Threat actors likely associated with the Democratic People’s Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea. The attack chain, per Fortinet FortiGuard Labs, involves obfuscated Windows shortcut (LNK) files acting as the starting point to drop a decoy PDF – Read More – The Hacker News
A federal judge has sentenced the maker of stalkerware pcTattleTale, which went out of business after a data breach, to supervised release and a $5,000 fine. Bryan Fleming pleaded guilty in January to a charge of intentionally manufacturing, possessing or selling a device with the knowledge that it would be primarily used for surreptitious interception … Read More “pcTattleTale stalkerware maker sentence includes fine, supervised release – CyberScoop” »
Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins – Hackread – Cybersecurity News, Data Breaches, AI and More
New Phishing scam uses fake missile alerts and the ongoing conflict involving Iran to target users with QR codes and fake government emails to steal Microsoft passwords. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More – The Hacker News
This week had real hits. The key software got tampered with. Active bugs showed up in the tools people use every day. Some attacks didn’t even need much effort because the path was already there. One weak spot now spreads wider than before. What starts small can reach a lot of systems fast. New bugs, faster use, less time to react. That’s this … Read More “⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More – The Hacker News” »
Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments, attackers move across Windows endpoints, executive MacBooks, Linux infrastructure, and mobile devices, taking advantage of the fact that many SOC workflows are still fragmented by platform. For security leaders, this creates a – Read More – The Hacker News
Why Security Researchers and Red Teams Are Turning to Workflow Automation – Hackread – Cybersecurity News, Data Breaches, AI and More
Security researchers and red teams adopt workflow automation to cut alert fatigue, enrich data, and scale operations across SOC, intel and recon tasks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cloudflare Targets WordPress With New AI-Powered EmDash CMS – Hackread – Cybersecurity News, Data Breaches, AI and More
Cloudflare launches EmDash CMS, an AI-powered platform built to fix WordPress security flaws with sandboxed plugins, serverless scaling, and passkey auth. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
North Korean Hackers Pose as Trading Firm to Steal $285M from Drift – Hackread – Cybersecurity News, Data Breaches, AI and More
North Korean hackers (UNC4736) posed as a trading firm for six months to infiltrate Drift Protocol, using social engineering tactics to steal $285M without suspicion. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are created, tested, cached, copied, and reused across services, bots, build tools, and now local AI agents. In March 2026, the TeamPCP threat actor proved just how valuable developer machines are. Their supply chain attack on – Read More – The Hacker News
Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro. Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named “msimg32.dll,” – Read More – The Hacker News
Germany’s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identity of the main threat actors associated with the now-defunct REvil (aka Sodinokibi) ransomware-as-a-service (RaaS) operation. The threat actor, who went by the alias UNKN, functioned as a representative of the group, advertising the ransomware in June 2019 on the XSS … Read More “BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks – The Hacker News” »
An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across … Read More “Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab – Krebs on Security” »
Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the Democratic People’s Republic of Korea (DPRK) that began in the fall of 2025. The Solana-based decentralized exchange described it as “an attack six months in the – … Read More “$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation – The Hacker News” »
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers – The Hacker News
Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. “Instead of exposing command execution through URL parameters or request bodies, these web shells rely on threat actor-supplied cookie values to gate execution, … Read More “Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers – The Hacker News” »
BrowserGate: LinkedIn Tracks 6,000+ Browser Extensions on Users’ PCs – Hackread – Cybersecurity News, Data Breaches, AI and More
LinkedIn is accused in the BrowserGate report of tracking 6,000+ browser extensions on users’ PCs, raising concerns over privacy and data collection practices. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS score: 9.1), has been described as a pre-authentication API access bypass leading to privilege escalation. “An improper access control vulnerability [CWE-284] in FortiClient EMS may allow an – Read More … Read More “Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS – The Hacker News” »
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants – The Hacker News
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop a persistent implant. “Every package contains three files (package.json, index.js, postinstall.js), has no description, repository, – Read More – The … Read More “36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants – The Hacker News” »
UNC1069 Targets Node.js Maintainers via Fake LinkedIn, Slack Profiles – Hackread – Cybersecurity News, Data Breaches, AI and More
North Korean group UNC1069 targets Node.js maintainers using fake LinkedIn and Slack profiles to spread malware and compromise open source packages. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
