โ ๏ธ WARNING - Are you using #ChatGPT, Codex, or OpenAI Atlas browser?
Update now... Older #macOS apps will stop working after May 8, 2026 due to a supply chain attack on a dependency used in OpenAIโs signing workflow. No user data was compromised, but certificates are revoked.
๐Read โ https://thehackernews.com/2026/04/openai-revokes-macos-app-certificate.html
Update now... Older #macOS apps will stop working after May 8, 2026 due to a supply chain attack on a dependency used in OpenAIโs signing workflow. No user data was compromised, but certificates are revoked.
๐Read โ https://thehackernews.com/2026/04/openai-revokes-macos-app-certificate.html
๐9๐ฑ7๐5๐คฏ4๐ฅ2
๐จ APT37 used Facebook to run a targeted malware campaign.
Fake profiles built trust, moved chats to Telegram, then pushed a trojanized PDF app that installs RokRAT via a JPG payload, using compromised sites and Zoho WorkDrive for control.
๐ Read โ https://thehackernews.com/2026/04/north-koreas-apt37-uses-facebook-social.html
Fake profiles built trust, moved chats to Telegram, then pushed a trojanized PDF app that installs RokRAT via a JPG payload, using compromised sites and Zoho WorkDrive for control.
๐ Read โ https://thehackernews.com/2026/04/north-koreas-apt37-uses-facebook-social.html
๐ฅ15๐คฏ4๐3๐2
Claude Code leak is now a malware vector.
A 512K-line source leak was mirrored on GitHub, where fake repos pushed Vidar, PureLogs, and GhostSocks via trojanized releases.
๐ How attackers weaponized the leak for malware spread โ https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#code-leak-weaponized-for-malware-spread
A 512K-line source leak was mirrored on GitHub, where fake repos pushed Vidar, PureLogs, and GhostSocks via trojanized releases.
๐ How attackers weaponized the leak for malware spread โ https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#code-leak-weaponized-for-malware-spread
๐14๐10๐ฑ8๐ฅ2
Monday is here, and your patch list just got a lot longer.
๐ฅ Adobe 0-Day
๐ค AI Exploits
โก Infra War
๐ก Router Botnets
๐ฐ๐ต Crypto Sting
๐ Fiber Spying
๐ Payroll Pirates
๐ต๏ธ Hack-for-Hire
๐ Signal Leak
Skim this before your next meeting. Letโs get into it: https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html
๐ฅ Adobe 0-Day
๐ค AI Exploits
โก Infra War
๐ก Router Botnets
๐ฐ๐ต Crypto Sting
๐ Fiber Spying
๐ Payroll Pirates
๐ต๏ธ Hack-for-Hire
๐ Signal Leak
Skim this before your next meeting. Letโs get into it: https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html
๐ฅ11โก3๐3
โก Email is still the top attack vector and $3 Billion in BEC losses (2024) proves it.
Modern attacks use AI-written messages, not malware. Traditional filters miss them. Security teams are layering behavioral AI and automation on top of Microsoft 365 to close the gap.
๐ Learn why email security is shifting to layered defense โ https://thehackernews.com/expert-insights/2026/04/why-security-leaders-are-layering-email.html
Modern attacks use AI-written messages, not malware. Traditional filters miss them. Security teams are layering behavioral AI and automation on top of Microsoft 365 to close the gap.
๐ Learn why email security is shifting to layered defense โ https://thehackernews.com/expert-insights/2026/04/why-security-leaders-are-layering-email.html
๐7๐ฅ2
FBI and Indonesian police dismantled W3LL, a phishing platform behind $20M+ fraud attempts.
Used by 500+ actors, it sold tools to steal credentials, bypass MFA, and resell access to 25,000+ accounts.
๐ Learn how a $500 kit scaled global phishing โ https://thehackernews.com/2026/04/fbi-and-indonesian-police-dismantle.html
Used by 500+ actors, it sold tools to steal credentials, bypass MFA, and resell access to 25,000+ accounts.
๐ Learn how a $500 kit scaled global phishing โ https://thehackernews.com/2026/04/fbi-and-indonesian-police-dismantle.html
๐ฅ9๐6
Anthropic restricted a model after it exploited zero-days autonomously.
Attackers now move in 29 minutes, or 22 seconds between steps. Detection is fast. But alerts still wait, and investigations take 20 to 40 minutes, longer than the attack itself.
๐ Learn the real gap in modern security โ https://thehackernews.com/2026/04/your-mttd-looks-great-your-post-alert.html
Attackers now move in 29 minutes, or 22 seconds between steps. Detection is fast. But alerts still wait, and investigations take 20 to 40 minutes, longer than the attack itself.
