π Flowise has a CVSS 10.0 RCE flaw (CVE-2025-59528) now under active attack.
A bug in MCP config lets attackers run JavaScript with full system access using just an API token. Over 12,000 exposed instances raise risk.
π Exploitation details β https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html
A bug in MCP config lets attackers run JavaScript with full system access using just an API token. Over 12,000 exposed instances raise risk.
π Exploitation details β https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html
β‘9π₯3
β οΈ WARNING: China-linked Storm-1175 is breaching networks and deploying ransomware in under 72 hours.
It chains zero-day and known flaws, then uses trusted tools to move, steal data, and evade detection across healthcare, finance, and more.
π Read β https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html
It chains zero-day and known flaws, then uses trusted tools to move, steal data, and evade detection across healthcare, finance, and more.
π Read β https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html
π6β‘3π₯3π±2
β‘ New research shows GPUs can be used to take over a system.
GPUBreach attack enables root access by flipping bits in GPU memory, corrupting page tables, and chaining into CPU exploitsβeven with IOMMU enabled.
π Read details β https://thehackernews.com/2026/04/new-gpubreach-attack-enables-full-cpu.html
GPUBreach attack enables root access by flipping bits in GPU memory, corrupting page tables, and chaining into CPU exploitsβeven with IOMMU enabled.
π Read details β https://thehackernews.com/2026/04/new-gpubreach-attack-enables-full-cpu.html
π±18π₯8π5π1π1
Ilan Nacmias at Sygnia shares a case where AI security tools worked, but no decisions were made.
Risks were clear, but teams disagreed and leaders saw things as under control. Progress came only after linking risk to business impact.
π Why AI didnβt fix execution in cybersecurity β https://thehackernews.com/expert-insights/2026/04/ai-will-change-cybersecurity-humans.html
Risks were clear, but teams disagreed and leaders saw things as under control. Progress came only after linking risk to business impact.
π Why AI didnβt fix execution in cybersecurity β https://thehackernews.com/expert-insights/2026/04/ai-will-change-cybersecurity-humans.html
π₯6β‘2
Credential security isnβt just about breaches.
Daily issues add up: 30% of helpdesk tickets are password resets (~$70 each), while exposed credentials often go unnoticed.
Forced resets increase weak passwords without reducing risk.
π Why credential issues cost more than breaches β https://thehackernews.com/2026/04/the-hidden-cost-of-recurring-credential.html
Daily issues add up: 30% of helpdesk tickets are password resets (~$70 each), while exposed credentials often go unnoticed.
Forced resets increase weak passwords without reducing risk.
π Why credential issues cost more than breaches β https://thehackernews.com/2026/04/the-hidden-cost-of-recurring-credential.html
π4π₯3π€1
Most attacks donβt start with exploits anymore. They start with access.
Across thousands of real-world incidents analyzed in the 2026 Annual Threat Report, one pattern is clear:
Attackers arenβt breaking in.
Theyβre logging in.
Hereβs what weβre seeing:
β³ Legitimate credentials are the #1 entry point
β³ Remote access tools are being used against you
β³ Traditional detection is missing what looks βnormalβ
This isnβt theory. This is what actually worked for attackers in 2025.
If your security strategy is still built around stopping malware, youβre already behind.
Download the Blackpoint Cyber 2026 Annual Threat Report and see how modern attacks are actually unfolding.
Download the report: https://thn.news/blackpoint-threat-2026
Across thousands of real-world incidents analyzed in the 2026 Annual Threat Report, one pattern is clear:
Attackers arenβt breaking in.
Theyβre logging in.
Hereβs what weβre seeing:
β³ Legitimate credentials are the #1 entry point
β³ Remote access tools are being used against you
β³ Traditional detection is missing what looks βnormalβ
This isnβt theory. This is what actually worked for attackers in 2025.
If your security strategy is still built around stopping malware, youβre already behind.
Download the Blackpoint Cyber 2026 Annual Threat Report and see how modern attacks are actually unfolding.
Download the report: https://thn.news/blackpoint-threat-2026
π7π₯2π1
β οΈ Attackers are hijacking exposed ComfyUI servers into crypto mining and proxy botnets.
Scanners exploit unauthenticated setups via custom nodes, run code, and install persistent malware. Infected systems mine crypto and resist removal.
π Read β https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html
Scanners exploit unauthenticated setups via custom nodes, run code, and install persistent malware. Infected systems mine crypto and resist removal.
π Read β https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html
π5π₯4
π Docker fixed a flaw letting attackers bypass AuthZ plugins with a padded API request (>1MB).
