CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 17:30 14/04/2026 UTC
  • Zero Trust Identity Security Practices Highlighted Following 2025 Credential-Based Breach Trends Stolen credentials accounted for 22% of known initial access vectors in 2025, making it the most prevalent method for network breaches. Excessive user permissions and limited visibility enabled attackers to escalate privileges post-compromise. Zero Trust principles, when implemented as an integrated identity strategy rather than isolated controls, are positioned to address these risks by enforcing least privilege, continuous authentication, and granular access segmentation. The five practical approaches emphasize identity-centric Zero Trust: enforcing least privilege access to limit credential abuse, deploying continuous context-aware authentication tied to device trust, restricting lateral movement through micro-segmentation, securing remote and third-party access with untrusted-by-default policies, and centralizing identity governance for improved visibility and incident response. Read
  • Unauthorized data access at Basic-Fit impacts 1 million European gym members A cyber incident at Basic-Fit, Europe’s largest gym operator, resulted in unauthorized access to systems storing member visit records, affecting approximately 1 million individuals across six countries. The attacker exfiltrated personal and financial data, including full names, physical addresses, email addresses, phone numbers, dates of birth, and bank account details. The intrusion was detected and contained within minutes, but external experts confirmed data exfiltration occurred. Data stored by franchises was not exposed as it resides on a separate system. Basic-Fit operates 1,700+ clubs across 12 countries with over 5 million members, and the incident spans the Netherlands, Belgium, Luxembourg, France, Spain, and Germany. Read
  • Triad Nexus fraud ecosystem expands with infrastructure laundering and regional targeting post-sanctions The cybercrime network Triad Nexus has expanded its global fraud operations to emerging markets and refined its tactics following US Treasury sanctions in 2025, resulting in reported losses exceeding $200 million. The group now leverages infrastructure laundering via compromised cloud accounts from AWS, Cloudflare, Google, and Microsoft to host malicious services, blending scam platforms with legitimate traffic. Victim losses have averaged $150,000 per incident, with operations scaling through industrialized digital brand theft targeting banking, luxury retail, and public services. To evade scrutiny, Triad Nexus enforces a geographic US block and has localized scam templates in Spanish, Vietnamese, and Indonesian, while deploying "clean" front companies to complicate attribution. Read
  • Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach The extortion group ShinyHunters leaked approximately 78.6 million records of Rockstar Games’ internal analytics data, asserting the data was exfiltrated from Snowflake environments using authentication tokens stolen during a recent breach at Anodot, a data anomaly detection provider. The compromised datasets reportedly include in-game revenue metrics, player behavior tracking, and game economy data for Grand Theft Auto Online and Red Dead Online, as well as customer support analytics from Zendesk. Rockstar Games acknowledged a limited, non-material data breach tied to the third-party incident, stating no impact on its operations or players. Read
  • Memory-safe DNS parser integration in Google Pixel modem firmware Google has integrated a Rust-based Domain Name System (DNS) parser into the modem firmware of Pixel devices to address memory safety risks in cellular modem codebases. The integration targets a high-risk attack surface within the modem’s large executable codebase, which has drawn increased attacker attention in recent years. The change replaces memory-unsafe legacy implementations with a memory-safe Rust parser, reducing exposure to vulnerabilities arising from parsing untrusted DNS data in cellular protocols such as call forwarding. Pixel 10 series devices are the first to include this modification. Read
  • Malicious Ledger Live macOS app on Apple App Store facilitates $9.5M crypto theft via seed phrase harvesting A counterfeit Ledger Live application distributed through Apple’s App Store for macOS compromised approximately 50 users between April 8–11, 2026, resulting in the theft of $9.5 million in cryptocurrency assets. The illicit application, published under the name ‘Leva Heal Limited,’ tricked users into entering seed/recovery phrases, granting attackers full control over victim wallets and enabling fund transfers to attacker-controlled addresses. Funds were subsequently laundered through over 150 KuCoin deposit addresses linked to a centralized mixing service named ‘AudiA6,’ with notable victims including musician G. Love, who lost 5.9 BTC (~$430k). Apple removed the malicious app after reports emerged, but only after significant financial damage was incurred. Read
  • Forged certificate acceptance vulnerability in wolfSSL TLS library fixed A critical cryptographic validation flaw in the wolfSSL TLS/SSL library (CVE-2026-5194) enables attackers to bypass certificate verification and force acceptance of forged certificates for malicious servers or connections. The issue stems from improper validation of hash algorithm and size during ECDSA signature checks, allowing weaker-than-expected digests to be accepted. This affects core cryptographic routines and impacts multiple signature algorithms including ECDSA/ECC, DSA, ML-DSA, Ed25519, and Ed448. The vulnerability affects widely deployed applications and devices, including embedded systems, IoT, industrial control systems, routers, and automotive equipment. wolfSSL is used in over 5 billion applications and devices globally. Read
Last updated: 19:15 14/04/2026 UTC
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors. Read
  • Unauthenticated remote code execution flaw in Magento and Adobe Commerce via PolyShell polyglot uploads Since mid-March 2026, a critical unauthenticated remote code execution flaw named PolyShell has affected all supported versions of Magento Open Source and Adobe Commerce (version 2), enabling attackers to upload polyglot files via the REST API and achieve code execution. Adobe has only released a patch in the alpha release of version 2.4.9, leaving production deployments vulnerable. Exploitation is now actively occurring in the wild, with mass scanning activity since March 19, 2026, and successful compromises detected in 56.7% of all vulnerable stores. A new wave of attacks injects a 1x1-pixel SVG element with an onload handler containing a base64-encoded skimmer payload, executed via setTimeout to avoid detection. The malware intercepts checkout clicks, displays a fake 'Secure Checkout' overlay with card and billing fields, and validates payment data in real time using the Luhn algorithm. Stolen data is exfiltrated to six exfiltration domains hosted at IncogNet LLC in the Netherlands via XOR-encrypted, base64-obfuscated JSON. Indicators of compromise include the _mgx_cv key in browser localStorage and requests to /fb_metrics.php. Adobe has not yet released a production patch, and sixteen exfiltration domains and IP address 23.137.249.67 are now associated with these attacks. Read
  • Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency A North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman via a two-week social engineering campaign and published malicious axios versions v1.14.1 and v0.30.4 containing the plain-crypto-js dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack’s blast radius has expanded beyond developer ecosystems after OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious axios library, prompting OpenAI to revoke its macOS app certificate as a precaution despite no evidence of compromise. This incident underscores the escalating risks of supply chain compromises, with Google warning that hundreds of thousands of stolen secrets from the axios and Trivy attacks could fuel further software supply chain attacks, SaaS compromises, ransomware, and cryptocurrency theft. The campaign reflects an industrialized social engineering model targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building and matured attacker tooling. Additional supply chain attacks in March 2026, such as the compromise of Trivy by TeamPCP (UNC6780), have compounded the threat landscape, exposing organizations like the European Commission and Mercor to downstream risks. Read
  • Six Android Malware Families Target Pix, Banking Apps, and Crypto Wallets Six Android malware families continue to target Pix payments, banking apps, and cryptocurrency wallets, with Mirax expanding its capabilities beyond financial theft. The Mirax trojan now integrates residential proxy functionality, enabling attackers to route malicious traffic through compromised devices and evade geographic restrictions. Mirax, previously identified as a banking trojan offered through a malware-as-a-service ecosystem, now operates under a restricted MaaS model targeting Spanish-speaking users with campaigns exceeding 200,000 accounts via social media advertisements. It provides full real-time device control, dynamic fake overlays fetched from C2 servers, and surveillance features including keylogging and lock screen detail collection. Distribution relies on social engineering via illegal streaming app promotions, with malware hosted on GitHub and device evasion techniques. Compromised devices are repurposed as residential proxies for broader cybercriminal activities, including account takeovers and anonymized network attacks. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns relied on malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms like Cloudflare Pages and Squarespace. AMOS has been delivered through disk images, obfuscated shell scripts, and in-memory payloads, expanding from Terminal-based ClickFix tactics to abuse trusted macOS applications. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 that blocks pasted command execution and warns users of risks, disrupting ClickFix attack chains. A new campaign observed in April 2026 by Jamf researchers now abuses the built-in Script Editor application to bypass these protections. The campaign uses fake Apple-themed disk cleanup guides to trick users into launching Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer. The new Script Editor-based ClickFix variation enables theft of Keychain data, browser autofill information, cryptocurrency wallet extensions, and system details without requiring Terminal interaction. AMOS continues to expand its capabilities, now including a backdoor component for persistent access to compromised systems. Read
  • Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws Microsoft’s multi-month Patch Tuesday campaign continues with the April 2026 release of 167 security patches, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Eight Critical vulnerabilities were patched, primarily remote code execution flaws, alongside updates for elevation of privilege, security feature bypass, information disclosure, denial of service, and spoofing vulnerabilities. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), which changed build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). New features included the ability to modify Smart App Control without reinstalling Windows, improved Narrator functionality with Copilot integration, enhanced File Explorer permissions management, and display reliability improvements supporting high refresh rate monitors. Microsoft also addressed System File Checker error reporting issues and confirmed plans for future quality updates including a movable taskbar and reduced Copilot integration. The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days, with critical updates for SQL Server, Microsoft Office, Excel, and Windows Server 2022 components. Windows 10 Enterprise LTSC and ESU participants now receive the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). The update also introduces Remote Desktop file phishing protections, Secure Boot certificate rollout indicators, and resolves BitLocker Recovery issues on Intel-based devices. Read
  • Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting As of April 10, 2026, Iranian state-sponsored and affiliated cyber threat actors continue to escalate attacks against U.S. critical infrastructure, with new data revealing that 3,891 internet-exposed Rockwell Automation/Allen-Bradley PLCs—74.6% of the global total—are vulnerable to ongoing Iranian APT campaigns. The FBI, CISA, and allied agencies confirm that these attacks have resulted in PLC project file exfiltration, HMI/SCADA data manipulation, and operational disruptions, marking a direct expansion of Iran’s cyber-kinetic doctrine into U.S. industrial control systems (ICS). The broader campaign remains defined by Iran’s integration of cyber and kinetic warfare, including the systematic exploitation of Hikvision/Dahua IP cameras for real-time battle damage assessment and the re-emergence of destructive ransomware groups like Pay2Key, which executed a three-hour encryption blitz against a U.S. healthcare provider in March 2026. Despite the April 8 ceasefire announcement by Handala—temporarily pausing U.S.-targeted attacks but continuing operations against Israel—low-level cyberactivity by groups like 313 Team and Conquerors Electronic Army persists, targeting Australian government systems, Israeli infrastructure, and U.S.-based platforms. Analysts warn that ceasefires historically inflame cyber operations, as actors exploit diplomatic pauses to pivot tactics or prepare for future escalations. Strategic trends highlight Iran’s use of false-flag operations, ransomware-as-a-smokescreen, and multi-actor obfuscation to stretch adversary defenses. The targeting of U.S. OT systems—mirroring prior CyberAv3ngers (IRGC) campaigns against Unitronics PLCs—signals a shift from regional surveillance to direct, disruptive operations, with risks of follow-on kinetic effects. Defenders are urged to segment OT networks, eliminate public PLC exposure, and monitor for Iranian VPN/VPS infrastructure (Mullvad, NordVPN, Surfshark) linked to ongoing campaigns. Read

