This week didnβt break anything. It bent everything:
β‘ Vercel hacked
π DDoS busted
π€ PowMix botnet
π’ Push fraud
π Obsidian RAT
β¬οΈ CPUID trojan
π§© Chrome spyware
π§ AI cyber
π° Vect ransomware
π¬ Teams trap
ποΈ CGrabber steal
π§ Mail breach
π Access trade
π οΈ Adaptix C2
𧬠Adware backdoor
π SQL attacks
π₯οΈ VM stealth
π Fake installer
π Scroll through the full recap β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html
β‘ Vercel hacked
π DDoS busted
π€ PowMix botnet
π’ Push fraud
π Obsidian RAT
β¬οΈ CPUID trojan
π§© Chrome spyware
π§ AI cyber
π° Vect ransomware
π¬ Teams trap
ποΈ CGrabber steal
π§ Mail breach
π Access trade
π οΈ Adaptix C2
𧬠Adware backdoor
π SQL attacks
π₯οΈ VM stealth
π Fake installer
π Scroll through the full recap β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html
π₯8π5β‘2
β οΈ SGLang has a critical flaw enabling remote code execution (CVSS 9.8) via malicious GGUF model files.
A crafted Jinja2 template runs when /v1/rerank is triggered, executing attacker code on the server.
π How GGUF templates become an RCE path β https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html
A crafted Jinja2 template runs when /v1/rerank is triggered, executing attacker code on the server.
π How GGUF templates become an RCE path β https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html
π₯6π4β‘2
β οΈ CISA added 8 actively exploited vulnerabilities to KEV across Cisco, Quest, PaperCut, TeamCity, Kentico, and Zimbra.
Includes 3 Cisco SD-WAN flaws and a Quest KACE bug (CVSS 10.0) enabling user impersonation.
Federal patch deadlines: April 23 (Cisco), May 4 (others).
π Read β https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
Includes 3 Cisco SD-WAN flaws and a Quest KACE bug (CVSS 10.0) enabling user impersonation.
Federal patch deadlines: April 23 (Cisco), May 4 (others).
π Read β https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
π4π₯2
96% of security teams canβt confirm if risks are exploitable.
In this analysis, Jean-Philippe Salles of Filigran shows CTEM is failing at prioritization and validation, with 42% of SOC time wasted on low-value work.
The gap is poor use of threat intelligence.
π Why CTEM breaks without intel-driven context β https://thehackernews.com/expert-insights/2026/04/why-threat-intelligence-is-missing-link.html
In this analysis, Jean-Philippe Salles of Filigran shows CTEM is failing at prioritization and validation, with 42% of SOC time wasted on low-value work.
The gap is poor use of threat intelligence.
π Why CTEM breaks without intel-driven context β https://thehackernews.com/expert-insights/2026/04/why-threat-intelligence-is-missing-link.html
π₯9π6
Google fixed an Antigravity IDE flaw that enabled arbitrary code execution via a search tool input.
Attackers could inject commands, bypass sandbox controls, and run scripts automatically. Similar prompt injection flaws are now seen across AI dev tools.
π Read β https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html
Attackers could inject commands, bypass sandbox controls, and run scripts automatically. Similar prompt injection flaws are now seen across AI dev tools.
π Read β https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html
π4π3π₯2
π Android malware is hijacking NFC payments via a real app.
Researchers found NGate abusing HandyPay to relay card data and steal PINs for ATM withdrawals. Spread via fake lottery sites and spoofed app pages, targeting Brazil since Nov 2025.
π Read β https://thehackernews.com/2026/04/ngate-campaign-targets-brazil.html
Researchers found NGate abusing HandyPay to relay card data and steal PINs for ATM withdrawals. Spread via fake lottery sites and spoofed app pages, targeting Brazil since Nov 2025.
π Read β https://thehackernews.com/2026/04/ngate-campaign-targets-brazil.html
π6π₯3π2π±2
99% of security leaders are confident in their ability to detect attacks. Yet nearly half of those who experienced one admit they detected it too late to prevent significant damage. π€
Something doesn't add up.
