β οΈ Iran linked hackers are targeting U.S. critical infrastructure with direct PLC disruption.
They access internet exposed devices using legitimate tools, then alter system data and operations, disrupting water, energy, and government services and causing financial loss.
π Read β https://thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html
They access internet exposed devices using legitimate tools, then alter system data and operations, disrupting water, energy, and government services and causing financial loss.
π Read β https://thehackernews.com/2026/04/iran-linked-hackers-disrupt-us-critical.html
π₯22π12π4π2π€2β‘1
π North Korea-linked hackers spread #malware across five open-source ecosystems.
1,700+ packages on npm, PyPI, Go, Rust, and PHP posed as dev tools but loaded infostealer and RAT malware, hidden inside normal functions, not install.
π Read β https://thehackernews.com/2026/04/n-korean-hackers-spread-1700-malicious.html
1,700+ packages on npm, PyPI, Go, Rust, and PHP posed as dev tools but loaded infostealer and RAT malware, hidden inside normal functions, not install.
π Read β https://thehackernews.com/2026/04/n-korean-hackers-spread-1700-malicious.html
π12π₯7π€―6π€3
π₯ Anthropicβs new Claude Mythos model has found thousands of high-severity zero-days across major OS, browsers, and software β showing capabilities that can surpass top human experts.
Project Glasswing deploys it to secure critical systems ahead of potential misuse.
π Details β https://thehackernews.com/2026/04/anthropics-claude-mythos-finds.html
Project Glasswing deploys it to secure critical systems ahead of potential misuse.
π Details β https://thehackernews.com/2026/04/anthropics-claude-mythos-finds.html
π±24π₯13π5π€5π4π1
π¨ Nearly half of identity activity is invisible.
46% sits outside IAM, across shadow apps, local accounts, and machine identities. This βidentity dark matterβ is where real risk lives.
IVIP brings full, real-time visibility across systems.
π Learn why IAM alone is no longer enough β https://thehackernews.com/2026/04/shrinking-iam-attack-surface-through.html
46% sits outside IAM, across shadow apps, local accounts, and machine identities. This βidentity dark matterβ is where real risk lives.
IVIP brings full, real-time visibility across systems.
π Learn why IAM alone is no longer enough β https://thehackernews.com/2026/04/shrinking-iam-attack-surface-through.html
π5π₯4π€3
β οΈ APT28 is targeting Ukraine and allied supply chains using a confirmed zero-day (CVE-2026-21513) and PRISMEX malware.
It also exploits CVE-2026-21509, with LNK delivery possibly chaining both flaws to enable theft and file-wiping.
π Read here β https://thehackernews.com/2026/04/apt28-deploys-prismex-malware-in.html
It also exploits CVE-2026-21509, with LNK delivery possibly chaining both flaws to enable theft and file-wiping.
π Read here β https://thehackernews.com/2026/04/apt28-deploys-prismex-malware-in.html
π8π€―4π₯3
Most DDoS failures arenβt caused by bad protection tools.
Theyβre caused by hidden gaps in configuration, architecture, and readinessβoften discovered too late.
Here are 5 gaps consistently uncovered in DDoS test simulations: https://thn.news/ddos-testing-reveals
Theyβre caused by hidden gaps in configuration, architecture, and readinessβoften discovered too late.
Here are 5 gaps consistently uncovered in DDoS test simulations: https://thn.news/ddos-testing-reveals
π12π₯4π3
π¨ Masjesu, a DDoS botnet active since 2023, is spreading across IoT devices.
Built for stealth and persistence, it avoids high-risk targets while exploiting routers and cameras to grow its network and launch attacks.
π Details here β https://thehackernews.com/2026/04/masjesu-botnet-emerges-as-ddos-for-hire.html
Built for stealth and persistence, it avoids high-risk targets while exploiting routers and cameras to grow its network and launch attacks.
π Details here β https://thehackernews.com/2026/04/masjesu-botnet-emerges-as-ddos-for-hire.html
π₯10π5π1
β οΈ ALERT - New Chaos malware variant now targets misconfigured cloud setups, expanding beyond routers.
New variant exploits exposed services, installs a payload & adds proxy features to route attacker traffic, making activity harder to trace.
π Read β https://thehackernews.com/2026/04/new-chaos-variant-targets-misconfigured.html
New variant exploits exposed services, installs a payload & adds proxy features to route attacker traffic, making activity harder to trace.