Latest updates

Browse →

Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws

Updated: 14.04.2026 21:09 · First: 10.03.2026 19:49 · 📰 8 src / 9 articles

Microsoft’s multi-month Patch Tuesday campaign continues with the April 2026 release of 167 security patches, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Eight Critical vulnerabilities were patched, primarily remote code execution flaws, alongside updates for elevation of privilege, security feature bypass, information disclosure, denial of service, and spoofing vulnerabilities. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), which changed build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). New features included the ability to modify Smart App Control without reinstalling Windows, improved Narrator functionality with Copilot integration, enhanced File Explorer permissions management, and display reliability improvements supporting high refresh rate monitors. Microsoft also addressed System File Checker error reporting issues and confirmed plans for future quality updates including a movable taskbar and reduced Copilot integration. The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days, with critical updates for SQL Server, Microsoft Office, Excel, and Windows Server 2022 components. Windows 10 Enterprise LTSC and ESU participants now receive the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). The update also introduces Remote Desktop file phishing protections, Secure Boot certificate rollout indicators, and resolves BitLocker Recovery issues on Intel-based devices.

Salesforce misconfiguration leads to non-sensitive data exposure at McGraw-Hill amid ShinyHunters extortion claims

Updated: · First: 14.04.2026 21:07 · 📰 1 src / 1 articles

McGraw-Hill disclosed unauthorized access to a limited set of data hosted on a Salesforce webpage due to a Salesforce environment misconfiguration. The company stated the breach did not involve its Salesforce accounts, customer databases, courseware, or internal systems, and exposed data is limited and non-sensitive. An extortion group, ShinyHunters, claimed responsibility, alleging possession of 45 million Salesforce records with personally identifiable information (PII), contradicting McGraw-Hill’s assessment. The affected webpages were secured promptly, and McGraw-Hill is collaborating with Salesforce to remediate the issue.

Malicious Ledger Live macOS app on Apple App Store facilitates $9.5M crypto theft via seed phrase harvesting

Updated: · First: 14.04.2026 19:37 · 📰 1 src / 1 articles

A counterfeit Ledger Live application distributed through Apple’s App Store for macOS compromised approximately 50 users between April 8–11, 2026, resulting in the theft of $9.5 million in cryptocurrency assets. The illicit application, published under the name ‘Leva Heal Limited,’ tricked users into entering seed/recovery phrases, granting attackers full control over victim wallets and enabling fund transfers to attacker-controlled addresses. Funds were subsequently laundered through over 150 KuCoin deposit addresses linked to a centralized mixing service named ‘AudiA6,’ with notable victims including musician G. Love, who lost 5.9 BTC (~$430k). Apple removed the malicious app after reports emerged, but only after significant financial damage was incurred.

