Over 99% of Mythos-discovered vulnerabilities remain unpatched. The Glasswing report lands in July. The window between patch publication and AI-powered weaponization is collapsing.
Picus Security published 12 vendor-neutral recommendations for security teams preparing for what comes after.
Get your copy now: https://thn.news/post-mythos-actions
Picus Security published 12 vendor-neutral recommendations for security teams preparing for what comes after.
Get your copy now: https://thn.news/post-mythos-actions
π₯5π€―4π3
A 24-year-old linked to Scattered Spider pleaded guilty after stealing $8 million in digital assets from multiple companies.
The campaign used SMS phishing to capture employee credentials, then SIM swapping to take over accounts across telecom, tech, and crypto firms.
π Read β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html#:~:text=British%20National%20Pleads%20Guilty%20to%20Scattered%20Spider%20Campaign
The campaign used SMS phishing to capture employee credentials, then SIM swapping to take over accounts across telecom, tech, and crypto firms.
π Read β https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html#:~:text=British%20National%20Pleads%20Guilty%20to%20Scattered%20Spider%20Campaign
π₯10π5π±4π1
π¨ Researchers found 22 vulnerabilities in serial-to-IP converters, with ~20,000 devices exposed online.
Exploitation can enable device takeover and tampering with data between legacy systems and IP networks, impacting industrial operations.
π Read β https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html
Exploitation can enable device takeover and tampering with data between legacy systems and IP networks, impacting industrial operations.
π Read β https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html
π₯14π±5β‘2π2π2
π A SystemBC-linked server exposed 1,570+ infected systems, mostly corporate.
An affiliate of The Gentlemen #ransomware used the proxy malware for covert access and stagingβnot all were confirmed ransomware victims.
π Read β https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html
An affiliate of The Gentlemen #ransomware used the proxy malware for covert access and stagingβnot all were confirmed ransomware victims.
π Read β https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html
β‘6π₯5π3
Many companies have backups but still canβt recover from ransomware.
As Acronisβ Subramani Rao explains, backups often fail before encryption as attackers disable, delete, or corrupt them after gaining access.
Recovery breaks down due to compromised systems and slow validation.
π Why backup doesnβt equal recovery in real attacks β https://thehackernews.com/expert-insights/2026/04/why-your-backups-might-not-save-you.html
As Acronisβ Subramani Rao explains, backups often fail before encryption as attackers disable, delete, or corrupt them after gaining access.
Recovery breaks down due to compromised systems and slow validation.
π Why backup doesnβt equal recovery in real attacks β https://thehackernews.com/expert-insights/2026/04/why-your-backups-might-not-save-you.html
π7π₯3
β οΈ A Python sandbox for untrusted code has a 9.3 flaw (CVE-2026-5752).
A Pyodide bug enables sandbox escape and root command execution. The project is unmaintained, so the issue remains UNPATCHED.
π Learn more β https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html
A Pyodide bug enables sandbox escape and root command execution. The project is unmaintained, so the issue remains UNPATCHED.
π Learn more β https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html
π5π₯2β‘1π1
β‘ Security teams track MTTR as a metric. Leadership sees every hour of dwell time as risk.
Delays rarely come from staffingβthey come from disconnected threat intel, manual lookups, and tool switching that add up over time.
π Learn why MTTR slows down inside most SOCs β https://thehackernews.com/2026/04/5-places-where-mature-socs-keep-mttr.html
Delays rarely come from staffingβthey come from disconnected threat intel, manual lookups, and tool switching that add up over time.
π Learn why MTTR slows down inside most SOCs β https://thehackernews.com/2026/04/5-places-where-mature-socs-keep-mttr.html
π5π₯3
π China-linked APT targets Indiaβs banks with updated malware.
LOTUSLITE v1.1 uses phishing, signed executables, and DLL sideloading to gain accessβfocused on espionage, not theft. Shift from U.S. govt targets to Indian financial systems.
π Details β https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html
LOTUSLITE v1.1 uses phishing, signed executables, and DLL sideloading to gain accessβfocused on espionage, not theft. Shift from U.S. govt targets to Indian financial systems.
π Details β https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html
π8π5π₯3β‘1
β οΈ Microsoft patched CVE-2026-40372 (CVSS 9.1) in ASP .NET Core enabling SYSTEM-level escalation.
A crypto flaw let attackers forge payloads and decrypt auth data in apps using vulnerable Data Protection on Linux/macOS.
π Read β https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html
A crypto flaw let attackers forge payloads and decrypt auth data in apps using vulnerable Data Protection on Linux/macOS.
π Read β https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html
π₯6π3π€3π2
β οΈ Kaspersky found a new wiper targeting Venezuelaβs energy sector.
Lotus Wiper fully destroys systemsβno ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools.
π Details β https://thehackernews.com/2026/04/lotus-wiper-malware-targets-venezuelan.html
Lotus Wiper fully destroys systemsβno ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools.
π Details β https://thehackernews.com/2026/04/lotus-wiper-malware-targets-venezuelan.html
π€10π8π€―6π₯3π±3
Moltbook exposed 1.5M API tokens and 35,000 emails via an open database.
Agents also stored internal tokens and third-party credentials together in plaintext, creating cross-app access paths no one reviewed.
π How βtoxic combinationsβ form across SaaS β https://thehackernews.com/2026/04/toxic-combinations-when-cross-app.html
Agents also stored internal tokens and third-party credentials together in plaintext, creating cross-app access paths no one reviewed.
