Tag: cyber
-
CISA Warns Compromised Axios npm Package Fueled Major Supply Chain Attack
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a severe software supply chain compromise affecting the widely used Axios node package manager (npm). Axios is a highly popular JavaScript library that developers rely on to handle HTTP requests in both Node.js and browser environments. Because of its massive global adoption…
-
2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable
From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have shaped 2026 so far. The post 2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-top-cyberattacks-2026-so-far/
-
2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable
From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have shaped 2026 so far. The post 2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-top-cyberattacks-2026-so-far/
-
2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable
From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have shaped 2026 so far. The post 2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-top-cyberattacks-2026-so-far/
-
AI Changes Focus to Real-Time Cyber Defense
Cisco’s Jeetu Patel on How Machine-Speed Threats Drive Need for AI-Led Security. Cisco’s Jeetu Patel explains how AI models are compressing exploit timelines to minutes, forcing a shift to machine-speed defense, real-time enforcement and deeper ecosystem collaboration to secure critical infrastructure and stay ahead of adversaries. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-changes-focus-to-real-time-cyber-defense-a-31463
-
Gh0st RAT, CloverPlus Hit Victims in Dual-Malware Campaign
A new malware campaign is bundling a powerful remote access trojan (RAT) with intrusive adware, giving attackers both long-term control of infected systems and an immediate revenue stream from fraudulent advertising activity. The loader hides two encrypted payloads in its resource section, one of which is detected as AdWare.Win32.CloverPlus. Once executed, this adware installs advertising…
-
Intel Utility Hijacked in AppDomain Attack to Launch Malware
Hackers are abusing a trusted Intel utility to quietly launch advanced malware by hijacking the .NET AppDomain mechanism, allowing malicious code to run inside a signed executable and evade many enterprise defenses. The campaign, dubbed Operation PhantomCLR by researchers, targets financial and other organizations in the Middle East and wider EMEA region using highly targeted…
-
Anthropic MCP Hit by Critical Vulnerability Enabling Remote Code Execution
A critical, systemic vulnerability discovered in Anthropic’s Model Context Protocol (MCP) has exposed over 150 million downloads and up to 200,000 servers to complete takeover, according to research published April 15, 2026, by the OX Security Research team. The flaw enables Arbitrary Remote Code Execution (RCE) on any system running a vulnerable MCP implementation, allowing…
-
Wenn Vertrauen nicht reicht: Warum Unternehmen ihre Cyber-Resilienz neu denken müssen
Die Folgen sind konkret spürbar. Cybervorfälle führen nicht nur zu technischen Problemen, sondern treffen Unternehmen im Kern ihres Geschäfts: Kundenbeziehungen leiden First seen on infopoint-security.de Jump to article: www.infopoint-security.de/wenn-vertrauen-nicht-reicht-warum-unternehmen-ihre-cyber-resilienz-neu-denken-muessen/a44702/
-
Iran’s MOIS Tied to Coordinated Cyber Campaign Using Multiple Hacker Personas
A single Iranian state-directed operation is hiding behind several so”‘called “hacktivist” brands, using different online identities to run one coordinated global cyber campaign. New analysis links three prominent personas Homeland Justice, Karma/KarmaBelow80, and Handala to Iran’s Ministry of Intelligence and Security (MOIS), rather than to independent hacktivist groups as they claim. Researchers say these identities act as interchangeable…
-
TBK DVR Vulnerability CVE-2024-3721 Exploited to Spread Nexcorium DDoS Malware
Hackers are actively exploiting a critical vulnerability in TBK digital video recorder (DVR) devices to deploy a new Mirai-based botnet called Nexcorium. The campaign leverages CVE-2024-3721, an OS command injection vulnerability, highlighting how poorly secured IoT devices continue to fuel large-scale distributed denial-of-service (DDoS) attacks. Threat actors exploit CVE-2024-3721 by manipulating the “mdb” and “mdc”…
-
iTerm2 Flaw Turns SSH Escape Sequences Into Arbitrary Code Execution
In the cybersecurity community, we often assume that simply reading a text file using a command like cat is a perfectly safe operation. However, security researchers have recently demonstrated that doing so inside the popular iTerm2 macOS terminal emulator can cross the line into arbitrary code execution. This alarming discovery, made in partnership with OpenAI, highlights a…
-
Microsoft-Signed Malware Built With FUD Crypt Packs Persistence and C2
Hackers are abusing a service called FUD Crypt to generate fully undetected, Microsoft”‘signed malware that installs persistence and connects to a dedicated command”‘and”‘control (C2) platform with zero effort on the buyer’s part. This Malware”‘as”‘a”‘Service (MaaS) offering turns ordinary payloads into polymorphic, signed loaders that are extremely hard for both security tools and human analysts to…
-
NCSC Outlines Coordinated Plan to Boost NHS Cyber Resilience
The National Cyber Security Centre has shared an update of its resilience-building efforts for the NHS First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ncsc-plan-boost-nhs-cyber/
-
CISOs reshape their roles as business risk strategists
Tags: ai, business, chatgpt, ciso, compliance, cyber, cybersecurity, data, finance, jobs, mitigation, risk, risk-assessment, skills, strategy, technology, toolEvolving risks require a new CISO leadership profile: The shift to CISO as a risk position, and not one limited to technical and cybersecurity alone, has been years in the making. But it has accelerated since the arrival of ChatGPT in late 2022, as organizations embraced first generative AI and more recently agentic AI. That’s…
