4/30/2026

Trump Signs Bill to Fund DHS After Lengthy Shutdown Over ICE Operations

Trump’s Cyber Ambassador Nominee Advances to Full Senate Vote

FBI Cyber Boss: China’s Hacker-For-Hire Ecosystem ‘Out of Control’

New Bluekit Phishing Service Includes an AI Assistant, 40 Templates

Bot Her Emails: Most Modern Phishing Campaigns Are AI-Enabled

‘It Took Nine Seconds’: Claude AI Agent Deletes Company’s Entire Database, Then Apologises

OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts

How Mythos Could Upend the Economics of Hacking

FBI Links Cybercriminals to Sharp Surge in Cargo Theft Attacks

Romanian Leader of Online Swatting Ring Gets 4 Years in Prison

France Investigates 15-Year-Old Over Alleged Hack of National ID Agency

Zambia Cancels Global Digital Freedoms Conference Days Before Start

Congress Punts FISA Renewal to June
Krebs: Anti-DDoS Firm Huge Networks Heaped Attacks on Brazilian ISPs

Moldova’s Health Insurance Agency Reports Possible Data Leak After Cyberattack

Stelia North America Hacked in Ransomware Attack

Dental Practice Software Maker Practice by Numbers Fixes Bug That Exposed Patients’ Medical Records

Sandhills (SC) Medical Data Breach May Have Exposed Info of 78,000+

90,000 Screenshots of One Celebrity’s Phone Were Exposed Online

PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades

Critical cPanel and WHM Bug Exploited as a Zero-Day, PoC Now Available

New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributions

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

4/29/2026

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

U.S., China Partner on Scam Center Takedown in Dubai

Swiss Police Arrest 10 Suspected Members of Nigeria-Linked Crime Group Black Axe

European Police Dismantles €50 Million Crypto Investment Fraud Ring

European Commission Accuses Meta of Breaching Child Safety Rules

Microsoft Says Backend Change Broke Teams Free Chat and Calls

House Approves Spy Program on Second Attempt, Senate Fate Murky

‘New Einstein’ Vows to Find ‘Source Code of Universe’ and Change Everything; Rejects Bezos Job Offer

Parsing Agentic Offensive Security’s Existential Threat
Medtronic Confirms Data Breach After ShinyHunters Claims

Pine Bluff Schools (AR) Lose $3.2M in Cyberattack Scam

Popular WordPress Redirect Plugin Hid Dormant Backdoor for Years

Hackers Exploit RCE Flaws in Qinglong Task Scheduler for Cryptomining

Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

Cursor Extension Flaw Exposes Developer API Keys

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

4/28/2026

China-Linked Hackers Led Phishing Campaigns Targeting Journalists and Activists, Researchers Say

North Korean BlueNoroff Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures

Cyber Command, NSA Chief Warns Foreign Adversaries Likely to Target Midterms

The Simple Security Flaws That Exposed Trump to Another Gunman

Attack of the Killer Script Kiddies

After Mythos, Nobody Is Safe From Cybersecurity Threats

The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards

EU Countries, Lawmakers Fail to Reach Deal on Watered-Down AI Rules

Why Sharing a Screenshot Can Get You Jailed in the UAE

Ukrainian Police Detain Hackers Suspected of Stealing Thousands of Roblox Accounts for Resale

U.S. Reportedly Charges Scattered Spider Hacker Arrested in Finland

Ransomware Turf War as 0APT and KryBit Groups Trade Blows

Vidar Rises to Top of Chaotic Infostealer Market

No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC

Electricity Is a Growing Area of Cyber-Risk
Have I Been Pwned Claims Pitney Bowes Hit by 8.2m Email Address Leak

