Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations. It has been described … Read More “Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621 – The Hacker News” »
Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT. The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with … Read More “CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads – The Hacker News” »
FBI Recovers Deleted Signal Messages Through iPhone Notifications – Hackread – Cybersecurity News, Data Breaches, AI and More
Signal messages may persist in iPhone notification data, enabling FBI access even after deletion, a court case reveals. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The fraud landscape has been changed by AI and cryptocurrency in a way that should concern organisations and individuals alike. Read more in my article on the Fortra blog. – Read More – GRAHAM CLULEY
Google Chrome Update Disrupts Infostealer Cookie Theft – Hackread – Cybersecurity News, Data Breaches, AI and More
Google adds Device Bound Session Credentials (DBSC) to Chrome 146, using hardware keys to block infostealer use of stolen session cookies on Windows. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023 – Read … Read More “Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data – The Hacker News” »
ShinyHunters Claims Rockstar Games Snowflake Breach via Anodot – Hackread – Cybersecurity News, Data Breaches, AI and More
ShinyHunters claims access to Rockstar Games Snowflake data via Anodot breach, threatening a data leak on April 14 if ransom demands are not met. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Android Banking Trojan Linked to Cambodia Scam Compounds Hits 21 Countries – Hackread – Cybersecurity News, Data Breaches, AI and More
Android banking trojan linked to Cambodia scam compounds uses forced labour to target users in 21 countries, bypassing security to steal funds. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Department of Commerce is putting together a catalog of AI tools that will be given special export status by the federal government to be sold abroad. The department issued a call for proposals to participating companies in the Federal Register, looking to create a “menu of priority AI export packages that the U.S. Government … Read More “Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad – CyberScoop” »
GraphAlgo Scam: Lazarus Hackers Register Real US LLCs to Spread Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
ReversingLabs has discovered a fresh wave of the graphalgo campaign in which North Korean Lazarus hackers are using fake Florida LLCs, mimicking SWFT Blockchain, and using GitHub typo-squatting to target developers with malware. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign – Hackread – Cybersecurity News, Data Breaches, AI and More
UNC6783 hackers and extortionists impersonate support staff, using fake Okta login pages and social engineering to access corporate systems and steal sensitive data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated development environments (IDEs) on a developer’s machine. The technique has been discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a – Read More – The Hacker News
Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie – Read More –
Qilin, Akira and Dragonforce were responsible for 40% of 672 ransomware incidents reported in March, says Check Point – Read More –
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including – Read More – The Hacker … Read More “Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure – The Hacker News” »
Browser Extensions Are the New AI Consumption Channel That No One Is Talking About – The Hacker News
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there’s a wide-open window nobody’s guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn’t on anyone’s – Read More – The … Read More “Browser Extensions Are the New AI Consumption Channel That No One Is Talking About – The Hacker News” »
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release. “This project represents a significant – Read More – The … Read More “Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows – The Hacker News” »
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across … Read More “Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers – The Hacker News” »
When Google announced last month it was moving up its own internal timeline for migrating to quantum-resistant forms of encryption, it started a broader conversation in the cybersecurity and cryptography communities: Just what was pushing one of the largest tech companies in the world to significantly accelerate its adoption of post-quantum protections for its systems, … Read More “Why is the timeline to quantum-proof everything constantly shrinking? – CyberScoop” »
The fallout and potential exposure from Iran’s state-backed targeting of U.S. critical infrastructure extends to more than 5,200 internet-connected devices, researchers at Censys said in a threat intelligence brief Wednesday. Of the programmable logic controllers manufactured by Rockwell Automation/Allen-Bradley that Censys identified as potentially exposed to Iranian government attackers, nearly 3,900, or about 3 out … Read More “Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs – CyberScoop” »
When Google announced last month it was moving up its own internal timeline for migrating to quantum-resistant forms of encryption, it started a broader conversation in the cybersecurity and cryptography communities: Just what was pushing one of the largest tech companies in the world to significantly accelerate its adoption of post-quantum protections for its systems, … Read More “Why is the timeline to quantum-proof everything constantly shrinking? – CyberScoop” »
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. “This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data,” the Microsoft Defender – Read More – The … Read More “EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets – The Hacker News” »
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs – Hackread – Cybersecurity News, Data Breaches, AI and More
