A researcher from offensive security firm Theori has found a nine-year-old flaw in the Linux kernel with the help of AI – Read More –
The cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them – Read More –
A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH persistence. The activity has been attributed to the GitHub account “BufferZoneCorp,” which has published a set of repositories that are associated with malicious Ruby gems … Read More “Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft – The Hacker News” »
Organisations must act now to prepare for a wave of patches that will address decades of technical debt. – Read More – All Feed
Best Diagram Software in 2026, Why EdrawMax Works for Everyday Use – Hackread – Cybersecurity News, Data Breaches, AI and More
Compare top diagram software in 2026 and see why Wondershare EdrawMax can be a practical choice for fast, template rich, AI supported diagramming. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Former incident responders sentenced to 4 years in prison for committing ransomware attacks – CyberScoop
Two former cybersecurity professionals who moonlighted as cybercriminals, committing a series of ransomware attacks in 2023, were each sentenced to four years in prison, the Justice Department said Thursday. Ryan Clifford Goldberg and Kevin Tyler Martin previously pleaded guilty to one of three charges brought against them in December and faced up to 20 years … Read More “Former incident responders sentenced to 4 years in prison for committing ransomware attacks – CyberScoop” »
A severe authentication bypass vulnerability in cPanel, one of the most widely deployed web hosting control panel platforms on the internet, is being actively exploited in the wild, according to security researchers and hosting providers. The vulnerability, tracked as CVE-2026-41940, affects all supported versions of cPanel and WebHost Manager (WHM) released after version 11.40, as … Read More “cPanel’s authentication bypass bug is being exploited in the wild, CISA warns – CyberScoop” »
Congress extended a controversial surveillance law for 45 days on Thursday, hours before its latest expiration following an earlier extension. The Senate passed — then the House cleared — a 45-day extension of Section 702 of the Foreign Intelligence Surveillance Act, which authorizes warrantless surveillance of foreign targets. But those targets are sometimes communicating electronically … Read More “Congress kicks the can down the road on surveillance law (again) – CyberScoop” »
Private Chats, Photos of Celebs Exposed in Suspected Stalkerware Leak – Hackread – Cybersecurity News, Data Breaches, AI and More
Private chats and photos of celebrities and influencers were exposed after a suspected stalkerware setup left a database open, revealing sensitive messages and files. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Federal Communications Commission approved new regulations Wednesday designed to crack down on robocalling, protect telecommunications networks from cyberattacks and further vet equipment-testing labs based overseas. Commissioners unanimously passed a measure to strengthen telecom companies’ “Know Your Customer” requirements for verifying callers’ identities. Among the potential solutions being considered are requiring telecoms to verify a … Read More “FCC tightens KYC rules for telecoms, closes loophole for banned foreign services – CyberScoop” »
Misconfigured Server Run by Hackers Leaks 345,000 Stolen Credit Cards – Hackread – Cybersecurity News, Data Breaches, AI and More
A misconfigured server linked to the carding marketplace Jerry’s Store exposed 345,000 stolen credit cards after an AI coding error caused a major security flaw. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign is … Read More “PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials – The Hacker News” »
Managed vs Self-Managed Cloud Hosting: Choosing the Best Option for Your Business – Hackread – Cybersecurity News, Data Breaches, AI and More
As more businesses relocate their operations to the cloud, one important decision arises: should you choose managed or… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Suspects accused of distributing malware and selling access to stolen Roblox accounts on Russian marketplaces – Read More –
A pair of persistent and problematic threat groups affiliated with The Com are actively targeting organizations across multiple critical infrastructure sectors for rapid data theft and extortion attacks, according to CrowdStrike. The financially-motivated attackers, which CrowdStrike tracks as Cordial Spider and Snarky Spider, have used voice-phishing and social engineering attacks to break into victims’ identity … Read More “Two new extortion crews are speedrunning the Scattered Spider playbook – CyberScoop” »
Deep#Door Python RAT uses tunneling and obfuscation to evade detection and steal credentials – Read More –
Post Content – Read More – IC3.gov News
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories – The Hacker News
The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a busy time to be online. Security is always a moving target. … Read More “ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories – The Hacker News” »
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work … Read More “Anti-DDoS Firm Heaped Attacks on Brazilian ISPs – Krebs on Security” »
The British public education sector has faced the nation’s most dramatic increase in cyber breach prevalence over the past year – Read More –
A new CISA‑led guide explains how zero‑trust security can be applied to operational technology, balancing cyber defence with safety and system availability – Read More –
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers, and security analysts by impersonating administrative utilities they rely on for daily operations. By integrating Search Engine Order (SEO) – Read More – The Hacker News
Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts. “The intrusion chain begins with execution of a batch script (‘install_obf.bat’) that disables Windows security controls, dynamically extracts an – Read More – … Read More “New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials – The Hacker News” »
European police arrested 10 suspects after dismantling Albanian scam call centers linked to a €50m ($58m) online investment fraud operation – Read More –
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori. “An unprivileged local user can write four controlled bytes into the page cache of … Read More “New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions – The Hacker News” »
Anthropic recently announced that it would not release Mythos, its most powerful AI model, to the public. The model discovered thousands of previously unknown software vulnerabilities — flaws that had sat undetected in major operating systems and web browsers for as long as nearly three decades. Anthropic said the model was too dangerous to deploy … Read More “Everyone’s building AI agents. Almost nobody’s ready for what they do to identity. – CyberScoop” »
Marsh’s 2026 People Risks survey finds cyber‑related challenges dominate, as cyber‑threat literacy tops risks and cyber and AI skills shortages rise – Read More –
Cloud HSM for Regulated Industries: Strengthening Compliance and Data Security – JISA Softech Pvt Ltd
Data has become the most regulated asset in modern enterprises. For organizations operating in tightly governed sectors, the challenge… The post Cloud HSM for Regulated Industries: Strengthening Compliance and Data Security appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
9-Year-Old Linux Kernel Vulnerability “Copy Fail” Enables Full Root Access – Hackread – Cybersecurity News, Data Breaches, AI and More
Linux Kernel Vulnerability “Copy Fail” lets attackers gain root access via memory flaw. Patch now or disable algif_aead to stay secure. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
US Marines stationed around the Persian Gulf have been receiving WhatsApp messages from strangers suggesting they call home and make their final goodbyes. Read more in my article on the Hot for Security blog. – Read More – GRAHAM CLULEY
Google has addressed a maximum severity security flaw in Gemini CLI — the “@google/gemini-cli” npm package and the “google-github-actions/run-gemini-cli” GitHub Actions workflow — that could have allowed attackers to execute arbitrary commands on host systems. “The vulnerability allowed an unprivileged external attacker to force their own malicious content to load as Gemini configuration,” – Read … Read More “Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution – The Hacker News” »
Smashing Security podcast #465: This developer wanted to cheat at Roblox. It cost millions – GRAHAM CLULEY
A developer at an AI startup wanted to cheat at Roblox. They downloaded a dodgy script on their work laptop. That one decision triggered a cascade of failures that ended with a $2 million data breach affecting hundreds of thousands of organisations. All for some free in-game currency. Meanwhile, there’s a 1980s phone protocol called … Read More “Smashing Security podcast #465: This developer wanted to cheat at Roblox. It cost millions – GRAHAM CLULEY” »
What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong) – The Hacker News
Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: “So, are we actually safer now?” Crickets. The room goes quiet because an honest answer requires context – which is something that patch counts … Read More “What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong) – The Hacker News” »
Cursor AI Agent Wipes PocketOS Database and Backups in 9 Seconds – Hackread – Cybersecurity News, Data Breaches, AI and More
PocketOS founder says Cursor AI agent deleted its production database in 9 seconds after misusing a root API token, exposing major Railway security flaws. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The growth of data centers — and adversaries’ targeting of them — left lawmakers at a hearing Wednesday contemplating whether the federal government has the right setup for defending them. Some industry witnesses and experts at the hearing of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection testified that the answer might be … Read More “Congress, industry ponder government posture for protecting data centers – CyberScoop” »
Polymarket Rejects Data Breach Claims as Hacker Alleges 300K Records Stolen – Hackread – Cybersecurity News, Data Breaches, AI and More
A hacker using the alias “Xorcat” claims to have breached Polymarket using API flaws, but research suggests the leak could be just data scraping incident. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
New AI-Powered Bluekit Phishing Kit Targets Major Platforms with MFA Bypass Attacks – Hackread – Cybersecurity News, Data Breaches, AI and More
Bluekit Phishing Kit is a new PhaaS tool that targets major platforms, using AiTM techniques to steal session data and bypass MFA protections. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
SEC Consult SA-20260423-0 :: DLL Hijacking in EfficientLab Controlio (cloud-based employee monitoring service) – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 29 SEC Consult Vulnerability Lab Security Advisory < 20260423-0 > ======================================================================= title: DLL Hijacking product: EfficientLab Controlio (cloud-based employee monitoring service) vulnerable version: <1.3.95 fixed version: 1.3.95 CVE number: CVE-2025-10549 impact: High … Read More “SEC Consult SA-20260423-0 :: DLL Hijacking in EfficientLab Controlio (cloud-based employee monitoring service) – Full Disclosure” »
