CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 19:00 15/04/2026 UTC
  • Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws Microsoft's multi-month Patch Tuesday campaign continues with the April 2026 release addressing 167 security vulnerabilities in Windows and related software, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Nearly 60% of the patched flaws are elevation-of-privilege bugs, marking the highest proportion in eight months, while eight Critical vulnerabilities were addressed, including unauthenticated remote code execution flaws in Windows IKE Service Extensions (CVE-2026-33824, CVSS 9.8) and secure tunneling components (CVE-2026-33827, CVSS 8.1). The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), changing build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). Windows 10 Enterprise LTSC and ESU participants received the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). Critical updates addressed CVE-2026-32201 (actively exploited SharePoint Server spoofing vulnerability enabling phishing and unauthorized data manipulation) and CVE-2026-33825 (publicly disclosed Microsoft Defender elevation-of-privilege flaw granting SYSTEM privileges). Additional critical risks included CVE-2026-33824 (Windows IKE Service Extensions unauthenticated RCE, CVSS 9.8) and CVE-2026-33827 (secure tunneling RCE, CVSS 8.1). Nearly 60% of patched flaws were elevation-of-privilege bugs, with 93 such vulnerabilities addressed. Read
  • Windows Task Host privilege escalation flaw (CVE-2025-60710) added to CISA's Known Exploited Vulnerabilities catalog A Windows Task Host privilege escalation vulnerability (CVE-2025-60710) is being actively exploited by attackers to gain SYSTEM privileges on Windows 11 and Windows Server 2025 systems. The vulnerability, stemming from a link following weakness in the Host Process for Windows Tasks, allows local attackers with basic user permissions to escalate privileges through low-complexity attacks. Microsoft patched the flaw in November 2025, but exploitation has now been confirmed in the wild. CISA has mandated Federal Civilian Executive Branch agencies to remediate within two weeks under BOD 22-01. Read
  • Microsoft awards $2.3M for cloud and AI vulnerabilities identified during Zero Day Quest 2026 Microsoft awarded $2.3 million to security researchers following the 2026 Zero Day Quest hacking contest, where over 80 high-impact cloud and AI security vulnerabilities were identified. The event, held at Microsoft’s Redmond campus, engaged researchers from 20+ countries, including students and academics, who tested within authorized environments to identify critical flaws such as credential exposure, SSRF chains, and cross-tenant access risks. No customer data or tenant systems were accessed during testing. The total payout marks a significant investment in Microsoft’s Secure Future Initiative (SFI), aimed at improving Cloud and AI security by integrating findings across its engineering practices. Read
  • ENISA advancement to top-level CVE Numbering Authority status under review The European Union Agency for Cybersecurity (ENISA) is undergoing onboarding to achieve top-level root Common Vulnerabilities and Exposures (CVE) Numbering Authority (TL-Root CNA) status, as announced by Nuno Rodrigues Carvalho, Head of Sector for Incidents and Vulnerability Services at ENISA, during VulnCon26 in Scottsdale, Arizona on April 14, 2026. If granted, ENISA will join CISA and MITRE as the third TL-Root CNA, enabling it to manage the CVE Program alongside them, including global policy setting, consistency enforcement across Root CNAs and CNAs, and representation in the program’s Board. ENISA aims to achieve this status by 2026 or early 2027. Read
  • Dragon Boss signed adware disables security products on 23,000+ hosts via WMI persistence and scheduled tasks A signed adware operation attributed to Dragon Boss Solutions LLC disabled antivirus and endpoint security products on more than 23,000 hosts across 124 countries by deploying a PowerShell-based payload (ClockRemoval.ps1) that terminated processes, uninstalled security tools, and blocked reinstallation. The campaign abused a legitimate code-signing certificate and an update mechanism to deliver MSI-based payloads, leveraging SYSTEM privileges, WMI event subscriptions, and scheduled tasks to maintain persistence and evade detection. High-value targets included 221 universities, 41 operational technology networks, 35 government entities, and three healthcare organizations. Read
  • Cyber-Enabled Cargo Theft Leveraging GPS Spoofing and Fraudulent Broker Impersonation in North American Transportation Sector North American transportation logistics faces escalating cyber-enabled cargo theft targeting high-value freight, with attackers exploiting GPS spoofing, fraudulent broker identities, and stolen credentials to divert shipments. Large trucking fleets operate as interconnected networks with vulnerable telematics, onboard systems, and enterprise infrastructure, creating multiple attack surfaces. Cybercriminals weaponize operational and cybersecurity weaknesses to impersonate legitimate brokers, manipulate GPS tracking, and coerce unwitting drivers into facilitating theft. The financial impact of cargo crime exceeds $725 million in reported losses for 2025 alone, with high-value goods such as specialty alcohol targeted for diversion and resale on black markets or counterfeit retail platforms. Read
  • Compromised Chrome Extensions Campaign Targeting Google and Telegram Accounts A coordinated campaign of 108 malicious Chrome extensions has been identified, targeting approximately 20,000 users to steal Google and Telegram session data via a shared command-and-control (C2) infrastructure. The extensions exfiltrate sensitive credentials, inject arbitrary scripts, and strip security headers while masquerading as legitimate utilities under five publisher identities. At least 54 extensions steal Google account identities via OAuth2, 45 contain universal backdoors opening arbitrary URLs on startup, and some target Telegram Web sessions every 15 seconds. The campaign was first reported on April 14, 2026, with security researchers at Socket uncovering coordinated backend systems and shared operational patterns across all extensions. The operation functions as a Malware-as-a-Service (MaaS) model, allowing third parties to access stolen data and active sessions. All 108 extensions remained available at discovery, prompting takedown requests. Additional details confirm the use of a central backend hosted on a Contabo VPS with subdomains for session hijacking, identity collection, command execution, and monetization, and that the campaign is attributed to Russian-speaking actors based on code comments. Read
Last updated: 14:00 15/04/2026 UTC
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors. Read