Halcyon recently surveyed 100 CISOs and senior security leaders on #ransomware, and their findings show the confidence-vs-reality gap is bigger than it should be:
β οΈ 98% use EDR; only 25% actually trust it to defend against today's threats
β οΈ #AI is giving attackers a 13:1 speed advantage over defenders
β οΈ 90% rate their security as sufficient - yet nearly half experienced moderate to significant disruption
The problem isn't experience or awareness. It's that most tools in use today weren't purpose-built for ransomware - and attackers know it.
The gap is real, it's measurable, and it's getting wider.
π Read the full report: https://thn.news/halcyon-survey-2026
Something doesn't add up.
Halcyon recently surveyed 100 CISOs and senior security leaders on #ransomware, and their findings show the confidence-vs-reality gap is bigger than it should be:
β οΈ 98% use EDR; only 25% actually trust it to defend against today's threats
β οΈ #AI is giving attackers a 13:1 speed advantage over defenders
β οΈ 90% rate their security as sufficient - yet nearly half experienced moderate to significant disruption
The problem isn't experience or awareness. It's that most tools in use today weren't purpose-built for ransomware - and attackers know it.
The gap is real, it's measurable, and it's getting wider.
π Read the full report: https://thn.news/halcyon-survey-2026
π5π1
Most breaches donβt start with exploits. Stolen credentials still dominate initial access.
Attackers log in, move laterally, and escalate fastβoften reaching ransomware within hours. AI is accelerating this pattern, not changing it.
π Why identity attacks still lead breaches β https://thehackernews.com/2026/04/no-exploit-needed-how-attackers-walk.html
Attackers log in, move laterally, and escalate fastβoften reaching ransomware within hours. AI is accelerating this pattern, not changing it.
π Why identity attacks still lead breaches β https://thehackernews.com/2026/04/no-exploit-needed-how-attackers-walk.html
π₯9
π¨ A ransomware negotiator worked with attackers while advising victims.
Angelo Martino leaked client negotiation data to BlackCat, including insurance limits, helping raise ransom payouts while getting paid by both sides.
π Read β https://thehackernews.com/2026/04/ransomware-negotiator-pleads-guilty-to.html
Angelo Martino leaked client negotiation data to BlackCat, including insurance limits, helping raise ransom payouts while getting paid by both sides.
π Read β https://thehackernews.com/2026/04/ransomware-negotiator-pleads-guilty-to.html
π₯12π6π€―4π1
Over 99% of Mythos-discovered vulnerabilities remain unpatched. The Glasswing report lands in July. The window between patch publication and AI-powered weaponization is collapsing.
Picus Security published 12 vendor-neutral recommendations for security teams preparing for what comes after.
Get your copy now: https://thn.news/post-mythos-actions
Picus Security published 12 vendor-neutral recommendations for security teams preparing for what comes after.
Get your copy now: https://thn.news/post-mythos-actions
π₯5π€―4π3
A 24-year-old linked to Scattered Spider pleaded guilty after stealing $8 million in digital assets from multiple companies.
The campaign used SMS phishing to capture employee credentials, then SIM swapping to take over accounts across telecom, tech, and crypto firms.
π Read β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html#:~:text=British%20National%20Pleads%20Guilty%20to%20Scattered%20Spider%20Campaign
The campaign used SMS phishing to capture employee credentials, then SIM swapping to take over accounts across telecom, tech, and crypto firms.
π Read β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html#:~:text=British%20National%20Pleads%20Guilty%20to%20Scattered%20Spider%20Campaign
π₯10π5π±4π1
π¨ Researchers found 22 vulnerabilities in serial-to-IP converters, with ~20,000 devices exposed online.
Exploitation can enable device takeover and tampering with data between legacy systems and IP networks, impacting industrial operations.
π Read β https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html
Exploitation can enable device takeover and tampering with data between legacy systems and IP networks, impacting industrial operations.
π Read β https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html
π₯14π±5β‘2π2π2
π A SystemBC-linked server exposed 1,570+ infected systems, mostly corporate.
An affiliate of The Gentlemen #ransomware used the proxy malware for covert access and stagingβnot all were confirmed ransomware victims.
π Read β https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html
An affiliate of The Gentlemen #ransomware used the proxy malware for covert access and stagingβnot all were confirmed ransomware victims.