SEC Consult SA-20260427-0 :: Missing TLS Certificate Validation leading to RCE in DeskTime Time Tracking App – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 29 SEC Consult Vulnerability Lab Security Advisory < 20260427-0 > ======================================================================= title: Missing TLS Certificate Validation leading to RCE product: DeskTime Time Tracking App vulnerable version: 1.3.671 fixed version: – CVE number: CVE-2025-10539 impact: medium homepage:https://desktime.com… – Read More … Read More “SEC Consult SA-20260427-0 :: Missing TLS Certificate Validation leading to RCE in DeskTime Time Tracking App – Full Disclosure” »
Re: SEC Consult SA-20260427-0 :: Missing TLS Certificate Validation leading to RCE in DeskTime Time Tracking App – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 29 *Update 2026-04-28:* The vendor contacted us and now provides a patched version v1.3.674 which can be obtained at the following URL: https://desktime.com/download – Read More – Full Disclosure
Posted by Milan Berger via Fulldisclosure on Apr 29 # Security Advisory: ESP-RFID-Tool v2 PRO **Product:** ESP-RFID-Tool v2 PRO **Vendor:** Raik Schneider (Einstein2150), foto-video-it.de **Repository:** https://github.com/Einstein2150/ESP-RFID-Tool-v2 **Affected Version:** v2.2.1 (latest as of 2026-04-28) **Severity:** CRITICAL **Disclosure Type:** Full Public Disclosure **Disclosure Date:** 2026-04-28 **Researcher:** Milan ‘t4c’ Berger — ## Disclosure Timeline | Date | … Read More “ESP-RFID-Tool v2 PRO — Full Public Disclosure – Full Disclosure” »
Posted by SBA Research Security Advisory via Fulldisclosure on Apr 29 # GoAnywhere MFT Email HTML Injection # Link: https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20251120-01_GoAnywhere_MFT_Email_HTML_Injection ## Vulnerability Overview ## GoAnywhere MFT before 7.10.0 is affected by an HTML injection vulnerability in its email templating functionality. If an attacker is able to influence the content of a template variable, malicious … Read More “[SBA-ADV-20251120-01] CVE-2026-0972: GoAnywhere MFT Email HTML Injection – Full Disclosure” »
[IWCC 2026] CfP: 15th International Workshop on Cyber Crime – Linköping, Sweden, Aug 24-27, 2026 – Full Disclosure
Posted by Artur Janicki via Fulldisclosure on Apr 29 [APOLOGIES FOR CROSS-POSTING] CALL FOR PAPERS 15th International Workshop on Cyber Crime (IWCC 2026 – https://www.ares-conference.eu/iwcc) to be held in conjunction with the International Conference on Availability, Reliability and Security (ARES 2026 – https://www.ares-conference.eu/) in Linköping, Sweden, August 24-27, 2026 IMPORTANT DATES Submission Deadline May … Read More “[IWCC 2026] CfP: 15th International Workshop on Cyber Crime – Linköping, Sweden, Aug 24-27, 2026 – Full Disclosure” »
Posted by malvuln on Apr 29 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2026 Original source: https://malvuln.com/advisory/8c15ec5f0137d097a345b693f0bffedb.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Trojan-Spy.Win32.Small Vulnerability: Remote Command Execution Description: The malware opens a listener on TCP port 65535, allowing unauthenticated remote attackers with network access… – Read … Read More “Trojan-Spy.Win32.Small / Remote Command Execution – Full Disclosure” »
Posted by Egidio Romano on Apr 29 ——————————————————————— SocialEngine <= 7.8.0 Blind Server-Side Request Forgery Vulnerability ——————————————————————— [-] Software Link: https://socialengine.com [-] Affected Versions: Versions 7.8.0, 7.7.0, and likely prior versions. [-] Vulnerability Description: User input passed through the “uri” request parameter to the… – Read More – Full Disclosure
Posted by Egidio Romano on Apr 29 —————————————————————– SocialEngine <= 7.8.0 (get-memberall) SQL Injection Vulnerability —————————————————————– [-] Software Link: https://socialengine.com [-] Affected Versions: Versions 7.8.0, 7.7.0, and likely prior versions. [-] Vulnerability Description: User input passed through the “text” request parameter to the… – Read More – Full Disclosure
Posted by Nir Yehoshua on Apr 29 Hi Full Disclosure list, I published a technical research article titled: When Trusted Tools Become Attack Primitives The article examines how trusted local utilities can become security-relevant primitives when used inside automated processing pipelines. It covers two case studies: 1. macOS textutil resolving remote resources during HTML-to-text … Read More “Research: When Trusted Tools Become Attack Primitives – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Apr 29 APPLE-SA-04-22-2026-1 iOS 26.4.2 and iPadOS 26.4.2 iOS 26.4.2 and iPadOS 26.4.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127002. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Notification Services Available … Read More “APPLE-SA-04-22-2026-1 iOS 26.4.2 and iPadOS 26.4.2 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Apr 29 APPLE-SA-04-22-2026-2 iOS 18.7.8 and iPadOS 18.7.8 iOS 18.7.8 and iPadOS 18.7.8 addresses the following issues. Information about the security content is also available at https://support.apple.com/en-us/127003. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Notification Services Available … Read More “APPLE-SA-04-22-2026-2 iOS 18.7.8 and iPadOS 18.7.8 – Full Disclosure” »
SEC Consult SA-20260415-0 :: Exposed Private Key of X.509 Certificate in SAP HANA Cockpit & SAP HANA Database Explorer – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 29 SEC Consult Vulnerability Lab Security Advisory < 20260415-0 > ======================================================================= title: Exposed Private Key of X.509 Certificate product: SAP HANA Cockpit & SAP HANA Database Explorer vulnerable version: HANA Cockpit <2.18.2 (HRTT <2.16.254002) fixed … Read More “SEC Consult SA-20260415-0 :: Exposed Private Key of X.509 Certificate in SAP HANA Cockpit & SAP HANA Database Explorer – Full Disclosure” »





