CVE-2026-33824: Remote Code Execution in Windows IKEv2
https://www.thezdi.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
https://www.thezdi.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
Zero Day Initiative
Zero Day Initiative — CVE-2026-33824: Remote Code Execution in Windows IKEv2
In this excerpt of a TrendAI Research Services vulnerability report, Richard Chen and Lucas Miller of the TrendAI Research team detail a recently patched double free vulnerability in the Windows Internet Key Exchange (IKE) service. This bug was originally…
Spam and phishing targeting taxpayers | Kaspersky official blog
https://www.kaspersky.com/blog/income-tax-phishing-bait/55637/
https://www.kaspersky.com/blog/income-tax-phishing-bait/55637/
Kaspersky official blog
Spam and phishing targeting taxpayers
How to identify tax-related phishing and fraud: fake portals, bogus crypto wallet verifications, and malicious files. We break down the steps you need to take to protect both your money and your data.
A dozen allied agencies say China is building covert hacker networks out of everyday routers
https://cyberscoop.com/china-nexus-covert-networks-advisory/
https://cyberscoop.com/china-nexus-covert-networks-advisory/
CyberScoop
A dozen allied agencies say China is building covert hacker networks out of everyday routers
Global agencies issue a major warning on China-nexus covert networks, as hackers shift tactics to exploit SOHO routers and IoT devices to target infrastructure.
Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities
https://cyberscoop.com/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-telecom-vulnerabilities/
https://cyberscoop.com/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-telecom-vulnerabilities/
CyberScoop
Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities
Citizen Lab reveals how surveillance vendors exploit mobile network signaling protocols like SS7 and Diameter to track targets, highlighting severe global telecom risks.
Dragos: Despite AI use, new malware targeting water plants is ‘hype’
https://cyberscoop.com/dragos-zionsiphon-ai-malware-targeting-water-sector-hype/
https://cyberscoop.com/dragos-zionsiphon-ai-malware-targeting-water-sector-hype/
CyberScoop
Dragos: Despite AI use, new malware targeting water plants is ‘hype’
ZionSiphon was designed to find and sabotage Israelis’ water supply. An OT expert said it appears to be ineffective and the work of amateurs using AI.
US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied
https://cyberscoop.com/cisco-firestarter-malware-cisa-warning/
https://cyberscoop.com/cisco-firestarter-malware-cisa-warning/
CyberScoop
US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied
"CISA and the NCSC warn of 'Firestarter,' a persistent Cisco firewall backdoor that survives patches. Authorities mandate hard reboots and device reimaging to eliminate the threat."
Vercel attack fallout expands to more customers and third-party systems
https://cyberscoop.com/vercel-attack-fallout-expands/
https://cyberscoop.com/vercel-attack-fallout-expands/
CyberScoop
Vercel attack fallout expands to more customers and third-party systems
The company said it found more evidence of compromise across its customer base. Exposure, which has yet to be defined, poses significant downstream risk.
fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/
https://www.sentinelone.com/labs/fast16-mystery-shadowbrokers-reference-reveals-high-precision-software-sabotage-5-years-before-stuxnet/
China-Linked Cyber Actors Turn to Massive Covert Botnets to Evade Detection
https://thecyberexpress.com/china-nexus-covert-botnet-cyber-operations/
https://thecyberexpress.com/china-nexus-covert-botnet-cyber-operations/
The Cyber Express
China-Nexus Hackers Use Massive Covert Botnets Globally
Advisory reveals China-Nexus hackers using covert botnets of IoT and routers to evade detection and scale global cyberattacks.
UK Biobank Leak Prompts Urgent Review of Data Protection in Biomedical Research
https://thecyberexpress.com/uk-biobank-data-breach-healthcare/
https://thecyberexpress.com/uk-biobank-data-breach-healthcare/
The Cyber Express
UK Biobank Data Breach Raises Health Data Privacy Concerns
UK Biobank data breach exposed de-identified health records listed for sale online, raising global concerns over biomedical data security and access.
Intigriti Bug Bytes #235 - April 2026
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-235-april-2026
https://www.intigriti.com/researchers/blog/bug-bytes/intigriti-bug-bytes-235-april-2026
Intigriti
Intigriti Bug Bytes #235 - April 2026 🚀
Hi hackers, Welcome to the latest edition of Bug Bytes! In this month's issue, we'll be featuring: Compromising an NPM package with 40M weekly downloads Bypassing Cloudflare WAF for a full ATO 20-...
