
- Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Toolsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 10:07 am
Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security […]
- BKA Identifies REvil Leaders Behind 130 German Ransomware Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 6:59 am
Germany’s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identities of two of the key figures associated with the now-defunct REvil (aka […]
- $285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operationby info@thehackernews.com (The Hacker News) (The Hacker News) on April 5, 2026 at 6:25 pm
Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social […]
- 36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implantsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 5, 2026 at 5:07 am
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis […]
- Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMSby info@thehackernews.com (The Hacker News) (The Hacker News) on April 5, 2026 at 4:32 am
Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as […]
- China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishingby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 5:34 pm
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in […]
- Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Serversby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 3:32 pm
Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from […]
- UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 11:04 am
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North […]
- Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Postureby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 11:00 am
The next major breach hitting your clients probably won’t come from inside their walls. It’ll come through a vendor they trust, a SaaS tool their finance team signed up for, or […]
- New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Imagesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 9:10 am
Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered […]
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRKby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 8:35 am
Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026. […]
- Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentialsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 7:30 pm
A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH […]
- Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromiseby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 3:21 pm
Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, […]
- ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 12:45 pm
The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest […]
- Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Minersby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 11:42 am
A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since […]
- The State of Trusted Open Source Reportby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 11:30 am
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption across […]
- WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Actionby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 9:51 am
Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with spyware. According […]
- Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploitby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 7:09 am
Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from the risk posed by a recently disclosed exploit […]
- CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emailsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 4:10 pm
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute […]
- Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypassby info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 2:10 pm
Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late […]
- Block the Prompt, Not the Work: The End of “Doctor No”by info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 12:46 pm
There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build. It doesn’t enable. Its entire function […]
- Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Luresby info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 12:36 pm
A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka […]
- New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Releasedby info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 11:42 am
Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The […]
- 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)by info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 10:58 am
For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next. Threat actors now use malware less […]
- Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069by info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 7:44 am
Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. “We […]