Checkmarx Confirms LAPSUS$ Hackers Leaked its Stolen GitHub Data

Video Service Vimeo Confirms Anodot Breach Exposed User Data

Ameriprise Data Breach Hits 48,000 Customers

Robinhood Account Creation Flaw Abused to Send Phishing Emails

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

Hackers are Exploiting a Critical LiteLLM Pre-Auth SQLi Flaw

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

Microsoft to Deprecate Legacy TLS in Exchange Online Starting July

Microsoft: New Remote Desktop Warnings May Display Incorrectly

4/27/2026

Cole Allen Charged With Attempting to Assassinate Trump

Alleged Silk Typhoon Hacker Extradited to U.S. for Cyberespionage

Money Launderer Linked to $230M Crypto Heist Gets 70 Months in Prison

FTC: Americans Lost Over $2.1 Billion to Social Media Scams in 2025

Tennessee Becomes Second State to Ban Cryptocurrency ATMs Over Scam Concerns

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side

Most Cybersecurity Professionals Feel Undervalued and Underpaid

Nearly Half of Cybersecurity Pros Want to Quit – Here’s Why
Medtronic Says Cyberattack on IT Network Has Not Disrupted Operations

Home Security Giant ADT Data Breach Affects 5.5 Million People

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks

Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud

PyPi Package With 1.1m Monthly Downloads Hacked to Push Infostealer

Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

Disinformation Campaign Targeted Tibetan Parliament-In-Exile Elections

4/24-26/2026

Trump Faces Unprecedented Third Assassination Attempt

Officials Identify Suspect in White House Correspondents’ Dinner

Washington Hotel Shooting Raises Questions About Trump Security

Iran’s Cyber Threat May Be Less ‘Shock and Awe’ Than ‘Low and Slow,’ Officials Say

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

German Government Suspects Russia of Signal Attack Targeting Politicians

Rogue Ransomware Negotiator Rattles Trust in Outside Data-Breach Responders

Toronto Police Arrest Three in Canada’s First Mobile Sms Blaster Case

Norway’s Prime Minister Proposes Ban on Social Media Access for Young Teens

Microsoft to Roll Out Entra Passkeys on Windows in Late April

Pentagon Grapples With Securing AI as It Moves Toward Autonomous Warfare
American Utility Firm Itron Discloses Breach of Internal IT Network

ShinyHunters Claim They Have Cruise Giant Carnival’s Booty as 7.5m Emails Surface

ADT Confirms Data Breach After ShinyHunters Leak Threat

New BlackFile Extortion Group Linked to Surge of Vishing Attacks

City of Suffolk (VA) Victim of Cybersecurity Attack

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

Over 10,000 Zimbra Servers Vulnerable to Ongoing XSS Attacks

New ‘Pack2TheRoot’ Flaw Gives Hackers Root Linux Access

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

4/23/2026

CISA: U.S. Agency Breached Through Cisco Vulnerability, FIRESTARTER Backdoor Allowed Access Through March

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

UK Warns of Chinese Hackers Using Proxy Networks to Evade Detection

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

Dev Targeted by Sophisticated Job Scam: ‘I Let My Guard Down, and Ran the Freaking Code’

Anthropic’s Mythos Breach Was Humiliating

‘Zealot’ Shows What AI’s Capable of in Staged Cloud Attack

Google Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AI

UK Regulator Closes Loophole That Allowed Rogue Companies to Track Phone Users’ Location

Surveillance Companies Exploiting Telecom System to Spy on Targets’ Locations, Research Shows

Age Checks Could Turn Internet Into an ID Checkpoint, Complains Proton CEO
Cosmetics Giant Rituals Discloses Data Breach Affecting Customers

Medical Data of 500,000 Britons Put Up for Sale on Chinese Website

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Trigona Ransomware Attacks Use Custom Exfiltration Tool to Steal Data

