π¨ CISA flags active exploitation of an Apache ActiveMQ flaw enabling remote code execution.
Attackers abuse the Jolokia API to run OS commands. Default credsβand in some versions no authβmake it easier to exploit.
π Read β https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html
Attackers abuse the Jolokia API to run OS commands. Default credsβand in some versions no authβmake it easier to exploit.
π Read β https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html
π₯9
β οΈ A global operation just disrupted DDoS-for-hire networks used by cybercriminals.
53 domains seized, 4 arrests in Operation PowerOFF across 21 countries. Authorities accessed 3M+ user accounts tied to these services.
π Read β https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html
53 domains seized, 4 arrests in Operation PowerOFF across 21 countries. Authorities accessed 3M+ user accounts tied to these services.
π Read β https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html
π₯11β‘4π4π3
π₯ NIST will now prioritize CVE analysis.
263% rise in vulnerabilities forced it to enrich only high-risk cases (KEV, federal, critical software). Others stay listed but without full analysis, marked βNot Scheduled.β
π Read about it here β https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html
263% rise in vulnerabilities forced it to enrich only high-risk cases (KEV, federal, critical software). Others stay listed but without full analysis, marked βNot Scheduled.β
π Read about it here β https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html
π15π₯6π±3
Google updated Android 17 privacy rules while reporting 8.3B ads blocked and 24.9M accounts suspended in 2025.
Apps must now limit contact and location access or justify it. Separately, AI is stopping most malicious ads before users see them.
π Read β https://thehackernews.com/2026/04/google-blocks-83b-policy-violating-ads.html
Apps must now limit contact and location access or justify it. Separately, AI is stopping most malicious ads before users see them.
π Read β https://thehackernews.com/2026/04/google-blocks-83b-policy-violating-ads.html
π17π7β‘3π€3π±1
β‘ Researchers confirm exploitation of three Microsoft Defender flawsβone patched (CVE-2026-33825) , two unpatched.
Attackers escalate privileges and can block Defender updates.
π Learn how these flaws are used in attacks β https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html
Attackers escalate privileges and can block Defender updates.
π Learn how these flaws are used in attacks β https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html
β‘16π8π€4π±4π2π₯1
Attackers are exploiting CVE-2024-3721 in TBK DVRs to deploy Mirai variant Nexcorium.
It spreads via old exploits and default creds, persists on devices, and launches DDoS attacks. EoL TP-Link routers are also being targeted via known flaws.
π Read β https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html
It spreads via old exploits and default creds, persists on devices, and launches DDoS attacks. EoL TP-Link routers are also being targeted via known flaws.
π Read β https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html
π11π₯5π2
Sanctioned #cryptocurrency exchange Grinex is shutting down after a $13.74M hack.
Stolen funds were quickly moved and swapped to avoid freezing. The platform is linked to Garantex, flagged for laundering over $100M.
π Read β https://thehackernews.com/2026/04/1374m-hack-shuts-down-sanctioned-grinex.html
Stolen funds were quickly moved and swapped to avoid freezing. The platform is linked to Garantex, flagged for laundering over $100M.
π Read β https://thehackernews.com/2026/04/1374m-hack-shuts-down-sanctioned-grinex.html
π₯16π1
The EU says its age verification app is ready for rollout.
Users can prove age with ID without sharing personal data. The system is anonymous, open source, and built to support child safety rules across platforms.
π What the EUβs system actually does β https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html#anonymous-age-checks
Users can prove age with ID without sharing personal data. The system is anonymous, open source, and built to support child safety rules across platforms.
π What the EUβs system actually does β https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html#anonymous-age-checks
π€46π±18π11π10π€―10π₯6
π₯ Vercel disclosed a BREACH after an attacker used a compromised 3rd-party AI tool to take over an employee account.
Some internal systems, non-sensitive variables, and limited customer credentials were exposed. No evidence sensitive data was accessed.
π Read β https://thehackernews.com/2026/04/vercel-breach-tied-to-context-ai-hack.html
Some internal systems, non-sensitive variables, and limited customer credentials were exposed. No evidence sensitive data was accessed.
