An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to – Read … Read More “Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts – The Hacker News” »
Category: Attack Feeds
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. “CVEs that do not meet those criteria will still be … Read More “NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions – The Hacker News” »
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian – Read More – The Hacker News
Two New Jersey men were sentenced Wednesday for facilitating North Korea’s long-running scheme to plant operatives inside U.S. businesses as employees, generating more than $5 million in illicit revenue for the regime, the Justice Department said. The U.S. nationals — Kejia Wang, also known as Tony Wang, and Zhenxing Wang, also known as Danny Wang … Read More “US nationals sentenced for aiding North Korea’s tech worker scheme – CyberScoop” »
Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. “PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,” Cisco Talos – Read More – The … Read More “Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic – The Hacker News” »
Authorities from 21 countries took down 53 domains and arrested four people allegedly involved in distributed denial-of-service operations used by more than 75,000 cybercriminals, Europol said Thursday. The globally coordinated effort dubbed “Operation PowerOFF” disrupted booter services and seized and dismantled infrastructure, including servers and databases, that supported the DDoS-for-hire services, officials said. Law enforcement … Read More “Officials seize 53 DDoS-for-hire domains in ongoing crackdown – CyberScoop” »
OpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity – Hackread – Cybersecurity News, Data Breaches, AI and More
OpenAI unveils GPT-5.4-Cyber, a cybersecurity-focused model built to help defenders analyze malware and fix software bugs. The company is also expanding its Trusted Access for Cyber (TAC) program to thousands of verified experts. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories – The Hacker News
You know that feeling when you open your feed on a Thursday morning and it’s just… a lot? Yeah. This week delivered. We’ve got hackers getting creative in ways that are almost impressive if you ignore the whole “crime” part, ancient vulnerabilities somehow still ruining people’s days, and enough supply chain drama to fill a season of television … Read More “ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories – The Hacker News” »
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most – Read More – … Read More “[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment – The Hacker News” »
A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without a single security control registering a violation. Read the full technical breakdown in the Security Intelligence Brief. Download now → The “First-Hop Bias” Blind Spot Most& – Read More – The Hacker News
Researchers Say Fiverr Left User Files Open to Google Search – Hackread – Cybersecurity News, Data Breaches, AI and More
Private Fiverr user documents, including tax records and IDs, were reportedly found in Google search results due to a storage configuration issue. Read more about the findings and the company’s response to the data exposure. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks – The Hacker News
A “novel” social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage – Read More … Read More “Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks – The Hacker News” »
Cybersecurity Risks of Hiring a Virtual Assistant and How to Protect Your Business – Hackread – Cybersecurity News, Data Breaches, AI and More
Virtual assistants boost productivity but add cybersecurity risks. Poor access control, weak devices, and credential sharing can expose sensitive business data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution – The Hacker News
Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below – CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on … Read More “Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution – The Hacker News” »
A company wakes up to a news story claiming it has suffered a major data breach. The details are specific, technical and convincing. But the breach didn’t happen. No systems were compromised. No data was taken. A language model generated the entire story, filling in plausible details from scratch. And before the company can figure … Read More “Ghost breaches: How AI-mediated narratives have become a new threat vector – CyberScoop” »
The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April – Read More – The Hacker News
Securing Remote Server Access: Why VPNs Matter for Administrators – Hackread – Cybersecurity News, Data Breaches, AI and More
VPNs help secure remote server access by encrypting traffic, restricting entry to authorized users, and reducing exposure of critical systems to the internet. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Anonymizing Network Traffic: A Dive into SOCKS5 and Data Encryption – Hackread – Cybersecurity News, Data Breaches, AI and More