π Read β https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html
β‘6π₯5π3
Many companies have backups but still canβt recover from ransomware.
As Acronisβ Subramani Rao explains, backups often fail before encryption as attackers disable, delete, or corrupt them after gaining access.
Recovery breaks down due to compromised systems and slow validation.
π Why backup doesnβt equal recovery in real attacks β https://thehackernews.com/expert-insights/2026/04/why-your-backups-might-not-save-you.html
As Acronisβ Subramani Rao explains, backups often fail before encryption as attackers disable, delete, or corrupt them after gaining access.
Recovery breaks down due to compromised systems and slow validation.
π Why backup doesnβt equal recovery in real attacks β https://thehackernews.com/expert-insights/2026/04/why-your-backups-might-not-save-you.html
π7π₯3
β οΈ A Python sandbox for untrusted code has a 9.3 flaw (CVE-2026-5752).
A Pyodide bug enables sandbox escape and root command execution. The project is unmaintained, so the issue remains UNPATCHED.
π Learn more β https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html
A Pyodide bug enables sandbox escape and root command execution. The project is unmaintained, so the issue remains UNPATCHED.
π Learn more β https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html
π5π₯2β‘1π1
β‘ Security teams track MTTR as a metric. Leadership sees every hour of dwell time as risk.
Delays rarely come from staffingβthey come from disconnected threat intel, manual lookups, and tool switching that add up over time.
π Learn why MTTR slows down inside most SOCs β https://thehackernews.com/2026/04/5-places-where-mature-socs-keep-mttr.html
Delays rarely come from staffingβthey come from disconnected threat intel, manual lookups, and tool switching that add up over time.
π Learn why MTTR slows down inside most SOCs β https://thehackernews.com/2026/04/5-places-where-mature-socs-keep-mttr.html
π5π₯3
π China-linked APT targets Indiaβs banks with updated malware.
LOTUSLITE v1.1 uses phishing, signed executables, and DLL sideloading to gain accessβfocused on espionage, not theft. Shift from U.S. govt targets to Indian financial systems.
π Details β https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html
LOTUSLITE v1.1 uses phishing, signed executables, and DLL sideloading to gain accessβfocused on espionage, not theft. Shift from U.S. govt targets to Indian financial systems.
π Details β https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html
π8π5π₯3β‘1
β οΈ Microsoft patched CVE-2026-40372 (CVSS 9.1) in ASP .NET Core enabling SYSTEM-level escalation.
A crypto flaw let attackers forge payloads and decrypt auth data in apps using vulnerable Data Protection on Linux/macOS.
π Read β https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html
A crypto flaw let attackers forge payloads and decrypt auth data in apps using vulnerable Data Protection on Linux/macOS.
π Read β https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html
π₯6π3π€3π2
β οΈ Kaspersky found a new wiper targeting Venezuelaβs energy sector.
Lotus Wiper fully destroys systemsβno ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools.
π Details β https://thehackernews.com/2026/04/lotus-wiper-malware-targets-venezuelan.html
Lotus Wiper fully destroys systemsβno ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools.
π Details β https://thehackernews.com/2026/04/lotus-wiper-malware-targets-venezuelan.html
π€10π8π€―6π₯3π±3
Moltbook exposed 1.5M API tokens and 35,000 emails via an open database.
Agents also stored internal tokens and third-party credentials together in plaintext, creating cross-app access paths no one reviewed.
π How βtoxic combinationsβ form across SaaS β https://thehackernews.com/2026/04/toxic-combinations-when-cross-app.html
Agents also stored internal tokens and third-party credentials together in plaintext, creating cross-app access paths no one reviewed.
π How βtoxic combinationsβ form across SaaS β https://thehackernews.com/2026/04/toxic-combinations-when-cross-app.html
π₯12π7π2β‘1
Join 15+ SANS Institute instructors in a panel-style webinar to gain practical tools, proven tactics, and real-world tradecraft you can apply immediately. Detect threats sooner and respond with precision.
15+ Cybersecurity Experts. 1 Can't-Miss Webinar. Register β https://thn.news/sans-2026-secure-fortress
15+ Cybersecurity Experts. 1 Can't-Miss Webinar. Register β https://thn.news/sans-2026-secure-fortress
π₯8