
- Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on April 27, 2026 at 2:19 pm
Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on […]
- ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on April 27, 2026 at 1:30 pm
Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains got hit. Fake help desks worked. Weird […]
- Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Sideby info@thehackernews.com (The Hacker News) (The Hacker News) on April 27, 2026 at 11:58 am
Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurity-focused AI system capable […]
- PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networksby info@thehackernews.com (The Hacker News) (The Hacker News) on April 27, 2026 at 11:54 am
A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since […]
- Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on April 27, 2026 at 11:23 am
Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked to a persistent information-stealing […]
- Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraudby info@thehackernews.com (The Hacker News) (The Hacker News) on April 27, 2026 at 6:33 am
Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending […]
- Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Softwareby info@thehackernews.com (The Hacker News) (The Hacker News) on April 25, 2026 at 9:26 am
Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying […]
- CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadlineby info@thehackernews.com (The Hacker News) (The Hacker News) on April 25, 2026 at 5:08 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series […]
- FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patchesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 24, 2026 at 5:06 pm
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency’s Cisco Firepower device running Adaptive Security Appliance […]
- NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Softwareby info@thehackernews.com (The Hacker News) (The Hacker News) on April 24, 2026 at 2:13 pm
The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a […]
- Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engineby info@thehackernews.com (The Hacker News) (The Hacker News) on April 24, 2026 at 11:49 am
The AI Agent Authority Gap – From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is […]
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrasesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 24, 2026 at 11:48 am
Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases […]
- Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2by info@thehackernews.com (The Hacker News) (The Hacker News) on April 24, 2026 at 9:29 am
Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and […]
- LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosureby info@thehackernews.com (The Hacker News) (The Hacker News) on April 24, 2026 at 7:24 am
A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving large language models (LLMs), has come under active exploitation in the […]
- UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 6:16 pm
A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on […]
- Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaignby info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 1:42 pm
Bitwarden CLI, the command-line interface for the password manager Bitwarden, has reportedly been compromised as part of a newly discovered and ongoing Checkmarx supply chain […]
- ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 1:17 pm
You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes. The […]
- [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speedby info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 12:03 pm
Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now […]
- Project Glasswing Proved AI Can Find the Bugs. Who’s Going to Fix Them?by info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 11:30 am
Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public […]
- China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoorsby info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 9:04 am
Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. “The […]
- Vercel Finds More Compromised Accounts in Context.ai-Linked Breachby info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 8:40 am
Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to […]
- Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messagesby info@thehackernews.com (The Hacker News) (The Hacker News) on April 23, 2026 at 8:06 am
Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, […]
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chainby info@thehackernews.com (The Hacker News) (The Hacker News) on April 22, 2026 at 5:55 pm
Cybersecurity researchers have warned of malicious images pushed to the official “checkmarx/kics” Docker Hub repository. In an alert published today, software supply chain […]
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokensby info@thehackernews.com (The Hacker News) (The Hacker News) on April 22, 2026 at 5:33 pm
Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer […]
- Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph APIby info@thehackernews.com (The Hacker News) (The Hacker News) on April 22, 2026 at 3:28 pm
The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia. “The […]
