CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 18:30 11/04/2026 UTC
  • Unauthenticated Internet-exposed industrial controllers identified in global OT networks Researchers identified at least 179 Internet-connected industrial control systems (ICS) devices exposing the Modbus protocol on default port 502 without authentication, enabling direct read and write access by any Internet user. The exposed devices include controllers tied to national railway and power grid infrastructure, creating potential for serious physical consequences if compromised. Despite geopolitical tensions, direct targeting of OT assets remains an active and avoidable risk vector. Read
  • Structural failure in enterprise vulnerability remediation amid collapsing exploit timelines Analysis of over one billion CISA KEV remediation records spanning four years across 10,000 organizations reveals a systemic failure in enterprise vulnerability remediation despite increased operational effort. Time-to-Exploit has collapsed to negative seven days for critical vulnerabilities, with 88% of tracked weaponized flaws remediated slower than exploitation occurred. Critical vulnerabilities open at Day 7 have risen from 56% to 63% while remediation tickets closed grew 6.5x since 2022. Traditional scan-and-report models cannot close this operational gap as autonomous AI agents accelerate offensive capabilities beyond human response cycles. Read
  • Storm-2755 conducts AiTM payroll pirate attacks against Canadian Microsoft 365 accounts A financially motivated threat actor named Storm-2755 has compromised Canadian employee accounts via adversary-in-the-middle (AiTM) phishing to intercept and divert salary payments in a payroll pirate campaign. The attackers hijacked Microsoft 365 sessions by stealing authentication tokens and session cookies through malicious sign-in pages hosted on SEO-poisoned or malvertised domains, thereby bypassing MFA protections. Once inside victim mailboxes, Storm-2755 created stealthy inbox rules to hide HR correspondence, then contacted HR staff to update direct deposit details or directly modified payroll systems such as Workday to reroute payments. The campaign highlights ongoing abuse of legacy authentication and non-phishing-resistant MFA in enterprise environments. Read
  • Sensitive customer support ticket data exposed in Hims third-party platform breach A third-party customer support platform used by telehealth provider Hims & Hers Health (Hims) was breached between February 4 and February 7, exposing highly sensitive protected health information (PHI) via customer support tickets. The breach compromised names, unspecified medical data, and email addresses, impacting an undisclosed number of customers. Threat actor ShinyHunters initially claimed responsibility, though this has not been independently verified. The incident highlights systemic risks in healthcare customer support workflows that aggregate sensitive PHI across fragmented, outsourced systems. Read
  • Rising Threat of AI Browser Extensions as Enterprise Attack Surface Exposed A new study reveals AI browser extensions as a rapidly expanding, under-monitored attack vector in enterprise environments. These extensions bypass traditional security controls by operating within the browser, granting direct access to user inputs, session cookies, and rendered page content. Enterprise adoption is nearly universal—99% of users install at least one extension—with AI extensions displaying disproportionately high risk profiles, including elevated vulnerability rates, increased permission escalations, and ungoverned access to sensitive data. The lack of visibility and governance creates an unmonitored channel for data exfiltration, session hijacking, and policy evasion, particularly as AI tooling becomes embedded directly into browsing workflows. Read
  • OpenAI introduces ChatGPT Pro subscription tier targeting enterprise and coding use cases OpenAI launched a new ChatGPT Pro subscription tier priced at $100 per month, aligning with Anthropic’s Claude pricing strategy. The tier is positioned to attract enterprise users and developers requiring high-volume access to advanced AI capabilities for complex, ongoing workflows. The Pro tier offers 5x higher usage limits than the $20 Plus plan, with time-limited 10x Codex usage boosts, and includes access to Pro models, Codex, Deep Research, image generation, Memory, and file uploads. The move reflects OpenAI’s shift toward targeting coders and enterprises, a segment previously emphasized by Anthropic with its $100 Claude subscription tier. Read
  • International law enforcement disruption of cryptocurrency fraud networks exposes 20,000 victims and $57M in illicit proceeds An international law enforcement operation codenamed Operation Atlantic, coordinated by the U.K. National Crime Agency (NCA), has identified over 20,000 victims of cryptocurrency fraud across Canada, the U.K., and the U.S., while freezing $12.4 million in suspected criminal proceeds. The week-long operation disrupted fraud networks using approval phishing tactics to gain unauthorized access to victims’ wallets, often leveraging investment scams. Investigators also traced $45 million in stolen cryptocurrency linked to global fraud schemes. The initiative involved public-private partnerships with agencies including the U.S. Secret Service, Ontario Provincial Police, and the Financial Conduct Authority, aiming to embed this model into the U.K.'s Fraud Strategy for enhanced fraud prevention. Read
Last updated: 16:15 11/04/2026 UTC
  • Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors. Read