In a First, Ransomware Family Kyber Is Confirmed to Be Quantum-Safe

Hackers Exploit File Upload Bug in Breeze Cache WordPress Plugin

CISA Orders Feds to Patch BlueHammer Flaw Exploited as Zero-Day

Trump’s Pick for CISA Director Withdraws From Consideration

U.S. Sanctions Cambodian Senator for Millions Earned Through Scam Compounds

House Republicans Unveil Data Privacy Law That Would Override State Protections

4/22/2026

Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

China’s Cyber Capabilities Now Equal to the U.S., Warns Dutch Intelligence

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

North Korean Hackers Siphon More Than $12 Million From Crypto Users in Sprawling Campaign

Anthropic’s Mythos Rollout Has Missed America’s Cybersecurity Agency

Anthropic’s Most Dangerous AI Model Just Fell Into the Wrong Hands

Anthropic’s Super-Scary Bug Hunting Model Mythos Is Shaping up to Be a Nothingburger

Microsoft to Integrate Anthropic’s Mythos Into Its Security Development Program

UK Financial Sector Prepared for Mythos and Others, Says BOE Co-Chaired Group

UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns

UK Government Says 100 Countries Have Spyware That Can Hack People’s Phones

Scotland Yard Can Keep Using Live Facial Recognition on People in London, Say Judges

Google Unleashes Even More AI Security Agents to Fight the Baddies

Spain Dismantles Major $4.7m Manga Piracy Platform, Arrests Four
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

Surge in Silent Subject Phishing Attacks Targets VIP Users

MacOS Native Tools Enable Stealthy Enterprise Attacks

Kyber Ransomware Gang Toys With Post-Quantum Encryption on Windows

New GoGra Malware for Linux Uses Microsoft Graph API for Comms

Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

New Npm Supply-Chain Attack Self-Spreads to Steal Auth Tokens

New Mirai Campaign Exploits RCE Flaw in EoL D-Link Routers

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

Over 1,300 Microsoft Sharepoint Servers Vulnerable to Spoofing Attacks

Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug

Apple Fixes iOS Bug That Retained Deleted Notification Data

New Defense Department Cyber Strategy Imminent, Official Says

French Police Arrest Suspected Hacker Behind Dozens of Data Breaches

4/21/2026

Nation-States Want to Cause Harm, Not Just Steal Cash – Stop Handing Your Cyber Defenses to the Cheapest Contractor

Ukraine Busts ‘Bot Farm’ Supplying Thousands of Fake Telegram Accounts to Russian Spies

EU Targets Two Russian Propaganda Networks With New Sanctions

They Built a Legendary Privacy Tool. Now They’re Sworn Enemies

UK Probes Telegram, Teen Chat Sites Over CSAM Sharing Concerns

Meta Is Sued Over Scam Ads on Facebook and Instagram

Murder, She Wrote: Ex-FBI Chief Wants Some Ransomware Crims Charged With Homicide

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

Krebs: ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
French Gov’t Agency Confirms Breach as Hacker Offers to Sell Data

New Lotus Data Wiper Used Against Venezuelan Energy, Utility Firms

NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs

Actively Exploited Apache ActiveMQ Flaw Impacts 6,400 Servers

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution

Mozilla Used Anthropic’s Mythos to Find and Fix 271 Bugs in Firefox

AI Hacking Tools Like Mythos Can Be ‘Net Positive’ Says Top Cyber Official

4/20/2026

The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad

Apple Hardware Executive John Ternus to Succeed Tim Cook as CEO

Banking Industry Scrambles for Anthropic’s Mythos as Global Regulators Review Risks

Claude Desktop Changes App Access Settings for Browsers You Don’t Even Have Installed Yet

Scot Becomes Second Scattered Spider-Linked Crook to Plead Guilty in U.S.

