β οΈ CISA added two actively exploited vulnerabilities to KEV, affecting Windows and ScreenConnect.
A Windows flaw links to an incomplete patch tied to APT28 campaigns. ScreenConnect bugs are now used in Medusa ransomware attacks.
π Read β https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html
A Windows flaw links to an incomplete patch tied to APT28 campaigns. ScreenConnect bugs are now used in Medusa ransomware attacks.
π Read β https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html
π5π3π₯1
π¨ WARNING: cPanel patched an auth flaw affecting all supported versionsβforcing providers to restrict access.
Namecheap blocked ports 2083/2087, disabling control panel access until patches deployed.
π Read β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
Namecheap blocked ports 2083/2087, disabling control panel access until patches deployed.
π Read β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
π8π7β‘3π€3
Security teams close hundreds of vulnerabilities and still canβt prove theyβre safer.
Only ~2% of exposures matter when mapped to real attack paths and critical assets. The rest is noise from tools that miss context and exploitability.
π Why most platforms miss real risk β https://thehackernews.com/2026/04/what-to-look-for-in-exposure-management.html
Only ~2% of exposures matter when mapped to real attack paths and critical assets. The rest is noise from tools that miss context and exploitability.
π Why most platforms miss real risk β https://thehackernews.com/2026/04/what-to-look-for-in-exposure-management.html
π6π3π₯2
BeyondTrustβs latest Microsoft Vulnerabilities Report is out, and the numbers should concern every security leader.
Critical vulnerabilities doubled, Azure & Dynamics surged 9x, and 40% of all flaws were tied to Elevation of Privilege.
More insights: https://thn.news/msft-vuln-report
#MVR2026 #LeastPrivilege
Critical vulnerabilities doubled, Azure & Dynamics surged 9x, and 40% of all flaws were tied to Elevation of Privilege.
More insights: https://thn.news/msft-vuln-report
#MVR2026 #LeastPrivilege
π3π2π₯1
π A wave of attacks is using layered npm dependencies to deliver hidden malware.
Fake SDKs, AI-assisted commits, and job scams all route through packages that pull second-stage payloads, stealing crypto wallets, credentials, and source code. Linked to North Korean campaigns targeting developers.
π Learn how these attacks connect across npm, PyPI, and GitHub β https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html
Fake SDKs, AI-assisted commits, and job scams all route through packages that pull second-stage payloads, stealing crypto wallets, credentials, and source code. Linked to North Korean campaigns targeting developers.
π Learn how these attacks connect across npm, PyPI, and GitHub β https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html
π±8π7β‘4
β οΈ ALERT β SAP related npm packages were just found shipping credential-stealing malware.
A preinstall script runs on install, steals tokens, and injects GitHub Actions to self-propagate, exfiltrating encrypted secrets via victim-owned repos.
π Read β https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html
A preinstall script runs on install, steals tokens, and injects GitHub Actions to self-propagate, exfiltrating encrypted secrets via victim-owned repos.
π Read β https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html
π±7π3π1
π Gemini and Cursor vulnerabilities exposed direct code execution in dev workflows.
#Gemini CLI (CVSS 10.0) auto-trusted folders in CI, letting malicious .gemini/ configs from PRs run on hosts. #Cursor bugs triggered hidden Git hooks and exposed local API keys via extensions.
π Details β https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html
#Gemini CLI (CVSS 10.0) auto-trusted folders in CI, letting malicious .gemini/ configs from PRs run on hosts. #Cursor bugs triggered hidden Git hooks and exposed local API keys via extensions.
π Details β https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html
π13π4π₯1
β οΈ UPDATE: #cPanel flaw now tracked as CVE-2026-41940 (CVSS 9.8)βan auth bypass granting unauthenticated admin access.
Actively exploited as a 0-day for weeks. Root cause: CRLF injection lets attackers forge sessions and escalate to root.
π Exploit mechanics and real-world impact β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
Actively exploited as a 0-day for weeks. Root cause: CRLF injection lets attackers forge sessions and escalate to root.
