Another Thursday, another avalanche.
π¦ Hybrid botnet, 125K/day
π 13-yr Apache RCE, still live
πΈ $17.7B lost to fraud in 2025
π 8M DDoS hits, H2 2025
πΈ Meta insider, 30K stolen photos
π BPOs hijacked, enterprises breached
π SVG skimmer, 99 Magento stores
π Emojis beating security filters
π ClickFix β Node.js RAT, in-memory
π ClickFix β macOS via AppleScript
π€ PyPI package stealing AI prompts
π 5K+ Rockwell PLCs, wide open
π Claude Code leak β stealer wave
πΎ Remus = Lumma's 64-bit ghost
βοΈ Anthropic's risk label stands
π Fake Proxifier β clipboard clipper
π§ GitHub & Jira flipped for phishing
π Linux SMB3 leaks AES keys
π§ CLAUDE.md β prompt injection
π» GrafanaGhost, silent data exfil
π³ LSPosed = Android payment fraud
π Read more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html
π¦ Hybrid botnet, 125K/day
π 13-yr Apache RCE, still live
πΈ $17.7B lost to fraud in 2025
π 8M DDoS hits, H2 2025
πΈ Meta insider, 30K stolen photos
π BPOs hijacked, enterprises breached
π SVG skimmer, 99 Magento stores
π Emojis beating security filters
π ClickFix β Node.js RAT, in-memory
π ClickFix β macOS via AppleScript
π€ PyPI package stealing AI prompts
π 5K+ Rockwell PLCs, wide open
π Claude Code leak β stealer wave
πΎ Remus = Lumma's 64-bit ghost
βοΈ Anthropic's risk label stands
π Fake Proxifier β clipboard clipper
π§ GitHub & Jira flipped for phishing
π Linux SMB3 leaks AES keys
π§ CLAUDE.md β prompt injection
π» GrafanaGhost, silent data exfil
π³ LSPosed = Android payment fraud
π Read more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html
π5β‘3
π‘ State of Browser Attacks β free webinar series
Attackers have moved into the browser. These numbers tell the story:
β’ OAuth attacks up 37x this year
β’ ClickFix was the #1 initial access vector in 2025 (47% of attacks)
β’ 1 in 3 phishing payloads now delivered outside email
β’ Average breakout time to high-value assets: 29 minutes
Most security tools never see it coming.
Push Security is running a 3-part series with Troy Hunt (Have I Been Pwned), John Hammond (Huntress), and Matt Johansen (Vulnerable U) β breaking down exactly how these attacks work and what actually stops them.
π Starts April 16
π https://thn.news/push-browser-attacks
Attackers have moved into the browser. These numbers tell the story:
β’ OAuth attacks up 37x this year
β’ ClickFix was the #1 initial access vector in 2025 (47% of attacks)
β’ 1 in 3 phishing payloads now delivered outside email
β’ Average breakout time to high-value assets: 29 minutes
Most security tools never see it coming.
Push Security is running a 3-part series with Troy Hunt (Have I Been Pwned), John Hammond (Huntress), and Matt Johansen (Vulnerable U) β breaking down exactly how these attacks work and what actually stops them.
π Starts April 16
π https://thn.news/push-browser-attacks
π8π₯5π2
Researchers tracked UAT-10362 targeting Taiwan via phishing.
It uses DLL side-loading to deploy LucidRook, a Lua-based stager that steals system data and runs encrypted payloads in memory. Execution is limited to zh-TW systems to evade detection.
π Full attack chain and toolkit details β https://thehackernews.com/2026/04/uat-10362-targets-taiwanese-ngos-with.html
It uses DLL side-loading to deploy LucidRook, a Lua-based stager that steals system data and runs encrypted payloads in memory. Execution is limited to zh-TW systems to evade detection.
π Full attack chain and toolkit details β https://thehackernews.com/2026/04/uat-10362-targets-taiwanese-ngos-with.html
π8π₯4
π ALERT - A flaw in EngageLabβs #Android SDK exposed 30M+ crypto wallet installs to potential data access.
The intent redirection bug allowed sandbox bypass via a malicious app on the same device. No active exploitation found.
πRead β https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html
The intent redirection bug allowed sandbox bypass via a malicious app on the same device. No active exploitation found.
πRead β https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html
π₯11β‘7π2
β οΈ Smart Slider 3 Pro shipped a backdoored update (3.5.1.35) via its official update system.
For ~6 hours, installs got hidden admin accounts, pre-auth remote code execution via HTTP headers, and full credential + site data exfiltration with persistent backdoors.
