CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 18:00 09/04/2026 UTC
  • Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting Iranian state-sponsored and affiliated cyber threat actors have formalized a cyber-kinetic war doctrine, integrating digital reconnaissance with physical strikes following the February 28, 2026, joint US-Israel military operation (Epic Fury). New research confirms Iran’s systematic compromise of Hikvision and Dahua IP cameras across Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and Lebanon—exploiting five patched but widely unpatched vulnerabilities to enable real-time battle damage assessment and missile-targeting support. Check Point Research assesses this activity as a predictive indicator of kinetic strikes, mirroring tactics used during the June 2025 Israel-Iran conflict. As of April 2026, Iranian APT actors have escalated direct targeting of U.S. critical infrastructure, focusing on Rockwell/Allen-Bradley PLCs in Government Services, Water and Wastewater Systems, and Energy sectors. The joint FBI/CISA/NSA advisory warns of financial losses, operational disruptions, and malicious manipulation of HMI/SCADA displays, with confirmed extraction of PLC project files. This follows prior CyberAv3ngers (IRGC-linked) campaigns that compromised 75 Unitronics PLCs in 2023–2024. In parallel, pro-Iranian hacktivist group Handala wiped 80,000 devices on U.S. medical giant Stryker’s network in March 2026, signaling a shift toward destructive hybrid operations blending state-backed and proxy activity. The campaign extends beyond surveillance: pro-Iranian actors breached Jordan’s Silos and Supply General Company via phishing, while IRGC-linked groups conducted limited but targeted ICS/SCADA attacks and DDoS campaigns against UAE/Bahrain government entities. CrowdStrike and Flashpoint warn of escalating hybrid tactics, including propaganda operations, data center missile strikes, and hacktivist proxies (e.g., Russian Legion) expanding targets to US-based critical infrastructure. Pay2Key, an Iranian-linked ransomware group active since 2020, has re-emerged in March 2026 with enhanced evasion capabilities, targeting a US healthcare provider in a three-hour encryption blitz that leveraged TeamViewer, credential harvesting (Mimikatz/LaZagne), and backup enumeration—raising concerns about its strategic destruction motives amid geopolitical tensions. Read
  • Unauthenticated RCE Vulnerability in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197) A high-severity unauthenticated remote code execution (RCE) vulnerability (CVE-2026-34197) was discovered in Apache ActiveMQ Classic, affecting versions prior to 5.19.4 and all versions from 6.0.0 to 6.2.3. The flaw permits attackers to execute arbitrary OS commands by abusing the Jolokia management API's addNetworkConnector function to fetch remote Spring XML files during broker initialization. Researchers uncovered the vulnerability using Anthropic’s Claude AI, which identified 80% of the exploit path in approximately 10 minutes with minimal human input. Horizon3’s Naveen Sunkavally reported the issue to Apache on March 22, 2026, and it was patched on March 30, 2026. Exploitation indicators include ActiveMQ broker logs showing internal VM transport connections with brokerConfig=xbean:http:// query parameters and warnings about configuration problems indicating payload execution. The flaw builds on a prior issue (CVE-2024-32114), which removed authentication requirements in versions 6.0.0-6.1.1, while other versions require default credentials (admin:admin). Despite the availability of the newer Artemis branch, ActiveMQ Classic remains widely deployed in enterprise, web backends, government, and Java-based corporate systems. Read
  • Security teams briefed on early threat signal monitoring techniques in upcoming webinar A live webinar scheduled for April 30, 2026, will outline methods for detecting and analyzing early indicators of threat actor activity across underground and encrypted communication channels. The session highlights the use of dark web forums, Telegram channels, and access broker marketplaces to identify pre-attack signals such as vulnerability discussions, leaked credentials, and compromised access listings. The goal is to enable security teams to shift from reactive to proactive defense by translating fragmented threat intelligence into prioritized defensive actions. The webinar is hosted by BleepingComputer and features Tammy Harper, Threat Intelligence Researcher at RansomLook, alongside insights from Flare Systems on monitoring external threat surfaces. Read
  • STX RAT campaign targets finance sector with advanced in-memory evasion and encrypted C2 A previously undocumented remote access trojan (RAT), designated STX RAT, was deployed against a financial services organization in late February 2026. The malware uses a multi-stage, in-memory execution chain with XXTEA encryption, Zlib compression, and reflective loading via PowerShell to evade file-based detection. It establishes encrypted command-and-control (C2) channels, delays credential theft until instructed, and employs virtual desktop integration to operate stealthily. Attackers leveraged opportunistic delivery vectors such as browser-downloaded scripts and trojanized installers. Initial access led to privilege escalation, persistent registry autorun and COM hijacking, and extensive post-exploitation capabilities including data harvesting, payload execution, and network tunneling. Read
  • Resurgence of Phorpiex Twizt botnet with hybrid P2P-C2 model and cryptocurrency clipper payloads A new variant of the Phorpiex (Trik) botnet, identified as Twizt, has evolved into a hybrid peer-to-peer (P2P) and HTTP polling command-and-control (C2) architecture using both TCP and UDP protocols, enabling resilience against takedowns. The malware primarily functions as a cryptocurrency clipper to reroute financial transactions, while also distributing sextortion spam, facilitating ransomware deployment (LockBit Black, Global), and exfiltrating sensitive data such as mnemonic phrases. Worm-like propagation occurs via removable and remote drives, alongside scanning for Local File Inclusion (LFI) vulnerabilities. The botnet maintains an average of 125,000 active infections daily, with the highest concentration of compromised hosts in Iran, Uzbekistan, China, Kazakhstan, and Pakistan. Read
  • Middle East civil society spear-phishing campaign linked to South Asian APT group Bitter using ProSpy Android spyware A spear-phishing campaign targeting civil society figures in the Middle East—including high-profile journalists in Egypt and Lebanon—was attributed to a hack-for-hire operation linked to the South Asian advanced persistent threat (APT) group Bitter (T-APT-17, APT-C-08). Between 2023 and 2025, attackers used social engineering via fake accounts and impersonation of legitimate services, including Signal and Apple Support, to deliver ProSpy Android spyware and compromise cloud accounts. The campaign leveraged two-stage delivery, credential phishing, and Android malware to extract files, contacts, messages, geolocation, and enable microphone and camera access. A Lebanese journalist’s Apple account was compromised in 2025, while two Egyptian journalists thwarted attempts in 2023–2024. The operation’s scope extended to Bahraini government entities, UAE, Saudi Arabia, UK, and potentially US targets, with infrastructure repurposed across campaigns. Read