Italian Regulator Fines National Postal Service Orgs $15 Million for Data Privacy Violations

Elon Musk Fails to Appear for Questioning by French Police Over Sexualized AI Images on X

Bluesky Blames App Outage on ‘Sophisticated’ DDoS Attack

Mastodon Says Its Flagship Server Was Hit by a DDoS Attack
KelpDAO Suffers $290 Million Heist Tied to Lazarus Hackers

Cyberattack at French Identity Document Agency May Have Exposed Personal Data

Seiko USA Website Defaced as Hacker Claims Customer Data Theft

China’s Apple App Store Infiltrated by Crypto-Stealing Wallet Apps

Microsoft: Teams Increasingly Abused in Helpdesk Impersonation Attacks

Formbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid Detection

The Gentlemen Ransomware Now Uses SystemBC for Bot-Powered Attacks

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

4/17-19/2026

Ukraine Confirms Suspected APT28 Campaign Targeting Prosecutors, Anti-Corruption Agencies

NSA Using Anthropic’s Mythos Despite Blacklist

The Shocking Secrets of Madison Square Garden’s Surveillance Machine

Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

Ransomware Attack Continues to Disrupt Healthcare in London Nearly Two Years Later

Grinex Exchange Blames “Western Intelligence” for $13.7M Crypto Hack

Man Gets 30 Months for Selling Thousands of Hacked DraftKings Accounts

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

Just Like Phishing for Gullible Humans, Prompt Injecting Ais Is Here to Stay
Cloud Development Platform Vercel Was Hacked

City of Tallahassee (FL) Technology Systems Hit by Cyberattack Friday, Officials Report No Operational Impacts

Apple Account Change Alerts Abused to Send Phishing Emails

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Critical Flaw in Protobuf Library Enables JavaScript Code Execution

NIST to Stop Rating Non-Priority Flaws Due to Volume Increase

Time for Government, Business Leaders to Figure Out AI Cybersecurity Regulation

4/16/2026

ZionSiphon Malware Designed to Sabotage Water Treatment Systems

North Korean APT38 Targets macOS Users in Latest Heist

White House Works to Give U.S. Agencies Anthropic Mythos AI

Anthropic Rolls Out Claude Opus 4.7, an AI Model That Is Less Risky Than Mythos

OpenAI Launches AI Model GPT-Rosalind for Life Sciences Research

Google Expands Gemini AI Use to Fight Malicious Ads on Its Platform

Entry-Level Cyber Workers Are Losing Out to AI

New ATHR Vishing Platform Uses AI Voice Agents for Automated Attacks

Europe’s Online Age Verification App Is Here

European Police Email 75,000 People Asking Them to Stop DDoS Attacks

U.S. Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea

Russia-Linked Grinex Crypto Exchange Suspends Operations After Hack

Cargo Thieving Hackers Running Sophisticated Remote Access Campaigns, Researchers Find
Cookeville Medical Center (TN) Notifies Patients After July 2025 Ransomware Attack

Fashion Retailer Express Left Customers’ Personal Data and Order Details Exposed to the Internet

Data Breach at Edtech Giant McGraw Hill Affects 13.5 Million Accounts

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Operation PowerOFF Identifies 75k DDoS Users, Takes Down 53 Domains

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

APK Malformation Found in Thousands of Android Malware Samples

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

New Microsoft Defender “RedSun” Zero-Day PoC Grants SYSTEM Privileges

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

Microsoft’s Original Windows Secure Boot Certificate Is Expiring

4/15/2026

Russia-Linked Hackers Compromised Scores of Ukrainian Prosecutors’ Email Accounts

Sweden Blames Russian Hackers for Attempting ‘Destructive’ Cyberattack on Thermal Plant

Researchers Spot Surge in Brute-Force Attacks from Middle East

Trump Backs Government AI Safeguards in Banking System, Acknowledges Risks

ECB to Quiz Bankers About Risks of Anthropic’s New AI Model

AI Companies to Play Bigger Role in CVE Program, Says CISA

OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI

The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought

Teen Arrested in Northern Ireland Over Cyberattack on School Network

French Cops Free Mother and Son After 20-Hour Crypto Kidnap Ordeal
New AgingFly Malware Used in Attacks on Ukraine Gov’t, Hospitals

