AI is shrinking cyberattacks to hours.
Threat actors use AI to automate phishing, find vulnerabilities, and chain exploits faster than human response. Traditional security is too slow.
Defenders are moving to continuous AI-driven testing and fixes.
π Why speed now defines cybersecurity β https://thehackernews.com/2026/03/the-ai-arms-race-why-unified-exposure.html
Threat actors use AI to automate phishing, find vulnerabilities, and chain exploits faster than human response. Traditional security is too slow.
Defenders are moving to continuous AI-driven testing and fixes.
π Why speed now defines cybersecurity β https://thehackernews.com/2026/03/the-ai-arms-race-why-unified-exposure.html
π±8π3π2π₯1
AI is redefining cyber roles, hiring, and skills.
See where teams are rebuilding and where careers are heading by downloading your copy of 2026 Workforce Research Report.
π Download β https://thn.news/sans-workforce-research
See where teams are rebuilding and where careers are heading by downloading your copy of 2026 Workforce Research Report.
π Download β https://thn.news/sans-workforce-research
π4π€4π₯2
β οΈ A zero-day in TrueConf let attackers spread malware through its own update system.
CVE-2026-3502 (CVSS 7.8) was exploited by compromising on-prem servers, pushing tampered updates to all connected clients in government networks across Southeast Asia.
π How the TrueChaos campaign weaponized software updates β https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html
CVE-2026-3502 (CVSS 7.8) was exploited by compromising on-prem servers, pushing tampered updates to all connected clients in government networks across Southeast Asia.
π How the TrueChaos campaign weaponized software updates β https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html
π₯4π€4π€―3π2
π₯ Google has opened Android verification to all developers.
Developer verification is now live globally, letting devs confirm identity and register apps ahead of enforcement.
From Sept 30, 2026, only verified apps install in select markets, expanding globally in 2027.
π Timeline and what devs must do next β https://thehackernews.com/2026/03/android-developer-verification-rollout.html
Developer verification is now live globally, letting devs confirm identity and register apps ahead of enforcement.
From Sept 30, 2026, only verified apps install in select markets, expanding globally in 2027.
π Timeline and what devs must do next β https://thehackernews.com/2026/03/android-developer-verification-rollout.html
π13π±8π6π€―4π₯1
π₯ Anthropic accidentally exposed 512,000 lines of Claude Code via an npm packaging error.
The code reveals internal systems like multi-agent workflows, guardrails, and automationβgiving attackers a clear map to study and exploit.
π Read β https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html
The code reveals internal systems like multi-agent workflows, guardrails, and automationβgiving attackers a clear map to study and exploit.
π Read β https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html
π₯33π€―20π4π4
β οΈ Google links the Axios npm compromise to North Korean group UNC1069.
Attackers hijacked the maintainer account and pushed malicious versions that executed during install via a hidden dependency, deploying a cross-platform backdoor (Windows, macOS, Linux) and then removing traces.
π Read β https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html
Attackers hijacked the maintainer account and pushed malicious versions that executed during install via a hidden dependency, deploying a cross-platform backdoor (Windows, macOS, Linux) and then removing traces.
π Read β https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html
π€―13π4π₯4π4β‘3
Vulnerability management is shifting from periodic scans to continuous monitoring.
Exploitation can start within hours, making CVSS scores and patch cycles too slow. Teams now need continuous visibility, threat context, and real-time detection to manage actual risk.
π Why proactive vulnerability management is replacing scans β https://thehackernews.com/expert-insights/2026/03/wazuh-for-proactive-vulnerability.html
Exploitation can start within hours, making CVSS scores and patch cycles too slow. Teams now need continuous visibility, threat context, and real-time detection to manage actual risk.
π Why proactive vulnerability management is replacing scans β https://thehackernews.com/expert-insights/2026/03/wazuh-for-proactive-vulnerability.html
π12π₯4β‘3
π Chrome 0-day Warning!
Tracked as CVE-2026-5281, this WebGPU (Dawn) use-after-free bug allows code execution via a crafted page if the renderer is compromised.
Itβs the 4th exploited Chrome browser zero-day in 2026.
π Read β https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html
Tracked as CVE-2026-5281, this WebGPU (Dawn) use-after-free bug allows code execution via a crafted page if the renderer is compromised.
Itβs the 4th exploited Chrome browser zero-day in 2026.
π Read β https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html
π₯15π5β‘3
Cyberattacks are shifting away from malware.
84% now use built-in tools like PowerShell and WMIC to move inside systems without raising alarms. These actions look normal, making detection harder while excess access creates hidden risk.
π Why attackers now use your own tools β https://thehackernews.com/2026/04/3-reasons-attackers-are-using-your.html
84% now use built-in tools like PowerShell and WMIC to move inside systems without raising alarms. These actions look normal, making detection harder while excess access creates hidden risk.
π Why attackers now use your own tools β https://thehackernews.com/2026/04/3-reasons-attackers-are-using-your.html
π€―5π4π₯2π€2π±1
π¨ Microsoft identified a campaign using WhatsApp to deliver malicious VBS files.
The attack renames Windows tools, uses cloud payloads and installs AnyDesk to enable stealthy persistence and remote access while blending into normal activity.
π Read β https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html
The attack renames Windows tools, uses cloud payloads and installs AnyDesk to enable stealthy persistence and remote access while blending into normal activity.
π Read β https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html
π₯9π5π5
π« Blocking #ChatGPT or DeepSeek doesnβt stop usageβit pushes it out of sight.