Zero Trust Identity Security Practices Highlighted Following 2025 Credential-Based Breach Trends

Updated: · First: 14.04.2026 17:02 · 📰 1 src / 1 articles

Stolen credentials accounted for 22% of known initial access vectors in 2025, making it the most prevalent method for network breaches. Excessive user permissions and limited visibility enabled attackers to escalate privileges post-compromise. Zero Trust principles, when implemented as an integrated identity strategy rather than isolated controls, are positioned to address these risks by enforcing least privilege, continuous authentication, and granular access segmentation. The five practical approaches emphasize identity-centric Zero Trust: enforcing least privilege access to limit credential abuse, deploying continuous context-aware authentication tied to device trust, restricting lateral movement through micro-segmentation, securing remote and third-party access with untrusted-by-default policies, and centralizing identity governance for improved visibility and incident response.

Declining cybersecurity job satisfaction drives talent attrition and organizational risk

Updated: · First: 14.04.2026 16:00 · 📰 1 src / 1 articles

Cybersecurity professionals report increasing dissatisfaction with career progression, compensation, and work-life balance, with only 34% planning to remain in current roles over the next year. A 2026 IANS and Artico Search report reveals that senior professionals are more likely to consider job changes, with career growth and organizational support emerging as stronger retention drivers than compensation alone. The trend contributes to staffing shortages that directly weaken organizational defenses and heighten incident risk. Hybrid work models featuring one to two on-site days per week show the strongest correlation with improved work-life balance and job satisfaction. High performers increasingly prioritize visibility, mentorship, and career development beyond monetary incentives in their employment decisions.

Triad Nexus fraud ecosystem expands with infrastructure laundering and regional targeting post-sanctions

Updated: · First: 14.04.2026 15:00 · 📰 1 src / 1 articles

The cybercrime network Triad Nexus has expanded its global fraud operations to emerging markets and refined its tactics following US Treasury sanctions in 2025, resulting in reported losses exceeding $200 million. The group now leverages infrastructure laundering via compromised cloud accounts from AWS, Cloudflare, Google, and Microsoft to host malicious services, blending scam platforms with legitimate traffic. Victim losses have averaged $150,000 per incident, with operations scaling through industrialized digital brand theft targeting banking, luxury retail, and public services. To evade scrutiny, Triad Nexus enforces a geographic US block and has localized scam templates in Spanish, Vietnamese, and Indonesian, while deploying "clean" front companies to complicate attribution.

Compromised Chrome Extensions Campaign Targeting Google and Telegram Accounts

Updated: 14.04.2026 14:30 · First: 14.04.2026 11:35 · 📰 2 src / 2 articles

A coordinated campaign of 108 malicious Chrome extensions has been identified, targeting approximately 20,000 users to steal Google and Telegram session data via a shared command-and-control (C2) infrastructure. The extensions exfiltrate sensitive credentials, inject arbitrary scripts, and strip security headers while masquerading as legitimate utilities under five publisher identities. At least 54 extensions steal Google account identities via OAuth2, 45 contain universal backdoors opening arbitrary URLs on startup, and some target Telegram Web sessions every 15 seconds. The campaign was first reported on April 14, 2026, with security researchers at Socket uncovering coordinated backend systems and shared operational patterns across all extensions. The operation functions as a Malware-as-a-Service (MaaS) model, allowing third parties to access stolen data and active sessions. All 108 extensions remained available at discovery, prompting takedown requests.

Memory-safe DNS parser integration in Google Pixel modem firmware

Updated: · First: 14.04.2026 13:21 · 📰 1 src / 1 articles

Google has integrated a Rust-based Domain Name System (DNS) parser into the modem firmware of Pixel devices to address memory safety risks in cellular modem codebases. The integration targets a high-risk attack surface within the modem’s large executable codebase, which has drawn increased attacker attention in recent years. The change replaces memory-unsafe legacy implementations with a memory-safe Rust parser, reducing exposure to vulnerabilities arising from parsing untrusted DNS data in cellular protocols such as call forwarding. Pixel 10 series devices are the first to include this modification.

Unauthorized data access at Basic-Fit impacts 1 million European gym members

Updated: · First: 14.04.2026 00:50 · 📰 1 src / 1 articles

A cyber incident at Basic-Fit, Europe’s largest gym operator, resulted in unauthorized access to systems storing member visit records, affecting approximately 1 million individuals across six countries. The attacker exfiltrated personal and financial data, including full names, physical addresses, email addresses, phone numbers, dates of birth, and bank account details. The intrusion was detected and contained within minutes, but external experts confirmed data exfiltration occurred. Data stored by franchises was not exposed as it resides on a separate system. Basic-Fit operates 1,700+ clubs across 12 countries with over 5 million members, and the incident spans the Netherlands, Belgium, Luxembourg, France, Spain, and Germany.

Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach

Updated: · First: 13.04.2026 23:08 · 📰 1 src / 1 articles

The extortion group ShinyHunters leaked approximately 78.6 million records of Rockstar Games’ internal analytics data, asserting the data was exfiltrated from Snowflake environments using authentication tokens stolen during a recent breach at Anodot, a data anomaly detection provider. The compromised datasets reportedly include in-game revenue metrics, player behavior tracking, and game economy data for Grand Theft Auto Online and Red Dead Online, as well as customer support analytics from Zendesk. Rockstar Games acknowledged a limited, non-material data breach tied to the third-party incident, stating no impact on its operations or players.

Forged certificate acceptance vulnerability in wolfSSL TLS library fixed

Updated: · First: 13.04.2026 22:56 · 📰 1 src / 1 articles

A critical cryptographic validation flaw in the wolfSSL TLS/SSL library (CVE-2026-5194) enables attackers to bypass certificate verification and force acceptance of forged certificates for malicious servers or connections. The issue stems from improper validation of hash algorithm and size during ECDSA signature checks, allowing weaker-than-expected digests to be accepted. This affects core cryptographic routines and impacts multiple signature algorithms including ECDSA/ECC, DSA, ML-DSA, Ed25519, and Ed448. The vulnerability affects widely deployed applications and devices, including embedded systems, IoT, industrial control systems, routers, and automotive equipment. wolfSSL is used in over 5 billion applications and devices globally.

Disruption of W3LL phishing ecosystem linked to $20 million in fraud

Updated: 13.04.2026 21:55 · First: 13.04.2026 13:35 · 📰 2 src / 2 articles

US and Indonesian authorities dismantled the W3LL phishing platform in a coordinated takedown, seizing infrastructure and arresting the alleged developer responsible for a modular phishing kit that facilitated over $20 million in fraud. The operation targeted a full-service cybercrime platform that enabled credential harvesting via spoofed Microsoft 365 login pages, allowed bypassing multi-factor authentication through adversary-in-the-middle techniques, and supported business email compromise (BEC) attacks from initial access through post-exploitation. The W3LL ecosystem operated from 2019 to 2023 as a members-only marketplace before persisting through encrypted channels, with operations spanning over 17,000 victims globally between 2023 and 2025.

Unauthorized access to Booking.com reservation data triggers PIN resets and phishing risk

Updated: · First: 13.04.2026 20:30 · 📰 1 src / 1 articles

Unauthorized parties gained access to reservation data on Booking.com, a major global online travel platform, prompting forced PIN resets and direct email notifications to impacted users. Compromised data includes full names, email addresses, postal addresses, phone numbers, and communications with property providers. Booking.com has not disclosed the total number of affected users but states all impacted individuals are being notified directly. The incident raises concerns about targeted phishing campaigns leveraging exposed reservation details.

JanelaRAT campaigns target Latin American financial sector via phishing and DLL side-loading

Updated: · First: 13.04.2026 20:15 · 📰 1 src / 1 articles

A sophisticated remote access trojan (RAT), JanelaRAT, has been actively targeting financial institutions in Latin America—primarily Brazil and Mexico—using phishing emails, MSI installers, and DLL side-loading techniques. In 2025, telemetry recorded 14,739 attacks in Brazil and 11,695 in Mexico, with infection chains evolving to include custom browser extension deployment, C2 communication over TCP sockets, and evasion of detection via user activity monitoring. The malware leverages active window title parsing to identify target banking websites and overlays fake dialogs to harvest credentials or simulate user input. The threat actor behind JanelaRAT demonstrates persistent innovation, with infection vectors shifting from VBScript to MSI installers and multi-stage orchestration using Go, PowerShell, and batch scripts. Stealth features include sandbox detection, anti-fraud system flagging, and conditional execution based on user inactivity, enabling targeted, low-visibility operations against financial sector victims.

Actively exploited prototype pollution flaw in Adobe Acrobat Reader patched as CVE-2026-34621

Updated: 13.04.2026 18:37 · First: 12.04.2026 07:25 · 📰 2 src / 2 articles

A critical prototype pollution vulnerability in Adobe Acrobat Reader, tracked as CVE-2026-34621, has been patched following active in-the-wild exploitation. The flaw permits arbitrary code execution via malicious PDF documents containing crafted JavaScript, enabling attackers to compromise vulnerable systems. Exploitation has been observed since at least December 2025, with reports indicating abuse of the bug in targeted attacks leveraging Russian-language lures in the oil and gas sector. Adobe released emergency updates on April 12, 2026, after researchers publicly disclosed exploitation details and technical impact. The bug bypasses sandbox restrictions by invoking privileged APIs such as util.readFileIntoStream() and RSS.addFeed(), allowing reading of arbitrary local files and data exfiltration without further user interaction.