Signed Adware Operation Disables Antivirus Across 23,000 Hosts

WordPress Plugin Suite Hacked to Push Malware to Thousands of Sites

CISA Flags Windows Task Host Vulnerability as Exploited in Attacks

Critical Nginx-ui MCP Flaw Actively Exploited in the Wild

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

Microsoft Pays $2.3M for Cloud and AI Flaws at Zero Day Quest

NIST to Limit Work on CVE Entries as Submissions Surge

Big Tech Fails to Opt-Out Users Requesting Not to Be Tracked Much of the Time, New Research Says

4/14/2026

Russia Appears to Block Social Media Platform Bluesky Amid Wider Internet Restrictions

In the Wake of Anthropic’s Mythos, OpenAI Has a New Cybersecurity Model—And Strategy

UK Gov’s Mythos AI Tests Help Separate Cybersecurity Threat From Hype

No Honor Among Thieves as 0APT Threatens Rival Ransomware Gang Krybit

Fake Ledger Live App on Apple’s App Store Stole $9.5m in Crypto

Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market

Teen Hacker Sentenced to Federal Prison After Major PowerSchool Data Breach Exposes Student Records

Virginia Enacts Ban on Precise Geolocation Data Sales as Momentum for Similar Prohibitions Builds

CISOs Urged to Innovate with Talent Retention as Job Satisfaction Declines

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
McGraw-Hill Confirms Data Breach Following Extortion Threat

Crypto-Exchange Kraken Extorted by Hackers After Insider Breach

Triad Nexus Expands Global Fraud Operations Despite U.S. Sanctions

New ‘JanaWare’ Ransomware Targeting Turkish Citizens as Cybercriminal Ecosystem Fragments

Malicious Chrome Extensions Campaign Exposes User Data

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

Krebs: Patch Tuesday, April 2026 Edition

Microsoft Adds Windows Protections for Malicious Remote Desktop Files

Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

4/13/2026

North Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware

Iran-Linked Group Handala Claims to Have Breached Three Major Uae Organizations

Anthropic Talking to the Trump Administration About Its Next AI Model

‘It Reads Like a Spy Novel’: $280 Million Theft From Drift Involved North Korean Fake Companies, Cutouts

The Dumbest Hack of the Year Exposed a Very Real Problem

Meta Is Warned That Facial Recognition Glasses Will Arm Sexual Predators

FBI Takedown of W3LL Phishing Service Leads to Developer Arrest

Majority of Australian Youth Still Use Social Media Despite Ban, Researchers Find

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
Booking.com Warns Reservation Data May Have Checked Out With Intruders

Gym Giant Basic-Fit Confirms Data on a Million Members Stolen in Cyberattack

Stolen Rockstar Games Analytics Data Leaked by Extortion Gang

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

Fake Linux Leader Using Slack to Con Devs Into Giving up Their Secrets

Mirax Android Trojan Turns Devices Into Residential Proxy Node

The Silent “Storm”: New Infostealer Hijacks Sessions, Decrypts Server-Side

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

Critical Flaw in wolfSSL Library Enables Forged Certificate Use

CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

4/10-12/2026

Nearly 4,000 U.S. Industrial Devices Exposed to Iranian Cyberattacks

Hungarian Government Creds Left in the Safe Hands of ‘FrankLampard’

Vance, Bessent Questioned Tech Giants on AI Security Before Anthropic’s Mythos Release

Your Push Notifications Aren’t Safe From the FBI

How the Internet Broke Everyone’s Bullshit Detectors

Over 20,000 Crypto Fraud Victims Identified in International Crackdown

UK Government Threatens Tech Bosses With Jail Time if They Do Not Adequately Fight Nudification Tools

Senator Grassley Launches Inquiry Into 8 Tech Giants for Failures to Adequately Report CSAM

Commvault Explores Sale After Takeover Interest, Sources Say

Florida Investigates OpenAI for Role ChatGPT May Have Played in Deadly Shooting

Google Rolls Out Gmail End-To-End Encryption on Mobile Devices
OpenAI Identifies Security Issue Involving Third-Party Tool, Says User Data Was Not Accessed