  • Governance failures escalate as agentic AI NHIs double across enterprises SANS Institute’s 2026 State of Identity Threats & Defenses Survey reveals a critical governance gap as enterprises integrate agentic AI into core operations. Organizations report a 76% increase in non-human identities (NHIs), such as service accounts, API keys, automation bots, and workload identities, with 74% already deploying AI agents or automations requiring credentials. Unlike traditional NHIs, agentic AI behaves unpredictably—interpreting instructions at machine speed, potentially hallucinating, and operating autonomously with privileged access to critical infrastructure and data. Credential hygiene failings are widespread: 92% of organizations do not rotate machine credentials on a 90-day cycle, fearing service account breakage; 59% rotate fewer than half of NHI credentials quarterly, while 15% do not track rotation rates at all. Manual access reviews and ticket-based provisioning are failing to scale across DevOps, cloud, and SaaS systems, with 5% of organizations unaware they are running agentic AI and 15% not even knowing their credential rotation policy. Read
Last updated: 14:16 09/04/2026 UTC
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors. Read
  • Unauthenticated remote code execution flaw in Magento and Adobe Commerce via PolyShell polyglot uploads Since mid-March 2026, a critical unauthenticated remote code execution flaw named PolyShell has affected all supported versions of Magento Open Source and Adobe Commerce (version 2), enabling attackers to upload polyglot files via the REST API and achieve code execution. Adobe has only released a patch in the alpha release of version 2.4.9, leaving production deployments vulnerable. Exploitation is now actively occurring in the wild, with mass scanning activity since March 19, 2026, and successful compromises detected in 56.7% of all vulnerable stores. A new wave of attacks injects a 1x1-pixel SVG element with an onload handler containing a base64-encoded skimmer payload, executed via setTimeout to avoid detection. The malware intercepts checkout clicks, displays a fake 'Secure Checkout' overlay with card and billing fields, and validates payment data in real time using the Luhn algorithm. Stolen data is exfiltrated to six exfiltration domains hosted at IncogNet LLC in the Netherlands via XOR-encrypted, base64-obfuscated JSON. Indicators of compromise include the _mgx_cv key in browser localStorage and requests to /fb_metrics.php. Adobe has not yet released a production patch, and sixteen exfiltration domains and IP address 23.137.249.67 are now associated with these attacks. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, compromising trusted PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) to deliver credential-stealing malware that harvests SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. The malware exfiltrates stolen data to attacker-controlled infrastructure and establishes persistent backdoors, with evidence linking TeamPCP to the Vectr ransomware group for follow-on operations. The campaign began as a supply-chain attack involving 47 compromised npm packages and escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and direct targeting of CI/CD pipelines via GitHub Actions workflows (e.g., Checkmarx, Trivy). Recent compromises of LiteLLM and Telnyx demonstrate rapid iteration and maturation of supply-chain attack methodology, while destructive payloads targeting Iranian systems in Kubernetes environments (e.g., time-zone/locale-based wipers) highlight the group’s geopolitical alignment. The LiteLLM compromise specifically turned developer endpoints into systematic credential harvesting operations, with malware activating during installation/updates and cascading through transitive dependencies (e.g., dspy, opik) to affect organizations that never directly used LiteLLM. Read
  • Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency A financially motivated North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman through a two-week social engineering campaign involving cloned personas, fake Slack workspaces, and deceptive Microsoft Teams meetings. The attackers published malicious axios versions v1.14.1 and v0.30.4 containing plain-crypto-js as a dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack was part of an industrialized social engineering campaign targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building, matured attacker tooling, and convincing delivery mechanisms. The blast radius of compromised packages like axios—downloaded over 100 million times weekly—amplifies the impact, with similar campaigns observed against cryptocurrency founders, venture capital executives, and other developers. Malicious packages were swiftly removed, but the incident underscores the evolving threat model where traditional social engineering now scales through supply chain compromises. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns relied on malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms like Cloudflare Pages and Squarespace. AMOS has been delivered through disk images, obfuscated shell scripts, and in-memory payloads, expanding from Terminal-based ClickFix tactics to abuse trusted macOS applications. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 that blocks pasted command execution and warns users of risks, disrupting ClickFix attack chains. A new campaign observed in April 2026 by Jamf researchers now abuses the built-in Script Editor application to bypass these protections. The campaign uses fake Apple-themed disk cleanup guides to trick users into launching Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer. The new Script Editor-based ClickFix variation enables theft of Keychain data, browser autofill information, cryptocurrency wallet extensions, and system details without requiring Terminal interaction. AMOS continues to expand its capabilities, now including a backdoor component for persistent access to compromised systems. Read
  • Qilin Ransomware Campaign: German Political Party and Endpoint Compromises Qilin ransomware has been linked to a high-profile data theft incident targeting Die Linke, a major German political party with 123,000 members and 64 seats in the Bundestag. The group stole sensitive internal party data and personal information of headquarters employees, though the membership database was reportedly unaffected. Die Linke attributed the attack to Qilin, describing them as Russian-speaking cybercriminals with financial and political motivations, and suggested the incident may be part of hybrid warfare operations. The initial investigation focused on a Huntress Labs endpoint compromise where a rogue ScreenConnect instance was used to deploy malicious files and attempt disabling Windows Defender before ransomware deployment. Qilin operates as a ransomware-as-a-service (RaaS) variant with affiliates following diverse attack patterns. Read
  • Microsoft Investigates Multiple Issues in Classic Outlook Microsoft has resolved a bug causing email delivery issues for some Classic Outlook users sending via Outlook.com, which previously prevented messages from reaching intended recipients and triggered 0x80070005-0x0004dc-0x000524 non-delivery reports. The issue primarily affected users with Outlook profiles linked to Exchange accounts or those with Exchange Online mail contacts sharing SMTP addresses. Microsoft deployed a server-side fix on April 3, 2026, though some users may still encounter temporary issues until OAuth tokens expire. Earlier investigations revealed that Microsoft was addressing multiple problems in classic Outlook, including mouse pointer disappearance that also impacted OneNote and other Microsoft 365 apps, synchronization and connection issues with Gmail and Yahoo accounts, and "Can't connect to the server" errors when creating groups with EWS enabled. Temporary workarounds were provided for these issues while Microsoft worked on permanent fixes. Read

