Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Global Landscape of Cybersecurity Threats: A Weekly Roundup


Recent developments in the world of cybersecurity have highlighted the increasing sophistication of threats and the need for individuals and organizations to stay vigilant. In this article, we will delve into the latest vulnerabilities and exploits that have been reported in recent days, providing valuable insights and information to help readers better understand the threat landscape and take steps to prevent these types of attacks.

Published: Sun Apr 26 04:36:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ai's Impact on Open Source Code Security: A Reevaluation of Cal.com's Decision

Cal.com's decision to abandon its AGPL license has sent shockwaves throughout the developer community, raising questions about the company's commitment to security and transparency in the face of AI-powered security threats.

Published: Sun Apr 26 05:51:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Customized Malware: Trigona Ransomware's Cutting-Edge Data Stealing Tool


Trigona ransomware has taken its operations to the next level by adopting a custom-built command-line tool that enables faster data exfiltration and evasion of detection. This new tool boasts multiple parallel connections, a rotation mechanism, and authentication keys to secure access to stolen data. As researchers, it is essential to stay vigilant and monitor these emerging trends to develop effective countermeasures against such advanced threats.

Published: Sun Apr 26 06:20:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trigona Ransomware Exploits Custom Tool to Evade Detection and Steal Sensitive Data

Trigona ransomware has been identified as a highly sophisticated malware tool designed to steal sensitive data while evading detection. Its custom-made features make it an attractive option for hackers looking to compromise sensitive information.

Published: Sun Apr 26 07:28:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Infrastructure Breach: Itron's Cybersecurity Incident Highlights the Ongoing Battle Against Sophisticated Threats


A recent cybersecurity incident involving American utility firm Itron highlights the ongoing threat of sophisticated attacks against critical infrastructure management. With a breach detected last month, Itron has taken proactive steps to address the issue, including activating its cybersecurity response plan and launching an investigation into the incident. The implications of this breach extend beyond the immediate actions taken by Itron, serving as a reminder of the need for industry leaders, government agencies, and cybersecurity experts to work together to prevent similar incidents in the future.

Published: Sun Apr 26 09:43:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

GopherWhisper: Uncovering the China-linked APT Group Targeting Mongolia with Sophisticated Malware


New China-linked APT Group, GopherWhisper, Targets Mongolian Government Institutions with Go-based Malware
A recent discovery by ESET researchers has shed light on a new China-aligned Advanced Persistent Threat (APT) group, tracked as GopherWhisper, which has been targeting government institutions in Mongolia using Go-based malware, loaders, and backdoors. This APT group's arsenal includes a range of tools mainly written in Go, which are used to deploy multiple backdoors, allowing attackers to maintain access and control over compromised systems.


Published: Sun Apr 26 10:46:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CrowdStrike LogScale Vulnerability Exposed: A Critical Threat to Organizations


A critical vulnerability has been discovered in CrowdStrike's LogScale self-hosted product, allowing unauthenticated file access via path traversal. This breach highlights the importance of timely patching and proactive vulnerability management in defensive software. Learn more about this critical threat to organizations and how it can be addressed.



Published: Sun Apr 26 12:54:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cal.com Controversy: A Rebuttal to Security by Obscurity


Cal.com's decision to abandon its commitment to AGPL and switch to proprietary licenses has sparked controversy within the open-source community, raising questions about the effectiveness of security by obscurity and the future of software development in an era dominated by AI. While some argue that this move is necessary, others contend that it marks a retreat from the principles of openness and collaboration that have long characterized the open-source movement.

Published: Sun Apr 26 16:10:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Security Breach Ecosystem: Itron's Cyber Incident Raises Concerns About Utility Infrastructure


U.S.-based utility giant Itron has disclosed a significant security breach involving unauthorized access to certain parts of its internal IT systems. The incident, which occurred on April 13, 2026, was contained through swift action by Itron's cybersecurity team and the support of external experts. As a company that plays a critical role in maintaining energy and water infrastructure, this incident underscores the importance of prioritizing cybersecurity and cooperation to address emerging threats.

Published: Mon Apr 27 02:29:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Mythos: How Anthropic's AI Vulnerability Detector is Revolutionizing Security


Anthropic's latest innovation, Mythos, promises to revolutionize the way we approach security with its cutting-edge AI-powered vulnerability detection tool. With its unparalleled accuracy and capabilities, Mythos is set to usher in a new era of digital safety, but also raises questions about ethics and long-term implications. Find out more about this game-changing technology and how it's shaping our approach to security.

Published: Mon Apr 27 03:44:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Scam Unfolds: How Fake CAPTCHA Traps Users into International SMS Fraud

A sophisticated international scam is luring unsuspecting users into sending premium rate SMS messages that incurs charges on their mobile bills. With its use of fake CAPTCHA verification tricks and malicious traffic distribution systems, this scam highlights the growing threat of revenue share fraud and the need for increased vigilance among consumers and telecom carriers.