π Exploit mechanics and real-world impact β https://thehackernews.com/2026/04/critical-cpanel-authentication.html
π9π1π1
β οΈ A new #Linux flaw mirrors Dirty Pipeβbut adds cross-container impact.
βCopy Failβ (CVE-2026-31431) lets any local user overwrite cached system files and run them as root. No race condition.
Works across major Linux distros since 2017.
π Read β https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html
βCopy Failβ (CVE-2026-31431) lets any local user overwrite cached system files and run them as root. No race condition.
Works across major Linux distros since 2017.
π Read β https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html
π±12π6π4β‘1π€―1
π¨ Attackers are targeting enterprise admins with fake tools and running control through #Ethereum smart contracts.
Malware spreads via SEO-poisoned #GitHub repos, then pulls live C2 from blockchain. No domains to block. Access lands on high-privilege systems.
π Learn how this campaign turns search results into enterprise breaches β https://thehackernews.com/2026/04/etherrat-distribution-spoofing.html
Malware spreads via SEO-poisoned #GitHub repos, then pulls live C2 from blockchain. No domains to block. Access lands on high-privilege systems.
π Learn how this campaign turns search results into enterprise breaches β https://thehackernews.com/2026/04/etherrat-distribution-spoofing.html
π5π4π₯1
β οΈ Malware now ships its payload inside the installer.
DEEP#DOOR embeds a Python backdoor in a script, extracts it at runtime, and avoids external downloads.
Using tunneling, it keeps access and steals credentials with minimal trace.
π Read β https://thehackernews.com/2026/04/new-python-backdoor-uses-tunneling.html
DEEP#DOOR embeds a Python backdoor in a script, extracts it at runtime, and avoids external downloads.
Using tunneling, it keeps access and steals credentials with minimal trace.
π Read β https://thehackernews.com/2026/04/new-python-backdoor-uses-tunneling.html
π±6π3π€3
AI-enabled cyber attacks are on the rise. Are you prepared? Most orgs arenβt as prepared as they think for AI-enabled attacks, but itβs never too late to start.
The cyber risk playbook for the AI threat era draws on research from over 200 GRC, IT, and cybersecurity professionals to gain new insights into AI-enabled attacks and the need for proactive cyber resilience.
Get the playbook today β https://thn.news/nyc-cyber-training
The cyber risk playbook for the AI threat era draws on research from over 200 GRC, IT, and cybersecurity professionals to gain new insights into AI-enabled attacks and the need for proactive cyber resilience.
Get the playbook today β https://thn.news/nyc-cyber-training
π3π€3π1
π₯ Cyber chaos exploding this week...
β’ Fake cell towers
β’ npm .env theft
β’ Extensions sell data
β’ 3.4M servers exposed
β’ Vidar tops stealers
β’ 38 OpenEMR flaws
β’ Komari backdoor used
β’ Saiga 2FA kits
β’ Black Axe arrests
β’ PhantomRPC unpatched
β’ Robinhood phishing trick
β’ arXiv leaks keys
β’ Qinglong crypto mining
β’ PyPI supply attack
π‘οΈ Full list here β https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html
β’ Fake cell towers
β’ npm .env theft
β’ Extensions sell data
β’ 3.4M servers exposed
β’ Vidar tops stealers
β’ 38 OpenEMR flaws
β’ Komari backdoor used
β’ Saiga 2FA kits
β’ Black Axe arrests
β’ PhantomRPC unpatched
β’ Robinhood phishing trick
β’ arXiv leaks keys
β’ Qinglong crypto mining
β’ PyPI supply attack
π‘οΈ Full list here β https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html
π7π₯5π4π€4β‘1π1
π¨ Supply chain attacks are escalating...
A widely used AI dev tool, PyTorch Lightning, was compromised on PyPI and turned into a credential stealer.
β Malicious code runs on import
β No user action needed
β Credentials silently stolen
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html
A widely used AI dev tool, PyTorch Lightning, was compromised on PyPI and turned into a credential stealer.
