π April Patch Tuesday spans SAP, Adobe, Microsoft, Fortinetβand core vendors like Apple, Google, Cisco, VMware, Palo Alto, AWS, and Linux.
SAP (CVSS 9.9) enables SQL execution. Adobe Reader and SharePoint flaws are already exploited.
π Read β https://thehackernews.com/2026/04/april-patch-tuesday-fixes-critical.html
SAP (CVSS 9.9) enables SQL execution. Adobe Reader and SharePoint flaws are already exploited.
π Read β https://thehackernews.com/2026/04/april-patch-tuesday-fixes-critical.html
π8π₯4β‘2
π¨ A critical nginx-ui flaw is now exploited in the wild.
CVE-2026-33032 (9.8) allows auth bypass via the /mcp_message endpoint, letting attackers take full control of Nginx with two HTTP requests due to an βallow-allβ default.
π Details here β https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html
CVE-2026-33032 (9.8) allows auth bypass via the /mcp_message endpoint, letting attackers take full control of Nginx with two HTTP requests due to an βallow-allβ default.
π Details here β https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html
π±12π3π₯3π1
π€ AI is now embedded across security teams. 100% of CISOs report active use.
Agentic testing adds variability, so results change between runs and break repeatability. Hybrid models keep tests consistent while using AI to adapt.
π Learn why hybrid AI models are replacing agentic security testing β https://thehackernews.com/2026/04/deterministic-agentic-ai-architecture.html
Agentic testing adds variability, so results change between runs and break repeatability. Hybrid models keep tests consistent while using AI to adapt.
π Learn why hybrid AI models are replacing agentic security testing β https://thehackernews.com/2026/04/deterministic-agentic-ai-architecture.html
π€8π5π₯3
β οΈ Attackers are abusing automation tools as delivery infrastructure.
Cisco Talos found #n8n webhooks used for phishing, malware, and tracking, leveraging trusted *.n8n.cloud domains to bypass filters.
email link β CAPTCHA β silent download β RMM-based persistence.
π Read β https://thehackernews.com/2026/04/n8n-webhooks-abused-since-october-2025.html
Cisco Talos found #n8n webhooks used for phishing, malware, and tracking, leveraging trusted *.n8n.cloud domains to bypass filters.
email link β CAPTCHA β silent download β RMM-based persistence.
π Read β https://thehackernews.com/2026/04/n8n-webhooks-abused-since-october-2025.html
π₯17π5β‘4
Ukraineβs CERT-UA reports attacks on hospitals and government using AGINGFLY to steal browser and WhatsApp data.
Phishing triggers LNK β HTA via mshta.exe, deploying RAVENSHELL for remote control, credential theft, and lateral movement.
π Full attack chain and tools used β https://thehackernews.com/2026/04/uac-0247-targets-ukrainian-clinics-and.html
Phishing triggers LNK β HTA via mshta.exe, deploying RAVENSHELL for remote control, credential theft, and lateral movement.
π Full attack chain and tools used β https://thehackernews.com/2026/04/uac-0247-targets-ukrainian-clinics-and.html
π11π±5π₯4
Google added E2EE to Gmail on Android and iOS for Workspace users.
Client-side encryption lets licensed users send encrypted emails to any address, readable in Gmail or secure web view.
π How Gmail handles encrypted emails β https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html#:~:text=Google%20Brings%20E2EE%20to%20Gmail%20for%20Android%20and%20iOS
Client-side encryption lets licensed users send encrypted emails to any address, readable in Gmail or secure web view.
π How Gmail handles encrypted emails β https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html#:~:text=Google%20Brings%20E2EE%20to%20Gmail%20for%20Android%20and%20iOS
π15π₯5
β οΈ Attackers are using Obsidianβs plugin system to run malware.
Targets move LinkedIn β Telegram β shared vault, where code runs only after enabling plugins. The payload deploys PHANTOMPULSE with Ethereum-based C2.