Hackers Give Rockstar Games Until April 14 to Pay for Stolen Data

Rockstar Games Says Hack Will Have ‘No Impact’

Spring Lake Park Schools (MN) Closed Monday Due to Suspected Ransomware Incident

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

Microsoft: Canadian Employees Targeted in Payroll Pirate Attacks

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

4/9/2026

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

3 Russian Submarines Detected Near Britain Were Spying, UK. Says

Russia Accuses Former Radio Free Europe Journalist of Aiding Cyberattacks for Ukraine

Do Ceasefires Slow Cyberattacks? History Suggests Not

Politicians Are Spending More Money on Security as They Increasingly Become Targets

Crypto? Huh. Good Gosh Y’all, What Is It Good For? $45M in This Case

Microsoft Suspends Dev Accounts for High-Profile Open Source Projects

Google API Keys Quietly Gain Access to Gemini on Android Devices

U.S. Software Stocks Slump on Renewed AI Disruption Jitters
Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets

Treasury Department Announces Crypto Industry Cyber Threat Sharing Initiative

Cybercriminals Target Accountants to Drain Russian Firms’ Bank Accounts

STX RAT Targets Finance Sector With Advanced Stealth Tactics

Hackers Use Pixel-Large SVG Trick to Hide Credit Card Stealer

Smart Slider Updates Hijacked to Push Malicious WordPress, Joomla Versions

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Google Chrome Adds Infostealer Protection Against Session Cookie Theft

4/8/2026

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

‘We Were Not Ready for This’: Lebanon’s Emergency System Is Hanging by a Thread

Two Prominent Egyptian Journalists Targeted With Elaborate Spearphishing Campaign

Hack-For-Hire Group Caught Targeting Android Devices and iCloud Backups

Who Is Satoshi Nakamoto? My Quest to Unmask Bitcoin’s Creator

British Cryptographer Adam Back Denies NYT Report That He Is Bitcoin Creator Satoshi Nakamoto

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Criminal Wannabes Even More Dangerous Than the Pros, Says Ex-FBI Cyber Chief

AI Is Forcing a Rethink in Cybersecurity

AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties

CIA Director Quietly Elevated Agency’s Cyber Espionage Division

TikTok Removes Covert Networks Ahead of Hungary Vote as Disinformation Concerns Grow
Trove of Sensitive LAPD Records Leaked in Data Hack of City Attorney’s Office

Minnesota Governor Sends National Guard to Winona County After Cyberattack

Dutch Healthcare Software Vendor ChipSoft Goes Dark After Ransomware Attack

NHS Scotland-Linked Domains Caught Serving Porn and Dodgy Sports Streams

Passport Numbers for More Than 300,000 Leaked During December Eurail Data Breach

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

Google: New UNC6783 Hackers Steal Corporate Zendesk Support Tickets

New macOS Stealer Campaign Uses Script Editor in ClickFix Attack

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

CISA Orders Feds to Patch Exploited Ivanti EPMM Flaw by Sunday

Hackers Exploit Critical Flaw in Ninja Forms WordPress Plugin

Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years

4/7/2026

Iran-Linked Hackers Are Sabotaging U.S. Energy and Water Infrastructure

Krebs: Russian Group APT28 Hacked Routers to Steal Microsoft Office Tokens

Hundreds of Orgs Compromised Daily in Microsoft Device Code Phishing Attacks

National Security Veterans Warn Against Delays in FISA 702 Reauthorization

FBI: Americans Lost a Record $21 Billion to Cybercrime Last Year

The College Student—and His Cat Meme—Who Hunted the World’s Biggest Cyberweapon

Anthropic Limits Mythos AI Rollout Over Fears Hackers Could Use Model for Cyberattacks

Anthropic Teams up With Its Rivals to Keep AI From Hacking Everything
Cyberattack on Telecom Giant Rostelecom Disrupts Internet Services Across Russia