Malicious mailbox rule abuse in Microsoft 365 environments escalates as covert post-compromise persistence vector

Updated: · First: 13.04.2026 18:00 · 📰 1 src / 1 articles

Attackers are increasingly exploiting native Microsoft 365 mailbox rules to maintain stealthy persistence, exfiltrate data, and manipulate email communications following account compromise. Abuse involves creating minimal or obfuscated rules that delete, archive, or redirect emails to obscure folders like Archive or RSS Subscriptions, enabling attackers to suppress security alerts, intercept sensitive conversations, and impersonate users without immediate detection. This technique is observed in approximately 10% of breached accounts during Q4 2025, often deployed within seconds of initial access.

Six Android Malware Families Target Pix, Banking Apps, and Crypto Wallets

Updated: 13.04.2026 17:30 · First: 12.03.2026 09:56 · 📰 3 src / 3 articles

Six Android malware families continue to target Pix payments, banking apps, and cryptocurrency wallets, with Mirax expanding its capabilities beyond financial theft. The Mirax trojan now integrates residential proxy functionality, enabling attackers to route malicious traffic through compromised devices and evade geographic restrictions. Mirax, previously identified as a banking trojan offered through a malware-as-a-service ecosystem, now operates under a restricted MaaS model targeting Spanish-speaking users with campaigns exceeding 200,000 accounts via social media advertisements. It provides full real-time device control, dynamic fake overlays fetched from C2 servers, and surveillance features including keylogging and lock screen detail collection. Distribution relies on social engineering via illegal streaming app promotions, with malware hosted on GitHub and device evasion techniques. Compromised devices are repurposed as residential proxies for broader cybercriminal activities, including account takeovers and anonymized network attacks.

Storm infostealer enables server-side decryption and automated session hijacking across browsers and applications

Updated: · First: 13.04.2026 17:05 · 📰 1 src / 1 articles

A newly observed infostealer named Storm has been deployed in early 2026, providing cybercriminals with a subscription-based tool that exfiltrates browser credentials, session cookies, cryptocurrency wallet data, and application sessions while avoiding local decryption artifacts that endpoint security tools traditionally detect. Storm automatically restores authenticated sessions using stolen tokens via a central operator panel, enabling persistent access to SaaS platforms, cloud environments, and internal tools without triggering multi-factor authentication or password-based alerts. The malware targets Chromium and Gecko-based browsers, messaging apps, documents, and system artifacts, all processed server-side to evade detection. Operators deploy the tool via compromised or purchased infrastructure, managing multiple workers and builds under a unified control panel. At least 1,715 entries were observed in the operator panel, spanning multiple countries and services commonly associated with account takeover and initial access operations.

PlugX RAT delivered via trojanized Anthropic Claude installer in fake website attack

Updated: · First: 13.04.2026 12:52 · 📰 1 src / 1 articles

A malicious website impersonating Anthropic’s legitimate Claude domain distributed a trojanized installer that delivers the PlugX remote access trojan (RAT) to victims. The installer masquerades as a cracked version of the AI chatbot but instead launches a VBScript dropper that executes the legitimate Claude application while silently deploying malware. The dropper establishes persistence via a signed G DATA antivirus updater (NOVUpdate.exe) abused for DLL sideloading to execute a PlugX variant, then connects to Alibaba Cloud C&C infrastructure. Evidence of infection is obscured by cleanup scripts that delete traces of the initial compromise.

UK Launches Associate Cyber Security Professional Title to Address Early-Career Skills Validation

Updated: · First: 13.04.2026 12:15 · 📰 1 src / 1 articles

The UK Cyber Security Council introduced the Associate Cyber Security Professional title on April 13, 2026, as a credential for early-career individuals entering cybersecurity. The title enables applicants—including those without traditional work experience—to demonstrate foundational knowledge, skills, and ethical commitment via a government-backed register. Successful candidates are placed on the UK Cyber Security Professional Register and must commit to 75 hours of continuing professional development (CPD) over three years. The initiative targets the persistent cybersecurity skills gap in the UK, where approximately half of businesses report basic skills shortages and nearly half of cybersecurity firms struggle to fill technical roles.

