β οΈ This cyberweapon existed before Stuxnet in 2005
Called "fast16," it sabotaged systems by quietly altering engineering calculations instead of destroying code.
π Full report and findings β https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html
Called "fast16," it sabotaged systems by quietly altering engineering calculations instead of destroying code.
π Full report and findings β https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html
π₯23π5β‘2
β οΈ WARNING - Fake CAPTCHA pages are now triggering up to 60 hidden SMS charges per victim.
Users are tricked into texting premium international numbers, quietly adding charges to their phone bills.
π See how the scam runs β https://thehackernews.com/2026/04/fake-captcha-irsf-scam-and-120-keitaro.html
Users are tricked into texting premium international numbers, quietly adding charges to their phone bills.
π See how the scam runs β https://thehackernews.com/2026/04/fake-captcha-irsf-scam-and-120-keitaro.html
π€―13π€8β‘2π2π₯1
π¨ 11,000+ fake government portals found.
A global scam called GovTrap is copying real public service sites to steal personal data and payments from citizens worldwide.
π See how the operation works β https://thehackernews.com/expert-insights/2026/04/ctm360-exposes-global-govtrap-campaign.html
A global scam called GovTrap is copying real public service sites to steal personal data and payments from citizens worldwide.
π See how the operation works β https://thehackernews.com/expert-insights/2026/04/ctm360-exposes-global-govtrap-campaign.html
β‘10π€―8π3π3π₯1
π¨ 73 VS Code extensions flagged as malicious.
Researchers say some are sleeper packages that later update to steal data and install backdoors across developer tools.
π Full details: https://thehackernews.com/2026/04/researchers-uncover-73-fake-vs-code.html
Researchers say some are sleeper packages that later update to steal data and install backdoors across developer tools.
π Full details: https://thehackernews.com/2026/04/researchers-uncover-73-fake-vs-code.html
π13π₯5π5β‘2
β οΈ Hackers breached TrueConf servers across Russia.
PhantomCore chained 3 privately developed bugs to skip login, run commands, and move inside networks. Attacks started weeks after patches.
π See how the attacks worked β https://thehackernews.com/2026/04/phantomcore-exploits-trueconf.html
PhantomCore chained 3 privately developed bugs to skip login, run commands, and move inside networks. Attacks started weeks after patches.
π See how the attacks worked β https://thehackernews.com/2026/04/phantomcore-exploits-trueconf.html
β‘8π₯5π2π2π1π±1
π¨ AI finds bugs faster than teams fix them...
More tools = more alerts, but most never get fixed in time.
π See whatβs breaking β https://thehackernews.com/2026/04/mythos-changed-math-on-vulnerability.html
More tools = more alerts, but most never get fixed in time.
π See whatβs breaking β https://thehackernews.com/2026/04/mythos-changed-math-on-vulnerability.html
π15π€3π2π₯1
β‘ This weekβs #cybersecurity recap is ugly in the usual way.
β’ Poisoned password manager CLI
β’ Fake Teams help desks
β’ Federal firewall backdoor
β’ Energy wiper
β’ Booby-trapped AI pages
β’ Fake Authenticator extensions
β’ and many more...
Read β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html
β’ Poisoned password manager CLI
β’ Fake Teams help desks
β’ Federal firewall backdoor
β’ Energy wiper
β’ Booby-trapped AI pages
β’ Fake Authenticator extensions
β’ and many more...
Read β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html
π9π₯3π2
β‘ Checkmarx data is on the dark web...
Company links it to a GitHub repo breach from its March supply chain attack. Scope still under review, no customer data confirmed.
π See whatβs known so far β https://thehackernews.com/2026/04/checkmarx-confirms-github-repository.html
Company links it to a GitHub repo breach from its March supply chain attack. Scope still under review, no customer data confirmed.
