Russian crypto-exchange Grinex claims Western intelligence agencies were behind a $13m heist – Read More –
North Korea’s Lazarus Group is pegged for a $290m crypto theft at KelpDAO – Read More –
Cloud app developer Vercel appears to have suffered a security breach – Read More –
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2023-27351 (CVSS score: 8.2) – An improper authentication vulnerability in PaperCut – Read … Read More “CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines – The Hacker News” »
The financing sector is on the verge of a turning point. With the development of quantum computing beyond theoretical… The post Quantum-Ready Banking Starts with CryptoBind: HSM + Vault + KMS Strategy appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Vercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved – Hackread – Cybersecurity News, Data Breaches, AI and More
Vercel confirms a breach linked to Context.ai as a hacker lists alleged data for $2M. ShinyHunters denies involvement and flags imposters. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Federal Trade Commission is poised to deepen its involvement in curbing the use of AI for malicious purposes, including the spread of nonconsensual sexualized deepfakes and voice cloning scams. Last year, Congress passed the Take It Down Act, a law that allowed for criminal prosecution of individuals who share or distribute nonconsensual, intimate images … Read More “The FTC’s AI portfolio is about to get bigger – CyberScoop” »
Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution – CyberScoop
As organizations consider agentic AI for their business and IT stacks, researchers continue to find bugs and vulnerabilities in major, commercial models that can significantly expand their attack surface. This week, researchers at Pillar Security disclosed a vulnerability in Antigravity, an AI-powered developer tool for filesystem operations made by Google. The bug, since patched, combined … Read More “Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution – CyberScoop” »
Vercel customers are at risk of compromise after an attacker hopped through multiple internal systems to steal credentials and other sensitive data, the company said in a security bulletin Sunday. The attack, which didn’t originate at Vercel, showcases the pitfalls of interconnected cloud applications and SaaS integrations with overly privileged permissions. An attacker traversed third-party … Read More “Vercel’s security breach started with malware disguised as Roblox cheats – CyberScoop” »
A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems. The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of command injection leading to the execution of arbitrary code. SGLang is … Read More “SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files – The Hacker News” »
How to Remove Objects from Video: AI Tools & Pro Tips (2026) – Hackread – Cybersecurity News, Data Breaches, AI and More
Remove unwanted objects from video effortlessly with AI in 2026. Learn step-by-step methods, best tools, and pro tips to clean up your footage like a professional. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Fake TikTok Downloaders on Chrome and Edge Spying on 130,000 Users – Hackread – Cybersecurity News, Data Breaches, AI and More
Over 130,000 users are at risk from fake TikTok downloader extensions on Chrome and Microsoft Edge. Researchers discovered these malicious tools use device fingerprinting to spy on users and steal sensitive browser data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities – Read More –
⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More – The Hacker News
Monday’s recap shows the same pattern in different places. A third-party tool becomes a way in, then leads to internal access. A trusted download path is briefly swapped to deliver malware. Browser extensions act normally while pulling data and running code. Even update channels are used to push payloads. It’s not breaking systems—it’s bending trust. … Read More “⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More – The Hacker News” »
Formbook attacks use combination of DLL Side-Loading and Obfuscated JavaScript to stay hidden, researchers at WatchGuard have uncovered – Read More –
British Hacker Tyler Buchanan Pleads Guilty to $8M Hacking Scheme in US – Hackread – Cybersecurity News, Data Breaches, AI and More
Tyler Robert Buchanan, a 24-year-old British hacker linked to Scattered Spider, admits to a multi-year US hacking scheme involving at least $8M in crypto theft. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Two weeks ago, a suspected North Korean threat actor slipped malicious code into a package within Axios, a widely used JavaScript library. The immediate concern was the blast radius: roughly 100 million weekly downloads spanning enterprises, startups, and government systems. But beyond the sheer scale, the attack’s speed was just as worrisome – a stark … Read More “Why the Axios attack proves AI is mandatory for supply chain security – CyberScoop” »
FortiGuard Labs has identified a Mirai-based Nexcorium campaign actively exploiting CVE-2024-3721 in TBK DVR devices – Read More –
The fastest way to fall in love with an AI tool is to watch the demo. Everything moves quickly. Prompts land cleanly. The system produces impressive outputs in seconds. It feels like the beginning of a new era for your team. But most AI initiatives don’t fail because of bad technology. They stall because what … Read More “Why Most AI Deployments Stall After the Demo – The Hacker News” »
Attackers rarely exploit an edge-device vulnerability indiscriminately. Typically, they first test how widely the flaw can be used and how much access it can provide, then move on to steal data or disrupt operations. Pre-attack surveillance and planning leaves a lot of noise in its wake. These signals — particularly spikes in traffic that are … Read More “Network ‘background noise’ may predict the next big edge-device vulnerability – CyberScoop” »
Cybersecurity researchers have discovered a critical “by design” weakness in the Model Context Protocol’s (MCP) architecture that could pave the way for remote code execution and have a cascading effect on the artificial intelligence (AI) supply chain. “This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct … Read More “Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain – The Hacker News” »
52M-Download protobuf.js Library Hit by RCE in Schema Handling – Hackread – Cybersecurity News, Data Breaches, AI and More
Critical RCE flaw in protobuf.js lets attackers execute code via malicious schemas. Learn who is at risk, affected versions, and how to fix it. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The National Cyber Security Centre has shared an update of its resilience-building efforts for the NHS – Read More –
Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems – The Hacker News
Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target Israeli water treatment and desalination systems. The malware has been codenamed ZionSiphon by Darktrace, highlighting its ability to set up persistence, tamper with local configuration files, and scan for operational technology (OT)-relevant services on the local subnet. – … Read More “Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems – The Hacker News” »
A call to action to collectively build UK resilience. – Read More – All Feed
Web infrastructure provider Vercel has disclosed a security breach that allows bad actors to gain unauthorized access to “certain” internal Vercel systems. The incident stemmed from the compromise of Context.ai, a third-party artificial intelligence (AI) tool, that was used by an employee at the company. “The attacker used that access to take over the employee’s … Read More “Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials – The Hacker News” »
ShowDoc Vulnerability Patched in 2020 Now Used in Active Server Takeovers – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers are exploiting a 5-year-old ShowDoc vulnerability (CVE-2025-0520) to deploy web shells, enabling RCE and full server takeover worldwide. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Operation PowerOFF: 75K Users of DDoS-for-Hire Services Identified and Warned – Hackread – Cybersecurity News, Data Breaches, AI and More
Operation PowerOFF identifies and warns 75K users of DDoS-for-hire services, nets 4 arrests, and seizes 53 domains in a Europol-led crackdown. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it’s suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The exchange said it fell victim to what it described as a large-scale cyber attack that bore hallmarks of foreign intelligence agency involvement. This attack led … Read More “$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims – The Hacker News” »
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability … Read More “Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet – The Hacker News” »
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; … Read More “Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Founder Liquidity Without Compromising on Growth – Hackread – Cybersecurity News, Data Breaches, AI and More
Founders can access liquidity without exiting by selling shares via secondary deals, reducing financial pressure while staying focused on long-term growth. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps – Hackread – Cybersecurity News, Data Breaches, AI and More
New research from Zimperium reveals four active Android malware campaigns, RecruitRat, SaferRat, Astrinox, and Massiv, targeting over 800 banking apps globally. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Race to Quantum-Proof the Internet Has Already Begun – Hackread – Cybersecurity News, Data Breaches, AI and More
The race to quantum-proof the internet is underway as experts warn of “harvest now, decrypt later” risks and slow migration to post-quantum security. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Congress is grappling with renewal of a surveillance law set to expire at the end of this month that critics say is a mystery on how much of a difference it has made for controversial government spying authorities — for better or worse. The 2024 law reauthorized so-called Section 702 powers of the Foreign Intelligence … Read More “The surveillance law Congress can’t quit — and can’t explain – CyberScoop” »
How the NCSC is reducing risk, improving detection, and helping to keep vital services running. – Read More – All Feed
New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers at Fortinet have discovered Nexcorium, a new Mirai-based malware targeting TBK DVR systems to turn them into a botnet for DDoS attacks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse ( … Read More “Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched – The Hacker News” »
Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users – Read More –
AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds – Read More –
New ZionSiphon Malware Discovered Targeting Israeli Water Systems – Hackread – Cybersecurity News, Data Breaches, AI and More
Researchers at Darktrace have identified ZionSiphon, a new malware targeting Israeli water treatment plants. Learn how this OT-focused… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul – The Hacker News
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing third-party apps … Read More “Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul – The Hacker News” »
Have you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your time. Because newly released research reveals that hackers may already have beaten you to it. Read more in my article on the Fortra blog. – Read More – GRAHAM CLULEY
If you hold cryptocurrency, there’s a very simple golden rule that you should always follow. Never hand over your seed phrase. Garrett Dutton, better known as G. Love – the front man of blues-hip-hop outfit G. Love & Special Sauce – has learnt that lesson the hard way. Read more in my article on the … Read More “Singer loses life savings to fake wallet downloaded from the Apple App Store – GRAHAM CLULEY” »
New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files – Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers spread CGrabber and Direct-Sys malware through GitHub ZIP files, bypassing security tools to steal passwords, crypto wallets, and user data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to – Read … Read More “Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts – The Hacker News” »
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. “CVEs that do not meet those criteria will still be … Read More “NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions – The Hacker News” »
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian – Read More – The Hacker News
Two New Jersey men were sentenced Wednesday for facilitating North Korea’s long-running scheme to plant operatives inside U.S. businesses as employees, generating more than $5 million in illicit revenue for the regime, the Justice Department said. The U.S. nationals — Kejia Wang, also known as Tony Wang, and Zhenxing Wang, also known as Danny Wang … Read More “US nationals sentenced for aiding North Korea’s tech worker scheme – CyberScoop” »
Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. “PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,” Cisco Talos – Read More – The … Read More “Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic – The Hacker News” »