β Malicious code runs on import
β No user action needed
β Credentials silently stolen
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html
π±7π5π₯4π2π€―1
π€¦ββοΈ Another supply chain hit.
intercom-client npm package compromised
β Malicious preinstall hook executes on install
β Credentials targeted across dev & CI/CD
Linked to ongoing Mini Shai-Hulud campaign.
Read this update here: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-package-compromised-as-part-of-mini-shai-hulud
intercom-client npm package compromised
β Malicious preinstall hook executes on install
β Credentials targeted across dev & CI/CD
Linked to ongoing Mini Shai-Hulud campaign.
Read this update here: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-package-compromised-as-part-of-mini-shai-hulud
π9π6π₯5
β οΈ Update: Mini Shai-Hulud is spreading across ecosystems.
β intercom-client (npm) and intercom-php (Packagist) compromised
β Install-time hooks deploy credential stealer
Attack targets GitHub tokens, cloud creds, SSH keys, Kubernetes, Vault, Docker, and .env files.
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-and-packagist-package-compromised-as-part-of-mini-shai-hulud
Campaign linked to TeamPCP and earlier Lightning compromise.
β intercom-client (npm) and intercom-php (Packagist) compromised
β Install-time hooks deploy credential stealer
Attack targets GitHub tokens, cloud creds, SSH keys, Kubernetes, Vault, Docker, and .env files.
Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-and-packagist-package-compromised-as-part-of-mini-shai-hulud
Campaign linked to TeamPCP and earlier Lightning compromise.
π€―8π4π3π2β‘1
π¬ Poisoned Ruby gems + Go modules used in a supply chain attack.
β’ Steal AWS creds, SSH keys, configs
β’ Tamper GitHub Actions via fake binaries
β’ Add SSH access for persistence
Read β https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html
β’ Steal AWS creds, SSH keys, configs
β’ Tamper GitHub Actions via fake binaries
β’ Add SSH access for persistence
Read β https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html
π6π3π€2
π Two cybersecurity professionals were sentenced to four years each for helping deploy BlackCat ransomware across the U.S. in 2023.
They took a share of ransom payments, including about $1.2 million in Bitcoin from one victim.
Read β https://thehackernews.com/2026/05/two-cybersecurity-professionals-get-4.html
They took a share of ransom payments, including about $1.2 million in Bitcoin from one victim.
Read β https://thehackernews.com/2026/05/two-cybersecurity-professionals-get-4.html
π€13π11β‘4π1π±1
Cybersecurity market: $38 B β $69 B by 2030
Yet MSPs still lose deals:
β’ 77% canβt create urgency
β’ 66% face cost pushback
β’ 8+ decision-makers per deal
Fix: sell outcomes, not tech
Read more β https://thehackernews.com/2026/05/top-five-sales-challenges-costing-msps.html
Yet MSPs still lose deals:
β’ 77% canβt create urgency
β’ 66% face cost pushback
β’ 8+ decision-makers per deal
Fix: sell outcomes, not tech
Read more β https://thehackernews.com/2026/05/top-five-sales-challenges-costing-msps.html
π5π₯1π1π1
β οΈ China-linked hackers targeted governments across Asia + a NATO state (Poland), exploiting Exchange/IIS flaws to deploy ShadowPad.
At the same time: journalists & activists hit with phishing campaigns.
Two ops. Same priorities.
Details here β https://thehackernews.com/2026/05/china-linked-hackers-target-asian.html
At the same time: journalists & activists hit with phishing campaigns.
Two ops. Same priorities.
Details here β https://thehackernews.com/2026/05/china-linked-hackers-target-asian.html
π₯13π7π3π2
β οΈ Two cybercrime groups are executing rapid SaaS attacks with minimal trace.
Cordial Spider and Snarky Spider use vishing and AiTM phishing to steal credentials, bypass MFA, and access multiple platforms through SSO.
Read: https://thehackernews.com/2026/05/cybercrime-groups-using-vishing-and-sso.html
Cordial Spider and Snarky Spider use vishing and AiTM phishing to steal credentials, bypass MFA, and access multiple platforms through SSO.
Read: https://thehackernews.com/2026/05/cybercrime-groups-using-vishing-and-sso.html
π₯12π2π1