Latest updates

Browse →

Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting

Updated: 09.04.2026 20:04 · First: 30.06.2025 15:00 · 📰 19 src / 26 articles

As of April 9, 2026, **Iranian state-sponsored and affiliated cyber threat actors continue aggressive operations despite a fragile US-Iran ceasefire**, with hacktivist group **Handala announcing a temporary pause in attacks against the U.S.** but explicitly stating that **cyber warfare against Israel would persist** and resume post-ceasefire. While Handala—responsible for the **March 2026 wipe of 80,000 devices at U.S. medical giant Stryker**—claimed compliance with Tehran’s orders, **low-level cyberactivity by groups like 313 Team and Conquerors Electronic Army has continued unabated**, targeting Australian government systems, Israeli infrastructure, and U.S.-based platforms (e.g., Upwork). Analysts warn that **ceasefires historically inflame cyber operations**, as actors exploit diplomatic pauses to pivot tactics, expand targeting, or prepare for future escalations. The broader campaign remains defined by **Iran’s cyber-kinetic war doctrine**, integrating **digital reconnaissance with physical strikes**—exemplified by the **systematic compromise of Hikvision/Dahua IP cameras** (five patched but unpatched CVEs) across Israel, Gulf states, and Lebanon to enable **real-time battle damage assessment** and missile-targeting support. Since March 2026, Iranian APTs have **escalated direct attacks on U.S. critical infrastructure**, focusing on **Rockwell/Allen-Bradley PLCs** in Government Services, Water/Wastewater, and Energy sectors, with confirmed **financial losses, HMI/SCADA manipulation, and PLC project file exfiltration**. This follows prior **CyberAv3ngers (IRGC) campaigns** that compromised 75 Unitronics PLCs in 2023–2024. Parallel efforts include **Pay2Key’s re-emergence** with destructive, geopolitically timed ransomware attacks (e.g., a **three-hour encryption blitz** against a U.S. healthcare provider) and **pro-Iranian hacktivist waves** (149 DDoS attacks across 16 countries in 48 hours post-February 28 strikes). **Strategic trends** highlight Iran’s use of **false-flag operations, ransomware-as-a-smokescreen, and multi-actor obfuscation** to stretch adversary defenses. Flashpoint and CrowdStrike assess that **cyber-kinetic integration**—combining IP camera exploits, ICS/SCADA targeting, and propaganda—has become a **permanent feature of modern Iranian warfare**, with attacks likely to **broaden geographically** (e.g., Europe, North America) as the conflict evolves. Defenders are urged to **segment OT networks, eliminate public PLC exposure, and monitor for Iranian VPN/VPS infrastructure** (Mullvad, NordVPN, Surfshark) linked to ongoing campaigns.