  • Unauthenticated remote code execution flaw in Magento and Adobe Commerce via PolyShell polyglot uploads Since mid-March 2026, a critical unauthenticated remote code execution flaw named PolyShell has affected all supported versions of Magento Open Source and Adobe Commerce (version 2), enabling attackers to upload polyglot files via the REST API and achieve code execution. Adobe has only released a patch in the alpha release of version 2.4.9, leaving production deployments vulnerable. Exploitation is now actively occurring in the wild, with mass scanning activity since March 19, 2026, and successful compromises detected in 56.7% of all vulnerable stores. A new wave of attacks injects a 1x1-pixel SVG element with an onload handler containing a base64-encoded skimmer payload, executed via setTimeout to avoid detection. The malware intercepts checkout clicks, displays a fake 'Secure Checkout' overlay with card and billing fields, and validates payment data in real time using the Luhn algorithm. Stolen data is exfiltrated to six exfiltration domains hosted at IncogNet LLC in the Netherlands via XOR-encrypted, base64-obfuscated JSON. Indicators of compromise include the _mgx_cv key in browser localStorage and requests to /fb_metrics.php. Adobe has not yet released a production patch, and sixteen exfiltration domains and IP address 23.137.249.67 are now associated with these attacks. Read
  • Unauthenticated RCE Vulnerability in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197) A high-severity unauthenticated remote code execution (RCE) vulnerability (CVE-2026-34197) was discovered in Apache ActiveMQ Classic, affecting versions prior to 5.19.4 and all versions from 6.0.0 to 6.2.3. The flaw permits attackers to execute arbitrary OS commands by abusing the Jolokia management API's addNetworkConnector function to fetch remote Spring XML files during broker initialization. Researchers uncovered the vulnerability using Anthropic’s Claude AI, which identified 80% of the exploit path in approximately 10 minutes with minimal human input. Horizon3’s Naveen Sunkavally reported the issue to Apache on March 22, 2026, and it was patched on March 30, 2026. Exploitation indicators include ActiveMQ broker logs showing internal VM transport connections with brokerConfig=xbean:http:// query parameters and warnings about configuration problems indicating payload execution. The flaw builds on a prior issue (CVE-2024-32114), which removed authentication requirements in versions 6.0.0-6.1.1, while other versions require default credentials (admin:admin). Despite the availability of the newer Artemis branch, ActiveMQ Classic remains widely deployed in enterprise, web backends, government, and Java-based corporate systems. Read
  • Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency A North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman via a two-week social engineering campaign and published malicious axios versions v1.14.1 and v0.30.4 containing the plain-crypto-js dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack’s blast radius has expanded beyond developer ecosystems after OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious axios library, prompting OpenAI to revoke its macOS app certificate as a precaution despite no evidence of compromise. This incident underscores the escalating risks of supply chain compromises, with Google warning that hundreds of thousands of stolen secrets from the axios and Trivy attacks could fuel further software supply chain attacks, SaaS compromises, ransomware, and cryptocurrency theft. The campaign reflects an industrialized social engineering model targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building and matured attacker tooling. Additional supply chain attacks in March 2026, such as the compromise of Trivy by TeamPCP (UNC6780), have compounded the threat landscape, exposing organizations like the European Commission and Mercor to downstream risks. Read
  • Six Android Malware Families Target Pix, Banking Apps, and Crypto Wallets Six Android malware families continue to target Pix payments, banking apps, and cryptocurrency wallets, with Mirax expanding its capabilities beyond financial theft. The Mirax trojan now integrates residential proxy functionality, enabling attackers to route malicious traffic through compromised devices and evade geographic restrictions. Mirax, previously identified as a banking trojan offered through a malware-as-a-service ecosystem, now operates under a restricted MaaS model targeting Spanish-speaking users with campaigns exceeding 200,000 accounts via social media advertisements. It provides full real-time device control, dynamic fake overlays fetched from C2 servers, and surveillance features including keylogging and lock screen detail collection. Distribution relies on social engineering via illegal streaming app promotions, with malware hosted on GitHub and device evasion techniques. Compromised devices are repurposed as residential proxies for broader cybercriminal activities, including account takeovers and anonymized network attacks. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns relied on malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms like Cloudflare Pages and Squarespace. AMOS has been delivered through disk images, obfuscated shell scripts, and in-memory payloads, expanding from Terminal-based ClickFix tactics to abuse trusted macOS applications. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 that blocks pasted command execution and warns users of risks, disrupting ClickFix attack chains. A new campaign observed in April 2026 by Jamf researchers now abuses the built-in Script Editor application to bypass these protections. The campaign uses fake Apple-themed disk cleanup guides to trick users into launching Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer. The new Script Editor-based ClickFix variation enables theft of Keychain data, browser autofill information, cryptocurrency wallet extensions, and system details without requiring Terminal interaction. AMOS continues to expand its capabilities, now including a backdoor component for persistent access to compromised systems. Read
  • Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws Microsoft's multi-month Patch Tuesday campaign continues with the April 2026 release addressing 167 security vulnerabilities in Windows and related software, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Nearly 60% of the patched flaws are elevation-of-privilege bugs, marking the highest proportion in eight months, while eight Critical vulnerabilities were addressed, including unauthenticated remote code execution flaws in Windows IKE Service Extensions (CVE-2026-33824, CVSS 9.8) and secure tunneling components (CVE-2026-33827, CVSS 8.1). The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), changing build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). Windows 10 Enterprise LTSC and ESU participants received the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). Critical updates addressed CVE-2026-32201 (actively exploited SharePoint Server spoofing vulnerability enabling phishing and unauthorized data manipulation) and CVE-2026-33825 (publicly disclosed Microsoft Defender elevation-of-privilege flaw granting SYSTEM privileges). Additional critical risks included CVE-2026-33824 (Windows IKE Service Extensions unauthenticated RCE, CVSS 9.8) and CVE-2026-33827 (secure tunneling RCE, CVSS 8.1). Nearly 60% of patched flaws were elevation-of-privilege bugs, with 93 such vulnerabilities addressed. Read