SOCKS5 protocol explained: anonymize traffic, boost security with encryption, bypass restrictions, and enable reliable data collection for business use. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying – GRAHAM CLULEY
A hacking group claims to have broken into the flood defence system protecting Venice’s Piazza San Marco – and is offering to sell access to whoever wants it. The asking price? A frankly insulting $600. Meanwhile, Anthropic accidentally leaked the source code for Claude Code via a basic packaging mistake. Oh, and by the way, … Read More “Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying – GRAHAM CLULEY” »
Fake Claude AI Installer Targets Windows Users with PlugX Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
Fake Claude AI installer mimicking Anthropic spreads PlugX malware on Windows, using DLL sideloading to gain persistent remote access to infected systems. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The federal agency tasked with analyzing security vulnerabilities is overwhelmed as it and other authorities struggle to keep pace with a flood of defects that grows every year. The National Institute of Standards and Technology announced Wednesday that it has capitulated to that deluge and narrowed the priorities for its National Vulnerability Database. NIST said … Read More “NIST narrows scope of CVE analysis to keep up with rising tide of vulnerabilities – CyberScoop” »
Fake Ledger Live App on Apple Store Linked to $9.5M Crypto Theft – Hackread – Cybersecurity News, Data Breaches, AI and More
Apple approved a fake Ledger Live app on its App Store, allowing scammers to steal $9.5 million from more than 50 users. Did you install this app? – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
National Cyber Director Sean Cairncross expects more executive orders coming from the White House as part of implementing the national cybersecurity strategy, he said Wednesday. Staffers on Capitol Hill and others in the cyber world have been awaiting the implementation guidance the Trump administration had proclaimed would come to accompany the strategy published last month. … Read More “Executive orders likely ahead in next steps for national cyber strategy – CyberScoop” »
Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. “By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery – Read More – The Hacker News
OpenAI said it is expanding its Trusted Access for Cyber program to “thousands of individuals and organizations,” who will use the company’s technology to root out bugs and vulnerabilities in their products. The program will also incorporate GPT 5.4 Cyber, a new variant of ChatGPT that OpenAI says is specifically optimized for cybersecurity tasks. OpenAI’s … Read More “OpenAI expands Trusted Access for Cyber program with new GPT 5.4 Cyber model – CyberScoop” »
ShinyHunters hackers leak 7.54 GB of Rockstar Games data from Snowflake analytics systems, confirming no player records or personal information were exposed. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More – The Hacker News
A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April’s Patch Tuesday releases. Topping the list is an SQL injection vulnerability impacting SAP Business Planning and Consolidation and SAP Business Warehouse (CVE-2026-27681, CVSS score: 9.9) that could result in the execution of arbitrary database – Read More – The … Read More “April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More – The Hacker News” »
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover – The Hacker News
A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It has been codenamed MCPwn by Pluto Security. ” – Read More … Read More “Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover – The Hacker News” »
Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations to adopt it across operational and security functions. Pentera’s AI Security and Exposure Report 2026 reflects that momentum: every CISO surveyed – Read More – The Hacker News
108 malicious Chrome extensions caught stealing Google and Telegram data from 20,000 users – GRAHAM CLULEY
Cybersecurity researchers have revealed that 108 malicious Google Chrome extensions have been quietly stealing user credentials, hijacking Telegram sessions, and injecting unwanted ads and scripts into browsers – all reporting back to the same central point. Read more in my article on the Hot for Security blog. – Read More – GRAHAM CLULEY
Active HanGhost Loader Campaign Targets Enterprise Payment and Logistics Workflows – Hackread – Cybersecurity News, Data Breaches, AI and More
Active HanGhost Loader campaign targets enterprise payment and logistics workflows with fileless attacks, multi-stage execution, and stealthy malware delivery. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds – Hackread – Cybersecurity News, Data Breaches, AI and More