The plugin sees no body and allows it, while Docker executes itβcreating a privileged container with host access and exposed credentials.
π Learn how this leads to full host compromise β https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html
The plugin sees no body and allows it, while Docker executes itβcreating a privileged container with host access and exposed credentials.
π Learn how this leads to full host compromise β https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html
π₯7π3
--- β οΈ WEBINAR ALERT ---
The biggest identity risk in 2026 isnβt inside your IAM. Itβs everything outside it.
Hundreds of unmanaged apps are now being accessed by AI agents, expanding risk beyond what your team can see or control.
π Join the WEBINAR for data and practical steps to close the gaps β https://thehackernews.com/2026/04/webinar-how-to-close-identity-gaps-in.html
The biggest identity risk in 2026 isnβt inside your IAM. Itβs everything outside it.
Hundreds of unmanaged apps are now being accessed by AI agents, expanding risk beyond what your team can see or control.
π Join the WEBINAR for data and practical steps to close the gaps β https://thehackernews.com/2026/04/webinar-how-to-close-identity-gaps-in.html
π9π₯3
π¨ WARNING - APT28 ran a global router hijack to steal credentials.
The group compromised MikroTik and TP-Link devices, rewrote DNS settings, and redirected traffic for credential theft at scale -- impacting 18,000+ IPs across 120 countries, including government and cloud targets.
π Read here β https://thehackernews.com/2026/04/russian-state-linked-apt28-exploits.html
The group compromised MikroTik and TP-Link devices, rewrote DNS settings, and redirected traffic for credential theft at scale -- impacting 18,000+ IPs across 120 countries, including government and cloud targets.
π Read here β https://thehackernews.com/2026/04/russian-state-linked-apt28-exploits.html
π₯11π±5π4
β οΈ Iran linked hackers are targeting U.S. critical infrastructure with direct PLC disruption.
They access internet exposed devices using legitimate tools, then alter system data and operations, disrupting water, energy, and government services and causing financial loss.
π Read β https://thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html
They access internet exposed devices using legitimate tools, then alter system data and operations, disrupting water, energy, and government services and causing financial loss.
π Read β https://thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html
π₯22π12π4π2π€2β‘1
π North Korea-linked hackers spread #malware across five open-source ecosystems.
1,700+ packages on npm, PyPI, Go, Rust, and PHP posed as dev tools but loaded infostealer and RAT malware, hidden inside normal functions, not install.
π Read β https://thehackernews.com/2026/04/n-korean-hackers-spread-1700-malicious.html
1,700+ packages on npm, PyPI, Go, Rust, and PHP posed as dev tools but loaded infostealer and RAT malware, hidden inside normal functions, not install.
π Read β https://thehackernews.com/2026/04/n-korean-hackers-spread-1700-malicious.html
π12π₯7π€―6π€3
π₯ Anthropicβs new Claude Mythos model has found thousands of high-severity zero-days across major OS, browsers, and software β showing capabilities that can surpass top human experts.
Project Glasswing deploys it to secure critical systems ahead of potential misuse.
π Details β https://thehackernews.com/2026/04/anthropics-claude-mythos-finds.html
Project Glasswing deploys it to secure critical systems ahead of potential misuse.
π Details β https://thehackernews.com/2026/04/anthropics-claude-mythos-finds.html
π±24π₯13π5π€5π4π1
π¨ Nearly half of identity activity is invisible.
46% sits outside IAM, across shadow apps, local accounts, and machine identities. This βidentity dark matterβ is where real risk lives.
IVIP brings full, real-time visibility across systems.
π Learn why IAM alone is no longer enough β https://thehackernews.com/2026/04/shrinking-iam-attack-surface-through.html
46% sits outside IAM, across shadow apps, local accounts, and machine identities. This βidentity dark matterβ is where real risk lives.
IVIP brings full, real-time visibility across systems.
π Learn why IAM alone is no longer enough β https://thehackernews.com/2026/04/shrinking-iam-attack-surface-through.html
π5π₯4π€3
β οΈ APT28 is targeting Ukraine and allied supply chains using a confirmed zero-day (CVE-2026-21513) and PRISMEX malware.
It also exploits CVE-2026-21509, with LNK delivery possibly chaining both flaws to enable theft and file-wiping.
π Read here β https://thehackernews.com/2026/04/apt28-deploys-prismex-malware-in.html
It also exploits CVE-2026-21509, with LNK delivery possibly chaining both flaws to enable theft and file-wiping.
