Read
A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). "The malware disguises itself as a Minecraft hack called 'Slinky,'"…
Infosecurity Magazine Apr 28, 2026, 03:30 PM (UTC)
Read
Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda
The Hacker News Apr 28, 2026, 02:01 PM (UTC)
Read
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for th…
Infosecurity Magazine Apr 28, 2026, 01:00 PM (UTC)
Read
Ransomware groups 0APT and KryBit have doxxed each other online
Cybersecurity Ventures Apr 28, 2026, 12:53 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 28, 2026 – Read the report Media outlets globally have been covering the 2026 CISO Report from Cybersecurity Ventures in collaboration with Sophos, and the main message…
Infosecurity Magazine Apr 28, 2026, 12:30 PM (UTC)
Read
Extradition links alleged MSS-directed hacker to Silk Typhoon and COVID-19 espionage
The Hacker News Apr 28, 2026, 11:58 AM (UTC)
Read
Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done. That assumption is wrong. It is also a major reason Zero Trust programs stall. New rese…
The Hacker News Apr 28, 2026, 11:18 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform with nearly 24,000 GitHub stars, that could be exploited to achieve remote code execution. The vulnerability in questio…
The Hacker News Apr 28, 2026, 10:30 AM (UTC)
Read
When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know the exploit window, the short buffer that organizations relied on to patch and protect after a vulnerability disclosure, is closing…
Infosecurity Magazine Apr 28, 2026, 08:30 AM (UTC)
Read
The National Cyber Security Centre has warned against measuring SOCs with ticket-based metrics
Infosecurity Magazine Apr 28, 2026, 08:00 AM (UTC)
Read
Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group
The Hacker News Apr 28, 2026, 07:57 AM (UTC)
Read
A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy. Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his alleged links to the Chinese state-sponsored threat group and for…
The Hacker News Apr 28, 2026, 06:37 AM (UTC)
Read
An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort. Agent ID Administrator is a privileged built-in role intr…
The Hacker News Apr 28, 2026, 05:50 AM (UTC)
Read
Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the wild. The vulnerability in question is CVE-2026-32202 (CVSS score: 4.3), a spoofing vulner…
Infosecurity Magazine Apr 27, 2026, 03:00 PM (UTC)
Read
US sanctions target Cambodian scam networks tied to crypto fraud and trafficking
The Hacker News Apr 27, 2026, 02:19 PM (UTC)
Read
Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on the dark web. "Based on current evidence, we believe this data originated from Ch…
Infosecurity Magazine Apr 27, 2026, 02:00 PM (UTC)
Read
Itron confirmed a cyber incident but does not believe it is likely to have a material impact on the company
The Hacker News Apr 27, 2026, 01:30 PM (UTC)
Read
Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains got hit. Fake help desks worked. Weird research showed how easy some attacks still are. Most of it feels like stuff we s…
Infosecurity Magazine Apr 27, 2026, 01:30 PM (UTC)
Read
Dozens of browser extensions openly sell user data via privacy policy disclosures
Cybersecurity Ventures Apr 27, 2026, 12:48 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 27, 2026 – Cybercrime Magazine YouTube Shorts The award-winning Cybercrime Magazine YouTube Channel, which has more than 1.2 million subscribers and many more viewers g…
The Hacker News Apr 27, 2026, 11:58 AM (UTC)
Read
Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurity-focused AI system capable of identifying vulnerabilities at scale and raising serious questions about how qu…
The Hacker News Apr 27, 2026, 11:54 AM (UTC)
Read
A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since September 2025. That's according to a report published by Positive Technologies, which fo…
Infosecurity Magazine Apr 27, 2026, 11:40 AM (UTC)
Read
A new report by global technology recruitment firm, Harvey Nash, found that three quarters of cybersecurity staff are pessimistic on pay and half are looking for a new job
The Hacker News Apr 27, 2026, 11:23 AM (UTC)
Read
Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked to a persistent information-stealing campaign dubbed GlassWorm. The cluster of 73 extensions has been identified as cl…
Infosecurity Magazine Apr 27, 2026, 09:10 AM (UTC)
Read
The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet
Infosecurity Magazine Apr 27, 2026, 08:15 AM (UTC)
Read
Researchers uncover a new data theft and extortion group dubbed “BlackFile”
The Hacker News Apr 27, 2026, 06:33 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their mobile bills, generating illicit…
The Hacker News Apr 25, 2026, 09:26 AM (UTC)
Read
Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran's nuclear program by destroying uranium enrichment centrifuges. According to a new report published by SentinelOne, th…