π Read β https://thehackernews.com/2026/04/new-chaos-variant-targets-misconfigured.html
π10π₯7π±5π2π€1
β οΈ WARNING - A hack-for-hire campaign linked to the βBitterβ cluster targeted journalists across MENA.
One Apple account was fully compromised, giving attackers persistent access. Others were hit with phishing using fake logins and Google OAuth abuse.
π Tactics, targets, and spyware links β https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html
One Apple account was fully compromised, giving attackers persistent access. Others were hit with phishing using fake logins and Google OAuth abuse.
π Tactics, targets, and spyware links β https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html
π€6π±3π2π₯2π€―1
β οΈ Attackers are exploiting a 0-day in Adobe Reader via malicious PDFs.
Opening the file runs hidden JavaScript to steal data and stage further exploits, including possible RCE. It works on the latest version & has been active since Dec 2025.
π Read β https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html
Opening the file runs hidden JavaScript to steal data and stage further exploits, including possible RCE. It works on the latest version & has been active since Dec 2025.
π Read β https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html
π10β‘8π5π₯2
Another Thursday, another avalanche.
π¦ Hybrid botnet, 125K/day
π 13-yr Apache RCE, still live
πΈ $17.7B lost to fraud in 2025
π 8M DDoS hits, H2 2025
πΈ Meta insider, 30K stolen photos
π BPOs hijacked, enterprises breached
π SVG skimmer, 99 Magento stores
π Emojis beating security filters
π ClickFix β Node.js RAT, in-memory
π ClickFix β macOS via AppleScript
π€ PyPI package stealing AI prompts
π 5K+ Rockwell PLCs, wide open
π Claude Code leak β stealer wave
πΎ Remus = Lumma's 64-bit ghost
βοΈ Anthropic's risk label stands
π Fake Proxifier β clipboard clipper
π§ GitHub & Jira flipped for phishing
π Linux SMB3 leaks AES keys
π§ CLAUDE.md β prompt injection
π» GrafanaGhost, silent data exfil
π³ LSPosed = Android payment fraud
π Read more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html
π¦ Hybrid botnet, 125K/day
π 13-yr Apache RCE, still live
πΈ $17.7B lost to fraud in 2025
π 8M DDoS hits, H2 2025
πΈ Meta insider, 30K stolen photos
π BPOs hijacked, enterprises breached
π SVG skimmer, 99 Magento stores
π Emojis beating security filters
π ClickFix β Node.js RAT, in-memory
π ClickFix β macOS via AppleScript
π€ PyPI package stealing AI prompts
π 5K+ Rockwell PLCs, wide open
π Claude Code leak β stealer wave
πΎ Remus = Lumma's 64-bit ghost
βοΈ Anthropic's risk label stands
π Fake Proxifier β clipboard clipper
π§ GitHub & Jira flipped for phishing
π Linux SMB3 leaks AES keys
π§ CLAUDE.md β prompt injection
π» GrafanaGhost, silent data exfil
π³ LSPosed = Android payment fraud
π Read more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html
π5β‘3
π‘ State of Browser Attacks β free webinar series
Attackers have moved into the browser. These numbers tell the story:
β’ OAuth attacks up 37x this year
β’ ClickFix was the #1 initial access vector in 2025 (47% of attacks)
β’ 1 in 3 phishing payloads now delivered outside email
β’ Average breakout time to high-value assets: 29 minutes
Most security tools never see it coming.
Push Security is running a 3-part series with Troy Hunt (Have I Been Pwned), John Hammond (Huntress), and Matt Johansen (Vulnerable U) β breaking down exactly how these attacks work and what actually stops them.
π Starts April 16
π https://thn.news/push-browser-attacks
Attackers have moved into the browser. These numbers tell the story:
β’ OAuth attacks up 37x this year
β’ ClickFix was the #1 initial access vector in 2025 (47% of attacks)
β’ 1 in 3 phishing payloads now delivered outside email
β’ Average breakout time to high-value assets: 29 minutes
Most security tools never see it coming.
Push Security is running a 3-part series with Troy Hunt (Have I Been Pwned), John Hammond (Huntress), and Matt Johansen (Vulnerable U) β breaking down exactly how these attacks work and what actually stops them.
π Starts April 16
π https://thn.news/push-browser-attacks
π8π₯5π2
Researchers tracked UAT-10362 targeting Taiwan via phishing.
