122Articles
9Categories
2026-04-22Date
🚨
Anthropic bets on EPSS for the coming bug surgeAnthropic’s Mythos has intensified a problem that vulnerability management programs were already struggling to contain: too many vulnerabilities and not enough clarity about which ones matter. What changes with Mythos — and the AI-based class of vulnerability discovery systems it…
KEV
🚨
CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlinessubmitted by kid to cybersecurity 1 points | 0 comments https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
KEV
🐛
Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
🐛
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
🐛
Critical Spring Authorization Server Issue Exposes Systems to XSS and SSRF Attacks
🐛
Critical Bamboo Data Centre and Server Flaw Enables Command Injection Attacks
🐛
Mozilla Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities
🐛
VU#518910: Ollama GGUF Quantization Remote Memory Leak
🐛
Microsoft out-of-band updates fixed critical ASP.NET Core privilege escalation flaw
🐛
Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers
🐛
Microsoft issues out-of-band patch for critical security flaw in update to ASP.NET Core
🐛
Microsoft Patch Still Leaves 1,300 SharePoint Servers Exposed
⚠️
Vercel Breach Started With AI Tool
⚠️
Microsoft Issues Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability
⚠️
1,370+ Microsoft SharePoint Servers at Risk of Spoofing Attacks Found Exposed Online
KEV
⚠️
DinDoor Backdoor Exploits Deno and MSI Installers to Slip Past Detection
⚠️
From Shame to Fame: Changing Behaviors and RSAC Interviews from Tanium and Illumio - BSW #444
⚠️
Risky Business #834 -- Vercel gets owned, Mozilla dumps hundreds of Mythos bugs
⚠️
The AI era demands a different kind of CISO
⚠️
Lotus Wiper Hits Energy Sector in Destructive Cyberattack
⚠️
Mullvad to add feature that forces all iOS traffic through the VPN tunnel
⚠️
Toxic Combinations: When Cross-App Permissions Stack into Risk
⚠️
NFC tap-to-pay gets tapped by hackers
⚠️
Mozilla says Claude’s Mythos AI helped uncover 271 flaws in Firefox
⚠️
109 Fake GitHub Repos Spread SmartLoader, StealC Malware
⚠️
Iran claims US exploited networking equipment backdoors during strikes
⚠️
Unsecured Perforce Servers Expose Sensitive Data From Major Orgs - SecurityWeek
⚠️
Actively exploited Apache ActiveMQ flaw impacts 6,400 servers
KEV
⚠️
Punishment Fails Behavior Change
⚠️
News alert: BreachLock’s integrated attack validation platform debuts in Gartner AEV category
⚠️
Microsoft SharePoint vulnerability widely exposed across multiple countries
⚠️
New Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert
⚠️
DDoS wave continues as Mastodon hit after Bluesky incident
⚠️
Apple fixes bug that cops used to extract deleted chat messages from iPhones
⚠️
The leak was only a matter of time.
📢
Namastex npm Packages Spread TeamPCP-Style CanisterWorm Malware
📢
The Cybercrime Shift: From Opportunistic Attacks to Marketplace-Driven Ecosystem
📢
UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns
📢
IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist
📢
Iran, Russia and China behind most major cyberattacks on UK, security chief warns
📢
Iran, Russia and China behind most major cyberattacks on UK, security chief warns
📢
New Defense Department cyber strategy imminent, official says
📢
NCSC Unveils SilentGlass, a Plug-In Device to Protect Monitors from Cyber-Attacks
📢
Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
📢
CISA director pick Sean Plankey withdraws his nomination
📢
House Republicans roll out national privacy bill
📢
Anonymous Competition Drives Executives
📢
Trump’s CISA director pick withdraws after tumultuous nomination
🔥
[Guest Diary] Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd)
🔥
Exclusive Anthropic Cyber Tool Mythos Accessed by Unapproved Actors
🔥
French Authorities Confirm Data Breach Amid Hackers’ Data Leak Allegations
🔥
Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang
🔥
Ransomware Negotiator Pleads Guilty to BlackCat Scheme
🔥
UK cyber agency handling four major incidents a week as nation-state attacks surge
🔥
French govt agency confirms breach as hacker offers to sell data
🔥
Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000 - SecurityWeek
🔥
Cosmetics giant Rituals confirms data breach of customer membership records
🔥
French police arrest suspected hacker behind dozens of data breaches