Latest updates

Browse →

Antivirus termination via signed PUP update chain enabled by unregistered domains

Updated: · First: 15.04.2026 20:59 · 📰 1 src / 1 articles

A signed adware ecosystem leveraging Dragon Boss Solutions' browsers deployed SYSTEM-level antivirus-killing scripts across at least 23,500 hosts in 124 countries, including high-value targets in education, utilities, government, healthcare, and critical infrastructure. The campaign abuses Advanced Installer’s update mechanism to silently deliver MSI and PowerShell payloads, including the ClockRemoval.ps1 script that disables multiple AV products by terminating services, deleting files, uninstalling software, and blocking vendor domains via hosts file modifications. The primary update domain remained unregistered until researchers sinkholed it, exposing a latent risk where arbitrary payloads could have been delivered to already compromised systems lacking AV protections.

Microsoft awards $2.3M for cloud and AI vulnerabilities identified during Zero Day Quest 2026

Updated: · First: 15.04.2026 19:20 · 📰 1 src / 1 articles

Microsoft awarded $2.3 million to security researchers following the 2026 Zero Day Quest hacking contest, where over 80 high-impact cloud and AI security vulnerabilities were identified. The event, held at Microsoft’s Redmond campus, engaged researchers from 20+ countries, including students and academics, who tested within authorized environments to identify critical flaws such as credential exposure, SSRF chains, and cross-tenant access risks. No customer data or tenant systems were accessed during testing. The total payout marks a significant investment in Microsoft’s Secure Future Initiative (SFI), aimed at improving Cloud and AI security by integrating findings across its engineering practices.