π See whatβs known so far β https://thehackernews.com/2026/04/checkmarx-confirms-github-repository.html
π9π±3π₯1
This media is not supported in your browser
VIEW IN TELEGRAM
βοΈ Your AI agents are only as smart as the context they operate onβMost security teams are racing to deploy AI, autonomous workflows, self-healing environments, and agents that triage before a human even sees the alert. But underneath all of it? Context that's fragmented, stale, and contradictor
The technology is ready. The foundation isn't.
The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.
π AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:
β’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β’ How to build multi-source consensus with verifiable provenance
β’ What decision-grade asset intelligence actually looks like in practice
If your team is serious about making AI-driven security actually work, this one is for you!
Register here: https://thn.news/trusted-automation
The technology is ready. The foundation isn't.
The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.
π AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:
β’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β’ How to build multi-source consensus with verifiable provenance
β’ What decision-grade asset intelligence actually looks like in practice
If your team is serious about making AI-driven security actually work, this one is for you!
Register here: https://thn.news/trusted-automation
π8π€―4π3π±2
π¨ WARNING: Microsoft confirmed active exploitation of a Windows flaw β CVE-2026-32202.
The bug stems from an incomplete fix, allowing attackers to steal credentials via SMB authentication when a malicious file is opened.
π Read details β https://thehackernews.com/2026/04/microsoft-confirms-active-exploitation.html
The bug stems from an incomplete fix, allowing attackers to steal credentials via SMB authentication when a malicious file is opened.
π Read details β https://thehackernews.com/2026/04/microsoft-confirms-active-exploitation.html
π₯7π6π2
π³ Entra ID Agent ID Administrator role flaw enabled service principal takeover.
Users could take over non-agent service principals, add credentials, and escalate privileges before Microsoftβs April 9, 2026 patch.
π See how the attack worked β https://thehackernews.com/2026/04/microsoft-patches-entra-id-role-flaw.html
Users could take over non-agent service principals, add credentials, and escalate privileges before Microsoftβs April 9, 2026 patch.
π See how the attack worked β https://thehackernews.com/2026/04/microsoft-patches-entra-id-role-flaw.html
π11π2
A user ran malware and no alerts fired...
As Ryan Boerner, Founder and CEO at Keep Aware, shows, the browser is now the real OS, but tools below it miss in-session actions where AI and scripts act as the user, breaking identity trust.
π Learn how browser-based attacks bypass modern security stacks β https://thehackernews.com/expert-insights/2026/04/work-moved-into-browser-security-didnt.html
As Ryan Boerner, Founder and CEO at Keep Aware, shows, the browser is now the real OS, but tools below it miss in-session actions where AI and scripts act as the user, breaking identity trust.
π Learn how browser-based attacks bypass modern security stacks β https://thehackernews.com/expert-insights/2026/04/work-moved-into-browser-security-didnt.html
π10π2π2π₯1
A Chinese national linked to Silk Typhoon has been extradited to the U.S. over alleged COVID-19 research cyberattacks.
Prosecutors say Xu Zewei exploited zero-days to breach vaccine research systems under direction of Chinaβs MSS.
π Details β https://thehackernews.com/2026/04/chinese-silk-typhoon-hacker-extradited.html
Prosecutors say Xu Zewei exploited zero-days to breach vaccine research systems under direction of Chinaβs MSS.
π Details β https://thehackernews.com/2026/04/chinese-silk-typhoon-hacker-extradited.html
π€―8π±6π4π€2π1π₯1
AI has erased the patch window.
Exploit discovery now takes minutes, not weeksβleaving organizations exposed before fixes exist. Security shifts from prevention to real-time containment.
π How AI-driven exploits are forcing an assume-breach model β https://thehackernews.com/2026/04/after-mythos-new-playbooks-for-zero.html
Exploit discovery now takes minutes, not weeksβleaving organizations exposed before fixes exist. Security shifts from prevention to real-time containment.