A Vulnerability has been discovered in Fortinet FortiClientEMS that could allow for arbitrary code execution. FortiClientEMS is a centralized management platform for deploying, configuring, monitoring, and enforcing security policies across numerous endpoints (computers) running the FortiClient agent. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the affected service account. Depending … Read More “A Vulnerability in Fortinet FortiClientEMS Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users – Hackread – Cybersecurity News, Data Breaches, AI and More
A fake Chrome browser extension called ‘ChatGPT Ad Blocker’ was harvesting conversations of ChatGPT users in the name of offering an ad-free experience. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
North Korean Hackers Abuse GitHub to Spy on South Korean Firms – Hackread – Cybersecurity News, Data Breaches, AI and More
Researchers from FortiGuard Labs have uncovered a high-severity spying campaign targeting South Korean companies. Discover how North Korean… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing – The Hacker News
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a cluster of activity that overlaps with DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo Panda. “This TA416 activity included multiple – Read More – The Hacker … Read More “China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing – The Hacker News” »
AI Future: The Leading International AI and Web3 Forum to Take Place in April – Hackread – Cybersecurity News, Data Breaches, AI and More
Moscow, Russia, 3rd April 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
AI Firm Mercor Confirms Breach as Hackers Claim 4TB of Stolen Data – Hackread – Cybersecurity News, Data Breaches, AI and More
AI firm Mercor confirms a breach linked to a LiteLLM supply chain attack, as hackers claim to have stolen 4TB of sensitive data and internal systems. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’ – CyberScoop
Sen. Ron Wyden, D-Ore., warned Social Security Administration chief Frank Bisignano that any follow-through on President Donald Trump’s executive order creating a new database of U.S. voters using agency data would be viewed by Democrats as a conscious choice on the part of SSA officials to participate in “blatant voter suppression.” “Facilitating Donald Trump’s directive … Read More “Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’ – CyberScoop” »
President Donald Trump’s fiscal 2027 budget would slash the Cybersecurity and Infrastructure Security Agency’s total by $707 million, according to a summary released Friday, which would deeply chop down an agency that already took a big hit in Trump’s first year. Another budget document suggests a smaller — but still substantial — hit of $361 … Read More “Trump budget proposal would cut hundreds of millions more from CISA – CyberScoop” »
Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’ – CyberScoop
Sen. Ron Wyden, D-Ore., warned Social Security Administration chief Frank Bisignano that any follow-through on President Donald Trump’s executive order creating a new database of U.S. voters using agency data would be viewed by Democrats as a conscious choice on the part of SSA officials to participate in “blatant voter suppression.” “Facilitating Donald Trump’s directive … Read More “Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’ – CyberScoop” »
A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom – Read More –
The next major breach hitting your clients probably won’t come from inside their walls. It’ll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor nobody in IT knows about. That’s the new attack surface, and most organizations are underprepared for it. Cynomi’s new guide, Securing the Modern Perimeter: The Rise of … Read More “Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture – The Hacker News” »
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069. Maintainer Jason Saayman said the attackers tailored their social engineering efforts “specifically to me” by first approaching him under the guise of the founder of … Read More “UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack – The Hacker News” »
A Nigerian fraudster spent years posing as a woman online, romancing unsuspecting American men out of their savings – until he accidentally tried the same trick on a fellow scammer, who told him to “learn how to do a clean job.” The recovered chat logs helped put him behind bars for 15 years. Read more … Read More “Nigerian romance scammer jailed after being caught out by fellow fraudster – GRAHAM CLULEY” »
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK – The Hacker News
Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026. “Earlier today, a malicious actor gained unauthorized access to Drift Protocol through a novel attack involving durable nonces, resulting in a rapid takeover of Drift’s Security Council administrative powers,” the& … Read More “Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK – The Hacker News” »
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images – The Hacker News
Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile operating systems. The malware has been found to conceal itself within seemingly benign apps, such as enterprise messengers and food delivery services, while – Read More – The Hacker … Read More “New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images – The Hacker News” »
Posted by cyber security on Apr 02 A vulnerability was identified in OWASP CRS where whitespace padding in filenames can bypass file upload extension checks, allowing uploads of dangerous files such as .php, .phar, .jsp, and .jspx. This issue has been assigned CVE‑2026‑33691. Impact: Attackers may evade CRS protections and upload web shells disguised … Read More “[CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability – Full Disclosure” »
Posted by Egidio Romano on Apr 02 ————————————————————————— MetInfo CMS <= 8.1 (weixinreply.class.php) PHP Code Injection Vulnerability ————————————————————————— [-] Software Link: https://www.metinfo.cn [-] Affected Versions: Versions 7.9, 8.0, and 8.1. [-] Vulnerability Description: The vulnerable code is located into the… – Read More – Full Disclosure