Compromise of Smart Slider 3 Pro update system leads to multi-layered WordPress and Joomla backdoors

Updated: · First: 09.04.2026 19:15 · 📰 1 src / 1 articles

A threat actor compromised the update mechanism for the Smart Slider 3 Pro plugin (versions for WordPress and Joomla) and distributed a malicious update (3.5.1.35) on April 7, 2026. The malicious version installed multiple backdoors, created a hidden administrator account with stolen credentials, and exfiltrated sensitive data. The malware includes unauthenticated remote command execution via crafted HTTP headers and authenticated PHP eval/OS command backdoors. Persistence is achieved through hidden admin accounts, must-use plugins, theme injections, and core file tampering. The vendor recommends immediate upgrade to version 3.5.1.36 (or rollback to 3.5.1.34 or earlier) and comprehensive site remediation.

STX RAT campaign targets finance sector with advanced in-memory evasion and encrypted C2

Updated: · First: 09.04.2026 18:00 · 📰 1 src / 1 articles

A previously undocumented remote access trojan (RAT), designated STX RAT, was deployed against a financial services organization in late February 2026. The malware uses a multi-stage, in-memory execution chain with XXTEA encryption, Zlib compression, and reflective loading via PowerShell to evade file-based detection. It establishes encrypted command-and-control (C2) channels, delays credential theft until instructed, and employs virtual desktop integration to operate stealthily. Attackers leveraged opportunistic delivery vectors such as browser-downloaded scripts and trojanized installers. Initial access led to privilege escalation, persistent registry autorun and COM hijacking, and extensive post-exploitation capabilities including data harvesting, payload execution, and network tunneling.

Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS

Updated: 09.04.2026 17:02 · First: 25.03.2026 13:34 · 📰 4 src / 4 articles

Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors.

Resurgence of Phorpiex Twizt botnet with hybrid P2P-C2 model and cryptocurrency clipper payloads

Updated: · First: 09.04.2026 15:57 · 📰 1 src / 1 articles

A new variant of the Phorpiex (Trik) botnet, identified as Twizt, has evolved into a hybrid peer-to-peer (P2P) and HTTP polling command-and-control (C2) architecture using both TCP and UDP protocols, enabling resilience against takedowns. The malware primarily functions as a cryptocurrency clipper to reroute financial transactions, while also distributing sextortion spam, facilitating ransomware deployment (LockBit Black, Global), and exfiltrating sensitive data such as mnemonic phrases. Worm-like propagation occurs via removable and remote drives, alongside scanning for Local File Inclusion (LFI) vulnerabilities. The botnet maintains an average of 125,000 active infections daily, with the highest concentration of compromised hosts in Iran, Uzbekistan, China, Kazakhstan, and Pakistan.

Security teams briefed on early threat signal monitoring techniques in upcoming webinar

Updated: · First: 09.04.2026 15:20 · 📰 1 src / 1 articles

A live webinar scheduled for April 30, 2026, will outline methods for detecting and analyzing early indicators of threat actor activity across underground and encrypted communication channels. The session highlights the use of dark web forums, Telegram channels, and access broker marketplaces to identify pre-attack signals such as vulnerability discussions, leaked credentials, and compromised access listings. The goal is to enable security teams to shift from reactive to proactive defense by translating fragmented threat intelligence into prioritized defensive actions. The webinar is hosted by BleepingComputer and features Tammy Harper, Threat Intelligence Researcher at RansomLook, alongside insights from Flare Systems on monitoring external threat surfaces.

Shamos Infostealer Targeting Mac Devices via ClickFix Attacks

Updated: 09.04.2026 14:20 · First: 22.08.2025 18:44 · 📰 8 src / 14 articles

Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns relied on malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms like Cloudflare Pages and Squarespace. AMOS has been delivered through disk images, obfuscated shell scripts, and in-memory payloads, expanding from Terminal-based ClickFix tactics to abuse trusted macOS applications. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 that blocks pasted command execution and warns users of risks, disrupting ClickFix attack chains. A new campaign observed in April 2026 by Jamf researchers now abuses the built-in Script Editor application to bypass these protections. The campaign uses fake Apple-themed disk cleanup guides to trick users into launching Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer. The new Script Editor-based ClickFix variation enables theft of Keychain data, browser autofill information, cryptocurrency wallet extensions, and system details without requiring Terminal interaction. AMOS continues to expand its capabilities, now including a backdoor component for persistent access to compromised systems.