Gmail mobile client-side encryption expands to Android and iOS with native E2EE support

Updated: 13.04.2026 11:31 · First: 10.04.2026 13:44 · 📰 2 src / 2 articles

Google has enabled native end-to-end encryption (E2EE) for Gmail on Android and iOS mobile devices, allowing users with Enterprise Plus licenses and Assured Controls add-ons to compose, read, and send encrypted emails directly within the Gmail app without additional tools. Encrypted messages are delivered as regular emails to recipients, regardless of their email service or device, and are accessible via a web browser if the recipient lacks the Gmail app. This implementation leverages client-side encryption (CSE), where encryption keys are controlled by the organization and stored externally, ensuring Google and third parties cannot access message content, aligning with compliance requirements such as HIPAA and data sovereignty mandates. The feature is now available immediately to eligible users after administrator configuration via the Admin Console CSE interface. Administrators must enable the feature for their organizations, and users can then compose encrypted messages by selecting the "Additional encryption" option via the lock icon in the Gmail mobile app. The rollout applies to Google Workspace Enterprise Plus customers with Assured Controls or Assured Controls Plus add-ons, supporting compliance with regulatory requirements while maintaining a user-friendly experience across recipient platforms.

Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency

Updated: 13.04.2026 09:50 · First: 01.04.2026 12:00 · 📰 3 src / 3 articles

A North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman via a two-week social engineering campaign and published malicious axios versions v1.14.1 and v0.30.4 containing the plain-crypto-js dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack’s blast radius has expanded beyond developer ecosystems after OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious axios library, prompting OpenAI to revoke its macOS app certificate as a precaution despite no evidence of compromise. This incident underscores the escalating risks of supply chain compromises, with Google warning that hundreds of thousands of stolen secrets from the axios and Trivy attacks could fuel further software supply chain attacks, SaaS compromises, ransomware, and cryptocurrency theft. The campaign reflects an industrialized social engineering model targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building and matured attacker tooling. Additional supply chain attacks in March 2026, such as the compromise of Trivy by TeamPCP (UNC6780), have compounded the threat landscape, exposing organizations like the European Commission and Mercor to downstream risks.

Pre-authenticated RCE in Marimo exploited within 10 hours of advisory

Updated: 12.04.2026 17:20 · First: 10.04.2026 10:37 · 📰 2 src / 2 articles

A pre-authenticated remote code execution (RCE) vulnerability in Marimo, tracked as CVE-2026-39987 (CVSS 9.3), was exploited in the wild within hours of public disclosure, with attackers leveraging the unauthenticated /terminal/ws WebSocket endpoint to gain full PTY shells on exposed instances. The flaw, affecting Marimo versions prior to 0.23.0, enables unauthenticated access to an interactive terminal with the same privileges as the Marimo process. Threat actors performed rapid, human-driven exploitation campaigns, validating the vulnerability within seconds, harvesting credentials (including .env files and SSH keys) in under three minutes, and avoiding automated payloads in favor of targeted data theft. Researchers at Sysdig reported 125 IP addresses conducting reconnaissance within the first 12 hours post-disclosure, while the first exploitation attempt occurred less than 10 hours after the advisory. Targeted systems included internet-facing Marimo instances configured as editable notebooks or exposed via --host 0.0.0.0 in edit mode.

Compromise of CPUID distribution channels delivers trojanized system monitoring tools

Updated: 12.04.2026 08:54 · First: 10.04.2026 16:12 · 📰 2 src / 2 articles

A threat actor compromised CPUID’s distribution infrastructure to deliver trojanized versions of CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor between April 9–10, 2026, deploying the STX RAT alongside a multi-stage installer using DLL side-loading. The compromise lasted approximately 19 hours, affecting at least 150 victims across multiple sectors and geographies, with the attackers reusing infrastructure and tactics from a prior FileZilla campaign. CPUID confirmed the breach was limited to distribution links and has since restored clean versions, though the developer’s unavailability during the incident may have contributed to the prolonged exposure.

International law enforcement disruption of cryptocurrency fraud networks exposes 20,000 victims and $57M in illicit proceeds

Updated: · First: 11.04.2026 17:20 · 📰 1 src / 1 articles

An international law enforcement operation codenamed Operation Atlantic, coordinated by the U.K. National Crime Agency (NCA), has identified over 20,000 victims of cryptocurrency fraud across Canada, the U.K., and the U.S., while freezing $12.4 million in suspected criminal proceeds. The week-long operation disrupted fraud networks using approval phishing tactics to gain unauthorized access to victims’ wallets, often leveraging investment scams. Investigators also traced $45 million in stolen cryptocurrency linked to global fraud schemes. The initiative involved public-private partnerships with agencies including the U.S. Secret Service, Ontario Provincial Police, and the Financial Conduct Authority, aiming to embed this model into the U.K.'s Fraud Strategy for enhanced fraud prevention.