Cyberattack Hits Northern Ireland’s Centralized School Network, Disrupting Access for Thousands

Massachusetts Hospital Turning Ambulances Away After Cyberattack

Snowflake Customers Hit in Data Theft Attacks After SaaS Integrator Breach

GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltration

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

Max Severity Flowise RCE Vulnerability Now Exploited in Attacks

4/6/2026

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

Krebs: Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

Suspect in Hacking of Climate Activists Is Extradited to New York

First Stalkerware Maker Prosecuted Since 2014 Receives No Jail Time

Drift $280M Crypto Theft Linked to 6-Month In-Person Operation

FBI: Cyber Fraud Surges to $17.6 Billion in Losses as Scams, Crypto Theft Soar

Embattled Startup Delve Has ‘Parted Ways’ With Y Combinator

A.I. Is on Its Way to Upending Cybersecurity
Major Outage Hits Russian Banking Apps, Metro Payments Across Regions

Hackers Threaten to Leak Data After Cyberattack on German Party Die Linke

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

New GPUBreach Attack Enables System Takeover via GPU Rowhammer

Microsoft Links Medusa Ransomware Affiliate to Zero-Day Attacks

CISA Orders Feds to Patch Exploited Fortinet EMS Flaw by Friday

Disgruntled Researcher Leaks “BlueHammer” Windows Zero-Day Exploit

Big Tech Vows to Continue Csam Scanning in Europe Despite Expiration of Law Allowing It

4/3-5/2026

CERT-EU: European Commission Hack Exposes Data of 30 EU Entities

EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking Group

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

Chinese Firms Market Iran War Intelligence ‘Exposing’ U.S. Forces

Trump Officials Try to Fight Foreign Disinformation They Once Dismissed

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The Hack That Exposed Syria’s Sweeping Security Failures

LinkedIn Secretly Scans for 6,000+ Chrome Extensions, Collects Data

Man Admits to Locking Thousands of Windows Devices in Extortion Plot

Researchers Didn’t Want to Glamorize Cybercrims. So They Roasted Them

Ukraine Warns Russian Hackers Are Revisiting Past Breaches to Prepare New Attacks

Act-of-War Clauses Cloud Cyber Insurance Coverage

White House Says Trump Orders Back Pay From Shutdown to All Homeland Security Employees

Trump Wants to Take a Battle Axe to CISA Again and Slash $707M From Budget
Massachusetts Emergency Communications System Impacted by Cyberattack

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Anyone With a Link Can View Your Granola Notes by Default

Die Linke German Political Party Confirms Data Stolen by Qilin Ransomware

Cyberattack Targeted Italy’s Uffizi but Nothing Stolen, Museum Says

Hims & Hers Warns of Data Breach After Zendesk Support Ticket Breach

Venom: New Phishing Platform Used in Credential Theft Campaigns Against C-Suite Execs

Traffic Violation Scams Switch to QR Codes in New Phishing Texts

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Device Code Phishing Attacks Surge 37X as New Kits Spread Online

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Hackers Exploit React2Shell in Automated Credential Theft Campaign

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

FCC Proposes $4.5 Million Fine for Voice Service Provider Hosting ‘Suspicious’ Foreign Call Traffic

4/2/2026

Drift Crypto Platform Confirms $280 Million Stolen in Hack as Researchers Point Finger at North Korea

Iran Says It Hit Oracle Facilities in UAE

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

The Company’s Biggest Security Hole Lived in the Breakroom

They Thought They Were Downloading Claude Code Source. They Got a Nasty Dose of Malware Instead

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

Residential Proxies Evaded IP Reputation Checks in 78% of 4B Sessions

Fate of DHS Funding Uncertain as U.S. Congress Republicans Decide Next Steps

Trump Says He’ll Sign Order to Pay All DHS Employees as Shutdown Continues

French Senate Passes Bill That Would Ban Children Under 15 From Social Media

Boards Are Falling Short on Cybersecurity

RSAC 2026: AI Dominates, But Community Remains Key to Security
Medtech Giant Stryker Fully Operational After Data-Wiping Attack

