- Telegram Mini Apps abused for crypto scams, Android malware deliveryby Lawrence Abrams on May 3, 2026
Cybersecurity researchers have uncovered a large-scale fraud operation that uses Telegram's Mini App feature to run crypto scams, impersonate well-known […]
- CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEVby info@thehackernews.com (The Hacker News) on May 3, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to […]
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacksby Lawrence Abrams on May 2, 2026
A new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in "Sorry" ransomware attacks. [...]
- ConsentFix v3 attacks target Azure with automated OAuth abuseby Bill Toulas on May 2, 2026
A new attack type, dubbed ConsentFix v3, has been circulating on hacker forums, building on the previous technique by adding automation and scaling potential. […]
- Trellix Confirms Source Code Breach With Unauthorized Repository Accessby info@thehackernews.com (The Hacker News) on May 2, 2026
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently […]
- Microsoft tests modern Windows Run, says it's faster than legacy dialogby Mayank Parmar on May 2, 2026
Microsoft has confirmed that Windows 11 is getting a new modern Run dialog with dark mode support and faster performance in a new preview build. [...]
- Edu tech firm Instructure discloses cyber incident, probes impactby Lawrence Abrams on May 1, 2026
Instructure, the company behind the widely used Canvas learning platform, has disclosed that it recently suffered a cybersecurity incident and is now […]
- 30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaignby info@thehackernews.com (The Hacker News) on May 1, 2026
A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to […]
- 15-year-old detained over French govt agency data breachby Ionut Ilascu on May 1, 2026
French authorities have detained a 15-year-old suspected of selling data stolen in a cyberattack on France Titres (ANTS), the country's agency for issuing and […]
- Story retractedby BleepingComputer on May 1, 2026
BleepingComputer initially published a story about a new data breach at Instructure. Shortly after publication, we determined that the information was […]
- Frequency and Severity of Hacks of Medical Devices Increasingby Steve Alder on May 1, 2026
Healthcare organizations are increasingly concerned about medical device security and for good reason – attacks targeting or impacting medical devices The […]
- Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacksby info@thehackernews.com (The Hacker News) on May 1, 2026
Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the confines of SaaS […]
- Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operationsby Sponsored by Criminal IP on May 1, 2026
Raw threat intel isn't enough without real-world context. Criminal IP has partnered with Securonix to integrate exposure-based intelligence into ThreatQ, […]
- China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activistsby info@thehackernews.com (The Hacker News) on May 1, 2026
Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across South, East, and […]
- Microsoft fixes Remote Desktop warnings displaying incorrectlyby Sergiu Gatlan on May 1, 2026
Microsoft has fixed a known issue causing newly introduced Windows security warnings to display incorrectly when opening Remote Desktop (.rdp) files. [...]
- Microsoft now lets admins choose pre-installed Store apps to uninstallby Sergiu Gatlan on May 1, 2026
Microsoft has updated a Windows 11 in-box app removal policy introduced in October to include a dynamic list that lets IT admins choose which preinstalled […]
- Top Five Sales Challenges Costing MSPs Cybersecurity Revenueby info@thehackernews.com (The Hacker News) on May 1, 2026
The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being the […]
- Windows 11 KB5083631 update released with 34 changes and fixesby Sergiu Gatlan on May 1, 2026
Microsoft has released the KB5083631 optional cumulative update for Windows 11, which includes 34 changes, such as a new Xbox mode for Windows PCs, enhanced […]
- Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacksby info@thehackernews.com (The Hacker News) on May 1, 2026
The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for their role in […]
- Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theftby info@thehackernews.com (The Hacker News) on May 1, 2026
A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled […]
- US ransomware negotiators get 4 years in prison over BlackCat attacksby Sergiu Gatlan on May 1, 2026
Two former employees of cybersecurity incident response companies Sygnia and DigitalMint were sentenced to four years in prison each for targeting U.S. […]
- New Bluekit phishing service includes an AI assistant, 40 templatesby Bill Toulas on April 30, 2026
A new phishing kit named Bluekit offers more than 40 templates targeting popular services and includes basic AI features for generating campaign drafts. [...]