π Read how β https://thehackernews.com/2026/04/obsidian-plugin-abuse-delivers.html
Targets move LinkedIn β Telegram β shared vault, where code runs only after enabling plugins. The payload deploys PHANTOMPULSE with Ethereum-based C2.
π Read how β https://thehackernews.com/2026/04/obsidian-plugin-abuse-delivers.html
π11π₯8
Cisco patched 4 critical flaws (CVSS up to 9.9) in Webex and ISE.
Bugs allow user impersonation, remote code execution, and OS command executionβeven with low-level admin access. Exploits can lead to root access or outages.
π CVEs, impact, and fixes β https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html
Bugs allow user impersonation, remote code execution, and OS command executionβeven with low-level admin access. Exploits can lead to root access or outages.
π CVEs, impact, and fixes β https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html
π₯6
Work with real ICS/OT security scenarios, tools, and techniques at the SANS ICS Security Summit.
Join experts and practitioners in Orlando, or attend virtually, for workshops, technical talks, and community discussions.
Register - https://thn.news/ics-security-summit-26
Join experts and practitioners in Orlando, or attend virtually, for workshops, technical talks, and community discussions.
Register - https://thn.news/ics-security-summit-26
π3
This week's ThreatsDay Bulletin is wild:
π§ 17-year-old Excel bug exploited again
πΈ Fake Ledger app drains $9.5M
π‘οΈ New Defender zero-day drops
βοΈ APT41 hiding in your cloud
π WordPress plugins poisoned via acquisition
π¬ $21B black market still live on Telegram
...and 12 more.
Read all new stories here β https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html
π§ 17-year-old Excel bug exploited again
πΈ Fake Ledger app drains $9.5M
π‘οΈ New Defender zero-day drops
βοΈ APT41 hiding in your cloud
π WordPress plugins poisoned via acquisition
π¬ $21B black market still live on Telegram
...and 12 more.
Read all new stories here β https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html
π₯7π4π4
88% of AI proof-of-concepts never make it to production, according to IDC. That wasnβt the case for Robinhood.
On April 23rd, join the Robinhood team live as they walk through their journey with AI, from evaluation to production. Youβll hear first-hand how they:
πΈ Doubled alert triage capacity across all severity levels
πΈ Built multi-agent AI systems to handle complex investigations
πΈ Use human-in-the-loop guardrails and confidence scoring to maintain accuracy
πΈ Reduced both threat exposure and incident exposure windows
If you're interested in maximizing your AI investment, this live session is for you - https://thn.news/tines-ai-roadmap
On April 23rd, join the Robinhood team live as they walk through their journey with AI, from evaluation to production. Youβll hear first-hand how they:
πΈ Doubled alert triage capacity across all severity levels
πΈ Built multi-agent AI systems to handle complex investigations
πΈ Use human-in-the-loop guardrails and confidence scoring to maintain accuracy
πΈ Reduced both threat exposure and incident exposure windows
If you're interested in maximizing your AI investment, this live session is for you - https://thn.news/tines-ai-roadmap
π€6π3π2
[Webinar] Ghost Identities in Autonomous AI...
Live session on securing non-human identities across cloud environments.
Learn to discover service accounts and API keys, remediate excessive permissions, and automate removal of ghost identities before risk escalates.
π Watch it here β https://thehackernews.com/2026/04/webinar-find-and-eliminate-orphaned-non.html
Live session on securing non-human identities across cloud environments.
Learn to discover service accounts and API keys, remediate excessive permissions, and automate removal of ghost identities before risk escalates.
π Watch it here β https://thehackernews.com/2026/04/webinar-find-and-eliminate-orphaned-non.html
π6π₯3
β οΈ Researchers uncovered PowMix Botnet, active since Dec 2025.
Randomized C2 beaconing and phishing ZIP β LNK β PowerShell chains enable in-memory control and persistence.
RondoDox separately exploits 170+ flaws for DDoS and crypto mining.