Ad-based global geolocation surveillance system Webloc leveraged by law enforcement and intelligence agencies

Updated: · First: 11.04.2026 09:02 · 📰 1 src / 1 articles

A global geolocation surveillance system named Webloc, developed by Cobwebs Technologies and now sold by its successor Penlink, has been used by law enforcement and intelligence agencies in multiple countries to track at least 500 million devices worldwide. The system aggregates device identifiers, location coordinates, and profile data harvested from mobile apps and digital advertising streams. Agencies including U.S. Immigration and Customs Enforcement (ICE), the U.S. military, state and local police departments, and agencies in Hungary and El Salvador accessed Webloc to monitor populations and infer device ownership via home and workplace addresses. Webloc operates without requiring warrants in some documented cases and provides historical tracking capabilities spanning up to three years.

OpenAI introduces ChatGPT Pro subscription tier targeting enterprise and coding use cases

Updated: · First: 11.04.2026 05:08 · 📰 1 src / 1 articles

OpenAI launched a new ChatGPT Pro subscription tier priced at $100 per month, aligning with Anthropic’s Claude pricing strategy. The tier is positioned to attract enterprise users and developers requiring high-volume access to advanced AI capabilities for complex, ongoing workflows. The Pro tier offers 5x higher usage limits than the $20 Plus plan, with time-limited 10x Codex usage boosts, and includes access to Pro models, Codex, Deep Research, image generation, Memory, and file uploads. The move reflects OpenAI’s shift toward targeting coders and enterprises, a segment previously emphasized by Anthropic with its $100 Claude subscription tier.

Sensitive customer support ticket data exposed in Hims third-party platform breach

Updated: · First: 10.04.2026 23:02 · 📰 1 src / 1 articles

A third-party customer support platform used by telehealth provider Hims & Hers Health (Hims) was breached between February 4 and February 7, exposing highly sensitive protected health information (PHI) via customer support tickets. The breach compromised names, unspecified medical data, and email addresses, impacting an undisclosed number of customers. Threat actor ShinyHunters initially claimed responsibility, though this has not been independently verified. The incident highlights systemic risks in healthcare customer support workflows that aggregate sensitive PHI across fragmented, outsourced systems.

Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting

Updated: 10.04.2026 18:52 · First: 30.06.2025 15:00 · 📰 20 src / 27 articles

As of **April 10, 2026**, Iranian state-sponsored and affiliated cyber threat actors continue to escalate attacks against **U.S. critical infrastructure**, with new data revealing that **3,891 internet-exposed Rockwell Automation/Allen-Bradley PLCs**—74.6% of the global total—are vulnerable to ongoing Iranian APT campaigns. The FBI, CISA, and allied agencies confirm that these attacks have resulted in **PLC project file exfiltration, HMI/SCADA data manipulation, and operational disruptions**, marking a direct expansion of Iran’s cyber-kinetic doctrine into U.S. industrial control systems (ICS). The broader campaign remains defined by **Iran’s integration of cyber and kinetic warfare**, including the **systematic exploitation of Hikvision/Dahua IP cameras** for real-time battle damage assessment and the **re-emergence of destructive ransomware groups like Pay2Key**, which executed a **three-hour encryption blitz** against a U.S. healthcare provider in March 2026. Despite the **April 8 ceasefire announcement by Handala**—temporarily pausing U.S.-targeted attacks but continuing operations against Israel—**low-level cyberactivity by groups like 313 Team and Conquerors Electronic Army persists**, targeting Australian government systems, Israeli infrastructure, and U.S.-based platforms. Analysts warn that **ceasefires historically inflame cyber operations**, as actors exploit diplomatic pauses to pivot tactics or prepare for future escalations. **Strategic trends** highlight Iran’s use of **false-flag operations, ransomware-as-a-smokescreen, and multi-actor obfuscation** to stretch adversary defenses. The targeting of **U.S. OT systems**—mirroring prior CyberAv3ngers (IRGC) campaigns against Unitronics PLCs—signals a **shift from regional surveillance to direct, disruptive operations**, with risks of **follow-on kinetic effects**. Defenders are urged to **segment OT networks, eliminate public PLC exposure, and monitor for Iranian VPN/VPS infrastructure** (Mullvad, NordVPN, Surfshark) linked to ongoing campaigns.

Structural failure in enterprise vulnerability remediation amid collapsing exploit timelines

Updated: · First: 10.04.2026 17:01 · 📰 1 src / 1 articles

Analysis of over one billion CISA KEV remediation records spanning four years across 10,000 organizations reveals a systemic failure in enterprise vulnerability remediation despite increased operational effort. Time-to-Exploit has collapsed to negative seven days for critical vulnerabilities, with 88% of tracked weaponized flaws remediated slower than exploitation occurred. Critical vulnerabilities open at Day 7 have risen from 56% to 63% while remediation tickets closed grew 6.5x since 2022. Traditional scan-and-report models cannot close this operational gap as autonomous AI agents accelerate offensive capabilities beyond human response cycles.