π Read β https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html
For ~6 hours, installs got hidden admin accounts, pre-auth remote code execution via HTTP headers, and full credential + site data exfiltration with persistent backdoors.
π Read β https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html
π7π±3π₯1
π₯ Google rolled out Device Bound Session Credentials (DBSC) in Chrome 146 (Windows).
It ties session cookies to a device using hardware keys, so stolen cookies canβt be reused without that device. Cookies expire quickly without validation.
π Read β https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html
It ties session cookies to a device using hardware keys, so stolen cookies canβt be reused without that device. Cookies expire quickly without validation.
π Read β https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html
π25π9π±6π₯4π2π€1
A 13-year-old flaw in Apache ActiveMQ can lead to RCE.
CVE-2026-34197 lets attackers run OS commands via the Jolokia API. Chained with CVE-2024-32114, it becomes unauthenticated RCE on some versions.
Patched in 5.19.4 and 6.2.3.
π Learn more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#chained-flaws-enable-stealth-rce
CVE-2026-34197 lets attackers run OS commands via the Jolokia API. Chained with CVE-2024-32114, it becomes unauthenticated RCE on some versions.
Patched in 5.19.4 and 6.2.3.
π Learn more β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#chained-flaws-enable-stealth-rce
π±16π3π₯1
β οΈ Marimo CVE-2026-39987 gave attackers a full shell with no authentication.
A missing check in /terminal/ws allowed remote code execution on exposed systems. Exploitation began within 9 hours of disclosureβno PoC needed.
π Details here β https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html
A missing check in /terminal/ws allowed remote code execution on exposed systems. Exploitation began within 9 hours of disclosureβno PoC needed.
π Details here β https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html
π€―6π€3π2π₯1
Shadow AI is now a core security risk.
55% of employees use unapproved AI tools, sending sensitive data outside control. No visibility. No audit trail.
Traditional security tools canβt monitor this shift.
π How shadow AI creates hidden exposure β https://thehackernews.com/2026/04/the-hidden-security-risks-of-shadow-ai.html
55% of employees use unapproved AI tools, sending sensitive data outside control. No visibility. No audit trail.
Traditional security tools canβt monitor this shift.
π How shadow AI creates hidden exposure β https://thehackernews.com/2026/04/the-hidden-security-risks-of-shadow-ai.html
π₯9π4
A fake VS Code extension is spreading malware across developer tools.
One plugin infects every IDE on the system, then installs a RAT and data stealer. It uses native Zig code to bypass sandbox limits and runs with full OS access.
π Details here β https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html
One plugin infects every IDE on the system, then installs a RAT and data stealer. It uses native Zig code to bypass sandbox limits and runs with full OS access.
π Details here β https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html
π±8π6β‘4π2π₯1
AI browser extensions are a hidden risk in enterprise security.
99% of users run extensions, yet they bypass DLP and logs while accessing sessions, inputs, and data. AI extensions are riskier and often change permissions over time.
π What security teams are missing β https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html
99% of users run extensions, yet they bypass DLP and logs while accessing sessions, inputs, and data. AI extensions are riskier and often change permissions over time.
π What security teams are missing β https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html
π8β‘5π3π₯1
β οΈ Police and intelligence agencies are using phone ad data to track people.
Up to 500M devices feed Webloc, built by Cobwebs and sold by Penlink, enabling location tracking, identity inference, and 3-year history, per Citizen Lab.
π Learn more β https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html
Up to 500M devices feed Webloc, built by Cobwebs and sold by Penlink, enabling location tracking, identity inference, and 3-year history, per Citizen Lab.
π Learn more β https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html
π€18π€―15π7π4π₯4π±4β‘1
π Adobe released emergency fixes for a 9.6 CVSS flaw (CVE-2026-34621) in Acrobat/Reader, confirmed under active exploitation.
A prototype pollution bug lets malicious PDFs run arbitrary code via JavaScript. Evidence shows attacks may date back to Dec 2025.
π Read β https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html
A prototype pollution bug lets malicious PDFs run arbitrary code via JavaScript. Evidence shows attacks may date back to Dec 2025.
π Read β https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html
π€―12π₯5π3π3π€2π±1
β οΈ ALERT - CPUIDβs site was compromised for ~19 hours, serving trojanized CPU-Z and HWMonitor installers.
Attackers used DLL sideloading to pair legit apps with a malicious file, deploying STX RAT.
150+ victims reported before detection.
π Read β https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html
Attackers used DLL sideloading to pair legit apps with a malicious file, deploying STX RAT.
150+ victims reported before detection.