Published: Mon Apr 27 04:01:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dawn of Cyber Sabotage: Unveiling Fast16, a Pre-Stuxnet Malware


A new report has revealed the existence of Fast16, a pre-Stuxnet malware used to corrupt scientific research programs in the mid-2000s. Developed by the United States, this Lua-based malware predates Stuxnet by at least five years and highlights the sophistication of early cyber sabotage operations. Learn more about the implications of Fast16 and how it sheds light on the early stages of cyber warfare.

Published: Mon Apr 27 04:20:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Italy Moves to Extradite Chinese National Accused of Hacking into COVID-19 Research

Italy has moved to extradite Xu Zewei, a Chinese national accused of hacking into COVID-19 research, to face U.S. authorities over cyber espionage charges.

Published: Mon Apr 27 04:30:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Controversy Surrounding John Edwards' Departure as ICO Chief


The Information Commissioner's Office (ICO), the UK's primary data regulator, is embroiled in a controversy surrounding its chief executive, John Edwards. Edwards has stepped aside amid an independent workplace investigation into unspecified HR matters, leaving many questions unanswered and the ICO under pressure to maintain transparency and accountability.

Published: Mon Apr 27 06:05:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Firefox Bug CVE-2026-6770 Exposed to Widespread Vulnerability: A Threat to User Privacy

A critical vulnerability was discovered in Mozilla Firefox and Tor Browser, allowing attackers to track users across multiple sites using cross-site tracking and fingerprinting through stable identifiers. The affected versions were released on April 21, 2026, with patches available shortly thereafter.

Published: Mon Apr 27 06:13:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Dark Web Ransom Demanded: The ADT Data Breach Scandal


A prominent home security company has been targeted by a group of cyber attackers who claim to have accessed over 10 million records containing personal identifiable information (PII). The breach raises questions about the adequacy of ADT's cybersecurity measures and whether the company had adequate protocols in place to prevent such an incident. As ADT struggles to contain the fallout, it remains to be seen how the company will respond to the breach and what steps it will take to safeguard customer information.

Published: Mon Apr 27 07:33:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Microsoft's Windows Update Experience: A Shift Towards User Control and Transparency


Microsoft has introduced a new feature to its Windows Update experience, allowing users to pause updates for up to 35 days in advance. This change is part of a broader effort by Microsoft to address issues with disruption caused by untimely updates and a lack of control over when updates happen.

Published: Mon Apr 27 07:43:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Mythos Paradox: Unpacking the Discovery-to-Remediation Gap in AI-Powered Vulnerability Management


In a recent development that has sent shockwaves through the security community, Anthropic's Claude Mythos, an AI-powered vulnerability management system, has highlighted the need for more robust organizational infrastructure. The Mythos announcement raises important questions about the efficacy of current practices and the gap between discovery and remediation. While it promises to revolutionize vulnerability management, its impact will depend on whether organizations can adapt their workflows to keep pace with the new paradigm.

Stay ahead of emerging threats by following us on social media or signing up for our newsletter.

Published: Mon Apr 27 07:58:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

PhantomCore's Malicious Campaign: Uncovering the Dark Web of Russian Network Exploitation


PhantomCore, a pro-Ukrainian hacktivist group, has been identified as the masterminds behind a malicious campaign to exploit vulnerabilities in TrueConf video conferencing software. Their exploits have been detected since September 2025, leaving a trail of compromised networks and shattered security in their wake. With their arsenal of tools and techniques, PhantomCore is targeting government and private organizations across industries, making them one of the most active groups in the Russian threat landscape.

Stay ahead of the cyber threats with our expert insights and analysis. Follow us for more updates on this story and others like it.



Published: Mon Apr 27 08:22:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Deceptive World of Visual Studio Code Extensions: Unveiling the GlassWorm v2 Malware Campaign



A recent discovery by cybersecurity researchers has exposed a sophisticated and malicious campaign involving Microsoft Visual Studio Code (VS Code) extensions, which are being used to deliver the GlassWorm v2 malware. The campaign involves 73 cloned VS Code extensions and is designed to trick unsuspecting developers into installing them, thereby gaining access to their systems and stealing sensitive data. Learn more about this threat and how you can protect yourself.



Published: Mon Apr 27 08:32:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Talent Faces Stagnant Pay as Industry Adapts to AI-Driven Threats

Cybersecurity talent faces stagnant pay and increasing workloads as AI-driven threats become increasingly complex and challenging to combat. Despite the growing importance of the sector, many professionals are feeling undervalued and unsupported by their employers.

Published: Mon Apr 27 09:40:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Home Security Giant ADT Hit by 5.5 Million Record Data Breach


A recent data breach has exposed the personal information of over 5.5 million individuals, including unique email addresses, names, dates of birth, phone numbers, physical addresses, and partial government-issued IDs.