  • Unauthenticated remote code execution flaw in Magento and Adobe Commerce via PolyShell polyglot uploads Since mid-March 2026, a critical unauthenticated remote code execution flaw named PolyShell has affected all supported versions of Magento Open Source and Adobe Commerce (version 2), enabling attackers to upload polyglot files via the REST API and achieve code execution. Adobe has only released a patch in the alpha release of version 2.4.9, leaving production deployments vulnerable. Exploitation is now actively occurring in the wild, with mass scanning activity since March 19, 2026, and successful compromises detected in 56.7% of all vulnerable stores. A new wave of attacks injects a 1x1-pixel SVG element with an onload handler containing a base64-encoded skimmer payload, executed via setTimeout to avoid detection. The malware intercepts checkout clicks, displays a fake 'Secure Checkout' overlay with card and billing fields, and validates payment data in real time using the Luhn algorithm. Stolen data is exfiltrated to six exfiltration domains hosted at IncogNet LLC in the Netherlands via XOR-encrypted, base64-obfuscated JSON. Indicators of compromise include the _mgx_cv key in browser localStorage and requests to /fb_metrics.php. Adobe has not yet released a production patch, and sixteen exfiltration domains and IP address 23.137.249.67 are now associated with these attacks. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, compromising trusted PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) to deliver credential-stealing malware that harvests SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. The malware exfiltrates stolen data to attacker-controlled infrastructure and establishes persistent backdoors, with evidence linking TeamPCP to the Vectr ransomware group for follow-on operations. The campaign began as a supply-chain attack involving 47 compromised npm packages and escalated to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and direct targeting of CI/CD pipelines via GitHub Actions workflows (e.g., Checkmarx, Trivy). Recent compromises of LiteLLM and Telnyx demonstrate rapid iteration and maturation of supply-chain attack methodology, while destructive payloads targeting Iranian systems in Kubernetes environments (e.g., time-zone/locale-based wipers) highlight the group’s geopolitical alignment. The LiteLLM compromise specifically turned developer endpoints into systematic credential harvesting operations, with malware activating during installation/updates and cascading through transitive dependencies (e.g., dspy, opik) to affect organizations that never directly used LiteLLM. Read
  • Targeted social engineering of Axios maintainer enables UNC1069 npm supply chain compromise via WAVESHAPER.V2 implant A maintainer of the widely used Axios npm package was targeted in a highly tailored social engineering campaign attributed to North Korean threat actor UNC1069, resulting in the compromise of npm account credentials and the publication of two trojanized versions of Axios (1.14.1 and 0.30.4). Google Threat Intelligence Group (GTIG) attributed the attack to UNC1069 based on the use of WAVESHAPER.V2 and infrastructure overlaps with past activities. The malicious packages were available for roughly three hours and injected a plain-crypto-js dependency that installed a cross-platform RAT, enabling credential theft and downstream compromise. The campaign also targeted additional maintainers, including Pelle Wessman (Mocha framework) and Node.js core contributors, revealing a coordinated effort against high-impact maintainers. The intrusion began with reconnaissance-driven impersonation of a legitimate company founder, engagement via a cloned Slack workspace and Microsoft Teams call, and execution of a fake system update that deployed the RAT. Post-incident, the maintainer reset devices, rotated all credentials, adopted immutable releases, introduced OIDC-based publishing flows, and updated GitHub Actions workflows to mitigate future risks. Read
  • Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency A financially motivated North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman through a two-week social engineering campaign involving cloned personas, fake Slack workspaces, and deceptive Microsoft Teams meetings. The attackers published malicious axios versions v1.14.1 and v0.30.4 containing plain-crypto-js as a dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack was part of an industrialized social engineering campaign targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building, matured attacker tooling, and convincing delivery mechanisms. The blast radius of compromised packages like axios—downloaded over 100 million times weekly—amplifies the impact, with similar campaigns observed against cryptocurrency founders, venture capital executives, and other developers. Malicious packages were swiftly removed, but the incident underscores the evolving threat model where traditional social engineering now scales through supply chain compromises. Read
  • Shamos Infostealer Targeting Mac Devices via ClickFix Attacks Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns relied on malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms like Cloudflare Pages and Squarespace. AMOS has been delivered through disk images, obfuscated shell scripts, and in-memory payloads, expanding from Terminal-based ClickFix tactics to abuse trusted macOS applications. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 that blocks pasted command execution and warns users of risks, disrupting ClickFix attack chains. A new campaign observed in April 2026 by Jamf researchers now abuses the built-in Script Editor application to bypass these protections. The campaign uses fake Apple-themed disk cleanup guides to trick users into launching Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer. The new Script Editor-based ClickFix variation enables theft of Keychain data, browser autofill information, cryptocurrency wallet extensions, and system details without requiring Terminal interaction. AMOS continues to expand its capabilities, now including a backdoor component for persistent access to compromised systems. Read
  • Microsoft Investigates Multiple Issues in Classic Outlook Microsoft has resolved a bug causing email delivery issues for some Classic Outlook users sending via Outlook.com, which previously prevented messages from reaching intended recipients and triggered 0x80070005-0x0004dc-0x000524 non-delivery reports. The issue primarily affected users with Outlook profiles linked to Exchange accounts or those with Exchange Online mail contacts sharing SMTP addresses. Microsoft deployed a server-side fix on April 3, 2026, though some users may still encounter temporary issues until OAuth tokens expire. Earlier investigations revealed that Microsoft was addressing multiple problems in classic Outlook, including mouse pointer disappearance that also impacted OneNote and other Microsoft 365 apps, synchronization and connection issues with Gmail and Yahoo accounts, and "Can't connect to the server" errors when creating groups with EWS enabled. Temporary workarounds were provided for these issues while Microsoft worked on permanent fixes. Read