🔥
Malicious TikTok Downloader Extensions Quietly Compromised 130K Users
🔥
France confirms data breach at government agency that manages citizens’ IDs
🔥
Smashing Security podcast #464: Rockstar got hacked. The data was junk. The secrets it revealed were not
🕵️
ISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd)
🕵️
Wireshark tutorial: Capture vs. Display Filters
🕵️
Nobody runs a marathon by accident
🕵️
Microsoft-Signed Binary Helps Deliver LOTUSLITE in India Spy Campaign
🕵️
Scale Computing Spotlights Edge Wins in Retail, K-12
🕵️
Amazon, Anthropic Expand Alliance With 5GW Compute Push to Power Claude
🕵️
Hackers Tie Iranian Espionage to CastleRAT and ChainShell
🕵️
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
🕵️
Auraboros RAT Adds Live Audio, Keylogging, and Cookie Theft via Open C2 Panel
🕵️
Microsoft warns of fake IT worker identities infiltrating cloud environments
🕵️
Unauthorized Group Gains Access to Anthropic's Exclusive Cyber Tool Mythos
🕵️
When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks
🕵️
ICE Uses Graphite Spyware
🕵️
French Fintech Accounts Used to Launder Stolen Funds Before Detection
🕵️
NGate NFC malware targets Android users through trojanized payment app - Help Net Security
🕵️
Microsoft Must Face £2.1B UK Cloud Licensing Lawsuit
🕵️
Researchers Uncover SIM Farm-as-a-Service Operation Spanning 87 Panels in 17 Nations
🕵️
Azure SRE Agent flaw lets outsiders silently eavesdrop on enterprise cloud operations | CSO Online
🕵️
Phishing Campaigns Abuse AI Workflow Automation Platforms
🕵️
Malicious Google Ads Hit Crypto Users With Wallet Drainers
🕵️
Downloads falsos do Google Antigravity estão roubando contas em questão de minutos | Malwarebytes
🕵️
More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC
🕵️
What are You Working on Wednesday
🕵️
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
🕵️
Phishing — sometimes with AI’s help — topped initial-access methods in Q1, Cisco says
🕵️
Network Engineering Basics
🕵️
Revolut Reportedly Targets $200B IPO Valuation in Huge Fintech Bet
🕵️
The Supreme Court is about to decide how far geofence warrants can go
🕵️
AI Tools Are Helping Mediocre North Korean Hackers Steal Millions
🕵️
Authentication No Longer Means Safe
🕵️
Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data
🕵️
Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
🕵️
KelpDAO suffers $290 million heist tied to Lazarus hackers
🕵️
Fake Google Antigravity Installer Can Steal Accounts in Minutes
🕵️
Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus
🕵️
Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor
🕵️
AI Demand Is Forcing a Rethink of Data Center Power, Cooling
🕵️
Vonage, Girls Who Code Show What ‘Responsible AI’ Looks Like
🕵️
Mozilla Fixes 271 Firefox Bugs Using Anthropic’s Mythos AI
🕵️
North Korean hackers siphon more than $12 million from crypto users in sprawling campaign
🌐
Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
🌐
Researcher claims Claude Desktop installs “spyware” on macOS
🌐
Malicious trading website drops malware that hands your browser to attackers
🌐
UK government says 100 countries have spyware that can hack people’s phones
🌐
Targeting developers: real-world cases, tactics, and defense strategies | Kaspersky official blog
🌐
Hackers deployed wiper malware in destructive attacks on Venezuela’s energy sector
🌐
LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
🎙️
Alignment Episode: How Traci Byrne Works Across CISOs, Startups, and Partners
🎙️
The AI-driven gap between innovation and security with Brian Vecci from Varonis
📡
Weekly Threat Bulletin – April 22nd, 2026
📡
Winter 2025 SOC 1 report is now available with 184 services in scope
📡
Venezuela energy sector targeted by highly destructive Lotus wiper
📡
Researchers Uncover ProxySmart Software Powering 90+ SIM Farms
📡
Surge in Silent Subject Phishing Attacks Targets VIP Users
📡
China’s cyber capabilities now equal to the US, warns Dutch intelligence
📡
Critical BRIDGE:BREAK flaws impact Lantronix and Silex Technology converters
📡
UK Commits £90m for Cybersecurity and Pushes for ‘Resilience Pledge’
📡
Unauthorized users gain access to Anthropic's Mythos model.
📡
A technical walkthrough of multicloud full-stack security using AWS Security Hub Extended
📡
MacOS Native Tools Enable Stealthy Enterprise Attacks
📡
Artemis emerges from stealth with $70 million in funding.