70% of users in one firm still used AI via browser extensions after a block, routing data externally without detection.
This is βtheatrical securityβ: control on paper, blind in practice.
π Why security is shifting to browser-level governance β https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html
70% of users in one firm still used AI via browser extensions after a block, routing data externally without detection.
This is βtheatrical securityβ: control on paper, blind in practice.
π Why security is shifting to browser-level governance β https://thehackernews.com/2026/04/block-prompt-not-work-end-of-doctor-no.html
π10π10π€6π₯4π±3β‘1
CERT-UA warned of a phishing campaign impersonating the agency to spread AGEWHEEZE malware.
The malware enables full system control, but confirmed infections were limited despite wide targeting.
π Campaign details and malware capabilities β https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html
The malware enables full system control, but confirmed infections were limited despite wide targeting.
π Campaign details and malware capabilities β https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html
π₯6π2π2π€―2π€1
π€ Threat intelligence is great, but do you have proof that your defenses actually work against real threat actors?
Stop guessing. Start validating.
Join this practical session to learn how to leverage modern tooling to automate security testing and continuously improve your posture.
WATCH NOW β¬οΈ https://thehacker.news/automate-testing-security-posture
Stop guessing. Start validating.
Join this practical session to learn how to leverage modern tooling to automate security testing and continuously improve your posture.
WATCH NOW β¬οΈ https://thehacker.news/automate-testing-security-posture
π₯3π2π€2
π₯ Apple expanded iOS 18.7.7 security updates to more iPhones and iPads to fix DarkSword exploits.
The fixes were released in 2025, and now also protect devices that are not on iOS 26βso users can stay on iOS 18 & still get security updates.
π Read β https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html
The fixes were released in 2025, and now also protect devices that are not on iOS 26βso users can stay on iOS 18 & still get security updates.
π Read β https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html
π11π2π₯2
π WhatsApp alerted ~200 users targeted by a fake iOS app carrying #spyware, mostly in Italy.
The attack used social engineering to mimic #WhatsApp. Meta is acting against an Italian firm linked to the spyware.
π Read details here β https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html
The attack used social engineering to mimic #WhatsApp. Meta is acting against an Italian firm linked to the spyware.
π Read details here β https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html
π9π5β‘4
A critical Oracle WebLogic flaw (CVSS 10.0) saw exploitation almost immediately after public exploit code was released.
CloudSEK observed automated scanning targeting this and older flaws via VPS infrastructure in a spray-and-pray campaign.
π Full attack patterns β https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Exploitation%20Against%20Oracle%20WebLogic%20Servers
CloudSEK observed automated scanning targeting this and older flaws via VPS infrastructure in a spray-and-pray campaign.
π Full attack patterns β https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Exploitation%20Against%20Oracle%20WebLogic%20Servers
π11π3π₯2
β οΈ Brazil-based attackers are targeting Spanish-speaking users with a multi-channel phishing campaign delivering Casbaneiro.
Court-themed PDFs trigger malware, then Horabot spreads it via phishing emails sent from victimsβ Outlook accounts.
π How email hijacking drives the spread β https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html
Court-themed PDFs trigger malware, then Horabot spreads it via phishing emails sent from victimsβ Outlook accounts.
π How email hijacking drives the spread β https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html
π8π2π€―2
β‘ AI is speeding up codeβand risk.
145% more vulnerabilities and 3x more fixes in one quarter, as Python (72.1%) and PostgreSQL (+73%) surge with AI.
96% of risk sits outside core tools.
π Where most security exposure actually lives β https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html
145% more vulnerabilities and 3x more fixes in one quarter, as Python (72.1%) and PostgreSQL (+73%) surge with AI.
96% of risk sits outside core tools.
π Where most security exposure actually lives β https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html
π5π4π€2
π¨ From zero-days to mass infections β this week has it all...
β οΈ ShareFile pre-auth RCE
π± Android rootkit at scale
πΌοΈ ImageMagick 0-days β RCE
π΅οΈ XLoader stealth upgrades
π£ Mobile phishing surge
π¦ Supply chain attacks Γ14
π Read the full ThreatsDay Bulletin β https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html
β οΈ ShareFile pre-auth RCE
π± Android rootkit at scale
πΌοΈ ImageMagick 0-days β RCE
π΅οΈ XLoader stealth upgrades
π£ Mobile phishing surge
π¦ Supply chain attacks Γ14
π Read the full ThreatsDay Bulletin β https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html
π4π€2β‘1π₯1π1
β οΈ A cybercrime campaign since 2023 spreads malware via fake installers.
REF1695 delivers RATs, crypto miners, and CNB Bot via ISO files, tricks users to bypass Windows protections, and uses GitHub to host payloads.
π Key tactics, payloads, and earnings β https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html
REF1695 delivers RATs, crypto miners, and CNB Bot via ISO files, tricks users to bypass Windows protections, and uses GitHub to host payloads.
π Key tactics, payloads, and earnings β https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html
π₯3π±3π2
π¨ Cisco fixed two critical flaws that allow full system takeover without login.
CVSS 9.8 vulnerabilities let attackers reset admin passwords (IMC) or run commands as root (SSM On-Prem) using crafted requests.
No workaround is available. Patching is required.
π Read β https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
CVSS 9.8 vulnerabilities let attackers reset admin passwords (IMC) or run commands as root (SSM On-Prem) using crafted requests.
No workaround is available. Patching is required.
π Read β https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
π7π₯4β‘2