๐ Learn the real gap in modern security โ https://thehackernews.com/2026/04/your-mttd-looks-great-your-post-alert.html
๐14๐6๐ฅ5๐คฏ3๐ค2
โ ๏ธ CISA added 6 flaws to its KEV list after active exploitation.
A Fortinet bug (9.1) allows unauthenticated remote code execution, while an Exchange flaw is being used to deploy Medusa ransomware.
Federal agencies must patch by April 27.
๐ Read โ https://thehackernews.com/2026/04/cisa-adds-6-known-exploited-flaws-in.html
A Fortinet bug (9.1) allows unauthenticated remote code execution, while an Exchange flaw is being used to deploy Medusa ransomware.
Federal agencies must patch by April 27.
๐ Read โ https://thehackernews.com/2026/04/cisa-adds-6-known-exploited-flaws-in.html
๐7๐ฅ4
๐จ A ShowDoc flaw (CVSS 9.4) is now under active exploitation.
CVE-2025-0520 lets attackers upload web shells via unauthenticated file upload โ full server control. First attacks seen via a U.S. honeypot; ~2,000 instances remain exposed, mostly in China.
๐ Details โ https://thehackernews.com/2026/04/showdoc-rce-flaw-cve-2025-0520-actively.html
CVE-2025-0520 lets attackers upload web shells via unauthenticated file upload โ full server control. First attacks seen via a U.S. honeypot; ~2,000 instances remain exposed, mostly in China.
๐ Details โ https://thehackernews.com/2026/04/showdoc-rce-flaw-cve-2025-0520-actively.html
๐9๐ฅ3๐ฑ3
๐ 108 Chrome extensions with 20,000 installs were tied to one backend stealing user data.
They captured Google accounts, hijacked Telegram sessions, and injected scripts into every pageโwhile posing as games and utilities.
๐Read โ https://thehackernews.com/2026/04/108-malicious-chrome-extensions-steal.html
They captured Google accounts, hijacked Telegram sessions, and injected scripts into every pageโwhile posing as games and utilities.
๐Read โ https://thehackernews.com/2026/04/108-malicious-chrome-extensions-steal.html
๐15๐6๐ฅ4
Android trojan Mirax is spreading via Meta ads, hitting 220K+ accounts with fake streaming apps.
It gives attackers full device control and turns phones into proxy nodes to mask fraud using real IPs.
๐ How RAT + proxy is reshaping mobile attacks โ https://thehackernews.com/2026/04/mirax-android-rat-turns-devices-into.html
It gives attackers full device control and turns phones into proxy nodes to mask fraud using real IPs.
๐ How RAT + proxy is reshaping mobile attacks โ https://thehackernews.com/2026/04/mirax-android-rat-turns-devices-into.html
๐ฅ13โก3๐3๐2๐ฑ1
MFA protects login. Not the session.
As Alicia Townsend explains, session cookies become the real credential after authentication. If stolen, attackers get access with no password, no MFA, no alerts.
๐ How session hijacking bypasses MFA โ https://thehackernews.com/expert-insights/2026/04/session-cookie-theft-you-showed-your-id.html
As Alicia Townsend explains, session cookies become the real credential after authentication. If stolen, attackers get access with no password, no MFA, no alerts.
๐ How session hijacking bypasses MFA โ https://thehackernews.com/expert-insights/2026/04/session-cookie-theft-you-showed-your-id.html
๐21๐4๐ค4๐2๐ฅ1
Effective DDoS testing requires more than generating traffic.
It requires:
๐ถ Precise attack modeling
๐ถ Deep understanding of mitigation layers
๐ถ Controlled execution against production-like environments
Otherwise, youโre measuring system behaviorโnot resilience to real world attacks.
Hereโs how the main DDoS testing approaches stack up in 2026: https://thn.news/ddos-automation-testing
It requires:
๐ถ Precise attack modeling
๐ถ Deep understanding of mitigation layers
๐ถ Controlled execution against production-like environments
Otherwise, youโre measuring system behaviorโnot resilience to real world attacks.
Hereโs how the main DDoS testing approaches stack up in 2026: https://thn.news/ddos-automation-testing
๐2๐1
Security alerts rose 52%, but critical risk jumped ~400%.
OX Security shows AI-driven development is scaling high-impact flaws faster than teams can fix them, while business context now outweighs CVSS in real risk.
๐ Read โ https://thehackernews.com/2026/04/analysis-of-216m-security-findings.html
OX Security shows AI-driven development is scaling high-impact flaws faster than teams can fix them, while business context now outweighs CVSS in real risk.
๐ Read โ https://thehackernews.com/2026/04/analysis-of-216m-security-findings.html
๐3๐1
๐ฅ Google put Rust in Pixel 10โs modem DNS parser, cutting off a major class of memory bugs.