π How βtoxic combinationsβ form across SaaS β https://thehackernews.com/2026/04/toxic-combinations-when-cross-app.html
π₯12π7π2β‘1
Join 15+ SANS Institute instructors in a panel-style webinar to gain practical tools, proven tactics, and real-world tradecraft you can apply immediately. Detect threats sooner and respond with precision.
15+ Cybersecurity Experts. 1 Can't-Miss Webinar. Register β https://thn.news/sans-2026-secure-fortress
15+ Cybersecurity Experts. 1 Can't-Miss Webinar. Register β https://thn.news/sans-2026-secure-fortress
π₯8
π A Linux backdoor is using Microsoftβs cloud to stay hidden.
Harvesterβs GoGra uses Outlook mailboxes as C2, executing commands via email, returning results, then deleting traces to evade detection.
Targets likely include India and Afghanistan.
π Read β https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html
Harvesterβs GoGra uses Outlook mailboxes as C2, executing commands via email, returning results, then deleting traces to evade detection.
Targets likely include India and Afghanistan.
π Read β https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html
π14π₯10π4π2
π Supply chain attacks are stacking across npm, PyPI, and GitHub.
CanisterSprawl worm steals npm tokens via postinstall scripts, republishes infected packages, and spreads across ecosystems.
Other campaigns add backdoored packages, LLM proxy abuse, and GitHub Actions exploits.
π Read β https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html
CanisterSprawl worm steals npm tokens via postinstall scripts, republishes infected packages, and spreads across ecosystems.
Other campaigns add backdoored packages, LLM proxy abuse, and GitHub Actions exploits.
π Read β https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html
π₯7π6π1
β οΈ WARNING: Checkmarx KICS Docker repo breachedβmalicious images replaced trusted tags.
The modified images could encrypt and exfiltrate scan data, risking exposure of credentials in IaC files. Related VS Code extensions also ran unverified remote code.
π Details β https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html
The modified images could encrypt and exfiltrate scan data, risking exposure of credentials in IaC files. Related VS Code extensions also ran unverified remote code.
π Details β https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html
π7π₯6π±5π1
β‘ Apple fixed an iOS bug where deleted notifications stayed stored on devices.
The flaw let message data persist after apps like Signal were removed. It surfaced after forensic extraction. The patch now clears and prevents retention.
π Details β https://thehackernews.com/2026/04/apple-patches-ios-flaw-that-stored.html
The flaw let message data persist after apps like Signal were removed. It surfaced after forensic extraction. The patch now clears and prevents retention.
π Details β https://thehackernews.com/2026/04/apple-patches-ios-flaw-that-stored.html
π15π₯9π5β‘3π1π€1
π₯ Vercel found more compromised accounts, some predating the breach.
Attackers used malware β Google Workspace β Vercel access, then mapped systems and decrypted environment variables. OAuth trust enabled lateral movement.
π Details here β https://thehackernews.com/2026/04/vercel-finds-more-compromised-accounts.html
Attackers used malware β Google Workspace β Vercel access, then mapped systems and decrypted environment variables. OAuth trust enabled lateral movement.
π Details here β https://thehackernews.com/2026/04/vercel-finds-more-compromised-accounts.html
β‘8π₯4π3
β οΈ A China-aligned APT, GopherWhisper, targeted Mongolian government systems.
It uses Slack, Discord, Outlook, and file-io for control and data theft, deploying Go-based backdoors across at least 12 confirmed systems.
π Details β https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html
It uses Slack, Discord, Outlook, and file-io for control and data theft, deploying Go-based backdoors across at least 12 confirmed systems.
π Details β https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html
β‘8π4π₯4
Anthropic delayed its new AI after it proved too effective at finding and exploiting bugs.
It uncovered decades-old flaws and built working exploitsβbut under 1% were patched. The bottleneck is no longer discovery. Itβs fixing at speed.
π Learn how AI is overwhelming vulnerability patching β https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html
It uncovered decades-old flaws and built working exploitsβbut under 1% were patched. The bottleneck is no longer discovery. Itβs fixing at speed.
π Learn how AI is overwhelming vulnerability patching β https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html
π₯14π5β‘4π€4
Move from AI ethics to AI execution. Hereβs how to secure your AI deployment. Join Uncharted on May 5 for a technical deep dive.
Register here: https://thn.news/ai-summit-x
Register here: https://thn.news/ai-summit-x
π₯8π2π2π1
π₯ Internetβs on fire again...
πΈ $290 million DeFi hack
β οΈ Live RCE exploits
π¦ Rogue npm packages
π€ AI prompt attacks
π΅οΈ App data grab
π Passkey push
π§ Backdoor claims
π Ransomware feud
π§© Cryptor kits
π© Blank phishing
βοΈ Binary hijack
π RAT bundle
π macOS abuse
π‘ SIM farms
πͺπΊ EU sanctions
πͺ€ Bot farm bust
π StealTok extensions
π Joomla backdoor
π Leak Bazaar
π RDP scan spike
𧨠Perforce leak
π Catch the full ThreatsDay Bulletin for this week β https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html
πΈ $290 million DeFi hack
β οΈ Live RCE exploits
π¦ Rogue npm packages
π€ AI prompt attacks
π΅οΈ App data grab
π Passkey push
π§ Backdoor claims
π Ransomware feud
π§© Cryptor kits
π© Blank phishing
βοΈ Binary hijack
π RAT bundle
π macOS abuse
π‘ SIM farms
πͺπΊ EU sanctions
πͺ€ Bot farm bust
π StealTok extensions
π Joomla backdoor
π Leak Bazaar
π RDP scan spike
𧨠Perforce leak
π Catch the full ThreatsDay Bulletin for this week β https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html
π₯17π4β‘1