Latest updates

Browse →

International law enforcement disruption of cryptocurrency fraud networks exposes 20,000 victims and $57M in illicit proceeds

Updated: · First: 11.04.2026 17:20 · 📰 1 src / 1 articles

An international law enforcement operation codenamed Operation Atlantic, coordinated by the U.K. National Crime Agency (NCA), has identified over 20,000 victims of cryptocurrency fraud across Canada, the U.K., and the U.S., while freezing $12.4 million in suspected criminal proceeds. The week-long operation disrupted fraud networks using approval phishing tactics to gain unauthorized access to victims’ wallets, often leveraging investment scams. Investigators also traced $45 million in stolen cryptocurrency linked to global fraud schemes. The initiative involved public-private partnerships with agencies including the U.S. Secret Service, Ontario Provincial Police, and the Financial Conduct Authority, aiming to embed this model into the U.K.'s Fraud Strategy for enhanced fraud prevention.

Ad-based global geolocation surveillance system Webloc leveraged by law enforcement and intelligence agencies

Updated: · First: 11.04.2026 09:02 · 📰 1 src / 1 articles

A global geolocation surveillance system named Webloc, developed by Cobwebs Technologies and now sold by its successor Penlink, has been used by law enforcement and intelligence agencies in multiple countries to track at least 500 million devices worldwide. The system aggregates device identifiers, location coordinates, and profile data harvested from mobile apps and digital advertising streams. Agencies including U.S. Immigration and Customs Enforcement (ICE), the U.S. military, state and local police departments, and agencies in Hungary and El Salvador accessed Webloc to monitor populations and infer device ownership via home and workplace addresses. Webloc operates without requiring warrants in some documented cases and provides historical tracking capabilities spanning up to three years.

OpenAI introduces ChatGPT Pro subscription tier targeting enterprise and coding use cases

Updated: · First: 11.04.2026 05:08 · 📰 1 src / 1 articles

OpenAI launched a new ChatGPT Pro subscription tier priced at $100 per month, aligning with Anthropic’s Claude pricing strategy. The tier is positioned to attract enterprise users and developers requiring high-volume access to advanced AI capabilities for complex, ongoing workflows. The Pro tier offers 5x higher usage limits than the $20 Plus plan, with time-limited 10x Codex usage boosts, and includes access to Pro models, Codex, Deep Research, image generation, Memory, and file uploads. The move reflects OpenAI’s shift toward targeting coders and enterprises, a segment previously emphasized by Anthropic with its $100 Claude subscription tier.

Sensitive customer support ticket data exposed in Hims third-party platform breach

Updated: · First: 10.04.2026 23:02 · 📰 1 src / 1 articles

A third-party customer support platform used by telehealth provider Hims & Hers Health (Hims) was breached between February 4 and February 7, exposing highly sensitive protected health information (PHI) via customer support tickets. The breach compromised names, unspecified medical data, and email addresses, impacting an undisclosed number of customers. Threat actor ShinyHunters initially claimed responsibility, though this has not been independently verified. The incident highlights systemic risks in healthcare customer support workflows that aggregate sensitive PHI across fragmented, outsourced systems.

Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting

Updated: 10.04.2026 18:52 · First: 30.06.2025 15:00 · 📰 20 src / 27 articles

As of **April 10, 2026**, Iranian state-sponsored and affiliated cyber threat actors continue to escalate attacks against **U.S. critical infrastructure**, with new data revealing that **3,891 internet-exposed Rockwell Automation/Allen-Bradley PLCs**—74.6% of the global total—are vulnerable to ongoing Iranian APT campaigns. The FBI, CISA, and allied agencies confirm that these attacks have resulted in **PLC project file exfiltration, HMI/SCADA data manipulation, and operational disruptions**, marking a direct expansion of Iran’s cyber-kinetic doctrine into U.S. industrial control systems (ICS). The broader campaign remains defined by **Iran’s integration of cyber and kinetic warfare**, including the **systematic exploitation of Hikvision/Dahua IP cameras** for real-time battle damage assessment and the **re-emergence of destructive ransomware groups like Pay2Key**, which executed a **three-hour encryption blitz** against a U.S. healthcare provider in March 2026. Despite the **April 8 ceasefire announcement by Handala**—temporarily pausing U.S.-targeted attacks but continuing operations against Israel—**low-level cyberactivity by groups like 313 Team and Conquerors Electronic Army persists**, targeting Australian government systems, Israeli infrastructure, and U.S.-based platforms. Analysts warn that **ceasefires historically inflame cyber operations**, as actors exploit diplomatic pauses to pivot tactics or prepare for future escalations. **Strategic trends** highlight Iran’s use of **false-flag operations, ransomware-as-a-smokescreen, and multi-actor obfuscation** to stretch adversary defenses. The targeting of **U.S. OT systems**—mirroring prior CyberAv3ngers (IRGC) campaigns against Unitronics PLCs—signals a **shift from regional surveillance to direct, disruptive operations**, with risks of **follow-on kinetic effects**. Defenders are urged to **segment OT networks, eliminate public PLC exposure, and monitor for Iranian VPN/VPS infrastructure** (Mullvad, NordVPN, Surfshark) linked to ongoing campaigns.

Structural failure in enterprise vulnerability remediation amid collapsing exploit timelines

Updated: · First: 10.04.2026 17:01 · 📰 1 src / 1 articles

Analysis of over one billion CISA KEV remediation records spanning four years across 10,000 organizations reveals a systemic failure in enterprise vulnerability remediation despite increased operational effort. Time-to-Exploit has collapsed to negative seven days for critical vulnerabilities, with 88% of tracked weaponized flaws remediated slower than exploitation occurred. Critical vulnerabilities open at Day 7 have risen from 56% to 63% while remediation tickets closed grew 6.5x since 2022. Traditional scan-and-report models cannot close this operational gap as autonomous AI agents accelerate offensive capabilities beyond human response cycles.

Unauthenticated Internet-exposed industrial controllers identified in global OT networks

Updated: · First: 10.04.2026 16:30 · 📰 1 src / 1 articles

Researchers identified at least 179 Internet-connected industrial control systems (ICS) devices exposing the Modbus protocol on default port 502 without authentication, enabling direct read and write access by any Internet user. The exposed devices include controllers tied to national railway and power grid infrastructure, creating potential for serious physical consequences if compromised. Despite geopolitical tensions, direct targeting of OT assets remains an active and avoidable risk vector.

GlassWorm malware targets OpenVSX, VS Code registries

Updated: 10.04.2026 16:23 · First: 20.10.2025 19:13 · 📰 16 src / 35 articles

GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, with the latest iteration leveraging Solana dead drops for C2, a novel browser extension for surveillance, and a shift into the Model Context Protocol (MCP) ecosystem. The campaign now delivers a .NET binary that targets Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data, executes arbitrary code, and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline to perform session surveillance on cryptocurrency platforms like Bybit and harvest extensive browser data. Additionally, threat actors have begun distributing malicious payloads via npm packages impersonating the WaterCrawl MCP server, marking GlassWorm’s first confirmed incursion into the AI-assisted development ecosystem. Recent innovations in the GlassWorm campaign include the introduction of a Zig-compiled dropper embedded within an Open VSX extension named 'specstudio.code-wakatime-activity-tracker', which masquerades as WakaTime. This dropper installs platform-specific Node.js native addons compiled from Zig code that execute outside the JavaScript sandbox with full OS-level access, enabling the threat actor to stealthily infect all IDEs on a developer's machine—including VS Code, VSCodium, Positron, Cursor, and Windsurf. The dropper then downloads a malicious VS Code extension (.VSIX) named 'floktokbok.autoimport' from an attacker-controlled GitHub account, which impersonates a legitimate extension with over 5 million installs and installs silently across all detected IDEs. The second-stage extension avoids execution on Russian systems, communicates with the Solana blockchain for C2, exfiltrates data, and deploys an information-stealing RAT that ultimately installs a malicious Google Chrome extension. Users who installed the malicious extensions should assume compromise and rotate all secrets immediately. The GlassWorm campaign remains a persistent supply chain threat impacting multiple ecosystems including npm, PyPI, GitHub, and Open VSX. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. The Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers. A new large-scale social engineering campaign has emerged, using fake VS Code security alerts posted in GitHub Discussions to distribute malware. The campaign automates posts across thousands of repositories using low-activity accounts, triggering GitHub email notifications with fake vulnerability advisories containing realistic CVE references. Links in these posts redirect victims through a cookie-driven chain to drnatashachinn[.]com, where a JavaScript reconnaissance payload profiles targets before delivering additional malicious payloads. This operation represents a coordinated, large-scale effort targeting developers as part of the broader GlassWorm malware campaign.

