π€ Threat intelligence is great, but do you have proof that your defenses actually work against real threat actors?
Stop guessing. Start validating.
Join this practical session to learn how to leverage modern tooling to automate security testing and continuously improve your posture.
WATCH NOW β¬οΈ https://thehacker.news/automate-testing-security-posture
Stop guessing. Start validating.
Join this practical session to learn how to leverage modern tooling to automate security testing and continuously improve your posture.
WATCH NOW β¬οΈ https://thehacker.news/automate-testing-security-posture
π₯3π2π€2
π₯ Apple expanded iOS 18.7.7 security updates to more iPhones and iPads to fix DarkSword exploits.
The fixes were released in 2025, and now also protect devices that are not on iOS 26βso users can stay on iOS 18 & still get security updates.
π Read β https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html
The fixes were released in 2025, and now also protect devices that are not on iOS 26βso users can stay on iOS 18 & still get security updates.
π Read β https://thehackernews.com/2026/04/apple-expands-ios-1877-update-to-more.html
π11π2π₯2
π WhatsApp alerted ~200 users targeted by a fake iOS app carrying #spyware, mostly in Italy.
The attack used social engineering to mimic #WhatsApp. Meta is acting against an Italian firm linked to the spyware.
π Read details here β https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html
The attack used social engineering to mimic #WhatsApp. Meta is acting against an Italian firm linked to the spyware.
π Read details here β https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html
π9π4β‘3
A critical Oracle WebLogic flaw (CVSS 10.0) saw exploitation almost immediately after public exploit code was released.
CloudSEK observed automated scanning targeting this and older flaws via VPS infrastructure in a spray-and-pray campaign.
π Full attack patterns β https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Exploitation%20Against%20Oracle%20WebLogic%20Servers
CloudSEK observed automated scanning targeting this and older flaws via VPS infrastructure in a spray-and-pray campaign.
π Full attack patterns β https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Exploitation%20Against%20Oracle%20WebLogic%20Servers
π9π3π₯2
β οΈ Brazil-based attackers are targeting Spanish-speaking users with a multi-channel phishing campaign delivering Casbaneiro.
Court-themed PDFs trigger malware, then Horabot spreads it via phishing emails sent from victimsβ Outlook accounts.
π How email hijacking drives the spread β https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html
Court-themed PDFs trigger malware, then Horabot spreads it via phishing emails sent from victimsβ Outlook accounts.
π How email hijacking drives the spread β https://thehackernews.com/2026/04/casbaneiro-phishing-targets-latin.html
π6π2π€―2
β‘ AI is speeding up codeβand risk.
145% more vulnerabilities and 3x more fixes in one quarter, as Python (72.1%) and PostgreSQL (+73%) surge with AI.
96% of risk sits outside core tools.
π Where most security exposure actually lives β https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html
145% more vulnerabilities and 3x more fixes in one quarter, as Python (72.1%) and PostgreSQL (+73%) surge with AI.
96% of risk sits outside core tools.
π Where most security exposure actually lives β https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html
π5π2π€2
π¨ From zero-days to mass infections β this week has it all...
β οΈ ShareFile pre-auth RCE
π± Android rootkit at scale
πΌοΈ ImageMagick 0-days β RCE
π΅οΈ XLoader stealth upgrades
π£ Mobile phishing surge
π¦ Supply chain attacks Γ14
π Read the full ThreatsDay Bulletin β https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html
β οΈ ShareFile pre-auth RCE
π± Android rootkit at scale
πΌοΈ ImageMagick 0-days β RCE
π΅οΈ XLoader stealth upgrades
π£ Mobile phishing surge
π¦ Supply chain attacks Γ14
π Read the full ThreatsDay Bulletin β https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html
π3π€2β‘1π₯1π1
β οΈ A cybercrime campaign since 2023 spreads malware via fake installers.
REF1695 delivers RATs, crypto miners, and CNB Bot via ISO files, tricks users to bypass Windows protections, and uses GitHub to host payloads.
π Key tactics, payloads, and earnings β https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html
REF1695 delivers RATs, crypto miners, and CNB Bot via ISO files, tricks users to bypass Windows protections, and uses GitHub to host payloads.
π Key tactics, payloads, and earnings β https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html
π₯2π±2π1
π¨ Cisco fixed two critical flaws that allow full system takeover without login.
CVSS 9.8 vulnerabilities let attackers reset admin passwords (IMC) or run commands as root (SSM On-Prem) using crafted requests.
No workaround is available. Patching is required.
π Read β https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
CVSS 9.8 vulnerabilities let attackers reset admin passwords (IMC) or run commands as root (SSM On-Prem) using crafted requests.
No workaround is available. Patching is required.
π Read β https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
π7π₯2β‘1
β οΈ ALERT - A threat group exploited a Next.js flaw to compromise 766+ hosts and steal cloud credentials at scale.