Middle East civil society spear-phishing campaign linked to South Asian APT group Bitter using ProSpy Android spyware

Updated: · First: 09.04.2026 13:45 · 📰 1 src / 1 articles

A spear-phishing campaign targeting civil society figures in the Middle East—including high-profile journalists in Egypt and Lebanon—was attributed to a hack-for-hire operation linked to the South Asian advanced persistent threat (APT) group Bitter (T-APT-17, APT-C-08). Between 2023 and 2025, attackers used social engineering via fake accounts and impersonation of legitimate services, including Signal and Apple Support, to deliver ProSpy Android spyware and compromise cloud accounts. The campaign leveraged two-stage delivery, credential phishing, and Android malware to extract files, contacts, messages, geolocation, and enable microphone and camera access. A Lebanese journalist’s Apple account was compromised in 2025, while two Egyptian journalists thwarted attempts in 2023–2024. The operation’s scope extended to Bahraini government entities, UAE, Saudi Arabia, UK, and potentially US targets, with infrastructure repurposed across campaigns.

Eurail Data Breach: Stolen Customer Data Sold on Dark Web

Updated: 09.04.2026 13:31 · First: 16.02.2026 21:19 · 📰 2 src / 2 articles

Eurail B.V. confirmed a December 26, 2025 data breach impacting 308,777 individuals, with stolen data including full names, passport details, ID numbers, bank account IBANs, health information, and contact details now being sold on the dark web. The breach involved unauthorized file transfers from Eurail’s network, and the company has notified affected customers and data protection authorities. Customers are advised to update passwords, monitor bank accounts, and remain vigilant against phishing attacks. The breach occurred after threat actors gained unauthorized access to Eurail’s customer database, exposing sensitive traveler information. Eurail initially disclosed the incident in February 2026, noting that a sample of the stolen data was published on Telegram. The European Commission later warned that health information for young travelers in the DiscoverEU program may also have been compromised.

Governance failures escalate as agentic AI NHIs double across enterprises

Updated: · First: 09.04.2026 13:00 · 📰 1 src / 1 articles

SANS Institute’s 2026 State of Identity Threats & Defenses Survey reveals a critical governance gap as enterprises integrate agentic AI into core operations. Organizations report a 76% increase in non-human identities (NHIs), such as service accounts, API keys, automation bots, and workload identities, with 74% already deploying AI agents or automations requiring credentials. Unlike traditional NHIs, agentic AI behaves unpredictably—interpreting instructions at machine speed, potentially hallucinating, and operating autonomously with privileged access to critical infrastructure and data. Credential hygiene failings are widespread: 92% of organizations do not rotate machine credentials on a 90-day cycle, fearing service account breakage; 59% rotate fewer than half of NHI credentials quarterly, while 15% do not track rotation rates at all. Manual access reviews and ticket-based provisioning are failing to scale across DevOps, cloud, and SaaS systems, with 5% of organizations unaware they are running agentic AI and 15% not even knowing their credential rotation policy.

Active exploitation of Adobe Acrobat Reader zero-day via crafted PDFs since December 2025

Updated: · First: 09.04.2026 12:22 · 📰 1 src / 1 articles

A zero-day vulnerability in Adobe Acrobat Reader has been actively exploited since at least December 2025 using maliciously crafted PDF documents. Threat actors leverage a sophisticated, fingerprinting-style exploit targeting an unpatched flaw, enabling data theft and potential remote code execution or sandbox escape on compromised systems without requiring user interaction beyond opening the PDF. The attacks appear to be selectively targeting users, with phishing lures referencing Russian-language content related to the oil and gas industry.

Unauthorized transfer of 50.903 Bitcoin from Bitcoin Depot corporate wallets

Updated: · First: 09.04.2026 10:44 · 📰 1 src / 1 articles

Attackers breached Bitcoin Depot’s corporate IT systems on March 23, 2026, and exfiltrated approximately 50.903 Bitcoin (valued at $3.665 million) from the company’s controlled wallets before access was blocked. The intrusion targeted Bitcoin Depot’s corporate environment and did not affect customer-facing platforms, systems, or data. The company activated incident response protocols, engaged external cybersecurity experts, and notified law enforcement and regulators, including the SEC.

Microsoft account verification policy enforcement disrupts high-profile open source project Windows builds

Updated: · First: 09.04.2026 09:46 · 📰 1 src / 1 articles

Microsoft suspended developer accounts used to maintain multiple high-profile open-source projects, blocking the publication of Windows drivers and security updates. Affected projects include WireGuard, VeraCrypt, MemTest86, and Windscribe VPN. Developers reported no prior notification, lack of appeal process, and inability to contact Microsoft support. The suspensions stemmed from non-compliance with Microsoft’s mandatory Windows Hardware Program account verification initiated in October 2025. Critically, the disruption impacted the delivery of Windows updates, which constitute the majority of user platforms for these projects.