ENISA advancement to top-level CVE Numbering Authority status under review

Updated: · First: 15.04.2026 18:31 · 📰 1 src / 1 articles

The European Union Agency for Cybersecurity (ENISA) is undergoing onboarding to achieve top-level root Common Vulnerabilities and Exposures (CVE) Numbering Authority (TL-Root CNA) status, as announced by Nuno Rodrigues Carvalho, Head of Sector for Incidents and Vulnerability Services at ENISA, during VulnCon26 in Scottsdale, Arizona on April 14, 2026. If granted, ENISA will join CISA and MITRE as the third TL-Root CNA, enabling it to manage the CVE Program alongside them, including global policy setting, consistency enforcement across Root CNAs and CNAs, and representation in the program’s Board. ENISA aims to achieve this status by 2026 or early 2027.

Windows Task Host privilege escalation flaw (CVE-2025-60710) added to CISA's Known Exploited Vulnerabilities catalog

Updated: · First: 15.04.2026 17:51 · 📰 1 src / 1 articles

A Windows Task Host privilege escalation vulnerability (CVE-2025-60710) is being actively exploited by attackers to gain SYSTEM privileges on Windows 11 and Windows Server 2025 systems. The vulnerability, stemming from a link following weakness in the Host Process for Windows Tasks, allows local attackers with basic user permissions to escalate privileges through low-complexity attacks. Microsoft patched the flaw in November 2025, but exploitation has now been confirmed in the wild. CISA has mandated Federal Civilian Executive Branch agencies to remediate within two weeks under BOD 22-01.

Authentication bypass in nginx-ui via MCP-enabled API leading to remote server compromise

Updated: 15.04.2026 17:45 · First: 15.04.2026 16:00 · 📰 2 src / 2 articles

A critical authentication bypass vulnerability in nginx-ui (CVE-2026-33032, CVSS 9.8) allows unauthenticated, network-adjacent attackers to gain full control of nginx servers via the MCP-enabled /mcp_message endpoint. The flaw, disclosed by Pluto Security in March 2026 and patched in version 2.3.4, stems from missing authentication middleware on an endpoint processing privileged operations such as configuration writes and server reloads. Public exposure includes over 2,600 internet-accessible instances and over 430,000 Docker image pulls, with exploitation confirmed in the wild. The issue reflects a broader pattern of AI integration endpoints (MCP) introducing security gaps, as Pluto Security also disclosed a second critical MCP-related flaw in 2026. Technical details and proof-of-concept exploits are publicly available, heightening the risk of abuse.

Dragon Boss signed adware disables security products on 23,000+ hosts via WMI persistence and scheduled tasks

Updated: · First: 15.04.2026 17:40 · 📰 1 src / 1 articles

A signed adware operation attributed to Dragon Boss Solutions LLC disabled antivirus and endpoint security products on more than 23,000 hosts across 124 countries by deploying a PowerShell-based payload (ClockRemoval.ps1) that terminated processes, uninstalled security tools, and blocked reinstallation. The campaign abused a legitimate code-signing certificate and an update mechanism to deliver MSI-based payloads, leveraging SYSTEM privileges, WMI event subscriptions, and scheduled tasks to maintain persistence and evade detection. High-value targets included 221 universities, 41 operational technology networks, 35 government entities, and three healthcare organizations.

Cyber-Enabled Cargo Theft Leveraging GPS Spoofing and Fraudulent Broker Impersonation in North American Transportation Sector

Updated: · First: 15.04.2026 17:00 · 📰 1 src / 1 articles

North American transportation logistics faces escalating cyber-enabled cargo theft targeting high-value freight, with attackers exploiting GPS spoofing, fraudulent broker identities, and stolen credentials to divert shipments. Large trucking fleets operate as interconnected networks with vulnerable telematics, onboard systems, and enterprise infrastructure, creating multiple attack surfaces. Cybercriminals weaponize operational and cybersecurity weaknesses to impersonate legitimate brokers, manipulate GPS tracking, and coerce unwitting drivers into facilitating theft. The financial impact of cargo crime exceeds $725 million in reported losses for 2025 alone, with high-value goods such as specialty alcohol targeted for diversion and resale on black markets or counterfeit retail platforms.

BitLocker recovery prompts triggered on Windows Server 2025 after KB5082063 update

Updated: · First: 15.04.2026 14:41 · 📰 1 src / 1 articles

Microsoft confirmed that Windows Server 2025 systems with specific BitLocker Group Policy configurations may boot into BitLocker recovery mode after installing the April 2026 KB5082063 security update. The issue occurs when certain PCR7 validation conditions are met, requiring admins to enter BitLocker recovery keys once before normal operation resumes. This affects only enterprise-managed systems with BitLocker enabled and does not impact typical end-user configurations.