Using automated scripts, attackers extracted AWS secrets, SSH keys, and API tokens, all managed through a central dashboard for reuse.
π Read β https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html
Using automated scripts, attackers extracted AWS secrets, SSH keys, and API tokens, all managed through a central dashboard for reuse.
π Read β https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html
π₯8π6π€―5π3β‘1
Drift Protocol lost $285M after attackers took over governance, not by breaking code but by abusing approvals.
They used pre-signed transactions, social engineering, and a zero-timelock change to gain admin control, add a fake asset, and remove limits to drain funds.
π How governance and multisig failures enabled the exploit β https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html
They used pre-signed transactions, social engineering, and a zero-timelock change to gain admin control, add a fake asset, and remove limits to drain funds.
π How governance and multisig failures enabled the exploit β https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html
π€―4π3β‘1
β οΈ WARNING - Attackers are weaponizing the Claude Code leak.
Fake GitHub repos now deploy Vidar Stealer and GhostSocks, using trojanized builds that look legitimate.
π Read β https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html#fake-claude-code-repos-deploy-vidar-stealer-and-ghostsocks
Fake GitHub repos now deploy Vidar Stealer and GhostSocks, using trojanized builds that look legitimate.
π Read β https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html#fake-claude-code-repos-deploy-vidar-stealer-and-ghostsocks
β‘6π₯6π€―3π2
β‘ It turns out Axios npm was compromised via a targeted UNC1069 social engineering attack.
Attackers used a fake Slack + Teams setup to install malware, steal npm credentials, and publish trojanized versions (1.14.1, 0.30.4).
π Details here β https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html
Attackers used a fake Slack + Teams setup to install malware, steal npm credentials, and publish trojanized versions (1.14.1, 0.30.4).
π Details here β https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html
π₯8π5
Apple is testing a safeguard against copy-paste attacks.
macOS 26.4 adds Terminal paste warnings, targeting scams that trick users into running malicious commands. Users can still override.
ClickFix-style attacks are now widely used.
π Reads β https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Apple%20Tests%20Ways%20to%20Block%20Malicious%20Copy%2DPastes%20in%20macOS
macOS 26.4 adds Terminal paste warnings, targeting scams that trick users into running malicious commands. Users can still override.
ClickFix-style attacks are now widely used.
π Reads β https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Apple%20Tests%20Ways%20to%20Block%20Malicious%20Copy%2DPastes%20in%20macOS
π8π5π₯2
30% of breaches now involve third parties like vendors and SaaS.
The perimeter has shifted outward, and regulations now require continuous oversight. Cynomi shows TPRM is now a core security function, not just compliance.
π Why TPRM is becoming central to security β https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html
The perimeter has shifted outward, and regulations now require continuous oversight. Cynomi shows TPRM is now a core security function, not just compliance.
π Why TPRM is becoming central to security β https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html
π4π₯2
SparkCat malware has reappeared on Apple and Google app stores, hiding inside everyday apps.
It scans photos for crypto recovery phrases and sends them to attackers, using OCR to extract sensitive data from images.
π Read β https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html
It scans photos for crypto recovery phrases and sends them to attackers, using OCR to extract sensitive data from images.
π Read β https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html
π₯3π€2
π Attackers are using HTTP cookies to control PHP web shells on Linux servers.
Malware stays inactive and runs only when specific cookie values are sent, blending into normal traffic. Cron jobs can also recreate it for persistence.
π How cookie-triggered web shells evade detection β https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html
Malware stays inactive and runs only when specific cookie values are sent, blending into normal traffic. Cron jobs can also recreate it for persistence.
π How cookie-triggered web shells evade detection β https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html
π₯15π6
π China-linked TA416 is again targeting European governments, using OAuth redirect abuse and cloud-hosted malware to deliver PlugX.
Activity expanded to the Middle East in 2026, tied to conflict-driven intelligence gathering.
π Read β https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html
Activity expanded to the Middle East in 2026, tied to conflict-driven intelligence gathering.
π Read β https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html
π₯7π5π1
β οΈ Fortinet is warning of active exploitation of CVE-2026-35616 (CVSS 9.1) in FortiClient EMS.
The flaw lets unauthenticated attackers bypass API controls and run code. This is the second critical EMS flaw exploited in weeks.
π Full details β https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html
The flaw lets unauthenticated attackers bypass API controls and run code. This is the second critical EMS flaw exploited in weeks.
π Full details β https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html
π₯7
π 36 npm packages posing as Strapi plugins were used to deliver malware that runs on install.
They exploited Redis and PostgreSQL, stole credentials, and deployed backdoors via postinstall scripts with full user or CI/CD access.
π Details β https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html
They exploited Redis and PostgreSQL, stole credentials, and deployed backdoors via postinstall scripts with full user or CI/CD access.
π Details β https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html
π€―7π±2