-
Official SAP npm packages compromised to steal credentials
Bleeping Computer – 2026-04-29 22:43:44
-
Popular WordPress redirect plugin hid dormant backdoor for years
Bleeping Computer – 2026-04-29 22:13:15
-
Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining
Bleeping Computer – 2026-04-29 20:50:35
-
Hackers arrested for hijacking and selling 610,000 Roblox accounts
Bleeping Computer – 2026-04-29 18:32:15
-
SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack
The Hacker News – 2026-04-29 16:26:00
-
cPanel, WHM emergency update fixes critical auth bypass bug
Bleeping Computer – 2026-04-29 15:51:44
-
New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
The Hacker News – 2026-04-29 14:43:00
-
European police dismantles €50 million crypto investment fraud ring
Bleeping Computer – 2026-04-29 14:27:36
-
Learning from the Vercel breach: Shadow AI & OAuth sprawl
Bleeping Computer – 2026-04-29 13:05:14
-
GitHub fixes RCE flaw that gave access to millions of private repos
Bleeping Computer – 2026-04-29 12:41:17
-
Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks
The Hacker News – 2026-04-29 12:02:00
-
What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
The Hacker News – 2026-04-29 11:30:00
-
CISA orders feds to patch Windows flaw exploited as zero-day
Bleeping Computer – 2026-04-29 10:29:31
-
Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
The Hacker News – 2026-04-29 09:37:00
-
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
The Hacker News – 2026-04-29 08:46:00
-
Microsoft says backend change broke Teams Free chat and calls
Bleeping Computer – 2026-04-29 08:38:07
-
LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
The Hacker News – 2026-04-29 05:34:00
-
Broken VECT 2.0 ransomware acts as a data wiper for large files
Bleeping Computer – 2026-04-28 21:25:57
-
Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw
Bleeping Computer – 2026-04-28 21:07:23
-
Video service Vimeo confirms Anodot breach exposed user data
Bleeping Computer – 2026-04-28 19:04:22
-
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
The Hacker News – 2026-04-28 18:19:00
-
Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
The Hacker News – 2026-04-28 17:39:00
-
US reportedly charges Scattered Spider hacker arrested in Finland
Bleeping Computer – 2026-04-28 15:39:52
-
Checkmarx confirms LAPSUS$ hackers leaked its stolen GitHub data
Bleeping Computer – 2026-04-28 14:50:40
-
VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
The Hacker News – 2026-04-28 14:01:00
-
Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
The Hacker News – 2026-04-28 11:58:00
-
Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
The Hacker News – 2026-04-28 11:18:00
-
After Mythos: New Playbooks For a Zero-Window Era
The Hacker News – 2026-04-28 10:30:00
-
Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
The Hacker News – 2026-04-28 07:57:00
-
Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
The Hacker News – 2026-04-28 06:37:00
-
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
The Hacker News – 2026-04-28 05:50:00
-
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
The Hacker News – 2026-04-27 14:19:00
-
⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
The Hacker News – 2026-04-27 13:30:00
-
Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
The Hacker News – 2026-04-27 11:58:00
-
PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
The Hacker News – 2026-04-27 11:54:00
-
Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
The Hacker News – 2026-04-27 11:23:00
-
Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud
The Hacker News – 2026-04-27 06:33:00
-
Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
The Hacker News – 2026-04-25 09:26:00
-
CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
The Hacker News – 2026-04-25 05:08:00
-
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
The Hacker News – 2026-04-24 17:06:00
-
NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
The Hacker News – 2026-04-24 14:13:00
-
Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
The Hacker News – 2026-04-24 11:49:00
-
26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
The Hacker News – 2026-04-24 11:48:00
-
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
The Hacker News – 2026-04-24 09:29:00
-
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
The Hacker News – 2026-04-24 07:24:00
-
UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware
The Hacker News – 2026-04-23 18:16:00
-
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
The Hacker News – 2026-04-23 13:42:00
-
ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
The Hacker News – 2026-04-23 13:17:00
-
[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
The Hacker News – 2026-04-23 12:03:00
-
Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
The Hacker News – 2026-04-23 11:30:00
-
China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
The Hacker News – 2026-04-23 09:04:00
-
Vercel Finds More Compromised Accounts in Context.ai-Linked Breach
The Hacker News – 2026-04-23 08:40:00
-
Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages
The Hacker News – 2026-04-23 08:06:00
-
Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
The Hacker News – 2026-04-22 17:55:00
-
Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
The Hacker News – 2026-04-22 17:33:00
-
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
The Hacker News – 2026-04-22 15:28:00
-
Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
The Hacker News – 2026-04-22 10:55:00
-
Toxic Combinations: When Cross-App Permissions Stack into Risk
The Hacker News – 2026-04-22 10:41:36
-
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
The Hacker News – 2026-04-22 09:29:00
-
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
The Hacker News – 2026-04-22 07:58:00
-
Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
The Hacker News – 2026-04-22 07:16:00
-
SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation
The Hacker News – 2026-04-21 18:18:00
-
22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters
The Hacker News – 2026-04-21 15:46:00
-
Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
The Hacker News – 2026-04-21 14:31:00
-
5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time
The Hacker News – 2026-04-21 13:00:00