A new Qrator Labs report reveals that the largest DDoS botnet has grown to 13.5 million devices, and… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Last year, Nvidia CEO Jensen Huang repeatedly denied that China was obtaining America’s most advanced chips. ‘There’s no evidence of any AI chip diversion,’ he said, dismissing such reports on another occasion as ‘tall tales.’ Federal prosecutors would beg to differ. They’ve charged six men over the past three weeks with smuggling billions of dollars’ … Read More “We’re only seeing the tip of the chip-smuggling iceberg – CyberScoop” »
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities – The Hacker News
Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169 vulnerabilities, 157 are rated Important, eight are rated Critical, three are rated Moderate, and one is rated Low in severity. Ninety-three of the flaws are – Read More – The Hacker News
OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that’s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model, Mythos. “The progressive use of AI accelerates defenders – those responsible for keeping systems, data, and users safe – enabling them to find and fix problems – Read … Read More “OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams – The Hacker News” »
The Cybersecurity and Infrastructure Security Agency has informed participants of the federal government’s Scholarship for Service program that it has canceled this year’s summer internship programs due to the current funding issues at the Department of Homeland Security. Emails from CISA obtained by CyberScoop recently informed applicants that the agency will not bring any CyberCorps: … Read More “CISA cancels summer internships for cyber scholarship students amid DHS funding lapse – CyberScoop” »
How Digital Annotations Are Replacing Paper Markups in Business – Hackread – Cybersecurity News, Data Breaches, AI and More
Digital Annotations replace paper markups in business, enabling real time collaboration, version control, and secure document workflows across teams. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed “BlueHammer.” Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited … Read More “Patch Tuesday, April 2026 Edition – Krebs on Security” »
Microsoft addressed 165 vulnerabilities affecting its various products and underlying systems, including one actively exploited vulnerability in Microsoft Office SharePoint, in this month’s Patch Tuesday update. “By my count, this is the second-largest monthly release in Microsoft’s history,” Dustin Childs, head of threat awareness at Trend Micro’s Zero Day Initiative, wrote in a blog post … Read More “Microsoft drops its second-largest monthly batch of defects on record – CyberScoop” »
A malicious Ledger Live app for macOS available from Apple’s App Store has drained approximately $9.5 million in cryptocurrency from 50 victims in just a few days this month. […] – Read More – BleepingComputer
Microsoft has released Windows 11 KB5083769 and KB5082052 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. […] – Read More – BleepingComputer
Today is Microsoft’s April 2026 Patch Tuesday with security updates for 167 flaws, including 2 zero-day vulnerabilities. […] – Read More – BleepingComputer
Education company McGraw-Hill has confirmed in a statement to BleepingComputer that hackers exploited a Salesforce misconfiguration and accessed its internal data. […] – Read More – BleepingComputer
Microsoft has released the Windows 10 KB5082200 extended security update to fix the April 2026 Patch Tuesday vulnerabilities, including 2 zero-days. […] – Read More – BleepingComputer
Seth Whitworth, who is both acting Associate Deputy Chief of Space Operations for Cyber and Data and acting chief information security officer, said he believes AI tools are shifting the way defenders review cyber risk, both for individual systems and more holistically throughout an enterprise. In particular, Large Language Models can be used to systematically … Read More “Space Force official touts AI’s impact on cyber compliance – CyberScoop” »
Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits – Hackread – Cybersecurity News, Data Breaches, AI and More
Philadelphia, United States / Pennsylvania, 14th April 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now – Hackread – Cybersecurity News, Data Breaches, AI and More
Critical wolfSSL flaw CVE-2026-5194 allows digital ID forgery across billions of devices, update to version 5.9.1 to fix the issue and reduce risk. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
It’s time once again for Patch Tuesday, and this one is huge. We’ve also got multiple exploits in the wild, which adds another layer of urgency to this month’s release. Take a break from your regularly scheduled activities, and let’s take a look at the latest security patches from Adobe and Microsoft. If you’d rather … Read More “The April 2026 Security Update Review – Zero Day Initiative – Blog” »
Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been described as command injection flaws affecting the Perforce VCS (version control software) driver. Details of the two flaws are below – CVE-2026-40176 (CVSS – Read More – The Hacker News
Kraken exchange faces extortion after a staff member misused access to record internal systems, about 2,000 accounts affected, no funds or systems breached. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More