Unauthenticated remote code execution flaw in Magento and Adobe Commerce via PolyShell polyglot uploads

Updated: 09.04.2026 01:34 · First: 19.03.2026 22:01 · 📰 3 src / 3 articles

Since mid-March 2026, a critical unauthenticated remote code execution flaw named PolyShell has affected all supported versions of Magento Open Source and Adobe Commerce (version 2), enabling attackers to upload polyglot files via the REST API and achieve code execution. Adobe has only released a patch in the alpha release of version 2.4.9, leaving production deployments vulnerable. Exploitation is now actively occurring in the wild, with mass scanning activity since March 19, 2026, and successful compromises detected in 56.7% of all vulnerable stores. A new wave of attacks injects a 1x1-pixel SVG element with an onload handler containing a base64-encoded skimmer payload, executed via setTimeout to avoid detection. The malware intercepts checkout clicks, displays a fake 'Secure Checkout' overlay with card and billing fields, and validates payment data in real time using the Luhn algorithm. Stolen data is exfiltrated to six exfiltration domains hosted at IncogNet LLC in the Netherlands via XOR-encrypted, base64-obfuscated JSON. Indicators of compromise include the _mgx_cv key in browser localStorage and requests to /fb_metrics.php. Adobe has not yet released a production patch, and sixteen exfiltration domains and IP address 23.137.249.67 are now associated with these attacks.

Emoji-based command-and-control and covert communications observed in threat actor operations

Updated: · First: 08.04.2026 23:21 · 📰 1 src / 1 articles

Threat actors are increasingly leveraging emojis in covert communications, malware logic, and operational coordination to evade detection and automate malicious activities. Emojis are used across Telegram, Discord, underground forums, and malware code to signal commands, exfiltrate data, and coordinate campaigns, with notable examples including the Pakistan-linked UTA0137 group’s 'Disgomoji' malware that translated emojis into operational actions. The technique provides obfuscation against keyword filters, enables multilingual coordination in global cybercriminal ecosystems, and supports rapid, high-volume communications in fraud channels and illicit marketplaces.

HackerOne suspends IBB program submissions amid AI-driven vulnerability discovery surge

Updated: · First: 08.04.2026 22:47 · 📰 1 src / 1 articles

HackerOne suspended new vulnerability submissions to its Internet Bug Bounty (IBB) program on March 27, 2026, citing a critical imbalance between AI-assisted vulnerability discovery rates and the limited remediation capacity of open source maintainers. The decision reflects the broader challenge of managing exponential increases in low-to-medium quality vulnerability reports generated by AI tools, which overwhelm volunteer-driven open source projects. The move has prompted downstream impacts, including the temporary suspension of the Node.js project’s bug bounty program due to funding loss through IBB. Industry experts characterize this as a structural shift in the vulnerability discovery and remediation pipeline, where discovery has been industrialized while remediation remains under-resourced and human-scale.

Unauthenticated RCE Vulnerability in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197)

Updated: 08.04.2026 20:26 · First: 08.04.2026 12:15 · 📰 2 src / 2 articles

A high-severity unauthenticated remote code execution (RCE) vulnerability (CVE-2026-34197) was discovered in Apache ActiveMQ Classic, affecting versions prior to 5.19.4 and all versions from 6.0.0 to 6.2.3. The flaw permits attackers to execute arbitrary OS commands by abusing the Jolokia management API's addNetworkConnector function to fetch remote Spring XML files during broker initialization. Researchers uncovered the vulnerability using Anthropic’s Claude AI, which identified 80% of the exploit path in approximately 10 minutes with minimal human input. Horizon3’s Naveen Sunkavally reported the issue to Apache on March 22, 2026, and it was patched on March 30, 2026. Exploitation indicators include ActiveMQ broker logs showing internal VM transport connections with brokerConfig=xbean:http:// query parameters and warnings about configuration problems indicating payload execution. The flaw builds on a prior issue (CVE-2024-32114), which removed authentication requirements in versions 6.0.0-6.1.1, while other versions require default credentials (admin:admin). Despite the availability of the newer Artemis branch, ActiveMQ Classic remains widely deployed in enterprise, web backends, government, and Java-based corporate systems.

Silent Expansion of Google API Key Access to Gemini AI Endpoints on Android Applications

Updated: · First: 08.04.2026 19:00 · 📰 1 src / 1 articles

A structural flaw in Google’s API key system has enabled unauthorized access to the Gemini AI platform from embedded keys in Android applications. The issue stems from Google’s API key format, which previously restricted access to services like Maps and Firebase but now automatically grants access to AI endpoints when Gemini is enabled. Developers who embedded these keys in client-side code, following prior guidance, now face exposure of sensitive data, unauthorized API usage leading to financial losses, and potential service disruption. CloudSEK identified 32 active exposed keys across 22 Android applications with over 500 million cumulative installs, demonstrating the widespread nature of the risk.

Arbitrary file upload vulnerability in Ninja Forms plugin leads to unauthenticated remote code execution in WordPress

Updated: · First: 08.04.2026 18:10 · 📰 1 src / 1 articles

A critical arbitrary file upload vulnerability in the Ninja Forms – File Uploads plugin (versions ≤3.3.26) for WordPress enables unauthenticated attackers to upload malicious files, leading to remote code execution (RCE). The flaw, discovered by researcher Sélim Lanouar, carries a CVSS score of 9.8 and stems from insufficient file validation in the plugin’s upload handling function. Attackers can bypass restrictions to upload PHP files, manipulate filenames, use path traversal, and execute malicious code, potentially gaining full control of affected websites.

