Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. “This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data,” the Microsoft Defender – Read More – The … Read More “EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets – The Hacker News” »
Category: Attack Feeds
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs – Hackread – Cybersecurity News, Data Breaches, AI and More
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns – The Hacker News
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. “LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and – Read More – The Hacker … Read More “UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns – The Hacker News” »
The recent FBI-led operation to knock Russian government hackers off routers sought to topple an especially insidious and threateningly contagious cyberespionage campaign, top bureau cyber official Brett Leatherman told CyberScoop. Researchers, along with U.S. and foreign government agencies, revealed details of the campaign this week by which APT28 — also known as Forest Blizzard or … Read More “Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’ – CyberScoop” »
New macOS Malware notnullOSX Targets Crypto Wallets Over $10K – Hackread – Cybersecurity News, Data Breaches, AI and More
macOS Malware notnullOSX targets crypto wallets over $10K, using fake apps, Terminal tricks, and backdoors to steal funds and sensitive data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action – Hackread – Cybersecurity News, Data Breaches, AI and More
Austin, Texas, United States, 9th April 2026, CyberNewswire – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks – Hackread – Cybersecurity News, Data Breaches, AI and More
LayerX researchers have discovered how to bypass Claude Code’s safety rules using the CLAUDE.md file. This exploit allows… – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories – The Hacker News
Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more … Read More “ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories – The Hacker News” »
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa – Read More – The Hacker News
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second – Read More – The Hacker … Read More “Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025 – The Hacker News” »
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to … Read More “The Hidden Security Risks of Shadow AI in Enterprises – The Hacker News” »
Our nation has entered a new fraud arms race fueled by AI. With billions of dollars in fraud losses mounting in both the private and public sectors, it’s clear the old ways of deterring fraud aren’t working. That’s why we need a new playbook that starts with understanding how fraudsters operate, evolving our defenses, and … Read More “Don’t just fight fraud, hunt it – CyberScoop” »
Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing – GRAHAM CLULEY
LinkedIn has been secretly scanning your browser for over 6,000 installed extensions — on every single click you make. It can tell if you’re job hunting, what religion you are, and whether you have ADHD. And none of this is mentioned anywhere in their privacy policy. Meanwhile, California’s crypto millionaires are learning that no amount … Read More “Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing – GRAHAM CLULEY” »
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure. “Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices,” Darktrace said in a new report. – Read More – The Hacker News
Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign – Hackread – Cybersecurity News, Data Breaches, AI and More
Operation Masquerade: The FBI and DoJ disrupted a Russian GRU campaign that hijacked routers via DNS attacks to spy on users and steal credentials. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It’s capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. “Built for … Read More “Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices – The Hacker News” »
An apparent hack-for-hire campaign from a group with suspected Indian government connections targeted Middle Eastern and North African journalists and activists using spyware, three collaborating organizations said in reports published Wednesday. The attacks shared infrastructure that pointed to the advanced persistent threat group known as Bitter, which most frequently targets government, military, diplomatic and critical … Read More “Hack-for-hire spyware campaign targets journalists in Middle East, North Africa – CyberScoop” »
In September of 2024, ZDI received a vulnerability submission from an anonymous researcher affecting npm CLI that revealed a fundamental design issue in Node.js. This blog details how it continues to expose applications to local privilege escalation (LPE) attacks on Windows systems, including the Discord desktop app (CVE-2026-0776 0-Day), which remains unpatched and vulnerable. The … Read More “Node.js Trust Falls: Dangerous Module Resolution on Windows – Zero Day Initiative – Blog” »
The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. “PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro – Read More – … Read More “APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies – The Hacker News” »
Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Flaw Disclosure – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft researchers have uncovered a fast-moving group, Storm-1175, launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Russian Forest Blizzard Hackers Hijack Home Routers for Global Spying – Hackread – Cybersecurity News, Data Breaches, AI and More
Microsoft Threat Intelligence reveals how Russian hacking group Forest Blizzard uses home routers for DNS hijacking and spying. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP) – The Hacker News
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems. The result is Identity Dark Matter: identity activity that sits outside the visibility of centralized IAM and – Read More – The Hacker News
New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto – Hackread – Cybersecurity News, Data Breaches, AI and More
Netskope Threat Labs report a new ClickFix attack using fake CAPTCHAs to deploy Tor-backed NodeJS malware and drain crypto wallets on Windows. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities. The model will be used by a small set of organizations, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike,& – Read More – The Hacker News
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. “The threat actor’s packages were designed to impersonate legitimate developer tooling […], while quietly functioning as malware loaders, extending Contagious Interview’s established playbook into a coordinated – Read More – The Hacker News
Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs – The Hacker News
Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. “These attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial – Read More – The Hacker News
Russian state-sponsored attackers compromised more than 18,000 routers spread across more than 120 countries to gain deeper access to sensitive networks for a large-scale espionage campaign before it was recently neutralized, researchers and authorities said Tuesday. Forest Blizzard, also known as APT28 and Fancy Bear, exploited known vulnerabilities to steal credentials for thousands of TP-Link … Read More “Feds quash widespread Russia-backed espionage network spanning 18,000 devices – CyberScoop” »
Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
REF1695 hackers spread Monero mining malware via fake non-profit installers, using stealth tactics to evade detection and hijack systems for profit. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Iranian government hackers are launching disruptive cyberattacks on American energy and water infrastructure, U.S. government agencies “urgently” warned Tuesday. The hackers are taking aim at devices and systems that control industrial processes, and have harmed victims in the last month following the onset of U.S.-Israel strikes against Iran, according to the joint alert from the … Read More “Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn – CyberScoop” »
Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities – CyberScoop
Major technology companies have joined forces in an effort to use advanced artificial intelligence to identify and address security flaws in the world’s most critical software systems, marking a significant shift in how the industry approaches cybersecurity threats. Anthropic announced Project Glasswing on Tuesday, bringing together Amazon, Apple, Broadcom, Cisco, CrowdStrike, the Linux Foundation, Microsoft, … Read More “Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities – CyberScoop” »
Cybercrime remains a booming business. Annual cybercrime losses amounted to almost $20.9 billion last year, reflecting a 26% increase from 2024, the FBI’s Internet Crime Complaint Center (IC3) said in its annual report Tuesday. The comprehensive study exposes a worsening digital crime environment that is driving financial losses, with momentum moving in the wrong direction … Read More “Cybercrime losses jumped 26% to $20.9 billion in 2025 – CyberScoop” »
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May 2025. The large-scale exploitation campaign has been codenamed – … Read More “Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign – The Hacker News” »
Hackers linked to Russia’s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code. Microsoft … Read More “Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on Security” »
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024. ” – Read More – The Hacker … Read More “Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access – The Hacker News” »
GrafanaGhost Vulnerability Allows Data Theft via AI Injection – Hackread – Cybersecurity News, Data Breaches, AI and More
GrafanaGhost is a critical vulnerability in Grafana’s AI components that uses indirect prompt injection and protocol-relative URL bypasses to exfiltrate data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Security researchers at Noma Security have disclosed a new vulnerability they are calling GrafanaGhost, an exploit capable of silently stealing sensitive data from Grafana environments by chaining multiple security bypasses, including a method that circumvents the platform’s AI model guardrails without requiring any user interaction. Grafana is widely deployed across enterprise organizations as a central … Read More “‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace – CyberScoop” »
AI Agents and Non-Human Identities Creating Critical Security Gaps, Report – Hackread – Cybersecurity News, Data Breaches, AI and More
New research from Keeper Security, reveals non-human identities and automated system-to-system interactions are becoming the top security risk for businesses in 2026. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. “A purpose-built Python scanner continuously sweeps major cloud IP ranges for vulnerable targets, automatically installing malicious nodes via ComfyUI-Manager if no exploitable node is already – Read More – The Hacker … Read More “Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign – The Hacker News” »
When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the average cost of a breach at $4.4 million. Avoiding even one major incident is enough to justify most security investments, but that headline figure obscures the more persistent problems caused by recurring credential … Read More “The Hidden Cost of Recurring Credential Incidents – The Hacker News” »
In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet the risk is actually increasing. According to new research from the Ponemon Institute, hundreds of applications within the typical enterprise remain disconnected from centralized identity systems. These “dark – Read More – The Hacker News
Threat actors likely associated with the Democratic People’s Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea. The attack chain, per Fortinet FortiGuard Labs, involves obfuscated Windows shortcut (LNK) files acting as the starting point to drop a decoy PDF – Read More – The Hacker News
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of a host. The efforts have been codenamed GPUBreach, GDDRHammer, and GeForge. GPUBreach goes a step further than GPUHammer, demonstrating for the first time that – Read More – The … Read More “New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips – The Hacker News” »
Life imprisonment for Cambodian scam compound operators – but will it make a difference? – GRAHAM CLULEY
Cambodia has taken a dramatic step in its fight against scam compounds that have imprisoned innocent people, and forced them to work as virtual slaves defrauding victims via the internet around the world with romance scams and dodgy investment schemes. Read more in my article on the Hot for Security blog. – Read More – … Read More “Life imprisonment for Cambodian scam compound operators – but will it make a difference? – GRAHAM CLULEY” »
A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate “high-velocity” attacks and break into susceptible internet-facing systems. “The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent – Read More – The Hacker … Read More “China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware – The Hacker News” »
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed – The Hacker News
Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution. “The CustomMCP node allows users to input configuration settings for connecting – Read More … Read More “Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed – The Hacker News” »
Fortinet customers confront actively exploited zero-day, with a full patch still pending – CyberScoop
Fortinet released an emergency software update over the weekend to address an actively exploited vulnerability in FortiClient EMS, an endpoint management tool for customer devices. The zero-day vulnerability — CVE-2026-35616 — has a CVSS rating of 9.8 and was added to the Cybersecurity and Infrastructure Security Agency’s known exploited vulnerability catalog Monday. Fortinet said in … Read More “Fortinet customers confront actively exploited zero-day, with a full patch still pending – CyberScoop” »
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations – The Hacker News
An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East. The activity, assessed to be ongoing, was carried out in three distinct attack waves that took place on March 3, March 13, and March 23, 2026, per Check Point. “The campaign is … Read More “Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations – The Hacker News” »
A federal judge has sentenced the maker of stalkerware pcTattleTale, which went out of business after a data breach, to supervised release and a $5,000 fine. Bryan Fleming pleaded guilty in January to a charge of intentionally manufacturing, possessing or selling a device with the knowledge that it would be primarily used for surreptitious interception … Read More “pcTattleTale stalkerware maker sentence includes fine, supervised release – CyberScoop” »
Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins – Hackread – Cybersecurity News, Data Breaches, AI and More
New Phishing scam uses fake missile alerts and the ongoing conflict involving Iran to target users with QR codes and fake government emails to steal Microsoft passwords. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More – The Hacker News
This week had real hits. The key software got tampered with. Active bugs showed up in the tools people use every day. Some attacks didn’t even need much effort because the path was already there. One weak spot now spreads wider than before. What starts small can reach a lot of systems fast. New bugs, faster use, less time to react. That’s this … Read More “⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More – The Hacker News” »