Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges. The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It’s rated Important in severity. An anonymous researcher has been credited with discovering and reporting the flaw. “Improper verification of … Read More “Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug – The Hacker News” »
Many security leaders are still operating with frameworks built for a different era. For years, success was measured by fixed checkpoints, such as passing audits, closing vulnerabilities, and maintaining compliance. Those markers still have value, but they were designed for a threat landscape that moved in predictable, linear ways. Today, that landscape is shifting in … Read More “The AI era demands a different kind of CISO – CyberScoop” »
A former ransomware negotiator has pleaded guilty to abusing his position by working with noted cybercrime group BlackCat – Read More –
Infrawatch says ProxySmart platform enables SIM farm activity at “industrial scale” – Read More –
A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system. “Sandbox escape vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal,” according … Read More “Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape – The Hacker News” »
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles – The Hacker News
Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that’s distributed via a theme related to India’s banking sector. “The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file operations, and session management, indicating a continued espionage-focused capability set rather than – Read More … Read More “Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles – The Hacker News” »
The convergence of global tensions and rapid technological change is driving a new era of cyber risk, the NCSC warns – Read More –
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is an email client. Mozilla Thunderbird … Read More “Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Rental platform unnecessarily collected the data of millions of Australians, privacy commissioner finds – Data and computer security | The Guardian
2Apply’s over-collection of personal information adds to the power of the real estate industry in the competitive rental market, Carly Kind says Follow our Australia news live blog for latest updates Get our breaking news email, free app or daily news podcast An online rental platform has been urged to stop collecting users’ personal information … Read More “Rental platform unnecessarily collected the data of millions of Australians, privacy commissioner finds – Data and computer security | The Guardian” »
As the technology landscape develops, the definition of cyber security is expanding with it. – Read More – All Feed
A South Florida man pleaded guilty to conspiring with multiple ransomware affiliates to commit attacks against and extort payments from the same U.S. companies he represented as a ransomware negotiator for DigitalMint in 2023, the Justice Department said Monday. Angelo John Martino III shared confidential information about victim organizations’ internal negotiating positions and insurance policy … Read More “Former DigitalMint ransomware negotiator pleads guilty to extortion scheme – CyberScoop” »
Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the command-and-control (C2 or C&C) server linked to SystemBC has led to the discovery of a botnet of more than 1,570 victims. “SystemBC establishes SOCKS5 network … Read More “SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation – The Hacker News” »
Microsoft Vulnerabilities Drop, But Critical Flaws Double, Report Warns – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft vulnerabilities fall, but critical flaws double, BeyondTrust report highlights rising risk in Microsoft Office, Azure, and cloud systems. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks – CyberScoop
Lawmakers at a hearing Tuesday explored ways to beef up punishments for ransomware attacks against hospitals, possibly by labeling them as more severe crimes. One proposal floated at the House Homeland Security Committee hearing, to treat ransomware attacks as terrorism, is an idea Congress has flirted with before. Another would be to press prosecutors to … Read More “Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks – CyberScoop” »
A core leader of the hacker subset of The Com responsible for a series of high-profile phishing attacks and cryptocurrency thefts from September 2021 to April 2023 pleaded guilty to federal charges, the Justice Department said Friday. Tyler Robert Buchanan of Dundee, Scotland, pleaded guilty to conspiracy to commit wire fraud and aggravated identity theft. … Read More “Scottish man pleads guilty to attack spree that created Scattered Spider’s notoriety – CyberScoop” »
NGate malware abuses HandyPay app to steal NFC card data and PINs in Brazil – Read More –
Russian crypto-exchange Grinex claims Western intelligence agencies were behind a $13m heist – Read More –
A third individual who was employed as a ransomware negotiator has pleaded guilty to conducting ransomware attacks against U.S. companies in 2023. Angelo Martino, 41, of Land O’Lakes, Florida, teamed up with the operators of the BlackCat ransomware starting in April 2023 to assist the e-crime gang in extracting higher amounts as ransoms. “Working as … Read More “Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023 – The Hacker News” »
A 24-year-old British national and senior member of the cybercrime group “Scattered Spider” has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology … Read More “‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty – Krebs on Security” »
Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them. The vulnerabilities have been collectively codenamed BRIDGE:BREAK by Forescout Research Vedere Labs, which identified nearly 20,000 Serial-to-Ethernet converters exposed – Read More – … Read More “22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters – The Hacker News” »
The Ungoverned Workforce: Cybersecurity Insiders Finds 92% Lack Visibility Into AI Identities – Hackread – Cybersecurity News, Data Breaches, AI and More
Washington D.C., USA, 21st April 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
BreachLock Named Representative Vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation – Hackread – Cybersecurity News, Data Breaches, AI and More
New York, United States, 21st April 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Gentlemen RaaS expands quickly with multi-platform attacks and SystemBC-linked infections – Read More –
Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage. The root cause of slow MTTR is almost never “not enough analysts.” It is almost always the same structural problem: … Read More “5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time – The Hacker News” »
Data exposure, operational disruption and financial losses among issues faced by businesses struggling with the rapid rise of AI agents, warns Cloud Security Alliance report – Read More –
Grinex crypto exchange shuts down, blames Western agencies for $13.7M breach – Hackread – Cybersecurity News, Data Breaches, AI and More
Grinex exchange collapses after $13.7M breach, blames Western spies as Chainalysis flags possible exit scam and sanctions evasion network links claims. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Threat Intel Scraping Without Burning Your Cover or Your Stack – Hackread – Cybersecurity News, Data Breaches, AI and More