CISA Advocates for AI Company Integration into CVE Program Amid Record Vulnerability Growth

Updated: · First: 15.04.2026 13:30 · 📰 1 src / 1 articles

CISA’s Chief of the Vulnerability Response & Coordination (VRC) Branch, Lindsey Cerkovnik, emphasized the need for AI companies such as OpenAI and Anthropic to play a more formal role in the Common Vulnerabilities and Exposures (CVE) program during VulnCon26. The call follows rapid growth in vulnerability disclosures, with 2026 projections ranging from 50,000 to 70,135 CVEs—a 45.6% increase from 2025—driven in part by AI-driven discovery tools. New AI models like Anthropic’s Claude Mythos Preview and OpenAI’s GPT-5.4-Cyber have demonstrated capabilities to autonomously identify critical zero-day vulnerabilities, including a 27-year-old flaw in OpenBSD and a 16-year-old flaw in FFmpeg, as well as chains of vulnerabilities in the Linux kernel enabling privilege escalation. CISA’s push aligns with a broader diversification strategy for the CVE program, including the establishment of new working groups and a goal to expand the roster of CVE Numbering Authorities (CNAs).

Renewal of FISA Section 702 surveillance authority under debate amid privacy and civil liberties concerns

Updated: · First: 15.04.2026 13:25 · 📰 1 src / 1 articles

The U.S. Congress is preparing to reauthorize Section 702 of the Foreign Intelligence Surveillance Act (FISA), a warrantless surveillance program that allows intelligence agencies to collect and analyze communications of non-U.S. persons abroad, with incidental collection of Americans' communications. The program’s authority expires on Monday, prompting bipartisan debate over warrant requirements for accessing Americans’ data, limitations on government use of commercial data brokers, and broader civil liberties implications. President Donald Trump has endorsed an 18-month extension despite past criticism of the program and its potential misuse for political surveillance, citing national security benefits in recent operations in Venezuela and Iran. Critics argue the program constitutes a persistent infringement on privacy rights and civil liberties, particularly due to the incidental capture of Americans’ communications without warrants. Supporters emphasize its critical role in preventing terrorist attacks and protecting national security, though questions persist about transparency, oversight, and the adequacy of recent reforms.

Microsoft resolves Windows Server upgrade bug enabling unintended 2025 upgrades

Updated: · First: 15.04.2026 13:24 · 📰 1 src / 1 articles

Microsoft has resolved a previously reported bug that caused systems running Windows Server 2019 and 2022 to automatically upgrade to Windows Server 2025 without explicit user action or licensing. The issue, first acknowledged in September 2024, led to unexpected overnight upgrades across multiple enterprise environments, prompting investigations into the root cause and mitigation steps. Microsoft attributed the problem to misconfigured third-party update management tools, though affected vendors disputed this and cited procedural errors on Microsoft’s side. The bug’s resolution restores the intended upgrade workflow via Windows Update settings, allowing administrators to control upgrade eligibility and timing. The fix follows a prolonged period of disruption and reactive out-of-band patches addressing related installation failures and authentication issues.

Surge in brute-force attacks targeting SonicWall and Fortinet devices originating from Middle East infrastructure

Updated: · First: 15.04.2026 12:30 · 📰 1 src / 1 articles

A significant increase in brute-force attacks aimed at SonicWall and Fortinet internet-facing VPN and firewall appliances has been observed, with 88% of detected attempts originating from infrastructure in the Middle East. The majority of these attacks were unsuccessful due to blocking by security tools or targeting invalid usernames, though persistent probing heightens the risk of eventual compromise through weak credentials or misconfigurations. Timing suggests possible correlation with regional geopolitical tensions, including US and Israeli actions against Iran.

Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws

Updated: 15.04.2026 12:10 · First: 10.03.2026 19:49 · 📰 11 src / 12 articles

Microsoft's multi-month Patch Tuesday campaign continues with the April 2026 release addressing 167 security vulnerabilities in Windows and related software, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Nearly 60% of the patched flaws are elevation-of-privilege bugs, marking the highest proportion in eight months, while eight Critical vulnerabilities were addressed, including unauthenticated remote code execution flaws in Windows IKE Service Extensions (CVE-2026-33824, CVSS 9.8) and secure tunneling components (CVE-2026-33827, CVSS 8.1). The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), changing build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). Windows 10 Enterprise LTSC and ESU participants received the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). Critical updates addressed CVE-2026-32201 (actively exploited SharePoint Server spoofing vulnerability enabling phishing and unauthorized data manipulation) and CVE-2026-33825 (publicly disclosed Microsoft Defender elevation-of-privilege flaw granting SYSTEM privileges). Additional critical risks included CVE-2026-33824 (Windows IKE Service Extensions unauthenticated RCE, CVSS 9.8) and CVE-2026-33827 (secure tunneling RCE, CVSS 8.1). Nearly 60% of patched flaws were elevation-of-privilege bugs, with 93 such vulnerabilities addressed.