ADT is not the first company to be hit by ShinyHunters' attacks, but this latest breach highlights the importance of robust cybersecurity measures for companies handling sensitive customer information.

The incident serves as a reminder that cybercrime is an ever-evolving threat landscape that requires constant vigilance and proactive measures to protect ourselves and our organizations from devastating consequences.



Published: Mon Apr 27 09:49:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Silent Warning Signs of Cyberattacks: A New Approach to Threat Intelligence

Learn how to identify early warning signs of cyberattacks and stay ahead of emerging threats in our upcoming webinar "From noise to signal: What threat actors are targeting next." Register now for this expert-led discussion and take your cybersecurity to the next level.

Published: Mon Apr 27 09:55:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Medtronic Data Breach: A Comprehensive Look at the Incident and Its Implications

Medtronic, a leading global medical device giant, recently confirmed that hackers breached its network, compromising sensitive data belonging to more than 9 million individuals. The breach raises significant concerns about the security of personal identifiable information and has implications for the medical device industry as a whole.

Published: Mon Apr 27 10:01:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Threat of Deepfake Voice Attacks: A Wake-Up Call for Security Leaders


The threat of deepfake voice attacks is on the rise, outpacing traditional cybersecurity defenses and leaving organizations scrambling for solutions. As security leaders, it's essential to understand this growing threat and take immediate action to protect your employees from falling prey.

Published: Mon Apr 27 10:11:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Chinese Spy's Deception: Uncovering the Spear-Phishing Campaign Targeting NASA


A sophisticated Chinese spy has been accused of impersonating a U.S. researcher in a spear-phishing campaign targeting NASA to steal defense software, according to a recent indictment. The scheme, which targeted dozens of victims across NASA, the U.S. military, government agencies, universities, and private firms, aimed to obtain restricted or proprietary software used for aerospace engineering and computational fluid dynamics. In this article, we will delve into the details of the case, exploring the tactics used by the Chinese spy, the impact on national security, and the importance of export control compliance in protecting sensitive technology.

Published: Mon Apr 27 10:24:25 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Hidden Dangers of BrowserGate: A Comprehensive Analysis of the Safari Extension Architecture


BrowserGate: A comprehensive analysis of the Safari extension architecture reveals vulnerabilities that make it susceptible to tracking and fingerprinting attacks. Learn more about this critical issue and how it affects your online security.

Published: Mon Apr 27 10:38:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A devastating supply chain attack: PyPI package with 1.1M monthly downloads hacked to push infostealer

A devastating supply chain attack has been discovered on a popular Python Package Index (PyPI) package, elementary-data, which has over 1.1 million monthly downloads. The attacker exploited a flaw in the project's workflow to push an infostealer that targeted sensitive data and crypto wallets.

Published: Mon Apr 27 11:53:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow of Supply Chain Security: A Growing Concern in the Era of Cyber Attacks


A recent supply chain security breach at Checkmarx has highlighted the need for stringent measures to protect against such threats. The incident, which involved a GitHub repository compromise, serves as a stark reminder of the importance of robust security protocols and proactive threat intelligence in mitigating cyber attacks.

Published: Mon Apr 27 12:00:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Wave of Cyber Threats: AI-Powered Malware and Exploits Continue to Evade Security Measures

Recent developments in AI-powered malware and exploits have highlighted the need for improved cybersecurity measures as these threats continue to evade security systems. Fast16, a new Lua-based malware, has been discovered to be at least five years older than Stuxnet, while indirect prompt injections (IPI) pose a significant threat to AI agents and their users. Understanding the nature of these threats is crucial in addressing them and staying ahead of emerging cyber threats.

Published: Mon Apr 27 12:19:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Threat of Cyberattacks on Medical and Utility Tech Companies

The US has seen a surge in high-profile cyberattacks on medical device manufacturers and utility-technology firms, highlighting the growing threat posed by digital intruders to critical infrastructure. This article provides an in-depth look at the recent breaches at Itron and Medtronic, and explores the broader implications for these sectors and the wider cybersecurity landscape.

Published: Mon Apr 27 13:38:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The White House Correspondents' Dinner Shooting: A Reflection of a Polarized Nation


A 31-year-old engineer who attended an independent game development conference was suspected of firing shots at President Donald Trump during the White House Correspondents' Dinner. The incident has raised concerns about security protocols, hate speech, and conspiracy theories in American society.



Published: Mon Apr 27 14:53:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Extradition of Xu Zewei: Unpacking the Alleged Role of China's Ministry of State Security in Cyberespionage Operations

Chinese national accused of carrying out cyberespionage operations for China's Ministry of State Security has been extradited to the US, marking a significant escalation in efforts to hold individuals accountable for their alleged involvement in malicious hacking activities.