Compromise of CPUID distribution channels delivers trojanized system monitoring tools

Updated: · First: 10.04.2026 16:12 · 📰 1 src / 1 articles

A threat actor compromised an API used by the CPUID project to replace official download links for CPU-Z and HWMonitor with malicious executables for at least six hours between April 9 and April 10, 2026. The malicious payload, distributed as HWiNFO_Monitor_Setup.exe, is a multi-stage trojanized installer that leverages an Inno Setup wrapper and a Russian installer component, operating primarily in-memory to evade detection. The campaign specifically targeted users of widely used system monitoring utilities, and forensic analysis indicates advanced evasion techniques such as proxying NTDLL functionality from a .NET assembly. The compromise was limited to distribution links; signed original binaries were not altered. CPUID reported that the developer was unavailable during the incident, and affected users are advised to verify downloads from trusted sources.

Storm-2755 conducts AiTM payroll pirate attacks against Canadian Microsoft 365 accounts

Updated: · First: 10.04.2026 14:56 · 📰 1 src / 1 articles

A financially motivated threat actor named Storm-2755 has compromised Canadian employee accounts via adversary-in-the-middle (AiTM) phishing to intercept and divert salary payments in a payroll pirate campaign. The attackers hijacked Microsoft 365 sessions by stealing authentication tokens and session cookies through malicious sign-in pages hosted on SEO-poisoned or malvertised domains, thereby bypassing MFA protections. Once inside victim mailboxes, Storm-2755 created stealthy inbox rules to hide HR correspondence, then contacted HR staff to update direct deposit details or directly modified payroll systems such as Workday to reroute payments. The campaign highlights ongoing abuse of legacy authentication and non-phishing-resistant MFA in enterprise environments.

Rising Threat of AI Browser Extensions as Enterprise Attack Surface Exposed

Updated: · First: 10.04.2026 14:00 · 📰 1 src / 1 articles

A new study reveals AI browser extensions as a rapidly expanding, under-monitored attack vector in enterprise environments. These extensions bypass traditional security controls by operating within the browser, granting direct access to user inputs, session cookies, and rendered page content. Enterprise adoption is nearly universal—99% of users install at least one extension—with AI extensions displaying disproportionately high risk profiles, including elevated vulnerability rates, increased permission escalations, and ungoverned access to sensitive data. The lack of visibility and governance creates an unmonitored channel for data exfiltration, session hijacking, and policy evasion, particularly as AI tooling becomes embedded directly into browsing workflows.

Critical WebML Heap and Integer Overflow Flaws Patched in Chrome 147

Updated: · First: 10.04.2026 13:44 · 📰 1 src / 1 articles

Google released Chrome 147, addressing 60 security vulnerabilities including two critical flaws in the WebML component that enable heap buffer overflow and integer overflow conditions. Both issues were reported anonymously and awarded $43,000 each in bug bounty payouts, indicating high exploit potential such as sandbox escape or remote code execution. The update also introduces new session cookie protections to mitigate account compromise via stolen authentication cookies.

Gmail mobile client-side encryption expands to Android and iOS with native E2EE support

Updated: · First: 10.04.2026 13:44 · 📰 1 src / 1 articles

Google has enabled native end-to-end encryption (E2EE) for Gmail on Android and iOS mobile devices, allowing users with Enterprise Plus licenses and Assured Controls add-ons to compose, read, and send encrypted emails directly within the Gmail app without additional tools. Encrypted messages are delivered as regular emails to recipients, regardless of their email service or device, and are accessible via a web browser if the recipient lacks the Gmail app. This implementation leverages client-side encryption (CSE), where encryption keys are controlled by the organization and stored externally, ensuring Google and third parties cannot access message content, aligning with compliance requirements such as HIPAA and data sovereignty mandates.