DNS powers core cellular functions, and unsafe parsing has enabled exploits like buffer overflows. This move reduces attack surface at one of the most exposed layers.
๐ Read โ https://thehackernews.com/2026/04/google-adds-rust-based-dns-parser-into.html
DNS powers core cellular functions, and unsafe parsing has enabled exploits like buffer overflows. This move reduces attack surface at one of the most exposed layers.
๐ Read โ https://thehackernews.com/2026/04/google-adds-rust-based-dns-parser-into.html
๐ฅ7๐คฏ5๐2๐2
2026 Gartnerยฎ Magic Quadrantโข for Third-Party Risk Management Tools for Assurance Leaders
As organizations grow increasingly reliant on third parties and their technologies, the range of associated risks expands as well. Third-party risk is a slippery slope, which is why itโs even more important to have a trusted solution that best supports your team.
โจ Optro has been named a Leader in the 2026 Gartnerยฎ Magic Quadrantโข for Third-Party Risk Management for Assurance Leaders!
Download your complimentary copy for unbiased recommendations and in-depth analyses of TPRM software: https://thn.news/2026-tprm-magic-quadrant
As organizations grow increasingly reliant on third parties and their technologies, the range of associated risks expands as well. Third-party risk is a slippery slope, which is why itโs even more important to have a trusted solution that best supports your team.
โจ Optro has been named a Leader in the 2026 Gartnerยฎ Magic Quadrantโข for Third-Party Risk Management for Assurance Leaders!
Download your complimentary copy for unbiased recommendations and in-depth analyses of TPRM software: https://thn.news/2026-tprm-magic-quadrant
๐3๐1
โก U.K. moves to jail tech execs over failure to remove non-consensual intimate images.
New bill amendments also criminalize incest porn and adults roleplaying as children, expanding platform liability.
๐ What the law changes for platforms and execs โ https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html#:~:text=U.K.%20Government%20Threatens%20Tech%20Execs%20with%20Jail%20Time
New bill amendments also criminalize incest porn and adults roleplaying as children, expanding platform liability.
๐ What the law changes for platforms and execs โ https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html#:~:text=U.K.%20Government%20Threatens%20Tech%20Execs%20with%20Jail%20Time
๐9๐ฑ4๐2๐ฅ2๐1๐ค1๐คฏ1
A new ad fraud campaign used AI-written news to enter Google Discover and trick users.
Pushpaganda drove 240M ad requests in a week by forcing notification opt-ins, then pushing scam alerts and redirecting to ad sites.
๐ Read โ https://thehackernews.com/2026/04/ai-driven-pushpaganda-scam-exploits.html
Pushpaganda drove 240M ad requests in a week by forcing notification opt-ins, then pushing scam alerts and redirecting to ad sites.
๐ Read โ https://thehackernews.com/2026/04/ai-driven-pushpaganda-scam-exploits.html
๐3๐ฅ2๐1
โ ๏ธ ALERT - Composer disclosed two command injection flaws (CVE-2026-40176 and CVE-2026-40261) with up to CVSS 8.8 severity.
Malicious composer.json or crafted source refs can execute arbitrary commandsโeven without Perforce installed. Affects multiple 2.x versions; patches released and metadata disabled as a precaution.
๐ Read โ https://thehackernews.com/2026/04/new-php-composer-flaws-enable-arbitrary.html
Malicious composer.json or crafted source refs can execute arbitrary commandsโeven without Perforce installed. Affects multiple 2.x versions; patches released and metadata disabled as a precaution.
๐ Read โ https://thehackernews.com/2026/04/new-php-composer-flaws-enable-arbitrary.html
๐ค5๐3๐ฅ2๐2
๐ฅ OpenAI launched GPT-5.4-Cyber, a model built for security teams to find and fix bugs faster.
3,000+ vulnerabilities already fixed using its Codex Security tools, with access expanding to thousands of defenders.
But the same AI can be misused to find exploits.
๐ Read โ https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html
3,000+ vulnerabilities already fixed using its Codex Security tools, with access expanding to thousands of defenders.
But the same AI can be misused to find exploits.
๐ Read โ https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html
๐ฅ16๐ฑ6๐4๐3๐2๐ค1
โก Microsoft patched 169 vulnerabilities, including an actively exploited SharePoint zero-day.
It lets attackers spoof trusted content. 93 flaws are privilege escalation, and a critical IKEv2 bug (CVSS 9.8) enables remote code execution with no user action.
๐ Full Patch Tuesday risks and fixes โ https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html
It lets attackers spoof trusted content. 93 flaws are privilege escalation, and a critical IKEv2 bug (CVSS 9.8) enables remote code execution with no user action.
๐ Full Patch Tuesday risks and fixes โ https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html
๐ฅ7โก2๐2