Published: Mon Apr 27 16:01:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Medtronic Discloses Security Incident After ShinyHunters Claimed Theft of 9 Million Records

Medtronic discloses security incident after ShinyHunters claimed theft of 9 million records. The medical device giant has confirmed a breach of its IT systems but assures that there is no impact on its products or operations.

Published: Mon Apr 27 16:09:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Medtronic and Itron Exposed: A Growing Concern for Medical Device and Utility Companies

Two major tech suppliers, Medtronic and Itron, have disclosed breaches in their systems, highlighting the growing concern among medical device companies about the potential risks of data breaches. The incidents underscore the need for robust cybersecurity measures and greater cooperation between industry stakeholders to share threat intelligence and best practices.

Published: Mon Apr 27 18:27:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Golden Dome Initiative: A $3.2 Billion Investment in Space-Based Interceptors

The United States Space Force has awarded contracts worth up to $3.2 billion to 11 companies for the development of space-based interceptors as part of President Trump's Golden Dome initiative, a program aimed at defending the US against advanced aerial threats. The USSF argues that the use of next-generation space-based tracking and AI-enabled interceptors is necessary to counter emerging threats.

Published: Mon Apr 27 18:34:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ongoing Supply-Chain Attack Targets Security and Dev Tools, Exposing Sensitive Data


A new supply-chain attack has been uncovered, compromising popular open-source tools such as Checkmarx, Trivy, and LiteLLM. The incident highlights the growing threat of supply-chain attacks, which involve compromising a software or hardware component within a larger system. With sensitive data including source code and login credentials exposed, experts are urging developers and organizations to remain vigilant and proactive in addressing potential vulnerabilities.

Published: Mon Apr 27 20:45:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Patches Critical Entra ID Role Flaw That Enables Service Principal Takeover


Microsoft has patched a critical flaw in its Entra ID platform that enables privilege escalation and identity takeover attacks. The vulnerability, known as the Agent ID Administrator role, allows attackers to take over arbitrary service principals, including those with elevated permissions. Follow us on Google News, Twitter, LinkedIn, and other platforms for more exclusive cybersecurity content.



Published: Tue Apr 28 02:07:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202: A Zero-Click Vulnerability Leaves a Trail of Sensitive Information

Microsoft has confirmed that the Windows Shell CVE-2026-32202 vulnerability has been actively exploited in the wild, despite being patched as part of its February 2026 Patch Tuesday update. The zero-click vulnerability stems from an incomplete patch for another high-severity security flaw, which was weaponized by a Russian nation-state group tracked as APT28.

Published: Tue Apr 28 02:21:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

National Cyber Security Centre Launches SilentGlass: A Groundbreaking Plug-In Device to Secure HDMI and DisplayPort Links

The National Cyber Security Centre (NCSC) has launched SilentGlass, a revolutionary plug-in device designed to secure HDMI and DisplayPort links. This innovative technology addresses the growing threat landscape by introducing a simple yet powerful solution that can protect critical infrastructure from physical attacks.

Published: Tue Apr 28 03:31:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: China's Silk Typhoon Group Member Extradited to U.S. Over COVID Research Cyberattacks


Chinese national Xu Zewei, 34, has been extradited to the United States from Italy after being accused of being a member of the Silk Typhoon hacking group, a state-sponsored threat group that has been involved in various high-profile cyber attacks against American organizations and government agencies. The extradition comes amidst a growing concern about the increasing involvement of Chinese hackers in global cybersecurity threats.

Published: Tue Apr 28 04:43:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sovereignty in the Cloud: SUSE's European Independence Hangs by a Thread

In a move that could potentially compromise SUSE's European digital sovereignty credentials, the company's majority stakeholder, EQT, has reportedly commissioned Arma Partners to explore its options, including a potential $6 billion sale. As SUSE's Global Head of Sovereign Solutions, Andreas Prins emphasized that local workloads are likely to become more prominent in the future, and the trend towards digital sovereignty is driven by a range of factors, including data privacy and security concerns.

Published: Tue Apr 28 05:55:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Zero-Window Era: How Artificial Intelligence is Redefining the Landscape of Cybersecurity

The Zero-Window Era: How Artificial Intelligence is Redefining the Landscape of Cybersecurity

Published: Tue Apr 28 06:03:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Android Spyware Morpheus Linked to Italian Surveillance Firm Raises Concerns Over Covert Surveillance


A new Android spyware called Morpheus linked to an Italian surveillance firm has been uncovered, highlighting the growing threat of covert surveillance tools in the digital landscape. The spyware, distributed through fake apps posing as updates, can steal extensive data from infected devices and gain persistence even after reboot. Osservatorio Nessuno researchers conclude that the malware is linked to IPS Intelligence, an Italian firm active in lawful interception technologies used by governments. This revelation underscores the importance of protecting personal data from emerging threats like Morpheus.