π Read β https://thehackernews.com/2026/04/vercel-breach-tied-to-context-ai-hack.html
π14π7π4π₯2
Researchers found OT malware targeting Israeli water systems.
ZionSiphon alters chlorine and pressure controls, scanning Modbus/DNP3/S7comm and spreading via USB. It activates only inside Israeli IP ranges + OT setups, but current code is unfinished.
π Read β https://thehackernews.com/2026/04/researchers-detect-zionsiphon-malware.html
ZionSiphon alters chlorine and pressure controls, scanning Modbus/DNP3/S7comm and spreading via USB. It activates only inside Israeli IP ranges + OT setups, but current code is unfinished.
π Read β https://thehackernews.com/2026/04/researchers-detect-zionsiphon-malware.html
π26π±8β‘7π4π₯1π1
π A design flaw in Anthropicβs MCP allows remote command execution on AI systems.
150M+ downloads affected as unsafe STDIO defaults expose 7,000+ services, including tools like LangChain and Flowise.
Anthropic calls the behavior βexpected,β leaving the risk across the AI supply chain.
π Read β https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html
150M+ downloads affected as unsafe STDIO defaults expose 7,000+ services, including tools like LangChain and Flowise.
Anthropic calls the behavior βexpected,β leaving the risk across the AI supply chain.
π Read β https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html
π₯16π5
AI tools look flawless in demosβbut break in real operations.
Clean data and ideal prompts donβt exist in production. Messy inputs, latency, edge cases, and weak integrations quickly surface.
π What breaks when AI leaves the demo β https://thehackernews.com/2026/04/why-most-ai-deployments-stall-after-demo.html
Clean data and ideal prompts donβt exist in production. Messy inputs, latency, edge cases, and weak integrations quickly surface.
π What breaks when AI leaves the demo β https://thehackernews.com/2026/04/why-most-ai-deployments-stall-after-demo.html
π7π₯4
Stop using Spreadsheets & PDFs for Pentest Reporting.
Move from static files to live findings, automate remediation, and prove risk reduction.
π See it in action β https://thn.news/plextrac-pentest
Move from static files to live findings, automate remediation, and prove risk reduction.
π See it in action β https://thn.news/plextrac-pentest
π₯8π4π4
This week didnβt break anything. It bent everything:
β‘ Vercel hacked
π DDoS busted
π€ PowMix botnet
π’ Push fraud
π Obsidian RAT
β¬οΈ CPUID trojan
π§© Chrome spyware
π§ AI cyber
π° Vect ransomware
π¬ Teams trap
ποΈ CGrabber steal
π§ Mail breach
π Access trade
π οΈ Adaptix C2
𧬠Adware backdoor
π SQL attacks
π₯οΈ VM stealth
π Fake installer
π Scroll through the full recap β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html
β‘ Vercel hacked
π DDoS busted
π€ PowMix botnet
π’ Push fraud
π Obsidian RAT
β¬οΈ CPUID trojan
π§© Chrome spyware
π§ AI cyber
π° Vect ransomware
π¬ Teams trap
ποΈ CGrabber steal
π§ Mail breach
π Access trade
π οΈ Adaptix C2
𧬠Adware backdoor
π SQL attacks
π₯οΈ VM stealth
π Fake installer
π Scroll through the full recap β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html
π₯8π5β‘2
β οΈ SGLang has a critical flaw enabling remote code execution (CVSS 9.8) via malicious GGUF model files.
A crafted Jinja2 template runs when /v1/rerank is triggered, executing attacker code on the server.
π How GGUF templates become an RCE path β https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html
A crafted Jinja2 template runs when /v1/rerank is triggered, executing attacker code on the server.
π How GGUF templates become an RCE path β https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html
π₯6π4β‘2
β οΈ CISA added 8 actively exploited vulnerabilities to KEV across Cisco, Quest, PaperCut, TeamCity, Kentico, and Zimbra.
Includes 3 Cisco SD-WAN flaws and a Quest KACE bug (CVSS 10.0) enabling user impersonation.
Federal patch deadlines: April 23 (Cisco), May 4 (others).