PhantomRPC: A new privilege escalation technique in Windows RPC
https://securelist.com/phantomrpc-rpc-vulnerability/119428/
https://securelist.com/phantomrpc-rpc-vulnerability/119428/
Securelist
Disclosing PhantomRPC – a privilege escalation vulnerability in RPC
Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.
Checkmarx supply chain attack impacts Bitwarden npm distribution path
https://securityaffairs.com/191215/uncategorized/checkmarx-supply-chain-attack-impacts-bitwarden-npm-distribution-path.html
https://securityaffairs.com/191215/uncategorized/checkmarx-supply-chain-attack-impacts-bitwarden-npm-distribution-path.html
Security Affairs
Checkmarx supply chain attack impacts Bitwarden npm distribution path
Bitwarden CLI hit by the Checkmarx supply chain attack. Version 2026.4.0 shipped malicious code in bw1.js via a compromised GitHub Action.
The Cyber Express Weekly Roundup: Data Breaches, Malware Campaigns, and Cyber Fraud Investigations
https://thecyberexpress.com/tce-weekly-roundup-april-2026/
https://thecyberexpress.com/tce-weekly-roundup-april-2026/
The Cyber Express
TCE Weekly Roundup: Data Breaches, Malware & Fraud Updates
In this The Cyber Express weekly roundup, explore the latest cybersecurity threats, from UK Biobank breaches and law enforcement actions.
❤1
Signal phishing campaign targets Germany’s Bundestag President Julia Klöckner
https://securityaffairs.com/191224/intelligence/signal-phishing-campaign-targets-germanys-bundestag-president-julia-klockner.html
https://securityaffairs.com/191224/intelligence/signal-phishing-campaign-targets-germanys-bundestag-president-julia-klockner.html
Security Affairs
Signal phishing campaign targets Germany’s Bundestag President Julia Klöckner
Germany’s Bundestag President Klöckner was targeted in a Signal phishing attack via a fake CDU group chat.
Eavesdropping via fiber-optic cables | Kaspersky official blog
https://www.kaspersky.com/blog/fiber-optics-eavesdropping/55658/
https://www.kaspersky.com/blog/fiber-optics-eavesdropping/55658/
Kaspersky official blog
Eavesdropping via fiber-optic cables
A side-channel attack that allows a fiber-optic cable to be used as a microphone.
Latest spy power reauthorization bill leaves critics unimpressed
https://cyberscoop.com/section-702-fisa-reauthorization-bill-leaves-critics-unimpressed/
https://cyberscoop.com/section-702-fisa-reauthorization-bill-leaves-critics-unimpressed/
CyberScoop
Latest spy power reauthorization bill leaves critics unimpressed
The latest attempt to re-up a controversial expiring surveillance law has failed to placate vocal critics on both the left and right of the political spectrum.
12-year-old Pack2TheRoot bug lets Linux users gain root privileges
https://securityaffairs.com/191231/security/12-year-old-pack2theroot-bug-lets-linux-users-gain-root-privileges.html
https://securityaffairs.com/191231/security/12-year-old-pack2theroot-bug-lets-linux-users-gain-root-privileges.html
Security Affairs
12-year-old Pack2TheRoot bug lets Linux users gain root privileges
'Pack2TheRoot' flaw lets local Linux users gain root via PackageKit. CVE-2026-41651 (8.8) has existed for nearly 12 years.
CISA reports persistent FIRESTARTER backdoor on Cisco ASA device in federal network
https://securityaffairs.com/191241/hacking/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network.html
https://securityaffairs.com/191241/hacking/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network.html
Security Affairs
CISA reports persistent FIRESTARTER backdoor on Cisco ASA device in federal network
CISA said a federal Cisco Firepower ASA device was infected with the FIRESTARTER backdoor in Sept 2025, and it survived security patches.
Over 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)
https://securityaffairs.com/191267/uncategorized/over-400000-sites-at-risk-as-hackers-exploit-breeze-cache-plugin-flaw-cve-2026-3844.html
https://securityaffairs.com/191267/uncategorized/over-400000-sites-at-risk-as-hackers-exploit-breeze-cache-plugin-flaw-cve-2026-3844.html
Security Affairs
Over 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)
Attackers exploit a Breeze Cache flaw (CVE-2026-3844) to upload files without login. Wordfence researchers detected over 170 attacks.