It uses DLL side-loading to deploy LucidRook, a Lua-based stager that steals system data and runs encrypted payloads in memory. Execution is limited to zh-TW systems to evade detection.
π Full attack chain and toolkit details β https://thehackernews.com/2026/04/uat-10362-targets-taiwanese-ngos-with.html
It uses DLL side-loading to deploy LucidRook, a Lua-based stager that steals system data and runs encrypted payloads in memory. Execution is limited to zh-TW systems to evade detection.
π Full attack chain and toolkit details β https://thehackernews.com/2026/04/uat-10362-targets-taiwanese-ngos-with.html
π8π₯4
π ALERT - A flaw in EngageLabβs #Android SDK exposed 30M+ crypto wallet installs to potential data access.
The intent redirection bug allowed sandbox bypass via a malicious app on the same device. No active exploitation found.
πRead β https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html
The intent redirection bug allowed sandbox bypass via a malicious app on the same device. No active exploitation found.
πRead β https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html
π₯11β‘7π2
β οΈ Smart Slider 3 Pro shipped a backdoored update (3.5.1.35) via its official update system.
For ~6 hours, installs got hidden admin accounts, pre-auth remote code execution via HTTP headers, and full credential + site data exfiltration with persistent backdoors.
π Read β https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html
For ~6 hours, installs got hidden admin accounts, pre-auth remote code execution via HTTP headers, and full credential + site data exfiltration with persistent backdoors.
π Read β https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html
π7π±3π₯1
π₯ Google rolled out Device Bound Session Credentials (DBSC) in Chrome 146 (Windows).
It ties session cookies to a device using hardware keys, so stolen cookies canβt be reused without that device. Cookies expire quickly without validation.
π Read β https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html
It ties session cookies to a device using hardware keys, so stolen cookies canβt be reused without that device. Cookies expire quickly without validation.
π Read β https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html
π25π9π±6π₯4π2π€1
A 13-year-old flaw in Apache ActiveMQ can lead to RCE.
CVE-2026-34197 lets attackers run OS commands via the Jolokia API. Chained with CVE-2024-32114, it becomes unauthenticated RCE on some versions.
Patched in 5.19.4 and 6.2.3.
π Learn more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#chained-flaws-enable-stealth-rce
CVE-2026-34197 lets attackers run OS commands via the Jolokia API. Chained with CVE-2024-32114, it becomes unauthenticated RCE on some versions.
Patched in 5.19.4 and 6.2.3.
π Learn more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#chained-flaws-enable-stealth-rce
π±16π3π₯1
β οΈ Marimo CVE-2026-39987 gave attackers a full shell with no authentication.
A missing check in /terminal/ws allowed remote code execution on exposed systems. Exploitation began within 9 hours of disclosureβno PoC needed.
π Details here β https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html
A missing check in /terminal/ws allowed remote code execution on exposed systems. Exploitation began within 9 hours of disclosureβno PoC needed.
π Details here β https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html
π€―6π€3π2π₯1
Shadow AI is now a core security risk.
55% of employees use unapproved AI tools, sending sensitive data outside control. No visibility. No audit trail.
Traditional security tools canβt monitor this shift.
π How shadow AI creates hidden exposure β https://thehackernews.com/2026/04/the-hidden-security-risks-of-shadow-ai.html
55% of employees use unapproved AI tools, sending sensitive data outside control. No visibility. No audit trail.
Traditional security tools canβt monitor this shift.
π How shadow AI creates hidden exposure β https://thehackernews.com/2026/04/the-hidden-security-risks-of-shadow-ai.html
π₯9π4
A fake VS Code extension is spreading malware across developer tools.
One plugin infects every IDE on the system, then installs a RAT and data stealer. It uses native Zig code to bypass sandbox limits and runs with full OS access.
π Details here β https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html
One plugin infects every IDE on the system, then installs a RAT and data stealer. It uses native Zig code to bypass sandbox limits and runs with full OS access.
π Details here β https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html
π±8π6β‘4π2π₯1
AI browser extensions are a hidden risk in enterprise security.
99% of users run extensions, yet they bypass DLP and logs while accessing sessions, inputs, and data. AI extensions are riskier and often change permissions over time.
π What security teams are missing β https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html
99% of users run extensions, yet they bypass DLP and logs while accessing sessions, inputs, and data. AI extensions are riskier and often change permissions over time.
π What security teams are missing β https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html
π8β‘5π3π₯1