-
MiningDropper Spreads Infostealers, RATs, Banking Malware on Android
Hackers are abusing a modular Android framework called MiningDropper to mine cryptocurrency and silently install infostealers, remote access trojans (RATs), and banking malware on infected devices. MiningDropper is a multi-stage Android dropper that combines crypto-mining with the delivery of additional malware payloads, including banking trojans, RATs such as BTMOB, and credential-stealing spyware. A recent variant is built…
-
Windows 11 Dev Build Introduces Improved Secure Boot Oversight and Storage Security
Microsoft has rolled out Windows 11 Insider Preview Build 26300.8170 to the Dev Channel, bringing crucial updates for system security and storage management. Announced by the Windows Insider Program Team on April 10, 2026, this release delivers enhanced oversight for Secure Boot states. It streamlines User Account Control (UAC) prompts. The update provides users with…
-
JanaWare Ransomware Hits Turkish Users via Tailored Adwind RAT
A newly analyzed ransomware campaign dubbed “JanaWare” is targeting users in Turkey by leveraging a customized version of the Adwind Remote Access Trojan (RAT). The campaign combines stealthy delivery techniques, geographic restrictions, and polymorphic malware to evade detection while maintaining long-term activity. Researchers identified that JanaWare is specifically designed to infect systems located in Turkey.…
-
British Hacker Admits Stealing Millions in Virtual Currency From Targeted Companies
A 24-year-old British national, Tyler Robert Buchanan, has pleaded guilty to orchestrating a massive cyberattack campaign that compromised over a dozen U.S. companies and resulted in the theft of at least $8 million in cryptocurrency. According to a Friday announcement from the U.S. Attorney’s Office for the Central District of California, the Scottish hacker admitted…
-
ZionSiphon Hits Israeli Water Systems With OT Sabotage Malware
ZionSiphon is a newly analyzed Operational Technology (OT) malware strain designed to target Israeli water treatment and desalination facilities, with a clear emphasis on sabotage rather than simple IT disruption. Darktrace’s investigation found that ZionSiphon restricts itself to hardcoded IPv4 ranges that map to Israeli network space, such as 2.52.0.02.55.255.255, 79.176.0.079.191.255.255, and 212.150.0.0212.150.255.255. The malware…
-
NSA Confirms Use of Anthropic’s Mythos Despite Pentagon Blacklist
The National Security Agency (NSA) is actively using Anthropic’s highly restricted >>Mythos<< artificial intelligence model, despite the developer currently being on the Department of Defense (DoD) blacklist. According to recent intelligence reports highlighted by the International Cyber Digest, the NSA is one of an exclusive group of approximately 40 organizations globally granted access to the…
-
Public Notion Pages Expose Editors’ Profile Photos and Email Addresses
A significant data exposure issue has been brought to light regarding Notion, a highly popular productivity and note-taking application. This exposure happens without requiring any authentication, cookies, or access tokens, leaving thousands of indexable company wikis and personal pages vulnerable to data scraping. For organizations that rely on Notion for public-facing documentation, this poses a…
-
QEMU Hijacked as Stealth Backdoor for Credential Theft, Ransomware
Attackers are increasingly abusing QEMU virtual machines to hide credential theft and ransomware staging inside “invisible” virtual environments, making detection and forensics significantly harder for defenders. QEMU is a legitimate open-source emulator and virtualizer that allows running full operating systems as virtual machines on a host. Threat actors are weaponizing this capability by running their…
-
Critical Gardyn Flaws Open Smart Garden Devices to Remote Hijacking
A recently updated advisory from the Cybersecurity and Infrastructure Security Agency (CISA) has revealed severe vulnerabilities in Gardyn Home Kit systems. These critical flaws carry a maximum CVSS score of 9.3 and could allow malicious actors to hijack smart gardening devices remotely. According to the April 2026 alert, successful exploitation enables unauthenticated attackers to completely…
-
Fake Helpdesk Attack Uses Teams and Quick Assist to Breach Targets
Attackers are increasingly abusing Microsoft Teams and Windows Quick Assist to run a helpdesk”‘themed social engineering attack chain that leads to full enterprise compromise and stealthy data theft. By impersonating IT support and relying on legitimate tools and protocols, adversaries can move laterally and exfiltrate data while blending into normal admin activity. Using names such as “Help…
-
NIST Adopts Risk-Based NVD Model as CVE Submissions Jump 263% Since 2020
According to a recent announcement from the National Institute of Standards and Technology (NIST), the agency is fundamentally restructuring how it manages the National Vulnerability Database (NVD). Driven by a massive 263% increase in Common Vulnerabilities and Exposures (CVE) submissions between 2020 and 2025, NIST is shifting from a comprehensive analysis approach to a targeted,…
-
Cyber attacks fuel surge in cargo theft across logistics industry
Hackers infiltrate logistics firms to steal cargo and divert payments, cyberattacks are linked to organized crime and rising losses. Proofpoint researchers observed crooks targeting trucking and logistics companies, running coordinated remote access campaigns to steal cargo and divert payments. These attacks appear to be linked to organized crime. The findings highlight a growing trend of…
-
A History of Global Hacking, and Where It’s Going Next
In her new book, Code War: How Nations Hack, Spy, and Shape the Digital Battlefield, Allie Mellen provides true stories of the current cyber war and, importantly, what might be ahead. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/a-history-of-global-hacking-and-where-its-going-next/