π Read β https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html
π€―34π7π5π±4π3π₯1
β οΈ WARNING - Are you using #ChatGPT, Codex, or OpenAI Atlas browser?
Update now... Older #macOS apps will stop working after May 8, 2026 due to a supply chain attack on a dependency used in OpenAIβs signing workflow. No user data was compromised, but certificates are revoked.
πRead β https://thehackernews.com/2026/04/openai-revokes-macos-app-certificate.html
Update now... Older #macOS apps will stop working after May 8, 2026 due to a supply chain attack on a dependency used in OpenAIβs signing workflow. No user data was compromised, but certificates are revoked.
πRead β https://thehackernews.com/2026/04/openai-revokes-macos-app-certificate.html
π8π±6π4π€―2
π¨ APT37 used Facebook to run a targeted malware campaign.
Fake profiles built trust, moved chats to Telegram, then pushed a trojanized PDF app that installs RokRAT via a JPG payload, using compromised sites and Zoho WorkDrive for control.
π Read β https://thehackernews.com/2026/04/north-koreas-apt37-uses-facebook-social.html
Fake profiles built trust, moved chats to Telegram, then pushed a trojanized PDF app that installs RokRAT via a JPG payload, using compromised sites and Zoho WorkDrive for control.
π Read β https://thehackernews.com/2026/04/north-koreas-apt37-uses-facebook-social.html
π₯11π€―3π1π1
Claude Code leak is now a malware vector.
A 512K-line source leak was mirrored on GitHub, where fake repos pushed Vidar, PureLogs, and GhostSocks via trojanized releases.
π How attackers weaponized the leak for malware spread β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#code-leak-weaponized-for-malware-spread
A 512K-line source leak was mirrored on GitHub, where fake repos pushed Vidar, PureLogs, and GhostSocks via trojanized releases.
π How attackers weaponized the leak for malware spread β https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#code-leak-weaponized-for-malware-spread
π12π±7π5
Monday is here, and your patch list just got a lot longer.
π₯ Adobe 0-Day
π€ AI Exploits
β‘ Infra War
π‘ Router Botnets
π°π΅ Crypto Sting
π Fiber Spying
π Payroll Pirates
π΅οΈ Hack-for-Hire
π Signal Leak
Skim this before your next meeting. Letβs get into it: https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html
π₯ Adobe 0-Day
π€ AI Exploits
β‘ Infra War
π‘ Router Botnets
π°π΅ Crypto Sting
π Fiber Spying
π Payroll Pirates
π΅οΈ Hack-for-Hire
π Signal Leak
Skim this before your next meeting. Letβs get into it: https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html
π₯8β‘2π1
β‘ Email is still the top attack vector and $3 Billion in BEC losses (2024) proves it.
Modern attacks use AI-written messages, not malware. Traditional filters miss them. Security teams are layering behavioral AI and automation on top of Microsoft 365 to close the gap.
π Learn why email security is shifting to layered defense β https://thehackernews.com/expert-insights/2026/04/why-security-leaders-are-layering-email.html
Modern attacks use AI-written messages, not malware. Traditional filters miss them. Security teams are layering behavioral AI and automation on top of Microsoft 365 to close the gap.
π Learn why email security is shifting to layered defense β https://thehackernews.com/expert-insights/2026/04/why-security-leaders-are-layering-email.html
π3
FBI and Indonesian police dismantled W3LL, a phishing platform behind $20M+ fraud attempts.
Used by 500+ actors, it sold tools to steal credentials, bypass MFA, and resell access to 25,000+ accounts.
π Learn how a $500 kit scaled global phishing β https://thehackernews.com/2026/04/fbi-and-indonesian-police-dismantle.html
Used by 500+ actors, it sold tools to steal credentials, bypass MFA, and resell access to 25,000+ accounts.
π Learn how a $500 kit scaled global phishing β https://thehackernews.com/2026/04/fbi-and-indonesian-police-dismantle.html
π₯5π2
Anthropic restricted a model after it exploited zero-days autonomously.
Attackers now move in 29 minutes, or 22 seconds between steps. Detection is fast. But alerts still wait, and investigations take 20 to 40 minutes, longer than the attack itself.
π Learn the real gap in modern security β https://thehackernews.com/2026/04/your-mttd-looks-great-your-post-alert.html
Attackers now move in 29 minutes, or 22 seconds between steps. Detection is fast. But alerts still wait, and investigations take 20 to 40 minutes, longer than the attack itself.
π Learn the real gap in modern security β https://thehackernews.com/2026/04/your-mttd-looks-great-your-post-alert.html
π12π4π€―2π₯1π€1