π WARNING: Bitwarden CLI was compromised in a supply chain attack.
@bitwarden/cli@2026.4.0 included malicious code after attackers hijacked GitHub Actions, stole secrets, and pushed a tampered version to npm.
π Learn how the attack worked β https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html
@bitwarden/cli@2026.4.0 included malicious code after attackers hijacked GitHub Actions, stole secrets, and pushed a tampered version to npm.
π Learn how the attack worked β https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html
π±28π4π3β‘2π₯1
The math doesn't add up anymore.
AI finds vulnerabilities in β‘ milliseconds.
Manual patching takes β³ weeks.
Learn how to beat the bots at their own game.
ποΈ Featuring: Ofer Gayer (VP Product, Miggo Security)
π Webinar: Rethinking Prioritization
Secure your spot β https://thehackernews.com/2026/04/webinar-mythos-reality-check-beating.html
AI finds vulnerabilities in β‘ milliseconds.
Manual patching takes β³ weeks.
Learn how to beat the bots at their own game.
ποΈ Featuring: Ofer Gayer (VP Product, Miggo Security)
π Webinar: Rethinking Prioritization
Secure your spot β https://thehackernews.com/2026/04/webinar-mythos-reality-check-beating.html
π11
β οΈ Hackers are breaching companies through Microsoft Teams, posing as IT helpdesk staff.
They flood inboxes, then send a Teams message with a βfixβ link. One click installs malware, steals credentials, and gives full remote access.
π Learn more β https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html
They flood inboxes, then send a Teams message with a βfixβ link. One click installs malware, steals credentials, and gives full remote access.
π Learn more β https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html
π15π6π₯6π€―6π±5β‘1
β οΈ LMDeploy flaw exploited within 12.5 hours of disclosure.
The SSRF bug let attackers hit AWS metadata, Redis, and internal services via the image loader to scan networks and access data.
WordPress plugin bugs are also being used for full site takeovers.
π Read β https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html
The SSRF bug let attackers hit AWS metadata, Redis, and internal services via the image loader to scan networks and access data.
WordPress plugin bugs are also being used for full site takeovers.
π Read β https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html
π6π₯6
macOS attacks are now hiding in system features.
Payloads stored in Spotlight metadata let attackers run code without suspicious files, using native scripting and protocols to move and persist outside standard monitoring.
π Learn how macOS built-ins are being weaponized β https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html#macos-stealth-execution-abuse
Payloads stored in Spotlight metadata let attackers run code without suspicious files, using native scripting and protocols to move and persist outside standard monitoring.
π Learn how macOS built-ins are being weaponized β https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html#macos-stealth-execution-abuse
π₯7π5π2π€―2
π A fake PDF reader is being used to quietly take over systems.
Tropic Trooper spreads a trojanized app that runs AdaptixC2 via GitHub-based control, then uses Microsoft Visual Studio Code tunnels for access on high-value targets.
π Read β https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html
Tropic Trooper spreads a trojanized app that runs AdaptixC2 via GitHub-based control, then uses Microsoft Visual Studio Code tunnels for access on high-value targets.
π Read β https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html
π₯9π±5π2π€―2
π 26 fake wallet apps on Appleβs App Store stole recovery phrases and private keys.
They mimicked MetaMask and Coinbase, worked via China-region accounts, and used phishing, OCR, or injected code to capture seed phrases.
π Read β https://thehackernews.com/2026/04/26-fakewallet-apps-found-on-apple-app.html
They mimicked MetaMask and Coinbase, worked via China-region accounts, and used phishing, OCR, or injected code to capture seed phrases.
π Read β https://thehackernews.com/2026/04/26-fakewallet-apps-found-on-apple-app.html
π10π±8π₯5π3
This media is not supported in your browser
VIEW IN TELEGRAM
AI agents donβt create risk. They expose it.
The real problem is delegated authority. Most orgs still donβt see or control who is granting that power. If the source is broken, agents will scale the risk fast.
π Learn why AI security starts with fixing delegation β https://thehackernews.com/2026/04/bridging-ai-agent-authority-gap.html
The real problem is delegated authority. Most orgs still donβt see or control who is granting that power. If the source is broken, agents will scale the risk fast.
π Learn why AI security starts with fixing delegation β https://thehackernews.com/2026/04/bridging-ai-agent-authority-gap.html
π€7
β‘ NASA staff unknowingly shared defense tech with China.
A fake U.S. researcher spent years tricking agencies and universities into sending sensitive aerospace software used in weapons development.
π Learn what investigators found in the case β https://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.html
A fake U.S. researcher spent years tricking agencies and universities into sending sensitive aerospace software used in weapons development.
π Learn what investigators found in the case β https://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.html
π22π±11π€―8π₯7π1
π₯ A U.S. federal agency was hacked via Cisco firewall.
Attackers used ASA flaws to install FIRESTARTER, a backdoor that stays even after patches and normal reboots.
Fix requires full reimage or hard power cycle, not just updating software.
π Read β https://thehackernews.com/2026/04/firestarter-backdoor-hit-federal-cisco.html
Attackers used ASA flaws to install FIRESTARTER, a backdoor that stays even after patches and normal reboots.
Fix requires full reimage or hard power cycle, not just updating software.