Published: Tue Apr 28 06:15:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI-Powered Bug Hunting: A New Era for Cybersecurity

As AI-powered bug hunting tools continue to advance at an unprecedented pace, cybersecurity experts are facing a new and daunting challenge. Learn how companies are preparing for this technological revolution and what strategies can be used to mitigate its impact.

Published: Tue Apr 28 07:27:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Unpatched Flaw in LeRobot Leaves Open-Source Robotics Platform Vulnerable to Remote Code Execution


A critical unpatched flaw in LeRobot, an open-source robotics platform developed by Hugging Face, has left it vulnerable to remote code execution. This vulnerability allows attackers to execute arbitrary code remotely through the use of a deserialization vulnerability stemming from the unsafe pickle format. The impact of this vulnerability could be severe, including unauthenticated remote code execution and compromise of connected robots.

Published: Tue Apr 28 07:36:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT FIXES ENTRA ID FLAW ENABLING PRIVILEGE ESCALATION: A WARNING TO ORGANIZATIONS WORLDWIDE

Microsoft has fixed a critical flaw in its Entra ID platform, known as the Agent ID Administrator role. This flaw allowed attackers to take over service accounts, posing significant privilege escalation risks to affected organizations. Microsoft has since restricted the role's capabilities, but this incident highlights the importance of monitoring sensitive roles and tracking service principal ownership changes.

Published: Tue Apr 28 07:47:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Zero Trust Bottleneck: How Manual Data Movement is Exposing the Digital Battlespace



A recent study by Cyber360 has revealed that manual data movement is a major contributor to cybersecurity breaches. The study's findings highlight the need for organizations to address this vulnerability by implementing effective Zero Trust strategies, ensuring data integrity in transit, and establishing robust identity and authentication mechanisms across different networks and environments. By prioritizing these critical areas, organizations can help prevent costly breaches and protect their sensitive data from falling into the wrong hands.

Published: Tue Apr 28 09:01:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Decoding the Signals: A Russian Operation Targeting German Officials

A sophisticated phishing campaign targeting German officials using Signal messaging platform has raised concerns about Russian involvement, highlighting the adaptability and reach of threat actors in the digital realm. The operation, which targeted high-profile individuals including politicians, ministers, military personnel, diplomats, and journalists, demonstrates the growing importance of human awareness and resilience in cybersecurity.

Published: Tue Apr 28 09:09:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Alert: Checkmarx Confirms LAPSUS$ Hackers Leaked Its Stolen GitHub Data


Checkmarx has confirmed that it was a victim of a data breach at the hands of LAPSUS$ hackers. The hackers leaked stolen GitHub data, compromising sensitive information. Customer information is not stored in Checkmarx's GitHub repository, reducing the risk of potential harm to customers. The company will share more details as a forensic investigation is underway.

Published: Tue Apr 28 10:30:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Shadow of ShinyHunters: A Global Cybercrime Collective's Devastating Trail of Data Breaches


A global cybercrime collective known as ShinyHunters has claimed responsibility for a string of high-profile data breaches across multiple industries, including logistics technology company Pitney Bowes. With an estimated 8.2 million unique email addresses leaked in the breach, experts are warning of the potential consequences for individuals and organizations alike. The rise of this collective highlights the growing sophistication and reach of cybercrime groups, making it essential that organizations prioritize data protection and take proactive steps to prevent similar incidents from occurring.

Published: Tue Apr 28 10:41:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

VECT 2.0 Ransomware: A Sophisticated yet Flawed Threat to Global Cybersecurity

VECT 2.0 ransomware poses a significant risk to global cybersecurity due to its flaw-ridden design, which renders data recovery nearly impossible even for the threat actors themselves.

Published: Tue Apr 28 10:49:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadow of Scattered Spider: A Growing Concern for Cybersecurity


The Shadow of Sc scattered Spider: A growing concern for cybersecurity. A 19-year-old dual US and Estonian citizen has been arrested in Finland for his involvement with the notorious Scattered Spider hacking collective, which is known for its use of social engineering tactics to extort millions of dollars from large corporations worldwide.

Published: Tue Apr 28 12:09:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Online Interactions: A Glimpse into the UAE's Strict Cybercrime Laws


In the UAE, sharing a screenshot can lead to severe penalties, including imprisonment and fines, under Article 52 of the country's cybercrime law. A closer look at the implications of this legislation reveals a complex web of laws that extend beyond traditional cybercrime activities and require greater awareness and education about their applications.

Published: Tue Apr 28 13:24:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brazilian LofyGang Resurfaces After Three Years With Sophisticated Minecraft LofyStealer Campaign Targeting Young Users



Brazilian LofyGang has resurfaced after three years to launch a new campaign targeting Minecraft players, using a sophisticated stealer called LofyStealer (aka GrabBot). The malware masquerades as a Minecraft hack and is designed to steal sensitive data from multiple web browsers. This development marks a significant departure from previously observed tradecraft, as the group has begun using a malware-as-a-service model.

