
- Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizationsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 6:37 pm
An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the […]
- DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Koreaby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 4:24 pm
Threat actors likely associated with the Democratic People’s Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage […]
- Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Stepsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 1:00 pm
Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments, attackers move across Windows endpoints, […]
- ⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 12:46 pm
This week had real hits. The key software got tampered with. Active bugs showed up in the tools people use every day. Some attacks didn’t even need much effort because the […]
- How LiteLLM Turned Developer Machines Into Credential Vaults for Attackersby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 11:45 am
The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are created, tested, cached, copied, and reused […]
- Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Toolsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 10:07 am
Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security […]
- BKA Identifies REvil Leaders Behind 130 German Ransomware Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on April 6, 2026 at 6:59 am
Germany’s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identities of two of the key figures associated with the now-defunct REvil (aka […]
- $285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operationby info@thehackernews.com (The Hacker News) (The Hacker News) on April 5, 2026 at 6:25 pm
Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social […]
- 36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implantsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 5, 2026 at 5:07 am
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis […]
- Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMSby info@thehackernews.com (The Hacker News) (The Hacker News) on April 5, 2026 at 4:32 am
Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as […]
- China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishingby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 5:34 pm
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in […]
- Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Serversby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 3:32 pm
Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from […]
- UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 11:04 am
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North […]
- Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Postureby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 11:00 am
The next major breach hitting your clients probably won’t come from inside their walls. It’ll come through a vendor they trust, a SaaS tool their finance team signed up for, or […]
- New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Imagesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 9:10 am
Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered […]
- Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRKby info@thehackernews.com (The Hacker News) (The Hacker News) on April 3, 2026 at 8:35 am
Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026. […]
- Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentialsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 7:30 pm
A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH […]
- Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromiseby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 3:21 pm
Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, […]
- ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 12:45 pm
The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick and honest […]
- Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Minersby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 11:42 am
A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since […]
- The State of Trusted Open Source Reportby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 11:30 am
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption across […]
- WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Actionby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 9:51 am
Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with spyware. According […]
- Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploitby info@thehackernews.com (The Hacker News) (The Hacker News) on April 2, 2026 at 7:09 am
Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from the risk posed by a recently disclosed exploit […]
- CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emailsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 4:10 pm
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute […]
- Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypassby info@thehackernews.com (The Hacker News) (The Hacker News) on April 1, 2026 at 2:10 pm
Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late […]