Money Transfer App Duc Exposed Thousands of Driver’s Licenses and Passports to the Open Web

Oklahoma Tax Commission Data Breach Raises Concerns

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

New ‘Storm’ Infostealer Remotely Decrypts Stolen Credentials

New CrystalRAT Malware Adds RAT, Stealer and Prankware Features

Researchers Observe Sub-One-Hour Ransomware Attacks

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

New Progress ShareFile Flaws Can be Chained in Pre-Auth RCE Attacks

Over 14,000 F5 BIG-IP APM Instances Still Exposed to RCE Attacks

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

Critical Cisco IMC Auth Bypass Gives Attackers Admin Access

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

4/1/2026

Chinese Hackers TA416 Target European Governments in Espionage Campaigns

FBI Warns Against Using Chinese Mobile Apps Due to Privacy Risks

Cambodia Extradites Alleged Cyber Scam Linchpin to China as Crackdown Intensifies

Romania Under Daily Barrage of Cyberattacks, Defense Minister Says

Cyberattacks Intensify Pressure on Latin American Governments

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

The Axios Hack: What to Know

Google Drive Ransomware Detection Now on by Default for Paying Users

Apple Will Push Out Rare ‘Backported’ Patches to Protect iOS 18 Users From DarkSword Hacking Tool

The Forgotten Endpoint: Security Risks of Dormant Devices

Are We Training AI Too Late?
Hasbro Says It Was Hacked, and May Take ‘Several Weeks’ to Recover

Nissan Says Stolen Data Came From Third-Party Vendor After Hacking Group Claims Breach

Mercor Confirms Security Incident Tied to LiteLLM Supply Chain Attack

Crypto Platform Drift Suspends Services After Millions Stolen in Security Incident

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

New EvilTokens Service Fuels Microsoft Device Code Phishing Attacks

‘NoVoice’ Android Malware on Google Play Infected 2.3 Million Devices

New Venom Stealer MaaS Platform Automates Continuous Data Theft

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

3/31/2026

Iran’s Revolutionary Guard Threatens to Strike U.S. Companies in Mideast

Iran Threatens to Start Attacking Major U.S. Tech Firms on April 1

Iran’s Hackers Are on the Offensive Against the U.S. and Israel

Iran Targets M365 Accounts With Password-Spraying Attacks

North Korea-Linked Hack Hits Largely Invisible Software That Powers Online Services

Critical Compromise: Axios NPM Library With 100M Weekly Downloads Is Delivering Malware

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

Pro-Russian Hackers Pose as Ukraine’s Cyber Agency to Target Government, Businesses

Employee Data Breaches Surge to Seven-Year High

Cybercriminals Exploit Tax Season With New Phishing Tactics

Hacker Charged With Stealing $53 Million From Uranium Crypto Exchange
Claude Code Leak Exposes a Tamagotchi-Style ‘Pet’ and an Always-on Agent

Claude Code Source Code Accidentally Leaked in NPM Package

Cisco Source Code Stolen in Trivy-Linked Dev Environment Breach

Hackers Hit Minot Water Treatment Plant (ND) Server in Ransomware Case, FBI Investigating

Dutch Finance Ministry Takes Treasury Banking Portal Offline After Breach

Don’t Open That WhatsApp Message, Microsoft Warns

Leak Bazaar: New Criminal Service Plans to Monetize Data Stolen by Ransomware Gangs

CISA Orders Feds to Patch Actively Exploited Citrix Flaw by Thursday

GIGABYTE Control Center Vulnerable to Arbitrary File Write Flaw

Claude AI Finds Vim, Emacs RCE Bugs that Trigger on File Open

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google’s Vertex AI Has an Over-Privileged Problem