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns – The Hacker News
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. “LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and – Read More – The Hacker … Read More “UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns – The Hacker News” »
Bitcoin Depot has disclosed a cyber-attack that led to the theft of more than 50 Bitcoin, worth $3.66m, after hackers accessed its internal systems – Read More –
STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery methods – Read More –
The recent FBI-led operation to knock Russian government hackers off routers sought to topple an especially insidious and threateningly contagious cyberespionage campaign, top bureau cyber official Brett Leatherman told CyberScoop. Researchers, along with U.S. and foreign government agencies, revealed details of the campaign this week by which APT28 — also known as Forest Blizzard or … Read More “Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’ – CyberScoop” »
New macOS Malware notnullOSX Targets Crypto Wallets Over $10K – Hackread – Cybersecurity News, Data Breaches, AI and More
macOS Malware notnullOSX targets crypto wallets over $10K, using fake apps, Terminal tricks, and backdoors to steal funds and sensitive data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action – Hackread – Cybersecurity News, Data Breaches, AI and More
Austin, Texas, United States, 9th April 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks – Hackread – Cybersecurity News, Data Breaches, AI and More
LayerX researchers have discovered how to bypass Claude Code’s safety rules using the CLAUDE.md file. This exploit allows… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories – The Hacker News
Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more … Read More “ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories – The Hacker News” »
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa – Read More – The Hacker News
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second – Read More – The Hacker … Read More “Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025 – The Hacker News” »
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to … Read More “The Hidden Security Risks of Shadow AI in Enterprises – The Hacker News” »
Our nation has entered a new fraud arms race fueled by AI. With billions of dollars in fraud losses mounting in both the private and public sectors, it’s clear the old ways of deterring fraud aren’t working. That’s why we need a new playbook that starts with understanding how fraudsters operate, evolving our defenses, and … Read More “Don’t just fight fraud, hunt it – CyberScoop” »
A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group – Read More –
macOS 26.4 update introduced security warnings into Terminal to prevent ClickFix attacks, so attackers have shifted to Script Editor instead – Read More –
SANS Institute reveals that AI agents are behind a 76% surge in non-human identities – Read More –
GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root – Read More –
Google’s threat intel team warns UNC6783, a new extortion group possibly linked to the “Raccoon” persona, is targeting BPOs and enterprises – Read More –
Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.27 immediately – Read More –
Google API key flaw exposes mobile apps to Gemini AI access, private files and billing risks – Read More –
Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing – GRAHAM CLULEY
LinkedIn has been secretly scanning your browser for over 6,000 installed extensions — on every single click you make. It can tell if you’re job hunting, what religion you are, and whether you have ADHD. And none of this is mentioned anywhere in their privacy policy. Meanwhile, California’s crypto millionaires are learning that no amount … Read More “Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing – GRAHAM CLULEY” »
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure. “Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices,” Darktrace said in a new report. – Read More – The Hacker News
Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign – Hackread – Cybersecurity News, Data Breaches, AI and More
Operation Masquerade: The FBI and DoJ disrupted a Russian GRU campaign that hijacked routers via DNS attacks to spy on users and steal credentials. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It’s capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. “Built for … Read More “Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices – The Hacker News” »
An apparent hack-for-hire campaign from a group with suspected Indian government connections targeted Middle Eastern and North African journalists and activists using spyware, three collaborating organizations said in reports published Wednesday. The attacks shared infrastructure that pointed to the advanced persistent threat group known as Bitter, which most frequently targets government, military, diplomatic and critical … Read More “Hack-for-hire spyware campaign targets journalists in Middle East, North Africa – CyberScoop” »
In September of 2024, ZDI received a vulnerability submission from an anonymous researcher affecting npm CLI that revealed a fundamental design issue in Node.js. This blog details how it continues to expose applications to local privilege escalation (LPE) attacks on Windows systems, including the Discord desktop app (CVE-2026-0776 0-Day), which remains unpatched and vulnerable. The … Read More “Node.js Trust Falls: Dangerous Module Resolution on Windows – Zero Day Initiative – Blog” »
The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. “PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro – Read More – … Read More “APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies – The Hacker News” »
Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Flaw Disclosure – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft researchers have uncovered a fast-moving group, Storm-1175, launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More