This campaign highlights an ongoing security challenge where widely trusted platforms are being abused to distribute malicious payloads. By utilizing social trust and common download channels, threat actors can often bypass traditional security solutions.

Published: Tue Apr 28 13:46:49 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Vimeo Data Breach: A Web of Complications Following the Anodot Incident


The recent data breach at Vimeo has raised concerns about the potential impact on its users and the company's ability to respond to the incident. Experts warn of the dangers of third-party breaches and the need for proactive security measures to protect user data.

Published: Tue Apr 28 15:04:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Alleged WhatsApp Backdoor Investigation: Unraveling the Complexities of Meta's Role


The U.S. Commerce Department has closed an investigation into alleged backdoors in WhatsApp's encryption system, sparking questions about Meta's role in potentially compromising user privacy. The allegations center on claims that Meta employees and contractors had access to encrypted messages, a stance vehemently denied by the company. As the implications of this incident continue to unfold, it is essential to consider the complex interplay between technological innovation, government surveillance, and individual privacy rights.

Published: Tue Apr 28 15:13:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Consequences of Vect's Ransomware: A Threat to Supply Chain Security



The devastating consequences of Vect's ransomware: a threat to supply chain security. Recent supply chain attacks, particularly those targeting AI and machine learning tools, have left a trail of destruction in their wake. This article explores the vulnerabilities exploited by Vect's ransomware and highlights the importance of prioritizing security measures to prevent similar breaches.

Published: Tue Apr 28 15:26:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Vulnerability Exploited on GitHub.com: A Case Study in Command Injection


A critical security vulnerability on GitHub.com allows authenticated users to execute arbitrary commands with a single "git push" command. The exploit stems from user-supplied push option values not being properly sanitized before inclusion in internal service headers.

Published: Tue Apr 28 15:37:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Catastrophic Consequences of Broken VECT 2.0 Ransomware: A Data Wiper's Unintended Devastation


The VECT 2.0 ransomware has been found to have a critical flaw in its encryption mechanism, which transforms it into a data wiper capable of irreparably destroying large files across various operating systems.

Published: Tue Apr 28 16:55:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Take Advantage of Critical LiteLLM Pre-Auth SQLi Flaw


Hackers are exploiting a critical vulnerability in LiteLLM, an open-source large-language model gateway, that allows unauthorized access to sensitive data stored in its database. The flaw, tracked as CVE-2026-42208, is an SQL injection issue that occurs during the proxy API key verification step. Users of LiteLLM are advised to upgrade to version 1.83.7 and rotate their virtual API keys and provider credentials to mitigate the risk of exploitation.

Published: Tue Apr 28 17:03:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in GitHub's Enterprise Server: A Cautionary Tale of Command Injection and Remote Code Execution


A critical vulnerability in GitHub's Enterprise Server has left millions of users exposed to a significant security risk, enabling remote code execution through a single git push. The root cause lies in a command injection issue, and researchers are urging immediate patching and increased vigilance in complex systems.

Published: Tue Apr 28 17:10:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

LiteLLM SQL Injection Vulnerability: A Critical Threat to AI Infrastructure



A critical vulnerability in BerriAI's popular LiteLLM Python package has been actively exploited in the wild within 36 hours of its public disclosure. The vulnerability, tracked as CVE-2026-42208 (CVSS score: 9.3), is an SQL injection that could be exploited to modify the underlying LiteLLM proxy database. Organizations that rely on LiteLLM must take immediate action to patch their instances or implement additional security measures to mitigate the risk.

Published: Wed Apr 29 01:26:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. CISA Adds Microsoft Windows Shell and ConnectWise ScreenConnect Flaws to Its Known Exploited Vulnerabilities Catalog: A Critical Update for Organizations


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical flaws in Microsoft Windows Shell and ConnectWise ScreenConnect to its Known Exploited Vulnerabilities (KEV) catalog, highlighting the ever-present threat landscape in the cybersecurity world. Organizations must take proactive measures to secure their systems and networks against these threats, including conducting thorough vulnerability assessments and ensuring that all software and systems are up-to-date with the latest patches and updates.

Published: Wed Apr 29 03:42:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShinyHunters' Latest Exploitation: Targeting Vimeo Following Anodot Security Breach

ShinyHunters, a notorious group known for their extortion tactics and cyber threats, have exploited Anodot's security breach to target Vimeo, threatening to leak stolen data unless the company pays a ransom. The incident highlights the importance of robust cybersecurity measures and the need for organizations to remain vigilant in the face of emerging threats.