DBSC deployment in Chrome 146 expands session cookie protection on Windows platforms

Updated: · First: 10.04.2026 10:58 · 📰 1 src / 1 articles

Google has enabled Device Bound Session Credentials (DBSC) for all Windows users of Chrome 146, providing a cryptographic defense against session cookie theft by binding authentication sessions to hardware-backed security modules. The feature leverages Trusted Platform Module (TPM) on Windows to generate non-exportable public/private key pairs, ensuring stolen session cookies expire and become unusable to attackers. This deployment follows earlier testing phases and targets session theft, a prevalent threat facilitated by information-stealing malware such as Atomic, Lumma, and Vidar Stealer. Google reports a significant reduction in session theft incidents since DBSC’s introduction and plans further expansion to macOS and broader device support.

Pre-authenticated RCE in Marimo exploited within 10 hours of advisory

Updated: · First: 10.04.2026 10:37 · 📰 1 src / 1 articles

A pre-authenticated remote code execution (RCE) vulnerability in Marimo, an open-source Python notebook platform, was exploited in the wild within 9 hours and 41 minutes of public disclosure. The flaw, tracked as CVE-2026-39987 (CVSS 9.3), affects all versions of Marimo prior to 0.23.0 and resides in the unauthenticated /terminal/ws WebSocket endpoint, which lacks authentication validation. Attackers exploited the endpoint to obtain full PTY shells and execute arbitrary system commands without credentials. Targeted systems included internet-facing Marimo instances, where threat actors performed manual reconnaissance, harvested sensitive files such as .env and SSH keys, and returned to confirm findings—demonstrating rapid, human-driven exploitation without PoC availability.

HiX EHR platform disruption following ransomware incident at ChipSoft

Updated: · First: 09.04.2026 22:46 · 📰 1 src / 1 articles

Dutch Electronic Health Record (EHR) software vendor ChipSoft confirmed a ransomware attack impacting its HiX platform, leading to the offline status of core digital health services including patient and provider portals. The incident forced multiple Dutch hospitals to disconnect from ChipSoft systems as a precautionary measure to prevent further compromise. Healthcare institutions using HiX reported operational disruptions, including four confirmed affected hospitals, while the national healthcare CERT (Z-CERT) engaged in response and recovery efforts. The attack highlights the systemic risk posed by ransomware targeting healthcare IT providers, which act as critical infrastructure supporting numerous care facilities and handling sensitive patient data.

Chrome 146 introduces Device Bound Session Credentials to mitigate session cookie theft via infostealers

Updated: · First: 09.04.2026 21:33 · 📰 1 src / 1 articles

Google Chrome 146 for Windows introduces Device Bound Session Credentials (DBSC) to prevent infostealer malware from harvesting and exploiting session cookies. The feature cryptographically binds user sessions to hardware security chips—TPM on Windows and Secure Enclave on macOS—ensuring session data cannot be exported or reused by attackers. DBSC enforces short-lived session cookies validated through possession of a unique private key stored on-device, rendering exfiltrated cookies immediately unusable. This mitigation targets the rising sophistication of infostealer families such as LummaC2, which increasingly target session cookies to bypass authentication mechanisms.

Intent redirection in EngageLab SDK versions 4.5.4 and earlier enabled sandbox escape on 50M Android devices

Updated: · First: 09.04.2026 20:26 · 📰 1 src / 1 articles

A now-patched intent redirection vulnerability in EngageLab SDK versions 4.5.4 and earlier allowed malicious apps on affected Android devices to bypass application sandboxing and gain unauthorized access to private data. At least 50 million installations across multiple apps—including more than 30 million cryptocurrency wallets—were potentially exposed. An attacker would need a malicious app installed on the same device to exploit the flaw by manipulating intent contents leveraging the SDK’s trusted context.

Compromise of Smart Slider 3 Pro update system leads to multi-layered WordPress and Joomla backdoors

Updated: · First: 09.04.2026 19:15 · 📰 1 src / 1 articles

A threat actor compromised the update mechanism for the Smart Slider 3 Pro plugin (versions for WordPress and Joomla) and distributed a malicious update (3.5.1.35) on April 7, 2026. The malicious version installed multiple backdoors, created a hidden administrator account with stolen credentials, and exfiltrated sensitive data. The malware includes unauthenticated remote command execution via crafted HTTP headers and authenticated PHP eval/OS command backdoors. Persistence is achieved through hidden admin accounts, must-use plugins, theme injections, and core file tampering. The vendor recommends immediate upgrade to version 3.5.1.36 (or rollback to 3.5.1.34 or earlier) and comprehensive site remediation.