Threat Intel Scraping sounds simple until it isn’t, here’s how cybersecurity teams avoid blocks, bad data, and unnecessary risk. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers have discovered a vulnerability in Google’s agentic integrated development environment (IDE), Antigravity, that could be exploited to achieve code execution. The flaw, since patched, combines Antigravity’s permitted file-creation capabilities with an insufficient input sanitization in Antigravity’s native file-searching tool, find_by_name, to bypass the program’s Strict – Read More – The Hacker News
Cybersecurity researchers have discovered a new iteration of an Android malware family calledNGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate. “The threat actors took the app, which is used to relay NFC data, and patched it with malicious code that appears to have been AI-generated,” ESET security researcher Lukáš … Read More “NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs – The Hacker News” »
No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks – The Hacker News
The cybersecurity industry has spent the last several years chasing sophisticated threats like zero-days, supply chain compromises, and AI-generated exploits. However, the most reliable entry point for attackers still hasn’t changed: stolen credentials. Identity-based attacks remain a dominant initial access vector in breaches today. Attackers obtain valid credentials through credential stuffing – Read More – … Read More “No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks – The Hacker News” »
Ensuring cross domain technologies are better understood – and more easily deployed – across sectors. – Read More – All Feed
Mythos matters. It is a significant step forward in AI-assisted vulnerability discovery. But it does not mean cybersecurity changed overnight, nor does it mean enterprises are suddenly facing fully automated exploitation at internet scale tomorrow. It does mean the offensive side of AI is continuing to improve. The defensive side needs to catch up now. … Read More “Mythos can find the vulnerability. It can’t tell you what to do about it. – CyberScoop” »
North Korea’s Lazarus Group is pegged for a $290m crypto theft at KelpDAO – Read More –
Cloud app developer Vercel appears to have suffered a security breach – Read More –
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2023-27351 (CVSS score: 8.2) – An improper authentication vulnerability in PaperCut – Read … Read More “CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines – The Hacker News” »
The financing sector is on the verge of a turning point. With the development of quantum computing beyond theoretical… The post Quantum-Ready Banking Starts with CryptoBind: HSM + Vault + KMS Strategy appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Vercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved – Hackread – Cybersecurity News, Data Breaches, AI and More
Vercel confirms a breach linked to Context.ai as a hacker lists alleged data for $2M. ShinyHunters denies involvement and flags imposters. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Federal Trade Commission is poised to deepen its involvement in curbing the use of AI for malicious purposes, including the spread of nonconsensual sexualized deepfakes and voice cloning scams. Last year, Congress passed the Take It Down Act, a law that allowed for criminal prosecution of individuals who share or distribute nonconsensual, intimate images … Read More “The FTC’s AI portfolio is about to get bigger – CyberScoop” »
Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution – CyberScoop
As organizations consider agentic AI for their business and IT stacks, researchers continue to find bugs and vulnerabilities in major, commercial models that can significantly expand their attack surface. This week, researchers at Pillar Security disclosed a vulnerability in Antigravity, an AI-powered developer tool for filesystem operations made by Google. The bug, since patched, combined … Read More “Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution – CyberScoop” »
Vercel customers are at risk of compromise after an attacker hopped through multiple internal systems to steal credentials and other sensitive data, the company said in a security bulletin Sunday. The attack, which didn’t originate at Vercel, showcases the pitfalls of interconnected cloud applications and SaaS integrations with overly privileged permissions. An attacker traversed third-party … Read More “Vercel’s security breach started with malware disguised as Roblox cheats – CyberScoop” »
A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems. The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of command injection leading to the execution of arbitrary code. SGLang is … Read More “SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files – The Hacker News” »
How to Remove Objects from Video: AI Tools & Pro Tips (2026) – Hackread – Cybersecurity News, Data Breaches, AI and More
Remove unwanted objects from video effortlessly with AI in 2026. Learn step-by-step methods, best tools, and pro tips to clean up your footage like a professional. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Fake TikTok Downloaders on Chrome and Edge Spying on 130,000 Users – Hackread – Cybersecurity News, Data Breaches, AI and More
Over 130,000 users are at risk from fake TikTok downloader extensions on Chrome and Microsoft Edge. Researchers discovered these malicious tools use device fingerprinting to spy on users and steal sensitive browser data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities – Read More –
⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More – The Hacker News
Monday’s recap shows the same pattern in different places. A third-party tool becomes a way in, then leads to internal access. A trusted download path is briefly swapped to deliver malware. Browser extensions act normally while pulling data and running code. Even update channels are used to push payloads. It’s not breaking systems—it’s bending trust. … Read More “⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More – The Hacker News” »
Formbook attacks use combination of DLL Side-Loading and Obfuscated JavaScript to stay hidden, researchers at WatchGuard have uncovered – Read More –
British Hacker Tyler Buchanan Pleads Guilty to $8M Hacking Scheme in US – Hackread – Cybersecurity News, Data Breaches, AI and More
Tyler Robert Buchanan, a 24-year-old British hacker linked to Scattered Spider, admits to a multi-year US hacking scheme involving at least $8M in crypto theft. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Two weeks ago, a suspected North Korean threat actor slipped malicious code into a package within Axios, a widely used JavaScript library. The immediate concern was the blast radius: roughly 100 million weekly downloads spanning enterprises, startups, and government systems. But beyond the sheer scale, the attack’s speed was just as worrisome – a stark … Read More “Why the Axios attack proves AI is mandatory for supply chain security – CyberScoop” »
FortiGuard Labs has identified a Mirai-based Nexcorium campaign actively exploiting CVE-2024-3721 in TBK DVR devices – Read More –
The fastest way to fall in love with an AI tool is to watch the demo. Everything moves quickly. Prompts land cleanly. The system produces impressive outputs in seconds. It feels like the beginning of a new era for your team. But most AI initiatives don’t fail because of bad technology. They stall because what … Read More “Why Most AI Deployments Stall After the Demo – The Hacker News” »





