⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More | Cybersecurity

Ravie LakshmananApr 13, 2026Cybersecurity / Hacking Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in…

Read more

Simply opening a PDF could trigger this Adobe Reader zero-day | Malware

Opening the wrong PDF in Adobe Reader was enough to let criminals quietly spy on your computer and unleash more attacks, even though everything looked normal. A researcher analyzed a…

Read more

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident | Cybersecurity

OpenAI revealed a GitHub Actions workflow used to sign its macOS apps, which downloaded the malicious Axios library on March 31, but noted that no user data or internal system was compromised. “Out…

Read more

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads | Cybersecurity

Ravie LakshmananApr 12, 2026Malware / Threat Intelligence Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than…

Read more

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data | Cybersecurity

Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc….

Read more

This New Malware Lives on the Blockchain and Can’t Ever Be Deleted. Here’s What It Can Do | News World

It started with a work offer. Last year, the blockchain crime-detection firm Crystal Intelligence’s then-vice president of engineering received a LinkedIn message from a man asking if he would be…

Read more

ClickFix finds a new way to infect Macs | Malware

ClickFix campaigns are looking for alternatives now that many Mac users have been made aware of the dangers of pasting certain commands into Terminal. Researchers found that ClickFix has kept…

Read more

Fake Claude site installs malware that gives attackers access to your computer | Malware

Claude’s rapid growth—nearly 290 million web visits per month—has made it an attractive target for attackers, and this campaign shows how easy it is to fall for a fake site….

Read more

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs | Cybersecurity

Ravie LakshmananApr 10, 2026Malware / Blockchain Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated…

Read more

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows | Cybersecurity

Ravie LakshmananApr 10, 2026Malware / Browser Security Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature…

Read more

30,000 private Facebook images allegedly downloaded by Meta employee | Malware

Every tech company tells you your data is safe. They’ve (hopefully) got encryption, access controls, and zero-trust architectures—the whole glossy security brochure. And then someone on the inside writes a…

Read more

NSFW app leak exposes 70,000 prompts linked to individual users | Malware

MyLovely.AI, an AI “artwork” generation platform, has reportedly been compromised, affecting 106,362 registered users. The AI girlfriend app allows users to generate personalized NSFW content and engage in real-time conversations…

Read more

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets | Cybersecurity

Ravie LakshmananApr 09, 2026Vulnerability / Mobile Security Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions…

Read more

Scammers pose as Amazon support to steal your account | Malware

Cybercriminals using the so-called “spray and pray” tactic love to impersonate well-known brands. Especially ones with huge customer bases. Amazon reportedly has around 310 million active customers, so they certainly…

Read more

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories | Cybersecurity

Ravie LakshmananApr 09, 2026Hacking News / Cybersecurity News Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting…

Read more

This fake Windows support website delivers password-stealing malware | Malware

A fake Microsoft support website is tricking people into downloading what looks like a normal Windows update. Instead, it installs malware designed to steal passwords, payment details, and account access….

Read more

Russian hacking group targets home and small office routers to spy on users | Malware

British security officials found that a group linked to the Russian military is spying on users of compromised Small Office/Home Office (SOHO) routers in a broad cyber espionage campaign. A…

Read more

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy | Cybersecurity

Ravie LakshmananApr 08, 2026Cryptomining / Network Security Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure. “Chaos malware is…

Read more

Your extensions leak clues about you, so we made sure Browser Guard doesn’t | Malware

Did you know you can be profiled based on the browser extensions you use? Advertisers can detect which extensions are installed and use that to build a picture of the…

Read more

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices | Cybersecurity

Ravie LakshmananApr 08, 2026IoT Security / Network Security Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been…

Read more

Timeshare owners warned to watch out for cartel-linked scams | Malware

If you own a timeshare and have been searching for a way out, you need to know who may be targeting you. In February, the US Treasury Department announced sanctions…

Read more

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP) | Cybersecurity

The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems.  The…

Read more

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs | Cybersecurity

Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. “These attacks have led to…

Read more

Support platform breach exposes Hims & Hers customer data | Malware

Healthcare companies handle some of the most personal data imaginable. That makes them a magnet for hackers. And when those companies outsource their customer support to third-party platforms, every one…

Read more

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign | Cybersecurity

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn…

Read more

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access | Cybersecurity

Ravie LakshmananApr 07, 2026Vulnerability / DevSecOps A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability,…

Read more

Traffic violation scams swap links for QR codes to steal your card details | Malware

As soon as people start to get to grips with a certain type of scam, criminals deploy new tactics to keep stealing money.  Now people have learned to distrust links…

Read more

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips | Cybersecurity

New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of…

Read more

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed | Cybersecurity

Ravie LakshmananApr 07, 2026Artificial Intelligence / Vulnerability Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The…

Read more

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations | Cybersecurity

An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East. The activity, assessed to be ongoing,…

Read more
Update cookies preferences