Kraken cryptocurrency exchange targeted in insider-facilitated extortion attempt

Updated: · First: 15.04.2026 00:58 · 📰 1 src / 1 articles

A cybercrime group attempted to extort Kraken, a major U.S.-based cryptocurrency exchange, by threatening to release videos of internal systems containing client data if demands were not met. The threat actor leveraged an insider threat, recruiting two support employees to improperly access limited customer data. Kraken confirmed no client funds were at risk and stated it will not negotiate with the extortionists. The incidents, first detected via a tip in February 2025 and later confirmed in a second video, affected approximately 2,000 accounts (0.02% of the user base), with exposure limited to client support data. Kraken has revoked unauthorized access, notified affected users, and is collaborating with law enforcement to pursue legal action against the involved individuals.

Compromised Chrome Extensions Campaign Targeting Google and Telegram Accounts

Updated: 14.04.2026 23:33 · First: 14.04.2026 11:35 · 📰 3 src / 3 articles

A coordinated campaign of 108 malicious Chrome extensions has been identified, targeting approximately 20,000 users to steal Google and Telegram session data via a shared command-and-control (C2) infrastructure. The extensions exfiltrate sensitive credentials, inject arbitrary scripts, and strip security headers while masquerading as legitimate utilities under five publisher identities. At least 54 extensions steal Google account identities via OAuth2, 45 contain universal backdoors opening arbitrary URLs on startup, and some target Telegram Web sessions every 15 seconds. The campaign was first reported on April 14, 2026, with security researchers at Socket uncovering coordinated backend systems and shared operational patterns across all extensions. The operation functions as a Malware-as-a-Service (MaaS) model, allowing third parties to access stolen data and active sessions. All 108 extensions remained available at discovery, prompting takedown requests. Additional details confirm the use of a central backend hosted on a Contabo VPS with subdomains for session hijacking, identity collection, command execution, and monetization, and that the campaign is attributed to Russian-speaking actors based on code comments.

Salesforce misconfiguration leads to non-sensitive data exposure at McGraw-Hill amid ShinyHunters extortion claims

Updated: · First: 14.04.2026 21:07 · 📰 1 src / 1 articles

McGraw-Hill disclosed unauthorized access to a limited set of data hosted on a Salesforce webpage due to a Salesforce environment misconfiguration. The company stated the breach did not involve its Salesforce accounts, customer databases, courseware, or internal systems, and exposed data is limited and non-sensitive. An extortion group, ShinyHunters, claimed responsibility, alleging possession of 45 million Salesforce records with personally identifiable information (PII), contradicting McGraw-Hill’s assessment. The affected webpages were secured promptly, and McGraw-Hill is collaborating with Salesforce to remediate the issue.

Malicious Ledger Live macOS app on Apple App Store facilitates $9.5M crypto theft via seed phrase harvesting

Updated: · First: 14.04.2026 19:37 · 📰 1 src / 1 articles

A counterfeit Ledger Live application distributed through Apple’s App Store for macOS compromised approximately 50 users between April 8–11, 2026, resulting in the theft of $9.5 million in cryptocurrency assets. The illicit application, published under the name ‘Leva Heal Limited,’ tricked users into entering seed/recovery phrases, granting attackers full control over victim wallets and enabling fund transfers to attacker-controlled addresses. Funds were subsequently laundered through over 150 KuCoin deposit addresses linked to a centralized mixing service named ‘AudiA6,’ with notable victims including musician G. Love, who lost 5.9 BTC (~$430k). Apple removed the malicious app after reports emerged, but only after significant financial damage was incurred.

Zero Trust Identity Security Practices Highlighted Following 2025 Credential-Based Breach Trends

Updated: · First: 14.04.2026 17:02 · 📰 1 src / 1 articles

Stolen credentials accounted for 22% of known initial access vectors in 2025, making it the most prevalent method for network breaches. Excessive user permissions and limited visibility enabled attackers to escalate privileges post-compromise. Zero Trust principles, when implemented as an integrated identity strategy rather than isolated controls, are positioned to address these risks by enforcing least privilege, continuous authentication, and granular access segmentation. The five practical approaches emphasize identity-centric Zero Trust: enforcing least privilege access to limit credential abuse, deploying continuous context-aware authentication tied to device trust, restricting lateral movement through micro-segmentation, securing remote and third-party access with untrusted-by-default policies, and centralizing identity governance for improved visibility and incident response.