The Hacker News Apr 25, 2026, 05:08 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of…
The Hacker News Apr 24, 2026, 05:06 PM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency's Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025 with a new malware called FIREST…
The Hacker News Apr 24, 2026, 02:13 PM (UTC)
Read
The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as…
Infosecurity Magazine Apr 24, 2026, 01:25 PM (UTC)
Read
UK government Minister confirms that breached health records of UK Biobank volunteers were up for sale on Chinese ecommerce platforms before being removed
Cybersecurity Ventures Apr 24, 2026, 12:38 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 24, 2026 – Read the full story in it-daily.net According to the 2026 CISO Report, published by Cybersecurity Ventures in collaboration with Sophos, a massive gap exists…
Infosecurity Magazine Apr 24, 2026, 12:10 PM (UTC)
Read
AI tools are not just creating new vulnerabilities, they are reviving old security failures, warned Jurgen Kutscher, VP of Mandiant Consulting
The Hacker News Apr 24, 2026, 11:49 AM (UTC)
Read
The AI Agent Authority Gap - From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly. The issue is not simply that agents are new actors. I…
The Hacker News Apr 24, 2026, 11:48 AM (UTC)
Read
Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025. "Once launched, these apps redirect user…
The Hacker News Apr 24, 2026, 09:29 AM (UTC)
Read
Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Visual Studio Code (VS Code) tunnels for r…
Infosecurity Magazine Apr 24, 2026, 08:10 AM (UTC)
Read
Malicious npm packages spread via worm-like propagation and steal developer credentials
The Hacker News Apr 24, 2026, 07:24 AM (UTC)
Read
A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving large language models (LLMs), has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerability, tracked as…
Cybersecurity Ventures Apr 23, 2026, 07:26 PM (UTC)
Read
The attacker’s blind spot just disappeared –Mayuresh Ektare, Senior Vice President, Product Management San Jose, Calif. – Apr. 23, 2026 Today’s attackers largely treat software as a black box. Some study open-source software (OSS) to tailor their techniques, b…
The Hacker News Apr 23, 2026, 06:16 PM (UTC)
Read
A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. "As with many other intrusions in recent years, UNC6692 relied…
Infosecurity Magazine Apr 23, 2026, 04:40 PM (UTC)
Read
Google Cloud’s COO advocated for combining general-purpose frontier large language models with task-specific AI agents
The Hacker News Apr 23, 2026, 01:42 PM (UTC)
Read
Bitwarden CLI, the command-line interface for the password manager Bitwarden, has reportedly been compromised as part of a newly discovered and ongoing Checkmarx supply chain campaign, according to findings from JFrog and Socket. "The affected package version…
The Hacker News Apr 23, 2026, 01:17 PM (UTC)
Read
You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes. The supply chain is messy. Packages you did not check are stealing data, adding backdoo…
Infosecurity Magazine Apr 23, 2026, 01:00 PM (UTC)
Read
Apple patches iOS flaw that retained deleted notifications, exposing message data
Cybersecurity Ventures Apr 23, 2026, 12:27 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 23, 2026 – Watch the YouTube video Keeper Security is transforming cybersecurity for people and organizations around the world. The company’s next-generation privileged…
The Hacker News Apr 23, 2026, 12:03 PM (UTC)
Read
Imagine a world where hackers don't sleep, don't take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time you have…
Infosecurity Magazine Apr 23, 2026, 12:00 PM (UTC)
Read
Google Cloud will attribute a unique cryptographic ID every AI agent that will be tied to “traceable and auditable” authorization policies
The Hacker News Apr 23, 2026, 11:30 AM (UTC)
Read
Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has given access to Apple, Microsoft, Google, Amazon…
Infosecurity Magazine Apr 23, 2026, 10:30 AM (UTC)
Read
Quorum Cyber report finds higher and further education institutions experienced 63% increase in attacks over a year
Infosecurity Magazine Apr 23, 2026, 09:30 AM (UTC)
Read
Forcepoint has found 10 new indirect prompt injection attacks targeting AI agents
The Hacker News Apr 23, 2026, 09:04 AM (UTC)
Read
Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. "The group wields a wide array of tools mostly written in Go, using injectors and loaders…
Infosecurity Magazine Apr 23, 2026, 08:45 AM (UTC)
Read
The UK’s NCSC has fully backed passkeys as consumers’ first choice for login, citing progress with FIDO and successful use across the NHS
The Hacker News Apr 23, 2026, 08:40 AM (UTC)
Read
Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding its…
The Hacker News Apr 23, 2026, 08:06 AM (UTC)
Read
Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue th…