πRead β https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html
Randomized C2 beaconing and phishing ZIP β LNK β PowerShell chains enable in-memory control and persistence.
RondoDox separately exploits 170+ flaws for DDoS and crypto mining.
πRead β https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html
π6π₯3β‘2
π¨ CISA flags active exploitation of an Apache ActiveMQ flaw enabling remote code execution.
Attackers abuse the Jolokia API to run OS commands. Default credsβand in some versions no authβmake it easier to exploit.
π Read β https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html
Attackers abuse the Jolokia API to run OS commands. Default credsβand in some versions no authβmake it easier to exploit.
π Read β https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html
π₯9
β οΈ A global operation just disrupted DDoS-for-hire networks used by cybercriminals.
53 domains seized, 4 arrests in Operation PowerOFF across 21 countries. Authorities accessed 3M+ user accounts tied to these services.
π Read β https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html
53 domains seized, 4 arrests in Operation PowerOFF across 21 countries. Authorities accessed 3M+ user accounts tied to these services.
π Read β https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html
π₯11β‘4π4π3
π₯ NIST will now prioritize CVE analysis.
263% rise in vulnerabilities forced it to enrich only high-risk cases (KEV, federal, critical software). Others stay listed but without full analysis, marked βNot Scheduled.β
π Read about it here β https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html
263% rise in vulnerabilities forced it to enrich only high-risk cases (KEV, federal, critical software). Others stay listed but without full analysis, marked βNot Scheduled.β
π Read about it here β https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html
π15π₯6π±3
Google updated Android 17 privacy rules while reporting 8.3B ads blocked and 24.9M accounts suspended in 2025.
Apps must now limit contact and location access or justify it. Separately, AI is stopping most malicious ads before users see them.
π Read β https://thehackernews.com/2026/04/google-blocks-83b-policy-violating-ads.html
Apps must now limit contact and location access or justify it. Separately, AI is stopping most malicious ads before users see them.
π Read β https://thehackernews.com/2026/04/google-blocks-83b-policy-violating-ads.html
π17π7β‘3π€3π±1
β‘ Researchers confirm exploitation of three Microsoft Defender flawsβone patched (CVE-2026-33825) , two unpatched.
Attackers escalate privileges and can block Defender updates.
π Learn how these flaws are used in attacks β https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html
Attackers escalate privileges and can block Defender updates.
π Learn how these flaws are used in attacks β https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html
β‘16π8π€4π±4π2π₯1
Attackers are exploiting CVE-2024-3721 in TBK DVRs to deploy Mirai variant Nexcorium.
It spreads via old exploits and default creds, persists on devices, and launches DDoS attacks. EoL TP-Link routers are also being targeted via known flaws.
π Read β https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html
It spreads via old exploits and default creds, persists on devices, and launches DDoS attacks. EoL TP-Link routers are also being targeted via known flaws.
π Read β https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html
π11π₯5π2
Sanctioned #cryptocurrency exchange Grinex is shutting down after a $13.74M hack.
Stolen funds were quickly moved and swapped to avoid freezing. The platform is linked to Garantex, flagged for laundering over $100M.
π Read β https://thehackernews.com/2026/04/1374m-hack-shuts-down-sanctioned-grinex.html
Stolen funds were quickly moved and swapped to avoid freezing. The platform is linked to Garantex, flagged for laundering over $100M.
π Read β https://thehackernews.com/2026/04/1374m-hack-shuts-down-sanctioned-grinex.html
π₯16π1
The EU says its age verification app is ready for rollout.
Users can prove age with ID without sharing personal data. The system is anonymous, open source, and built to support child safety rules across platforms.
π What the EUβs system actually does β https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html#anonymous-age-checks
Users can prove age with ID without sharing personal data. The system is anonymous, open source, and built to support child safety rules across platforms.
π What the EUβs system actually does β https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html#anonymous-age-checks
π€46π±18π11π10π€―10π₯6