- Romanian leader of online swatting ring gets 4 years in prisonby Sergiu Gatlan on April 30, 2026
A Romanian national who led an online swatting ring that targeted more than 75 public officials, multiple journalists, and four religious institutions was […]
- FBI links cybercriminals to sharp surge in cargo theft attacksby Sergiu Gatlan on April 30, 2026
The U.S. Federal Bureau of Investigation (FBI) warned the transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated […]
- PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentialsby info@thehackernews.com (The Hacker News) on April 30, 2026
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to […]
- Anti-DDoS Firm Heaped Attacks on Brazilian ISPsby BrianKrebs on April 30, 2026
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an […]
- ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Storiesby info@thehackernews.com (The Hacker News) on April 30, 2026
The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are […]
- New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentialsby info@thehackernews.com (The Hacker News) on April 30, 2026
Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish […]
- EtherRAT Distribution Spoofing Administrative Tools via GitHub Facadesby info@thehackernews.com (The Hacker News) on April 30, 2026
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically […]
- New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributionsby info@thehackernews.com (The Hacker News) on April 30, 2026
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. […]
- This month in security with Tony Anscombe – April 2026 editionon April 30, 2026
Warnings about helpdesk impersonation scams and Iran-linked hackers targeting critical sectors in the US, plus the most damaging scams of 2025 - here's some of […]
- Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Executionby info@thehackernews.com (The Hacker News) on April 30, 2026
Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the "google-github-actions/run-gemini-cli" […]
- SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attackby info@thehackernews.com (The Hacker News) on April 29, 2026
Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. […]
- New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATsby info@thehackernews.com (The Hacker News) on April 29, 2026
Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic's Claude Opus […]
- Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacksby info@thehackernews.com (The Hacker News) on April 29, 2026
In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly […]
- What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)by info@thehackernews.com (The Hacker News) on April 29, 2026
Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then […]
- Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediatelyby info@thehackernews.com (The Hacker News) on April 29, 2026
cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the […]
- AI Analysis Identifies 38 Flaws in OpenEMR Platformby Steve Alder on April 29, 2026
An automated, AI-driven analysis of the most widely used electronic medical records platform uncovered 38 previously unknown vulnerabilities, including two […]
- CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEVby info@thehackernews.com (The Hacker News) on April 29, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows […]
- LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosureby info@thehackernews.com (The Hacker News) on April 29, 2026
In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a newly disclosed critical security flaw in BerriAI's LiteLLM Python […]
- Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Pushby info@thehackernews.com (The Hacker News) on April 28, 2026
Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an […]
- Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaignby info@thehackernews.com (The Hacker News) on April 28, 2026
A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer […]
- Healthcare Organizations Struggling to Implement Primary Method of Blocking Lateral Movementby Steve Alder on April 28, 2026
A study of security leaders from the healthcare and manufacturing industries found that while there is an almost universal desire The post Healthcare […]
- VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXiby info@thehackernews.com (The Hacker News) on April 28, 2026
Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption […]
- Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks Aboutby info@thehackernews.com (The Hacker News) on April 28, 2026
Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data […]
- Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCEby info@thehackernews.com (The Hacker News) on April 28, 2026
Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform with nearly 24,000 […]
- After Mythos: New Playbooks For a Zero-Window Eraby info@thehackernews.com (The Hacker News) on April 28, 2026
When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know the exploit window, the […]
- Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacksby info@thehackernews.com (The Hacker News) on April 28, 2026
A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy. Xu Zewei, 34, was arrested in July […]
- Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeoverby info@thehackernews.com (The Hacker News) on April 28, 2026
An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, […]
- Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202by info@thehackernews.com (The Hacker News) on April 28, 2026
Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively […]






























