βRussian GRU Cyber Campaign Targets Western Logistics Firms Supporting Ukraine
https://thecyberexpress.com/russian-gru-cyber-campaign-targets-logistics/
https://thecyberexpress.com/russian-gru-cyber-campaign-targets-logistics/
The Cyber Express
Russian GRU Cyber Campaign Targets Western Logistics Firms
The advisory concludes that the Russian GRU cyber campaign is likely to persist, with continued use of similar tactics and targeting patterns.
β$15M Grinex Hack Forces Trading Halt After Major Crypto Wallet Breach
https://thecyberexpress.com/grinex-cyberattack-15m-wallet-breach/
https://thecyberexpress.com/grinex-cyberattack-15m-wallet-breach/
The Cyber Express
Grinex Cyberattack Triggers $15M Crypto Wallet Breach
Grinex Cyberattack halts trading after a $15M wallet breach, exposing major crypto exchange risks and fund movement across blockchains.
βGoogle Says Gemini Ad Safety Blocked 8.3 Billion Policy-Violating Ads in 2025
https://thecyberexpress.com/gemini-ad-safety-targets-scam-ads/
https://thecyberexpress.com/gemini-ad-safety-targets-scam-ads/
The Cyber Express
Gemini Ad Safety Targets Surge In AI-Generated Scam Ads
As Gemini ad safety systems continue to develop, the focus is likely to remain on faster detection, stronger verification, and tighter enforcement.
βU.S. CISA adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog
https://securityaffairs.com/190917/security/u-s-cisa-adds-a-flaw-in-apache-activemq-to-its-known-exploited-vulnerabilities-catalog.html
https://securityaffairs.com/190917/security/u-s-cisa-adds-a-flaw-in-apache-activemq-to-its-known-exploited-vulnerabilities-catalog.html
Security Affairs
U.S. CISA adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog
The U.S. CISA adds a vulnerability (CVE-2026-34197) in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog
βCritical nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
https://thecyberexpress.com/cve-2026-33032-nginx-ui-server-takeover/
https://thecyberexpress.com/cve-2026-33032-nginx-ui-server-takeover/
The Cyber Express
CVE-2026-33032 Enables Full Nginx Server Takeover Risk
Critical nginx-ui flaw CVE-2026-33032 allows full Nginx takeover. Active exploitation in the wild puts thousands of servers at risk.
βInside ZionSiphon: politically driven malware aims at Israeli water systems
https://securityaffairs.com/190922/malware/inside-zionsiphon-politically-driven-malware-aims-at-israeli-water-systems.html
https://securityaffairs.com/190922/malware/inside-zionsiphon-politically-driven-malware-aims-at-israeli-water-systems.html
Security Affairs
Inside ZionSiphon: politically driven malware aims at Israeli water systems
New ZionSiphon malware targets water systems, and allows attackers to alter pressure and chlorine levels.....
βKuwait Banks Deploy Real-Time War Room to Fight Growing Cyber Fraud Threats
https://thecyberexpress.com/kuwait-cyber-fraud-threats-prompt-war-room/
https://thecyberexpress.com/kuwait-cyber-fraud-threats-prompt-war-room/
The Cyber Express
Kuwait Cyber Fraud Threats Prompt Banks To Activate War Room
As Kuwait cyber fraud threats continue to evolve, such coordination is becoming increasingly important.
β75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains
https://thecyberexpress.com/75000-ddos-for-hire-users-reprimanded/
https://thecyberexpress.com/75000-ddos-for-hire-users-reprimanded/
The Cyber Express
75K DDoS-for-Hire Users Reprimanded As Authorities Seize Domains
Law enforcement agencies across Europe, the United States, and other partner nations cracked down on the commercial DDoS-for-hire ecosystem, targeting both
βCommon misconceptions debugged!
https://www.intigriti.com/blog/business-insights/common-misconceptions-debugged
https://www.intigriti.com/blog/business-insights/common-misconceptions-debugged
Intigriti
Common misconceptions debugged!
AI and the growing ecosystem of tools built around it have now moved beyond early experimentation and into everyday use across the bug bounty community.
βThe Cyber Express Weekly Roundup: Crypto Breaches, State-Linked Schemes, and Platform Exploits
https://thecyberexpress.com/tce-weekly-roundup-cybersecurity-news/
https://thecyberexpress.com/tce-weekly-roundup-cybersecurity-news/
The Cyber Express
TCE Weekly Roundup: Latest Breaches, Cyberattacks And More
TCE weekly roundup covers crypto hacks, fraud schemes, dark web contests, and cyberattacks shaping global cybersecurity trends.
βOperation PowerOFF: 53 DDoS domains seized and 3 Million criminal accounts uncovered
https://securityaffairs.com/190932/cyber-crime/operation-poweroff-53-ddos-domains-seized-and-3-million-criminal-accounts-uncovered.html
https://securityaffairs.com/190932/cyber-crime/operation-poweroff-53-ddos-domains-seized-and-3-million-criminal-accounts-uncovered.html
Security Affairs
Operation PowerOFF: 53 DDoS domains seized and 3 Million criminal accounts uncovered
Operation PowerOFF shut down 53 DDoS-for-hire domains, arrested four suspects, and exposed data on over 3 million criminal user accounts.