Posted by Joseph Goydish II via Fulldisclosure on Apr 02 SUMMARY Apple’s Oblivious HTTP relay for Live Caller ID Lookup (iOS 18+) routes traffic through 14 third-party endpoints across six countries. These include an anonymous Delaware LLC sharing data with OpenAI, a Russian endpoint (Yandex), and a Swiss GmbH whose privacy policy names “The … Read More “Apple OHTTP Relay: 14 Third-Party Endpoints, 6 Countries, Zero User Visibility – Full Disclosure” »
SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) – Vienna Symphonic Library – Full Disclosure
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 02 SEC Consult Vulnerability Lab Security Advisory < 20260326-0 > ======================================================================= title: Local Privilege Escalation product: Vienna Assistant (MacOS) – Vienna Symphonic Library vulnerable version: 1.2.542 fixed version: – CVE number: CVE-2026-24068 impact: high homepage:https://www.vsl.co.at/ … Read More “SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) – Vienna Symphonic Library – Full Disclosure” »
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 02 SEC Consult Vulnerability Lab Security Advisory < 20260401-0 > ======================================================================= title: Broken Access Control product: Open WebUI vulnerable version: <v0.8.11 fixed version: v0.8.11 CVE number: CVE-2026-34222 impact: high … Read More “SEC Consult SA-20260401-0 :: Broken Access Control in Open WebUI – Full Disclosure” »
Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution. Cisco Smart Software Manager On‑Prem is a centralized Cisco tool used by organizations to manage software licenses, entitlements, and compliance for Cisco products within their own network environment. Cisco Integrated Management Controller (IMC) is embedded server … Read More “Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Progress ShareFile, which when chained together, could allow for remote code execution. Progress ShareFile is a secure, cloud-based content collaboration and file-sharing platform. It enables businesses to securely exchange documents, manage client workflows, and obtain electronic signatures, with a focus on compliance for industries like finance and healthcare. Successful … Read More “Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe API keys, and GitHub tokens at scale. Cisco Talos has attributed the operation to a threat cluster it tracks as – Read More – The Hacker News
ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak – Hackread – Cybersecurity News, Data Breaches, AI and More
ShinyHunters hackers claim they stole 3 million+ Cisco records via Salesforce and AWS, warning of a public leak if demands are not met by April 3, 2026. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Immigration and Customs Enforcement has confirmed it is using Paragon spyware, prompting outrage Thursday from a trio of House Democrats. In response to a letter from the lawmakers inquiring about Paragon’s use, acting ICE Director Todd Lyons wrote that he had authorized the use of “cutting-edge technological tools” to help the Homeland Security Investigations division … Read More “House Dems decry confirmed ICE usage of Paragon spyware – CyberScoop” »
Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system with elevated privileges. The vulnerability, tracked as CVE-2026-20093, carries a CVSS score of 9.8 out of a maximum of 10.0. “This – Read More … Read More “Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise – The Hacker News” »
Microsoft Warns of WhatsApp Attachments Spreading Backdoor on Windows PCs – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft warns of a WhatsApp attachments spreading VBS malware that installs backdoors on Windows PCs, giving hackers remote access and control systems. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
With the country’s cybersecurity workforce still experiencing major shortages, a bipartisan, bicameral group of lawmakers is pushing to enlist the Department of Labor to help tackle the problem. The Cyber Ready Workforce Act would direct the DOL to establish a grant program that supports the “creation, implementation, and expansion of registered apprenticeship programs in cybersecurity,” … Read More “Lawmakers renew push for Labor Department-backed cyber apprenticeship grants – CyberScoop” »
Akira ransomware group can achieve initial access to data encryption in less than an hour – CyberScoop
The Akira ransomware group has compromised hundreds of victims over the past year with a well-honed attack lifecycle that has whittled down the time from initial access to encryption of data in less than four hours, according to cybersecurity firm Halcyon. Akira has been active since 2023, racking up at least $245 million in ransom … Read More “Akira ransomware group can achieve initial access to data encryption in less than an hour – CyberScoop” »
Medtech company Stryker says it’s back to being “fully operational,” three weeks after it became the most prominent victim to date of Iranian hackers, who said they attacked the Michigan-based company in retaliation over the conflict with the United States and Israel. A March 11 wiper attack from the pro-Palestinian, Iranian government-connected group Handala damaged … Read More “Medtech giant Stryker says it’s back up after Iranian cyberattack – CyberScoop” »
This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls – Read More –
ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories – The Hacker News
The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping systems safe this week. Things are moving fast. The list includes researchers chaining small bugs together to create massive backdoors, old software flaws – … Read More “ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories – The Hacker News” »