π Read β https://thehackernews.com/2026/04/firestarter-backdoor-hit-federal-cisco.html
π±28π₯15π9β‘2
π¨ Four actively exploited flaws flagged.
CISA warns SimpleHelp, Samsung, and D-Link bugs are already used for ransomware and botnets, including admin takeovers and remote command execution.
π See what to patch or replace β https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html
CISA warns SimpleHelp, Samsung, and D-Link bugs are already used for ransomware and botnets, including admin takeovers and remote command execution.
π See what to patch or replace β https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html
π12π6β‘3π₯2
β οΈ This cyberweapon existed before Stuxnet in 2005
Called "fast16," it sabotaged systems by quietly altering engineering calculations instead of destroying code.
π Full report and findings β https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html
Called "fast16," it sabotaged systems by quietly altering engineering calculations instead of destroying code.
π Full report and findings β https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html
π₯20π5β‘2
β οΈ WARNING - Fake CAPTCHA pages are now triggering up to 60 hidden SMS charges per victim.
Users are tricked into texting premium international numbers, quietly adding charges to their phone bills.
π See how the scam runs β https://thehackernews.com/2026/04/fake-captcha-irsf-scam-and-120-keitaro.html
Users are tricked into texting premium international numbers, quietly adding charges to their phone bills.
π See how the scam runs β https://thehackernews.com/2026/04/fake-captcha-irsf-scam-and-120-keitaro.html
π€―12π€6β‘1π1
π¨ 11,000+ fake government portals found.
A global scam called GovTrap is copying real public service sites to steal personal data and payments from citizens worldwide.
π See how the operation works β https://thehackernews.com/expert-insights/2026/04/ctm360-exposes-global-govtrap-campaign.html
A global scam called GovTrap is copying real public service sites to steal personal data and payments from citizens worldwide.
π See how the operation works β https://thehackernews.com/expert-insights/2026/04/ctm360-exposes-global-govtrap-campaign.html
β‘8π€―5π2π2
π¨ 73 VS Code extensions flagged as malicious.
Researchers say some are sleeper packages that later update to steal data and install backdoors across developer tools.
π Full details: https://thehackernews.com/2026/04/researchers-uncover-73-fake-vs-code.html
Researchers say some are sleeper packages that later update to steal data and install backdoors across developer tools.
π Full details: https://thehackernews.com/2026/04/researchers-uncover-73-fake-vs-code.html
π10π4π₯2
β οΈ Hackers breached TrueConf servers across Russia.
PhantomCore chained 3 privately developed bugs to skip login, run commands, and move inside networks. Attacks started weeks after patches.
π See how the attacks worked β https://thehackernews.com/2026/04/phantomcore-exploits-trueconf.html
PhantomCore chained 3 privately developed bugs to skip login, run commands, and move inside networks. Attacks started weeks after patches.
π See how the attacks worked β https://thehackernews.com/2026/04/phantomcore-exploits-trueconf.html
β‘5π₯3π1π1π±1
π¨ AI finds bugs faster than teams fix them...
More tools = more alerts, but most never get fixed in time.
π See whatβs breaking β https://thehackernews.com/2026/04/mythos-changed-math-on-vulnerability.html
More tools = more alerts, but most never get fixed in time.
π See whatβs breaking β https://thehackernews.com/2026/04/mythos-changed-math-on-vulnerability.html
π9
β‘ This weekβs #cybersecurity recap is ugly in the usual way.
β’ Poisoned password manager CLI
β’ Fake Teams help desks
β’ Federal firewall backdoor
β’ Energy wiper
β’ Booby-trapped AI pages
β’ Fake Authenticator extensions
β’ and many more...
Read β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html
β’ Poisoned password manager CLI
β’ Fake Teams help desks
β’ Federal firewall backdoor
β’ Energy wiper
β’ Booby-trapped AI pages
β’ Fake Authenticator extensions
β’ and many more...
Read β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html
π5π₯1π1
β‘ Checkmarx data is on the dark web...
Company links it to a GitHub repo breach from its March supply chain attack. Scope still under review, no customer data confirmed.
π See whatβs known so far β https://thehackernews.com/2026/04/checkmarx-confirms-github-repository.html
Company links it to a GitHub repo breach from its March supply chain attack. Scope still under review, no customer data confirmed.
π See whatβs known so far β https://thehackernews.com/2026/04/checkmarx-confirms-github-repository.html
π5π±2
This media is not supported in your browser
VIEW IN TELEGRAM
βοΈ Your AI agents are only as smart as the context they operate onβMost security teams are racing to deploy AI, autonomous workflows, self-healing environments, and agents that triage before a human even sees the alert. But underneath all of it? Context that's fragmented, stale, and contradictor
The technology is ready. The foundation isn't.
The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.
π AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:
β’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β’ How to build multi-source consensus with verifiable provenance
β’ What decision-grade asset intelligence actually looks like in practice
If your team is serious about making AI-driven security actually work, this one is for you!
Register here: https://thn.news/trusted-automation
The technology is ready. The foundation isn't.
The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.
π AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:
β’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β’ How to build multi-source consensus with verifiable provenance
β’ What decision-grade asset intelligence actually looks like in practice
If your team is serious about making AI-driven security actually work, this one is for you!
Register here: https://thn.news/trusted-automation
π5π€―2π±1