Published: Wed Apr 29 03:58:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great GoDaddy Domain Debacle: A Cautionary Tale of Inadequate Security Measures


In a shocking turn of events, Lee Landis, a partner at Pennsylvania-based IT shop Flagstream Technologies, has come forward alleging that GoDaddy transferred complete control of a valid 27-year-old domain to another customer without requiring any authentication processes or uploading supporting documents. This alleged incident sparked a four-day ordeal for Flagstream's client, resulting in significant downtime and potential security risks. Read more about the Great GoDaddy Domain Debacle and its implications on online security.

Published: Wed Apr 29 05:14:53 2026 by llama3.2 3B Q4_K_M



SecurityWeek

Critical GitHub Vulnerability Exposed Millions of Repositories

Cyber Insurance Data Gives CISOs New Ammo for Budget Talks

Vimeo Confirms User and Customer Data Breach

The Mythos Moment: Enterprises Must Fight Agents with Agents

Webinar Today: A Step-by-Step Approach to AI Governance

Robinhood Vulnerability Exploited for Phishing Attacks

Alleged Chinese State Hacker Extradited to US

Dozens of Open VSX Extension Clones Linked to GlassWorm Malware

Sevii Launches Cyber Swarm Defense to Make Agentic AI Security Costs Predictable

Electric Motorcycles and Scooters Face Hacking Risks to Security and Rider Safety

CISA News

CISA, National Cyber Security Centre (NCSC) UK, and Global Partners Issue Advisory on Chinese Government-Linked Covert Cyber Networks

CISA Warns of FIRESTARTER Malware Targeting Cisco ASA including Firepower and Secure Firewall Products

CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat

Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems

CISA Announces New Town Halls to Engage with Stakeholders on Cyber Incident Reporting for Critical Infrastructure

CISA’s 2025 Year in Review: Driving Security and Resilience Across Critical Infrastructure

CISA Releases Guide to Help Critical Infrastructure Users Adopt More Secure Communication

CISA Orders Federal Agencies to Strengthen Edge Device Security Amid Rising Cyber Threats

CISA Urges Critical Infrastructure Organizations to Take Action Against Insider Threats

CISA Releases Product Categories List to Propel Post-Quantum Cryptography Adoption Pursuant to President Trump’s Executive Order 14306

CISA Blog

The End is Just the Beginning of Better Security: Enhanced Vulnerability Management with OpenEoX

Super Bowl LX: Strengthening Preparation, Building Resilience, Fostering Partnerships

NCSWIC releases the “‘What is a PACE Plan” video

CISA Urges Critical Infrastructure to Be Air Aware

Helping OT Organizations to Establish Defensible Architecture and More Resilient Operations

The Mandate, Mission, and Momentum to lead the CVE Program into the Future belongs to CISA

The Joint SAFECOM-NCSWIC Project 25 (P25) User Needs Working Group (UNWG) releases the UNWG Video Series

Tackling the National Gap in Software Understanding

Securing Core Cloud Identity Infrastructure: Addressing Advanced Threats through Public-Private Collaboration

SAFECOM Releases the Emergency Communications System Lifecycle Planning Guide Suite Refresh

All CISA Advisories

NSA GRASSMARLIN

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA Adds Four Known Exploited Vulnerabilities to Catalog

Milesight Cameras

Defending Against China-Nexus Covert Networks of Compromised Devices

SpiceJet Online Booking System

Yadea T5 Electric Bicycle

FIRESTARTER Backdoor

CISA Adds One Known Exploited Vulnerability to Catalog

Hangzhou Xiongmai Technology Co., Ltd XM530 IP Camera

Carlson Software VASCO-B GNSS Receiver

Intrado 911 Emergency Gateway (EGW)

CISA Adds One Known Exploited Vulnerability to Catalog

Siemens Industrial Edge Management

Siemens SINEC NMS

SenseLive X3050

Siemens TPM 2.0

Siemens SINEC NMS

Zero Motorcycles Firmware

Siemens Analytics Toolkit

Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary

Silex Technology SD-330AC and AMC Manager

Hardy Barth Salia EV Charge Controller

Siemens RUGGEDCOM CROSSBOW Station Access Controller (SAC)

Siemens SCALANCE

CISA Adds Eight Known Exploited Vulnerabilities to Catalog

Supply Chain Compromise Impacts Axios Node Package Manager

Delta Electronics ASDA-Soft

Anviz Multiple Products

CISA Adds One Known Exploited Vulnerability to Catalog

Exploit-DB.com RSS Feed

[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)

[webapps] OpenKM 6.3.12 - Multiple

[webapps] GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)