π Read β https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
Includes 3 Cisco SD-WAN flaws and a Quest KACE bug (CVSS 10.0) enabling user impersonation.
Federal patch deadlines: April 23 (Cisco), May 4 (others).
π Read β https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
π4π₯2
96% of security teams canβt confirm if risks are exploitable.
In this analysis, Jean-Philippe Salles of Filigran shows CTEM is failing at prioritization and validation, with 42% of SOC time wasted on low-value work.
The gap is poor use of threat intelligence.
π Why CTEM breaks without intel-driven context β https://thehackernews.com/expert-insights/2026/04/why-threat-intelligence-is-missing-link.html
In this analysis, Jean-Philippe Salles of Filigran shows CTEM is failing at prioritization and validation, with 42% of SOC time wasted on low-value work.
The gap is poor use of threat intelligence.
π Why CTEM breaks without intel-driven context β https://thehackernews.com/expert-insights/2026/04/why-threat-intelligence-is-missing-link.html
π₯9π6
Google fixed an Antigravity IDE flaw that enabled arbitrary code execution via a search tool input.
Attackers could inject commands, bypass sandbox controls, and run scripts automatically. Similar prompt injection flaws are now seen across AI dev tools.
π Read β https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html
Attackers could inject commands, bypass sandbox controls, and run scripts automatically. Similar prompt injection flaws are now seen across AI dev tools.
π Read β https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html
π4π3π₯2
π Android malware is hijacking NFC payments via a real app.
Researchers found NGate abusing HandyPay to relay card data and steal PINs for ATM withdrawals. Spread via fake lottery sites and spoofed app pages, targeting Brazil since Nov 2025.
π Read β https://thehackernews.com/2026/04/ngate-campaign-targets-brazil.html
Researchers found NGate abusing HandyPay to relay card data and steal PINs for ATM withdrawals. Spread via fake lottery sites and spoofed app pages, targeting Brazil since Nov 2025.
π Read β https://thehackernews.com/2026/04/ngate-campaign-targets-brazil.html
π6π₯3π2π±2
99% of security leaders are confident in their ability to detect attacks. Yet nearly half of those who experienced one admit they detected it too late to prevent significant damage. π€
Something doesn't add up.
Halcyon recently surveyed 100 CISOs and senior security leaders on #ransomware, and their findings show the confidence-vs-reality gap is bigger than it should be:
β οΈ 98% use EDR; only 25% actually trust it to defend against today's threats
β οΈ #AI is giving attackers a 13:1 speed advantage over defenders
β οΈ 90% rate their security as sufficient - yet nearly half experienced moderate to significant disruption
The problem isn't experience or awareness. It's that most tools in use today weren't purpose-built for ransomware - and attackers know it.
The gap is real, it's measurable, and it's getting wider.
π Read the full report: https://thn.news/halcyon-survey-2026
Something doesn't add up.
Halcyon recently surveyed 100 CISOs and senior security leaders on #ransomware, and their findings show the confidence-vs-reality gap is bigger than it should be:
β οΈ 98% use EDR; only 25% actually trust it to defend against today's threats
β οΈ #AI is giving attackers a 13:1 speed advantage over defenders
β οΈ 90% rate their security as sufficient - yet nearly half experienced moderate to significant disruption
The problem isn't experience or awareness. It's that most tools in use today weren't purpose-built for ransomware - and attackers know it.
The gap is real, it's measurable, and it's getting wider.
π Read the full report: https://thn.news/halcyon-survey-2026
π5π1
Most breaches donβt start with exploits. Stolen credentials still dominate initial access.
Attackers log in, move laterally, and escalate fastβoften reaching ransomware within hours. AI is accelerating this pattern, not changing it.
π Why identity attacks still lead breaches β https://thehackernews.com/2026/04/no-exploit-needed-how-attackers-walk.html
Attackers log in, move laterally, and escalate fastβoften reaching ransomware within hours. AI is accelerating this pattern, not changing it.
π Why identity attacks still lead breaches β https://thehackernews.com/2026/04/no-exploit-needed-how-attackers-walk.html
π₯9