Declining cybersecurity job satisfaction drives talent attrition and organizational risk

Updated: · First: 14.04.2026 16:00 · 📰 1 src / 1 articles

Cybersecurity professionals report increasing dissatisfaction with career progression, compensation, and work-life balance, with only 34% planning to remain in current roles over the next year. A 2026 IANS and Artico Search report reveals that senior professionals are more likely to consider job changes, with career growth and organizational support emerging as stronger retention drivers than compensation alone. The trend contributes to staffing shortages that directly weaken organizational defenses and heighten incident risk. Hybrid work models featuring one to two on-site days per week show the strongest correlation with improved work-life balance and job satisfaction. High performers increasingly prioritize visibility, mentorship, and career development beyond monetary incentives in their employment decisions.

Triad Nexus fraud ecosystem expands with infrastructure laundering and regional targeting post-sanctions

Updated: · First: 14.04.2026 15:00 · 📰 1 src / 1 articles

The cybercrime network Triad Nexus has expanded its global fraud operations to emerging markets and refined its tactics following US Treasury sanctions in 2025, resulting in reported losses exceeding $200 million. The group now leverages infrastructure laundering via compromised cloud accounts from AWS, Cloudflare, Google, and Microsoft to host malicious services, blending scam platforms with legitimate traffic. Victim losses have averaged $150,000 per incident, with operations scaling through industrialized digital brand theft targeting banking, luxury retail, and public services. To evade scrutiny, Triad Nexus enforces a geographic US block and has localized scam templates in Spanish, Vietnamese, and Indonesian, while deploying "clean" front companies to complicate attribution.

Memory-safe DNS parser integration in Google Pixel modem firmware

Updated: · First: 14.04.2026 13:21 · 📰 1 src / 1 articles

Google has integrated a Rust-based Domain Name System (DNS) parser into the modem firmware of Pixel devices to address memory safety risks in cellular modem codebases. The integration targets a high-risk attack surface within the modem’s large executable codebase, which has drawn increased attacker attention in recent years. The change replaces memory-unsafe legacy implementations with a memory-safe Rust parser, reducing exposure to vulnerabilities arising from parsing untrusted DNS data in cellular protocols such as call forwarding. Pixel 10 series devices are the first to include this modification.

Unauthorized data access at Basic-Fit impacts 1 million European gym members

Updated: · First: 14.04.2026 00:50 · 📰 1 src / 1 articles

A cyber incident at Basic-Fit, Europe’s largest gym operator, resulted in unauthorized access to systems storing member visit records, affecting approximately 1 million individuals across six countries. The attacker exfiltrated personal and financial data, including full names, physical addresses, email addresses, phone numbers, dates of birth, and bank account details. The intrusion was detected and contained within minutes, but external experts confirmed data exfiltration occurred. Data stored by franchises was not exposed as it resides on a separate system. Basic-Fit operates 1,700+ clubs across 12 countries with over 5 million members, and the incident spans the Netherlands, Belgium, Luxembourg, France, Spain, and Germany.

Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach

Updated: · First: 13.04.2026 23:08 · 📰 1 src / 1 articles

The extortion group ShinyHunters leaked approximately 78.6 million records of Rockstar Games’ internal analytics data, asserting the data was exfiltrated from Snowflake environments using authentication tokens stolen during a recent breach at Anodot, a data anomaly detection provider. The compromised datasets reportedly include in-game revenue metrics, player behavior tracking, and game economy data for Grand Theft Auto Online and Red Dead Online, as well as customer support analytics from Zendesk. Rockstar Games acknowledged a limited, non-material data breach tied to the third-party incident, stating no impact on its operations or players.

Forged certificate acceptance vulnerability in wolfSSL TLS library fixed

Updated: · First: 13.04.2026 22:56 · 📰 1 src / 1 articles

A critical cryptographic validation flaw in the wolfSSL TLS/SSL library (CVE-2026-5194) enables attackers to bypass certificate verification and force acceptance of forged certificates for malicious servers or connections. The issue stems from improper validation of hash algorithm and size during ECDSA signature checks, allowing weaker-than-expected digests to be accepted. This affects core cryptographic routines and impacts multiple signature algorithms including ECDSA/ECC, DSA, ML-DSA, Ed25519, and Ed448. The vulnerability affects widely deployed applications and devices, including embedded systems, IoT, industrial control systems, routers, and automotive equipment. wolfSSL is used in over 5 billion applications and devices globally.