βHackers leverage leaked government intelligence tools to target everyday iOS users | Kaspersky official blog
https://www.kaspersky.com/blog/ios-exploits-darksword-and-coruna-in-mass-attacks/55622/
https://www.kaspersky.com/blog/ios-exploits-darksword-and-coruna-in-mass-attacks/55622/
Kaspersky official blog
Hackers leverage leaked government intelligence tools to target everyday iOS users
DarkSword and Coruna are new iOS malware strains that infect devices through zero-click attacks. Learn how these threats operate, which iOS versions are at risk, and how to protect your devices.
βDraftKings hacker sentenced to prison, ordered to pay $1.4 Million
https://securityaffairs.com/190943/cyber-crime/draftkings-hacker-sentenced-to-prison-ordered-to-pay-1-4-million.html
https://securityaffairs.com/190943/cyber-crime/draftkings-hacker-sentenced-to-prison-ordered-to-pay-1-4-million.html
Security Affairs
DraftKings hacker sentenced to prison, ordered to pay $1.4 Million
A DraftKings hacker got 30 months in prison for selling stolen credentials and must pay over $1.4 million in fines and restitution.
βContaining a domain compromise: How predictive shielding shut down lateral movement
https://www.microsoft.com/en-us/security/blog/2026/04/17/domain-compromise-predictive-shielding-shut-down-lateral-movement/
https://www.microsoft.com/en-us/security/blog/2026/04/17/domain-compromise-predictive-shielding-shut-down-lateral-movement/
Microsoft News
Containing a domain compromise: How predictive shielding shut down lateral movement
Domain compromise accelerates fast. Predictive shielding slowed it down. This real-world attack shows how exposure-based containment stopped credential abuse and broke the threat actor's momentum.
βThe surveillance law Congress canβt quit β and canβt explain
https://cyberscoop.com/section-702-fisa-surveillance-law-renewal-congress-debate/
https://cyberscoop.com/section-702-fisa-surveillance-law-renewal-congress-debate/
CyberScoop
The surveillance law Congress can't quit β and can't explain
Congress is debating whether to extend Section 702 surveillance powers, but two years after major reforms, there's little agreement on what they've achieved.
βKyrgyzstan-based crypto exchange Grinex shuts down after $13.7M cyber heist, blames Western Intelligence
https://securityaffairs.com/190950/security/kyrgyzstan-based-crypto-exchange-grinex-shuts-down-after-13-7m-cyber-heist-blames-western-intelligence.html
https://securityaffairs.com/190950/security/kyrgyzstan-based-crypto-exchange-grinex-shuts-down-after-13-7m-cyber-heist-blames-western-intelligence.html
Security Affairs
Kyrgyzstan-based crypto exchange Grinex shuts down after $13.7M cyber heist, blames Western Intelligence
Grinex halted operations after a $13.7M hack, blaming Western intelligence. Stolen funds came from wallets of Russian users on the platform.
βMicrosoft Defender under attack as three zero-days, two of them still unpatched, enable elevated access
https://securityaffairs.com/190961/hacking/microsoft-defender-under-attack-as-three-zero-days-two-of-them-still-unpatched-enable-elevated-access.html
https://securityaffairs.com/190961/hacking/microsoft-defender-under-attack-as-three-zero-days-two-of-them-still-unpatched-enable-elevated-access.html
Security Affairs
Microsoft Defender under attack as three zero-days, two of them still unpatched, enable elevated access
Attackers exploit three Microsoft Defender zero-days, code-named BlueHammer, RedSun, and UnDefend, to gain elevated access.
βNexcorium Mirai variant exploits TBK DVR flaw to launch DDoS attacks
https://securityaffairs.com/190974/malware/nexcorium-mirai-variant-exploits-tbk-dvr-flaw-to-launch-ddos-attacks.html
https://securityaffairs.com/190974/malware/nexcorium-mirai-variant-exploits-tbk-dvr-flaw-to-launch-ddos-attacks.html
Security Affairs
Nexcorium Mirai variant exploits TBK DVR flaw to launch DDoS attacks
A Mirai variant called Nexcorium exploits a flaw in TBK DVRs to infect devices and use them in DDoS attacks, along with outdated TP-Link routers.
βCrossβtenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook
https://www.microsoft.com/en-us/security/blog/2026/04/18/crosstenant-helpdesk-impersonation-data-exfiltration-human-operated-intrusion-playbook/
https://www.microsoft.com/en-us/security/blog/2026/04/18/crosstenant-helpdesk-impersonation-data-exfiltration-human-operated-intrusion-playbook/
Microsoft News
Crossβtenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook
Threat actors are abusing external Microsoft Teams collaboration to impersonate IT helpdesk staff and convince users to grant remote access. Once inside, attackers can abuse legitimate tools and standard admin protocols to move laterally and exfiltrate dataβ¦
βHidden VMs: how hackers leverage QEMU to stealthily steal data and spread malware
https://securityaffairs.com/190982/security/hidden-vms-how-hackers-leverage-qemu-to-stealthily-steal-data-and-spread-malware.html
https://securityaffairs.com/190982/security/hidden-vms-how-hackers-leverage-qemu-to-stealthily-steal-data-and-spread-malware.html
Security Affairs
Hidden VMs: how hackers leverage QEMU to stealthily steal data and spread malware
Attackers abuse QEMU to hide malware in virtual machines, bypass detection, steal data, and deploy ransomware without leaving any trace.