STX RAT campaign targets finance sector with advanced in-memory evasion and encrypted C2

Updated: · First: 09.04.2026 18:00 · 📰 1 src / 1 articles

A previously undocumented remote access trojan (RAT), designated STX RAT, was deployed against a financial services organization in late February 2026. The malware uses a multi-stage, in-memory execution chain with XXTEA encryption, Zlib compression, and reflective loading via PowerShell to evade file-based detection. It establishes encrypted command-and-control (C2) channels, delays credential theft until instructed, and employs virtual desktop integration to operate stealthily. Attackers leveraged opportunistic delivery vectors such as browser-downloaded scripts and trojanized installers. Initial access led to privilege escalation, persistent registry autorun and COM hijacking, and extensive post-exploitation capabilities including data harvesting, payload execution, and network tunneling.

Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS

Updated: 09.04.2026 17:02 · First: 25.03.2026 13:34 · 📰 4 src / 4 articles

Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors.

Claude Mythos uncovers thousands of zero-days across major systems via Project Glasswing

Updated: 09.04.2026 16:00 · First: 08.04.2026 12:16 · 📰 3 src / 3 articles

Anthropic’s Claude Mythos Preview, under Project Glasswing, has autonomously discovered and remediated thousands of high-severity zero-day vulnerabilities across major operating systems, web browsers, and software libraries, including long-standing flaws such as a 27-year-old OpenBSD denial-of-service bug and a 16-year-old FFmpeg issue. The model’s agentic coding and reasoning capabilities—developed without explicit cybersecurity training—also enable it to autonomously craft complex exploits, such as a FreeBSD NFS server remote code execution chain and a multi-stage browser sandbox escape via JIT heap spray. Project Glasswing, a consortium involving AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and Anthropic, provides $100 million in Mythos Preview usage credits and $4 million in donations to secure critical software. While Anthropic positions the initiative as a defensive tool to reshape cybersecurity, industry experts warn that the dual-use nature of Mythos Preview’s capabilities creates a race for defenders to remediate vulnerabilities before threat actors adopt similar AI-driven exploitation techniques. The lack of independent verification and transparency around error rates further complicates assessments of the model’s real-world efficacy.

Resurgence of Phorpiex Twizt botnet with hybrid P2P-C2 model and cryptocurrency clipper payloads

Updated: · First: 09.04.2026 15:57 · 📰 1 src / 1 articles

A new variant of the Phorpiex (Trik) botnet, identified as Twizt, has evolved into a hybrid peer-to-peer (P2P) and HTTP polling command-and-control (C2) architecture using both TCP and UDP protocols, enabling resilience against takedowns. The malware primarily functions as a cryptocurrency clipper to reroute financial transactions, while also distributing sextortion spam, facilitating ransomware deployment (LockBit Black, Global), and exfiltrating sensitive data such as mnemonic phrases. Worm-like propagation occurs via removable and remote drives, alongside scanning for Local File Inclusion (LFI) vulnerabilities. The botnet maintains an average of 125,000 active infections daily, with the highest concentration of compromised hosts in Iran, Uzbekistan, China, Kazakhstan, and Pakistan.

Security teams briefed on early threat signal monitoring techniques in upcoming webinar

Updated: · First: 09.04.2026 15:20 · 📰 1 src / 1 articles

A live webinar scheduled for April 30, 2026, will outline methods for detecting and analyzing early indicators of threat actor activity across underground and encrypted communication channels. The session highlights the use of dark web forums, Telegram channels, and access broker marketplaces to identify pre-attack signals such as vulnerability discussions, leaked credentials, and compromised access listings. The goal is to enable security teams to shift from reactive to proactive defense by translating fragmented threat intelligence into prioritized defensive actions. The webinar is hosted by BleepingComputer and features Tammy Harper, Threat Intelligence Researcher at RansomLook, alongside insights from Flare Systems on monitoring external threat surfaces.

Shamos Infostealer Targeting Mac Devices via ClickFix Attacks

Updated: 09.04.2026 14:20 · First: 22.08.2025 18:44 · 📰 8 src / 14 articles

Since June 2025, the COOKIE SPIDER group’s Shamos infostealer and Atomic macOS Stealer (AMOS) variants have targeted Mac devices via evolving ClickFix social engineering campaigns, stealing data and credentials from browsers, Keychain, Apple Notes, and cryptocurrency wallets. Early campaigns relied on malvertising, fake GitHub repositories, and signed Swift applications hosted on legitimate platforms like Cloudflare Pages and Squarespace. AMOS has been delivered through disk images, obfuscated shell scripts, and in-memory payloads, expanding from Terminal-based ClickFix tactics to abuse trusted macOS applications. In March 2026, Apple introduced a Terminal security feature in macOS Tahoe 26.4 that blocks pasted command execution and warns users of risks, disrupting ClickFix attack chains. A new campaign observed in April 2026 by Jamf researchers now abuses the built-in Script Editor application to bypass these protections. The campaign uses fake Apple-themed disk cleanup guides to trick users into launching Script Editor via the applescript:// URL scheme, executing an obfuscated payload in system memory that delivers Atomic Stealer. The new Script Editor-based ClickFix variation enables theft of Keychain data, browser autofill information, cryptocurrency wallet extensions, and system details without requiring Terminal interaction. AMOS continues to expand its capabilities, now including a backdoor component for persistent access to compromised systems.