Disruption of W3LL phishing ecosystem linked to $20 million in fraud

Updated: 13.04.2026 21:55 · First: 13.04.2026 13:35 · 📰 2 src / 2 articles

US and Indonesian authorities dismantled the W3LL phishing platform in a coordinated takedown, seizing infrastructure and arresting the alleged developer responsible for a modular phishing kit that facilitated over $20 million in fraud. The operation targeted a full-service cybercrime platform that enabled credential harvesting via spoofed Microsoft 365 login pages, allowed bypassing multi-factor authentication through adversary-in-the-middle techniques, and supported business email compromise (BEC) attacks from initial access through post-exploitation. The W3LL ecosystem operated from 2019 to 2023 as a members-only marketplace before persisting through encrypted channels, with operations spanning over 17,000 victims globally between 2023 and 2025.

Unauthorized access to Booking.com reservation data triggers PIN resets and phishing risk

Updated: · First: 13.04.2026 20:30 · 📰 1 src / 1 articles

Unauthorized parties gained access to reservation data on Booking.com, a major global online travel platform, prompting forced PIN resets and direct email notifications to impacted users. Compromised data includes full names, email addresses, postal addresses, phone numbers, and communications with property providers. Booking.com has not disclosed the total number of affected users but states all impacted individuals are being notified directly. The incident raises concerns about targeted phishing campaigns leveraging exposed reservation details.

JanelaRAT campaigns target Latin American financial sector via phishing and DLL side-loading

Updated: · First: 13.04.2026 20:15 · 📰 1 src / 1 articles

A sophisticated remote access trojan (RAT), JanelaRAT, has been actively targeting financial institutions in Latin America—primarily Brazil and Mexico—using phishing emails, MSI installers, and DLL side-loading techniques. In 2025, telemetry recorded 14,739 attacks in Brazil and 11,695 in Mexico, with infection chains evolving to include custom browser extension deployment, C2 communication over TCP sockets, and evasion of detection via user activity monitoring. The malware leverages active window title parsing to identify target banking websites and overlays fake dialogs to harvest credentials or simulate user input. The threat actor behind JanelaRAT demonstrates persistent innovation, with infection vectors shifting from VBScript to MSI installers and multi-stage orchestration using Go, PowerShell, and batch scripts. Stealth features include sandbox detection, anti-fraud system flagging, and conditional execution based on user inactivity, enabling targeted, low-visibility operations against financial sector victims.

Actively exploited prototype pollution flaw in Adobe Acrobat Reader patched as CVE-2026-34621

Updated: 13.04.2026 18:37 · First: 12.04.2026 07:25 · 📰 2 src / 2 articles

A critical prototype pollution vulnerability in Adobe Acrobat Reader, tracked as CVE-2026-34621, has been patched following active in-the-wild exploitation. The flaw permits arbitrary code execution via malicious PDF documents containing crafted JavaScript, enabling attackers to compromise vulnerable systems. Exploitation has been observed since at least December 2025, with reports indicating abuse of the bug in targeted attacks leveraging Russian-language lures in the oil and gas sector. Adobe released emergency updates on April 12, 2026, after researchers publicly disclosed exploitation details and technical impact. The bug bypasses sandbox restrictions by invoking privileged APIs such as util.readFileIntoStream() and RSS.addFeed(), allowing reading of arbitrary local files and data exfiltration without further user interaction.

Malicious mailbox rule abuse in Microsoft 365 environments escalates as covert post-compromise persistence vector

Updated: · First: 13.04.2026 18:00 · 📰 1 src / 1 articles

Attackers are increasingly exploiting native Microsoft 365 mailbox rules to maintain stealthy persistence, exfiltrate data, and manipulate email communications following account compromise. Abuse involves creating minimal or obfuscated rules that delete, archive, or redirect emails to obscure folders like Archive or RSS Subscriptions, enabling attackers to suppress security alerts, intercept sensitive conversations, and impersonate users without immediate detection. This technique is observed in approximately 10% of breached accounts during Q4 2025, often deployed within seconds of initial access.

Six Android Malware Families Target Pix, Banking Apps, and Crypto Wallets

Updated: 13.04.2026 17:30 · First: 12.03.2026 09:56 · 📰 3 src / 3 articles

Six Android malware families continue to target Pix payments, banking apps, and cryptocurrency wallets, with Mirax expanding its capabilities beyond financial theft. The Mirax trojan now integrates residential proxy functionality, enabling attackers to route malicious traffic through compromised devices and evade geographic restrictions. Mirax, previously identified as a banking trojan offered through a malware-as-a-service ecosystem, now operates under a restricted MaaS model targeting Spanish-speaking users with campaigns exceeding 200,000 accounts via social media advertisements. It provides full real-time device control, dynamic fake overlays fetched from C2 servers, and surveillance features including keylogging and lock screen detail collection. Distribution relies on social engineering via illegal streaming app promotions, with malware hosted on GitHub and device evasion techniques. Compromised devices are repurposed as residential proxies for broader cybercriminal activities, including account takeovers and anonymized network attacks.