Consumer-grade GPUs outperform AI accelerators in password cracking benchmarks

Updated: · First: 08.04.2026 17:00 · 📰 1 src / 1 articles

Benchmarking tests comparing flagship AI accelerators (Nvidia H200, AMD MI300X) and a consumer GPU (Nvidia RTX 5090) revealed that consumer-grade hardware significantly outperforms AI accelerators in raw password cracking performance across multiple hashing algorithms (MD5, NTLM, bcrypt, SHA-256, SHA-512). The RTX 5090 achieved higher hash rates than both the H200 and MI300X in all tested algorithms, despite being an order of magnitude less expensive. Historical comparisons with older consumer GPUs (e.g., 2017 Nvidia GTX 1080 rigs) showed similar or superior cracking performance to current AI accelerators. The findings underscore that password cracking capability is not dependent on specialized or high-cost hardware, highlighting the importance of strong password policies and credential monitoring to mitigate brute-force and credential-stuffing risks.

Operational Disruption at Signature Healthcare Following Suspected Cybersecurity Incident

Updated: · First: 08.04.2026 15:31 · 📰 1 src / 1 articles

Signature Healthcare in Brockton, Massachusetts, has diverted ambulances due to a suspected cybersecurity incident causing significant operational disruptions. Brockton Hospital, a 200-bed community facility, and Signature Medical Group’s 15 locations remained partially operational, with emergency and walk-in services open but ambulance traffic redirected. The incident, detected on Monday, triggered down-time procedures to maintain patient care and safety. Chemotherapy infusion services were canceled, prescriptions could not be filled at retail pharmacies, and patients faced delays across medical group practices. The attackers’ motives and whether ransomware was involved remain unconfirmed.

Masjesu DDoS botnet campaign expands with multi-architecture payload targeting global IoT devices

Updated: · First: 08.04.2026 14:49 · 📰 1 src / 1 articles

The Masjesu DDoS botnet has been operationally active since at least 2023, infecting IoT devices worldwide to launch multi-vector DDoS attacks exceeding hundreds of gigabytes in volume. The botnet’s operator advertises services on Telegram, targeting both Chinese and English-speaking users, and maintains a multi-architecture malware payload capable of infecting devices running i386, MIPS, ARM, SPARC, PPC, 68K, and AMD64. Masjesu primarily spreads via vulnerabilities in D-Link, GPON, Huawei home gateways, MVPower DVRs, Netgear routers, and UPnP-enabled devices, with the highest concentration of infected devices observed in Vietnam, Brazil, India, Iran, Kenya, and Ukraine.

Claude Mythos uncovers thousands of zero-days across major systems via Project Glasswing

Updated: 08.04.2026 14:30 · First: 08.04.2026 12:16 · 📰 2 src / 2 articles

Anthropic’s frontier AI model, Claude Mythos Preview, has autonomously discovered and remediated thousands of high-severity zero-day vulnerabilities across major operating systems, web browsers, and software libraries through Project Glasswing, a consortium involving AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and Anthropic. The initiative leverages Mythos Preview’s advanced agentic coding and reasoning capabilities—developed without explicit cybersecurity training—to identify long-standing flaws such as a 27-year-old OpenBSD denial-of-service vulnerability and a 16-year-old FFmpeg flaw. Anthropic has reported and patched these vulnerabilities while committing $100 million in usage credits and $4 million in donations to support open-source security efforts. The project aims to safely deploy Mythos-class models at scale, though concerns persist about potential malicious exploitation by threat actors.

Gartner’s Identity Visibility and Intelligence Platforms framework introduced to address enterprise IAM visibility gaps exposing identity dark matter

Updated: · First: 08.04.2026 14:30 · 📰 1 src / 1 articles

Gartner has formally introduced the Identity Visibility and Intelligence Platform (IVIP) as a critical "System of Systems" within the Identity Fabric framework to address the growing attack surface caused by undetected identity activity across fragmented enterprise environments. Research from Orchid Security indicates that 46% of enterprise identity activity occurs outside centralized IAM visibility, creating significant blind spots in security posture. IVIP platforms are positioned at Layer 5 of the Identity Fabric, providing continuous discovery, unified telemetry, and AI-driven behavioral intelligence to convert identity dark matter—including local accounts, over-permissioned machine identities, and shadow IT—into actionable security oversight. The IVIP model emphasizes outcome-driven metrics, automated remediation, and AI agent governance to reduce identity-related risk and shrink the operational gap between documented policy and real-world access patterns.