[webapps] JuzaWeb CMS 3.4.2 - Authenticated Remote Code Execution

[webapps] FacturaScripts 2025.43 - XSS

[webapps] Xibo CMS 4.3.0 - RCE via SSTI

[local] Fedora - Local Privilege Escalation

[webapps] LangChain Core 1.2.4 - SSTI/RCE

[local] Atlona ATOMERX21 - Authenticated Command Injection

[local] Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation

[webapps] WordPress Plugin 5.2.0 - Broken Access Control

[local] AVAST Antivirus 25.11 - Unquoted Service Path

[local] NetBT e-Fatura - Privilege Escalation

[webapps] D-Link DIR-650IN - Authenticated Command Injection

[webapps] React Server 19.2.0 - Remote Code Execution

[webapps] RomM 4.4.0 - XSS_CSRF Chain

[webapps] Jumbo Website Manager - Remote Code Execution

[local] ZSH 5.9 - RCE

[webapps] FortiWeb 8.0.2 - Remote Code Execution

[local] 7-Zip 24.00 - Directory Traversal

[webapps] xibocms 3.3.4 - RCE

[local] SQLite 3.50.1 - Heap Overflow

[local] Microsoft MMC MSC EvilTwin - Local Admin Creation

[webapps] Horilla v1.3 - RCE

[local] is-localhost-ip 2.0.0 - SSRF

[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass

[local] Windows Kernel - Elevation of Privilege

[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation

[webapps] ASP.net 8.0.10 - Bypass

[webapps] Grafana 11.6.0 - SSRF

[webapps] Zhiyuan OA - arbitrary file upload leading

[webapps] WBCE CMS 1.6.4 - Remote Code Execution

[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution

[webapps] WordPress Madara - Local File Inclusion

[webapps] WordPress Backup Migration 1.3.7 - Remote Command Execution

[webapps] mailcow 2025-01a - Host Header Password Reset Poisoning

[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow

[webapps] WeGIA 3.5.0 - SQL Injection

[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)

[webapps] motionEye 0.43.1b4 - RCE

[remote] Windows 10.0.17763.7009 - spoofing vulnerability

[local] glibc 2.38 - Buffer Overflow

[remote] windows 10/11 - NTLM Hash Disclosure Spoofing

[remote] Redis 8.0.2 - RCE

[webapps] OctoPrint 1.11.2 - File Upload

[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

[webapps] aiohttp 3.9.1 - directory traversal PoC

[webapps] FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution

[local] Docker Desktop 4.44.3 - Unauthenticated API Exposure

[webapps] Piranha CMS 12.0 - Stored XSS in Text Block

Full Disclosure

CyberDanube Security Research 20260408-1 | Multiple Vulnerabilities in Siemens SICAM A8000

CyberDanube Security Research 20260408-0 | Remote Operation Denial of Service in Siemens SICAM A8000

SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS

SEC Consult SA-20260401-0 :: Broken Access Control in Open WebUI

SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library

Apple OHTTP Relay: 14 Third-Party Endpoints, 6 Countries, Zero User Visibility

[KIS-2026-06] MetInfo CMS <= 8.1 (weixinreply.class.php) PHP Code Injection Vulnerability

[CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability

APPLE-SA-03-24-2026-10 Xcode 26.4

APPLE-SA-03-24-2026-9 Safari 26.4

APPLE-SA-03-24-2026-8 visionOS 26.4

APPLE-SA-03-24-2026-7 watchOS 26.4

APPLE-SA-03-24-2026-6 tvOS 26.4

APPLE-SA-03-24-2026-5 macOS Sonoma 14.8.5

APPLE-SA-03-24-2026-4 macOS Sequoia 15.7.5

Open Source Security

[ADVISORY] curl: CVE-2026-7168: cross-proxy Digest auth state leak

[ADVISORY] curl: CVE-2026-6276: stale custom cookie host causes cookie leak

[ADVISORY] curl: CVE-2026-7009: OCSP stapling bypass with Apple SecTrust

[ADVISORY] curl: CVE-2026-6253: proxy credentials leak over redirect-to proxy

[ADVISORY] curl: CVE-2026-6429: netrc credential leak with reused proxy connection

[ADVISORY] curl: CVE-2026-5773: wrong reuse of SMB connection

[ADVISORY] curl: CVE-2026-5545: wrong reuse of HTTP Negotiate connection

[ADVISORY] curl: CVE-2026-4873: connection reuse ignores TLS requirement

Re: Coordinated Disclosure in the LLM Age

Re: [SECURITY] Out-of-Bounds Read in MPLS Extension Parsing traceroute 2.1.2

Re: Coordinated Disclosure in the LLM Age

Re: [SECURITY] Out-of-Bounds Read in MPLS Extension Parsing traceroute 2.1.2

Re: [SECURITY] Out-of-Bounds Read in MPLS Extension Parsing traceroute 2.1.2

CVE-2026-40560: Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence

Re: [SECURITY] Out-of-Bounds Read in MPLS Extension Parsing traceroute 2.1.2








© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us