π Read here β https://thehackernews.com/2026/04/apt28-deploys-prismex-malware-in.html
π8π€―4π₯3
Most DDoS failures arenβt caused by bad protection tools.
Theyβre caused by hidden gaps in configuration, architecture, and readinessβoften discovered too late.
Here are 5 gaps consistently uncovered in DDoS test simulations: https://thn.news/ddos-testing-reveals
Theyβre caused by hidden gaps in configuration, architecture, and readinessβoften discovered too late.
Here are 5 gaps consistently uncovered in DDoS test simulations: https://thn.news/ddos-testing-reveals
π11π₯4π3
π¨ Masjesu, a DDoS botnet active since 2023, is spreading across IoT devices.
Built for stealth and persistence, it avoids high-risk targets while exploiting routers and cameras to grow its network and launch attacks.
π Details here β https://thehackernews.com/2026/04/masjesu-botnet-emerges-as-ddos-for-hire.html
Built for stealth and persistence, it avoids high-risk targets while exploiting routers and cameras to grow its network and launch attacks.
π Details here β https://thehackernews.com/2026/04/masjesu-botnet-emerges-as-ddos-for-hire.html
π₯10π5π1
β οΈ ALERT - New Chaos malware variant now targets misconfigured cloud setups, expanding beyond routers.
New variant exploits exposed services, installs a payload & adds proxy features to route attacker traffic, making activity harder to trace.
π Read β https://thehackernews.com/2026/04/new-chaos-variant-targets-misconfigured.html
New variant exploits exposed services, installs a payload & adds proxy features to route attacker traffic, making activity harder to trace.
π Read β https://thehackernews.com/2026/04/new-chaos-variant-targets-misconfigured.html
π10π₯7π±5π2π€1
β οΈ WARNING - A hack-for-hire campaign linked to the βBitterβ cluster targeted journalists across MENA.
One Apple account was fully compromised, giving attackers persistent access. Others were hit with phishing using fake logins and Google OAuth abuse.
π Tactics, targets, and spyware links β https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html
One Apple account was fully compromised, giving attackers persistent access. Others were hit with phishing using fake logins and Google OAuth abuse.
π Tactics, targets, and spyware links β https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html
π€6π±3π2π₯2π€―1
β οΈ Attackers are exploiting a 0-day in Adobe Reader via malicious PDFs.
Opening the file runs hidden JavaScript to steal data and stage further exploits, including possible RCE. It works on the latest version & has been active since Dec 2025.
π Read β https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html
Opening the file runs hidden JavaScript to steal data and stage further exploits, including possible RCE. It works on the latest version & has been active since Dec 2025.
π Read β https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html
π10β‘8π5π₯2
Another Thursday, another avalanche.
π¦ Hybrid botnet, 125K/day
π 13-yr Apache RCE, still live
πΈ $17.7B lost to fraud in 2025
π 8M DDoS hits, H2 2025
πΈ Meta insider, 30K stolen photos
π BPOs hijacked, enterprises breached
π SVG skimmer, 99 Magento stores
π Emojis beating security filters
π ClickFix β Node.js RAT, in-memory
π ClickFix β macOS via AppleScript
π€ PyPI package stealing AI prompts
π 5K+ Rockwell PLCs, wide open
π Claude Code leak β stealer wave
πΎ Remus = Lumma's 64-bit ghost
βοΈ Anthropic's risk label stands
π Fake Proxifier β clipboard clipper
π§ GitHub & Jira flipped for phishing
π Linux SMB3 leaks AES keys
π§ CLAUDE.md β prompt injection
π» GrafanaGhost, silent data exfil
π³ LSPosed = Android payment fraud
π Read more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html
π¦ Hybrid botnet, 125K/day
π 13-yr Apache RCE, still live
πΈ $17.7B lost to fraud in 2025
π 8M DDoS hits, H2 2025
πΈ Meta insider, 30K stolen photos
π BPOs hijacked, enterprises breached
π SVG skimmer, 99 Magento stores
π Emojis beating security filters
π ClickFix β Node.js RAT, in-memory
π ClickFix β macOS via AppleScript
π€ PyPI package stealing AI prompts
π 5K+ Rockwell PLCs, wide open
π Claude Code leak β stealer wave
πΎ Remus = Lumma's 64-bit ghost
βοΈ Anthropic's risk label stands
π Fake Proxifier β clipboard clipper
π§ GitHub & Jira flipped for phishing
π Linux SMB3 leaks AES keys
π§ CLAUDE.md β prompt injection
π» GrafanaGhost, silent data exfil
π³ LSPosed = Android payment fraud
π Read more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html
π5β‘3