- European Gym giant Basic-Fit data breach affects 1 million membersby Bill Toulas on April 13, 2026
Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers. [...]
- Stolen Rockstar Games analytics data leaked by extortion gangby Lawrence Abrams on April 13, 2026
Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking the stolen data on […]
- Critical flaw in wolfSSL library enables forged certificate useby Bill Toulas on April 13, 2026
A critical vulnerability in the wolfSSL SSL/TLS library can weaken security via improper verification of the hash algorithm or its size when checking Elliptic […]
- FBI takedown of W3LL phishing service leads to developer arrestby Lawrence Abrams on April 13, 2026
The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arresting the alleged […]
- OpenAI rotates macOS certs after Axios attack hit code-signing workflowby Lawrence Abrams on April 13, 2026
OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package during a recent […]
- New Booking.com data breach forces reservation PIN resetsby Bill Toulas on April 13, 2026
Booking.com has confirmed via a statement to BleepingComputer that it has detected unauthorized access to its systems that has exposed sensitive reservation […]
- JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025by info@thehackernews.com (The Hacker News) on April 13, 2026
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A […]
- Adobe rolls out emergency fix for Acrobat, Reader zero-day flawby Bill Toulas on April 13, 2026
Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked as CVE-2026-34621, that has been exploited in zero-day […]
- FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attemptsby info@thehackernews.com (The Hacker News) on April 13, 2026
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global […]
- The silent “Storm”: New infostealer hijacks sessions, decrypts server-sideby Sponsored by Varonis on April 13, 2026
New "Storm" infostealer skips local decryption, sending browser data to attacker servers. Varonis shows how server-side decryption enables session hijacking, […]
- ⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and Moreby info@thehackernews.com (The Hacker News) on April 13, 2026
Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your […]
- Your MTTD Looks Great. Your Post-Alert Gap Doesn'tby info@thehackernews.com (The Hacker News) on April 13, 2026
Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and […]
- North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malwareby info@thehackernews.com (The Hacker News) on April 13, 2026
The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors […]
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incidentby info@thehackernews.com (The Hacker News) on April 13, 2026
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user […]
- Critical Marimo pre-auth RCE flaw now under active exploitationby Bill Toulas on April 12, 2026
A critical pre-authentication remote code execution (RCE) vulnerability in Marimo is now under active exploitation, leveraged for credential theft. [...]
- CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloadsby info@thehackernews.com (The Hacker News) on April 12, 2026
Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and […]
- Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621by info@thehackernews.com (The Hacker News) on April 12, 2026
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The […]
- Over 20,000 crypto fraud victims identified in international crackdownby Sergiu Gatlan on April 11, 2026
An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, […]
- Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Databy info@thehackernews.com (The Hacker News) on April 11, 2026
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use […]
- ChatGPT rolls out new $100 Pro subscription to challenge Claudeby Mayank Parmar on April 11, 2026
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 […]
- Nearly 4,000 US industrial devices exposed to Iranian cyberattacksby Sergiu Gatlan on April 10, 2026
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed […]
- Analysis of one billion CISA KEV remediation records exposes limits of human-scale securityby Sponsored by Qualys on April 10, 2026
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before […]
- GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEsby info@thehackernews.com (The Hacker News) on April 10, 2026
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily […]
- CPUID hacked to deliver malware via CPU-Z, HWMonitor downloadsby Bill Toulas on April 10, 2026
Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular […]
- Microsoft: Canadian employees targeted in payroll pirate attacksby Sergiu Gatlan on April 10, 2026
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking their accounts in payroll pirate […]
- Browser Extensions Are the New AI Consumption Channel That No One Is Talking Aboutby info@thehackernews.com (The Hacker News) on April 10, 2026
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: […]
- Recovery scammers hit you when you’re down: Here’s how to avoid a second strikeon April 10, 2026
If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get […]
- Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windowsby info@thehackernews.com (The Hacker News) on April 10, 2026
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing […]
- Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosureby info@thehackernews.com (The Hacker News) on April 10, 2026
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public […]
- Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Serversby info@thehackernews.com (The Hacker News) on April 10, 2026
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing […]
- EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installsby info@thehackernews.com (The Hacker News) on April 9, 2026
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK […]
- UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaignsby info@thehackernews.com (The Hacker News) on April 9, 2026
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations […]
- ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Storiesby info@thehackernews.com (The Hacker News) on April 9, 2026
Thursday. Another week, another batch of things that probably should've been caught sooner but weren't. This one's got some range — old vulnerabilities […]
- The Hidden Security Risks of Shadow AI in Enterprisesby info@thehackernews.com (The Hacker News) on April 9, 2026
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, […]
- Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025by info@thehackernews.com (The Hacker News) on April 9, 2026
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least […]
- Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Regionby info@thehackernews.com (The Hacker News) on April 9, 2026
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and […]
- New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxyby info@thehackernews.com (The Hacker News) on April 8, 2026
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of […]
- Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devicesby info@thehackernews.com (The Hacker News) on April 8, 2026
Cybersecurity researchers have lifted the curtain on a stealthy botnet that's designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the […]
- Future-proofing payment integrity: How to gain more value now while scaling for future growthby jpiatt on April 8, 2026
Future-proofing payment integrity: How to gain more value now while scaling for future growth jpiatt Wed, 04/08/2026 - 11:53
- APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Alliesby info@thehackernews.com (The Hacker News) on April 8, 2026
The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its […]
- 2025 Losses to Cybercrime Exceeded $20 Billionby Steve Alder on April 8, 2026
In 2025, another unwanted record was set for losses to cybercrime, with almost $21 billion in reported losses, beating the The post 2025 Losses to Cybercrime […]
- Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)by info@thehackernews.com (The Hacker News) on April 8, 2026
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly […]
- Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systemsby info@thehackernews.com (The Hacker News) on April 8, 2026
Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new […]
- N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rustby info@thehackernews.com (The Hacker News) on April 8, 2026
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, […]
- Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCsby info@thehackernews.com (The Hacker News) on April 8, 2026
Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including […]
- Russia Hacked Routers to Steal Microsoft Office Tokensby BrianKrebs on April 7, 2026
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft […]
- Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaignby info@thehackernews.com (The Hacker News) on April 7, 2026
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link […]
- [Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Riskby info@thehackernews.com (The Hacker News) on April 7, 2026
In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet […]
- Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Accessby info@thehackernews.com (The Hacker News) on April 7, 2026
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under […]
- Reducing Barriers to Care: Mary’s Center Advances Technology Through Grant Fundingby jpiatt on April 7, 2026
Reducing Barriers to Care: Mary’s Center Advances Technology Through Grant Funding jpiatt Tue, 04/07/2026 - 10:21






























![[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRHgJL0SczODx5PAnF85b8b0mRpiOOkIQdOWvhivyXu6H8UeZKH9ZUdaeW5IuU59q2hjMNioQWQ5vk1Km8yinGGc8GA079qvhTtFsp9PV76Kmp-3lpKh2zi3vgd_-6dFcOI6i1YHs7VkJ-p-HvOEuOwkjooBVSvYFOrVqXqNhZShZy3IUeD6BVHVvUIj50/s1600/webinar-cerby.jpg)
