⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More | Cybersecurity
Ravie LakshmananApr 13, 2026Cybersecurity / Hacking Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in…
Read moreSimply opening a PDF could trigger this Adobe Reader zero-day | Malware
Opening the wrong PDF in Adobe Reader was enough to let criminals quietly spy on your computer and unleash more attacks, even though everything looked normal. A researcher analyzed a…
Read moreOpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident | Cybersecurity
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps, which downloaded the malicious Axios library on March 31, but noted that no user data or internal system was compromised. “Out…
Read moreCPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads | Cybersecurity
Ravie LakshmananApr 12, 2026Malware / Threat Intelligence Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than…
Read moreCitizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data | Cybersecurity
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc….
Read moreThis New Malware Lives on the Blockchain and Can’t Ever Be Deleted. Here’s What It Can Do | News World
It started with a work offer. Last year, the blockchain crime-detection firm Crystal Intelligence’s then-vice president of engineering received a LinkedIn message from a man asking if he would be…
Read moreClickFix finds a new way to infect Macs | Malware
ClickFix campaigns are looking for alternatives now that many Mac users have been made aware of the dangers of pasting certain commands into Terminal. Researchers found that ClickFix has kept…
Read moreFake Claude site installs malware that gives attackers access to your computer | Malware
Claude’s rapid growth—nearly 290 million web visits per month—has made it an attractive target for attackers, and this campaign shows how easy it is to fall for a fake site….
Read moreGlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs | Cybersecurity
Ravie LakshmananApr 10, 2026Malware / Blockchain Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated…
Read moreGoogle Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows | Cybersecurity
Ravie LakshmananApr 10, 2026Malware / Browser Security Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature…
Read more30,000 private Facebook images allegedly downloaded by Meta employee | Malware
Every tech company tells you your data is safe. They’ve (hopefully) got encryption, access controls, and zero-trust architectures—the whole glossy security brochure. And then someone on the inside writes a…
Read moreNSFW app leak exposes 70,000 prompts linked to individual users | Malware
MyLovely.AI, an AI “artwork” generation platform, has reportedly been compromised, affecting 106,362 registered users. The AI girlfriend app allows users to generate personalized NSFW content and engage in real-time conversations…
Read moreEngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets | Cybersecurity
Ravie LakshmananApr 09, 2026Vulnerability / Mobile Security Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions…
Read moreScammers pose as Amazon support to steal your account | Malware
Cybercriminals using the so-called “spray and pray” tactic love to impersonate well-known brands. Especially ones with huge customer bases. Amazon reportedly has around 310 million active customers, so they certainly…
Read moreThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories | Cybersecurity
Ravie LakshmananApr 09, 2026Hacking News / Cybersecurity News Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting…
Read moreThis fake Windows support website delivers password-stealing malware | Malware
A fake Microsoft support website is tricking people into downloading what looks like a normal Windows update. Instead, it installs malware designed to steal passwords, payment details, and account access….
Read moreRussian hacking group targets home and small office routers to spy on users | Malware
British security officials found that a group linked to the Russian military is spying on users of compromised Small Office/Home Office (SOHO) routers in a broad cyber espionage campaign. A…
Read moreNew Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy | Cybersecurity
Ravie LakshmananApr 08, 2026Cryptomining / Network Security Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure. “Chaos malware is…
Read moreYour extensions leak clues about you, so we made sure Browser Guard doesn’t | Malware
Did you know you can be profiled based on the browser extensions you use? Advertisers can detect which extensions are installed and use that to build a picture of the…
Read moreMasjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices | Cybersecurity
Ravie LakshmananApr 08, 2026IoT Security / Network Security Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been…
Read moreTimeshare owners warned to watch out for cartel-linked scams | Malware
If you own a timeshare and have been searching for a way out, you need to know who may be targeting you. In February, the US Treasury Department announced sanctions…
Read moreShrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP) | Cybersecurity
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems. The…
Read moreIran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs | Cybersecurity
Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. “These attacks have led to…
Read moreSupport platform breach exposes Hims & Hers customer data | Malware
Healthcare companies handle some of the most personal data imaginable. That makes them a magnet for hackers. And when those companies outsource their customer support to third-party platforms, every one…
Read moreRussian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign | Cybersecurity
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn…
Read moreDocker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access | Cybersecurity
Ravie LakshmananApr 07, 2026Vulnerability / DevSecOps A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability,…
Read moreTraffic violation scams swap links for QR codes to steal your card details | Malware
As soon as people start to get to grips with a certain type of scam, criminals deploy new tactics to keep stealing money. Now people have learned to distrust links…
Read moreNew GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips | Cybersecurity
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of…
Read moreFlowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed | Cybersecurity
Ravie LakshmananApr 07, 2026Artificial Intelligence / Vulnerability Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The…
Read moreIran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations | Cybersecurity
An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East. The activity, assessed to be ongoing,…
Read more