π How AI-driven exploits are forcing an assume-breach model β https://thehackernews.com/2026/04/after-mythos-new-playbooks-for-zero.html
π₯7π±7π4π1
β οΈ An unpatched critical flaw in Hugging Faceβs LeRobot enables remote code execution (CVSS 9.3).
Untrusted pickle over unauthenticated gRPC (no TLS) lets attackers take over servers, steal keys and models, and impact connected robots.
π Details β https://thehackernews.com/2026/04/critical-cve-2026-25874-leaves-hugging.html
Untrusted pickle over unauthenticated gRPC (no TLS) lets attackers take over servers, steal keys and models, and impact connected robots.
π Details β https://thehackernews.com/2026/04/critical-cve-2026-25874-leaves-hugging.html
β‘2π2π₯1
Security teams treat data as trusted once it crosses domains. Thatβs the β οΈ flaw.
53% still rely on manual processes, even as attacks hit 137 times a week and π€ AI drives response speeds on both sides. The gap isnβt identity. Itβs how data moves.
π Why data movement is the weakest layer in Zero Trust β https://thehackernews.com/2026/04/why-secure-data-movement-is-zero-trust.html
53% still rely on manual processes, even as attacks hit 137 times a week and π€ AI drives response speeds on both sides. The gap isnβt identity. Itβs how data moves.
π Why data movement is the weakest layer in Zero Trust β https://thehackernews.com/2026/04/why-secure-data-movement-is-zero-trust.html
π3π₯1
π¨ 9 days ago, a compromised OAuth token resulted in a breach at Vercel.
This is the reality facing security teams:
π₯· An infostealer hits a vendor in your SaaS ecosystem, the attacker works backwards from stolen access, and an old consent becomes the front door. πͺ
If you haven't made OAuth grant reviews a regular part of your on-going security program, you should.
Here's a step-by-step guide from Nudge Security to help you β https://thn.news/oauth-checklist
This is the reality facing security teams:
π₯· An infostealer hits a vendor in your SaaS ecosystem, the attacker works backwards from stolen access, and an old consent becomes the front door. πͺ
If you haven't made OAuth grant reviews a regular part of your on-going security program, you should.
Here's a step-by-step guide from Nudge Security to help you β https://thn.news/oauth-checklist
π4π₯1
This media is not supported in your browser
VIEW IN TELEGRAM
π VECT 2.0 ransomware canβt restore what it destroys.
Files over 131 KB are permanently destroyed, not encryptedβbecause required nonces are discarded during execution.
No attacker can recover the data, even after payment.
π Read β https://thehackernews.com/2026/04/vect-20-ransomware-irreversibly.html
Files over 131 KB are permanently destroyed, not encryptedβbecause required nonces are discarded during execution.
No attacker can recover the data, even after payment.
π Read β https://thehackernews.com/2026/04/vect-20-ransomware-irreversibly.html
π₯11π3π€1
Google flags indirect prompt injection as a primary attack vector for AI agents.
Attackers embed hidden commands in websites and documentsβseen by AI, not humansβredirecting execution away from user intent. Detections rose 32% in recent scans.
The risk sits in what models consume.
π How web content is being weaponized against AI systems β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html#:~:text=Turning%20the%20Web%20Into%20a%20Trap%20for%20LLMs
Attackers embed hidden commands in websites and documentsβseen by AI, not humansβredirecting execution away from user intent. Detections rose 32% in recent scans.
The risk sits in what models consume.
π How web content is being weaponized against AI systems β https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html#:~:text=Turning%20the%20Web%20Into%20a%20Trap%20for%20LLMs
π₯1π1π€―1
β οΈ A Brazilian cybercrime group is back, targeting Minecraft players with a fake mod.
LofyStealer runs directly in memory, stealing passwords, tokens, and banking data across major browsers after a single install.
π Read more β https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html
LofyStealer runs directly in memory, stealing passwords, tokens, and banking data across major browsers after a single install.
π Read more β https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html
π3π€2