APT28 DNS hijacking campaigns via compromised SOHO routers observed in 2025–2026 targeting credential theft

Updated: 08.04.2026 13:03 · First: 07.04.2026 18:30 · 📰 3 src / 3 articles

APT28 (GRU GTsSS Military Unit 26165) has conducted opportunistic DNS hijacking campaigns since at least August 2025 by compromising small office/home office (SOHO) routers—primarily TP-Link models such as WR841N—to redirect victim traffic through attacker-controlled DNS servers and steal credentials. The campaign peaked in December 2025, compromising over 18,000 networks, including 200 organizations and 5,000 consumer devices, and specifically targeted government agencies such as ministries of foreign affairs, law enforcement, and third-party email providers. TP-Link routers were likely exploited via CVE-2023-50224 to retrieve credentials, which were used in adversary-in-the-middle attacks against browser sessions and desktop applications to harvest credentials for web and email services. APT28 operates a persistent infrastructure of VPSs repurposed as malicious DNS servers, receiving DNS requests from exploited routers and enabling opportunistic triage to identify high-value targets. Microsoft reported this is the first time APT28 has used DNS hijacking at scale to support post-compromise adversary-in-the-middle (AiTM) attacks on TLS connections against Microsoft Outlook on the web domains, intercepting OAuth authentication tokens after successful MFA authentication without requiring additional malware on compromised routers. On April 7, 2026, US authorities dismantled APT28’s US-based DNS hijacking network as part of ‘Operation Masquerade,’ neutralizing compromised routers across 23 states. The operation, led by the FBI and authorized by a court, reset DNS settings on affected TP-Link routers to restore legitimate DNS resolvers from ISPs without impacting functionality or collecting user content. The FBI is working with ISPs to notify affected users and urges router owners to replace outdated devices, update firmware, and verify DNS settings to prevent further exploitation.

Server-side Bing update regression disrupts Windows 11 23H2 Start Menu search functionality

Updated: · First: 08.04.2026 10:00 · 📰 1 src / 1 articles

A server-side Bing update distributed by Microsoft on April 6, 2026, introduced a regression that broke the Start Menu search feature for a subset of Windows 11 23H2 users. Impacted systems exhibited blank search results that appeared functional but returned no data. Microsoft identified the root cause as a problematic server-side Bing update aimed at improving search performance and rolled back the change the same day. The fix is being gradually distributed to affected devices via Windows release health updates.

Unauthenticated remote code execution vulnerability in Ninja Forms File Uploads plugin exploited in the wild

Updated: · First: 08.04.2026 01:03 · 📰 1 src / 1 articles

A critical vulnerability in the Ninja Forms File Uploads premium WordPress add-on (CVE-2026-0740) is being actively exploited to achieve unauthenticated remote code execution. The flaw allows attackers to upload arbitrary files, including malicious PHP scripts, by bypassing file type validation and abusing path traversal due to lack of sanitization. With over 90,000 active installations and severe technical implications, exploitation can lead to full server compromise, web shell deployment, and site takeover. The issue affects Ninja Forms File Upload versions up to 3.3.26 and carries a CVSS score of 9.8, reflecting its high severity and immediate exploitability.

2025 U.S. cybercrime losses reach nearly $21bn with AI-enabled fraud, cryptocurrency scams, and critical infrastructure targeting highlighted

Updated: 07.04.2026 23:41 · First: 07.04.2026 15:00 · 📰 2 src / 2 articles

In 2025, U.S. cyber-enabled crime losses rose to nearly $21 billion, a 26% increase from 2024, with the FBI’s IC3 receiving over 1 million complaints. Cryptocurrency fraud dominated financial losses at over $11 billion across 181,565 cases, while phishing (191,000 cases) and investment scams (72,000) remained the most frequent complaint types. Americans over 60 were disproportionately affected, suffering $7.7 billion in losses—a 37% increase from the prior year. AI-enabled fraud, encompassing voice cloning, deepfakes, and synthetic profiles, accounted for $893 million in losses across 22,300 complaints. The FBI reported critical infrastructure sectors—including healthcare, manufacturing, financial services, information technology, and government facilities—as the most targeted. In response, the agency conducted 3,900 Financial Fraud Kill Chain interventions, freezing $679 million of $1.16 billion attempted thefts, and launched Operation Level Up to proactively alert 3,780 potential cryptocurrency investment fraud victims, 78% of whom were unaware of the scam.

Medusa ransomware campaigns by Storm-1175 exploit N-days and zero-days at rapid pace

Updated: · First: 07.04.2026 23:15 · 📰 1 src / 1 articles

Storm-1175, a financially motivated cybercrime group tracked by Microsoft Threat Intelligence, is conducting high-velocity Medusa ransomware campaigns that exploit both known vulnerabilities (N-days) and zero-days within days or even hours of disclosure. The group targets exposed perimeter assets in healthcare, education, professional services, and finance sectors across Australia, the United Kingdom, and the United States. Attack chains typically progress from initial exploitation to data exfiltration and Medusa deployment within 24 hours to a few days, outpacing organizational patching timelines and necessitating immediate patch prioritization upon release.

Indirect prompt injection in Grafana AI rendering enables silent data exfiltration

Updated: 07.04.2026 22:52 · First: 07.04.2026 17:00 · 📰 2 src / 2 articles

A novel attack chain dubbed GrafanaGhost exploits indirect prompt injection via Grafana's AI rendering components to silently extract sensitive enterprise data. The exploit is triggered when manipulated inputs—crafted via image tags, protocol-relative URLs, and the "INTENT" keyword—bypass domain validation and AI guardrails, enabling stealthy real-time transmission of financial metrics, infrastructure health data, and customer records. Grafana Labs has patched the vulnerability in its Markdown component’s image renderer, though the company disputes claims of zero-click operation, asserting exploitation required substantial user interaction and AI warnings.