The Hacker News Apr 22, 2026, 05:55 PM (UTC)
Read
Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics" Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten…
The Hacker News Apr 22, 2026, 05:33 PM (UTC)
Read
Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens. The supply chain worm has been detected by both Socket and StepSecurity…
Infosecurity Magazine Apr 22, 2026, 04:30 PM (UTC)
Read
macOS LOTL techniques bypass detection using native tools and metadata abuse
The Hacker News Apr 22, 2026, 03:28 PM (UTC)
Read
The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia. "The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert com…
Infosecurity Magazine Apr 22, 2026, 03:00 PM (UTC)
Read
The UK’s cybersecurity agency said the devices will be available for purchase by organizations around the world
Infosecurity Magazine Apr 22, 2026, 02:10 PM (UTC)
Read
UK unveils £90m cybersecurity funding at CYBERUK to boost SME resilience, promote Cyber Essentials and a new Cyber Resilience Pledge, sparking industry debate
Infosecurity Magazine Apr 22, 2026, 01:00 PM (UTC)
Read
Null subject phishing campaigns bypass filters and target VIPs with QR code and RMM abuse
Cybersecurity Ventures Apr 22, 2026, 12:38 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 22, 2026 – Read the full story in Cairo SCENE Digital transformation across the Middle East has accelerated rapidly in recent years, and cybersecurity has followed clos…
Infosecurity Magazine Apr 22, 2026, 11:00 AM (UTC)
Read
A former ransomware negotiator has pleaded guilty to abusing his position by working with noted cybercrime group BlackCat
The Hacker News Apr 22, 2026, 10:55 AM (UTC)
Read
Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks targeting Venezuela at the end of last year and the start of 2026. Dubbed Lotus Wiper, the novel file wiper has been used in a destructive campaign tar…
The Hacker News Apr 22, 2026, 10:41 AM (UTC)
Read
On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents. The more worrying part sat inside th…
Infosecurity Magazine Apr 22, 2026, 10:00 AM (UTC)
Read
Infrawatch says ProxySmart platform enables SIM farm activity at “industrial scale”
The Hacker News Apr 22, 2026, 09:29 AM (UTC)
Read
Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges. The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It's rated Important in s…
Infosecurity Magazine Apr 22, 2026, 08:07 AM (UTC)
Read
The convergence of global tensions and rapid technological change is driving a new era of cyber risk, the NCSC warns
Infosecurity Magazine Apr 21, 2026, 04:00 PM (UTC)
Read
NGate malware abuses HandyPay app to steal NFC card data and PINs in Brazil
Krebs on Security Apr 21, 2026, 02:53 PM (UTC)
Read
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the s…
Infosecurity Magazine Apr 21, 2026, 02:00 PM (UTC)
Read
Gentlemen RaaS expands quickly with multi-platform attacks and SystemBC-linked infections
Infosecurity Magazine Apr 21, 2026, 01:00 PM (UTC)
Read
Data exposure, operational disruption and financial losses among issues faced by businesses struggling with the rapid rise of AI agents, warns Cloud Security Alliance report
Infosecurity Magazine Apr 21, 2026, 09:10 AM (UTC)
Read
Cloud app developer Vercel appears to have suffered a security breach
Infosecurity Magazine Apr 21, 2026, 08:30 AM (UTC)
Read
North Korea’s Lazarus Group is pegged for a $290m crypto theft at KelpDAO
Infosecurity Magazine Apr 20, 2026, 04:00 PM (UTC)
Read
ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities
Infosecurity Magazine Apr 20, 2026, 03:01 PM (UTC)
Read
Formbook attacks use combination of DLL Side-Loading and Obfuscated JavaScript to stay hidden, researchers at WatchGuard have uncovered
Infosecurity Magazine Apr 20, 2026, 01:01 PM (UTC)
Read
FortiGuard Labs has identified a Mirai-based Nexcorium campaign actively exploiting CVE-2024-3721 in TBK DVR devices
Cybersecurity Ventures Apr 20, 2026, 12:16 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 20, 2026 – Listen to the podcast The Cybercrime Magazine Podcast tops Million Podcast’s curated list of the best 60 cybercrime podcasts to listen to in 2026. These podc…
Infosecurity Magazine Apr 20, 2026, 09:30 AM (UTC)
Read
The National Cyber Security Centre has shared an update of its resilience-building efforts for the NHS
Infosecurity Magazine Apr 20, 2026, 09:00 AM (UTC)
Read
Russian crypto-exchange Grinex claims Western intelligence agencies were behind a $13m heist
Cybersecurity Ventures Apr 17, 2026, 01:35 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 17, 2026 – Listen to the podcast episode Kerem Albayrak from north London threatened to wipe 319 million accounts unless Apple gave him iTunes gift cards worth $100,000…
Infosecurity Magazine Apr 17, 2026, 01:20 PM (UTC)
Read
AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds
Infosecurity Magazine Apr 17, 2026, 11:30 AM (UTC)
Read
Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users