Middle East civil society spear-phishing campaign linked to South Asian APT group Bitter using ProSpy Android spyware

Updated: · First: 09.04.2026 13:45 · 📰 1 src / 1 articles

A spear-phishing campaign targeting civil society figures in the Middle East—including high-profile journalists in Egypt and Lebanon—was attributed to a hack-for-hire operation linked to the South Asian advanced persistent threat (APT) group Bitter (T-APT-17, APT-C-08). Between 2023 and 2025, attackers used social engineering via fake accounts and impersonation of legitimate services, including Signal and Apple Support, to deliver ProSpy Android spyware and compromise cloud accounts. The campaign leveraged two-stage delivery, credential phishing, and Android malware to extract files, contacts, messages, geolocation, and enable microphone and camera access. A Lebanese journalist’s Apple account was compromised in 2025, while two Egyptian journalists thwarted attempts in 2023–2024. The operation’s scope extended to Bahraini government entities, UAE, Saudi Arabia, UK, and potentially US targets, with infrastructure repurposed across campaigns.

Eurail Data Breach: Stolen Customer Data Sold on Dark Web

Updated: 09.04.2026 13:31 · First: 16.02.2026 21:19 · 📰 2 src / 2 articles

Eurail B.V. confirmed a December 26, 2025 data breach impacting 308,777 individuals, with stolen data including full names, passport details, ID numbers, bank account IBANs, health information, and contact details now being sold on the dark web. The breach involved unauthorized file transfers from Eurail’s network, and the company has notified affected customers and data protection authorities. Customers are advised to update passwords, monitor bank accounts, and remain vigilant against phishing attacks. The breach occurred after threat actors gained unauthorized access to Eurail’s customer database, exposing sensitive traveler information. Eurail initially disclosed the incident in February 2026, noting that a sample of the stolen data was published on Telegram. The European Commission later warned that health information for young travelers in the DiscoverEU program may also have been compromised.

Governance failures escalate as agentic AI NHIs double across enterprises

Updated: · First: 09.04.2026 13:00 · 📰 1 src / 1 articles

SANS Institute’s 2026 State of Identity Threats & Defenses Survey reveals a critical governance gap as enterprises integrate agentic AI into core operations. Organizations report a 76% increase in non-human identities (NHIs), such as service accounts, API keys, automation bots, and workload identities, with 74% already deploying AI agents or automations requiring credentials. Unlike traditional NHIs, agentic AI behaves unpredictably—interpreting instructions at machine speed, potentially hallucinating, and operating autonomously with privileged access to critical infrastructure and data. Credential hygiene failings are widespread: 92% of organizations do not rotate machine credentials on a 90-day cycle, fearing service account breakage; 59% rotate fewer than half of NHI credentials quarterly, while 15% do not track rotation rates at all. Manual access reviews and ticket-based provisioning are failing to scale across DevOps, cloud, and SaaS systems, with 5% of organizations unaware they are running agentic AI and 15% not even knowing their credential rotation policy.

Active exploitation of Adobe Acrobat Reader zero-day via crafted PDFs since December 2025

Updated: · First: 09.04.2026 12:22 · 📰 1 src / 1 articles

A zero-day vulnerability in Adobe Acrobat Reader has been actively exploited since at least December 2025 using maliciously crafted PDF documents. Threat actors leverage a sophisticated, fingerprinting-style exploit targeting an unpatched flaw, enabling data theft and potential remote code execution or sandbox escape on compromised systems without requiring user interaction beyond opening the PDF. The attacks appear to be selectively targeting users, with phishing lures referencing Russian-language content related to the oil and gas industry.

Unauthorized transfer of 50.903 Bitcoin from Bitcoin Depot corporate wallets

Updated: · First: 09.04.2026 10:44 · 📰 1 src / 1 articles

Attackers breached Bitcoin Depot’s corporate IT systems on March 23, 2026, and exfiltrated approximately 50.903 Bitcoin (valued at $3.665 million) from the company’s controlled wallets before access was blocked. The intrusion targeted Bitcoin Depot’s corporate environment and did not affect customer-facing platforms, systems, or data. The company activated incident response protocols, engaged external cybersecurity experts, and notified law enforcement and regulators, including the SEC.