<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-4802841478634147276</id><updated>2026-04-16T11:50:17.967+05:30</updated><title type="text">The Hacker News</title><subtitle type="html">The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers</subtitle><link href="https://thehackernews.com/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="https://thehackernews.com/feeds/posts/default?redirect=false" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/" rel="alternate" type="text/html"/><link href="http://pubsubhubbub.appspot.com/" rel="hub"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" rel="next" type="application/atom+xml"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>16219</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6759161651843107882</id><published>2026-04-16T11:50:00.002+05:30</published><updated>2026-04-16T11:50:17.861+05:30</updated><title type="text">UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign</title><summary type="html">
The Computer Emergencies Response Team of Ukraine (CERT-UA)&amp;nbsp;has disclosed details of a new&amp;nbsp;campaign that has&amp;nbsp;targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and&amp;nbsp;WhatsApp.
The activity,&amp;nbsp;which was&amp;nbsp;observed between March and April </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6759161651843107882" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6759161651843107882" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/uac-0247-targets-ukrainian-clinics-and.html" rel="alternate" title="UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH3uHu3ez1qUhePM8e1rCVaEUwBzhu09tblZcAl6jlOEYHN1Zq2-rm-dyEOArGNUm63UjM-_Qs8XwFKUa46UxOwufTn4BmRlfv1xiwlxkk3XboMQu8d4fHpy5Vb5y_0zcpXw5Alg-V_Ud85gINtfz6pfOZWWcco9Dy0jkeRCPCF-ssY2zJjRge1d3PJf_c/s260-e100/uk.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-791493804215310174</id><published>2026-04-15T22:39:00.001+05:30</published><updated>2026-04-15T22:39:23.834+05:30</updated><title type="text">n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails</title><summary type="html">
Threat actors&amp;nbsp;have been&amp;nbsp;observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated&amp;nbsp;emails.
"By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/791493804215310174" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/791493804215310174" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/n8n-webhooks-abused-since-october-2025.html" rel="alternate" title="n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXMJaHSQp1aJ8l7rKKtfILQtDMLWTUVOPwWqizQ-nRzb5JbG1BJOFKTs0NYGVQ0fBFTzLkjaY0bntn7UDnlyy502mDQJzvqFhTJwmYlctN551StWLJf8hnET4i8ZrwWvtzhswLW_2GoSI1zlMVRnI89aVrFU1lbes9p7fpYFjT9V7OxAmbmMW3UR-hv9_/s260-e100/webhook.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4621819207219777292</id><published>2026-04-15T18:26:00.006+05:30</published><updated>2026-04-16T10:23:31.429+05:30</updated><title type="text">Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover</title><summary type="html">
A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the&amp;nbsp;wild.
The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It&amp;nbsp;has been codenamed MCPwn by Pluto&amp;nbsp;Security.
"</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4621819207219777292" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4621819207219777292" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html" rel="alternate" title="Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-efZdYJpyjLdBQDLfJxWi6aiElSTIIzesGLR7SNMM0laIvBdFHioyAfxmOQkhV-bBV5SqCxRRhocp4-Q3EezvtE5Xp2aeNcFrP6d89jhOY2QiCVhhyMCMCVy39cE5YcTvg_7_tvXAEwI4N1g_eRKNzWwYtLH-k80d5he55NN2UK0sNNkbb0l35ix6MOBR/s260-e100/nui.png" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6926159815410910288</id><published>2026-04-15T18:07:00.002+05:30</published><updated>2026-04-15T18:07:33.999+05:30</updated><title type="text">April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More</title><summary type="html">
A number&amp;nbsp;of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April's Patch Tuesday&amp;nbsp;releases.
Topping the list is an SQL injection vulnerability impacting SAP Business Planning and Consolidation and SAP Business Warehouse&amp;nbsp;(CVE-2026-27681, CVSS score: 9.9) that could result in the execution of arbitrary database&amp;nbsp;</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6926159815410910288" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6926159815410910288" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/april-patch-tuesday-fixes-critical.html" rel="alternate" title="April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-FBwJYevQ8Ner9ypyp5-H1XIPfa5guhQXC-W4llTZuBI072vjCoxKh9PUexQBZGJIeuZXoBAKboz9xz5Gzd0p1SiT5UME0wd0lTTOS6EIh3nJ6vsAeMzGmT0P38ry2ySiLc-je0e0YAZAPDYmhw3jSfqbExcsQW5nL8syaClAcSfZziU-KPneawQFfo6p/s260-e100/patches.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4068186319481926770</id><published>2026-04-15T17:00:00.008+05:30</published><updated>2026-04-15T17:00:00.116+05:30</updated><title type="text">Deterministic + Agentic AI: The Architecture Exposure Validation Requires</title><summary type="html">
Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across&amp;nbsp;industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations to adopt it across operational and security functions.&amp;nbsp;Pentera’s AI Security and Exposure Report&amp;nbsp;2026 reflects that&amp;nbsp;momentum: every CISO surveyed</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4068186319481926770" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4068186319481926770" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/deterministic-agentic-ai-architecture.html" rel="alternate" title="Deterministic + Agentic AI: The Architecture Exposure Validation Requires" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3s5QStAA0bgcCWhxktRnDbuCjGGiFi6NUz1Z9zVK8-4CkZ8FS82Sc5Qg_9-wKK98yThRDobcnyJcD63TIzW4OUTXzNrXTD6PXHoNMBJpgt02mi7K24qVMxfq_8zsG6kBupb8S0DygwxK2F33miTnFivZKSguCqCv82v3mxOAYWnHrcFHF7Y1iTPgV9i6u/s260-e100/validation-main.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-2621238192687157548</id><published>2026-04-15T14:10:00.002+05:30</published><updated>2026-04-15T15:44:41.353+05:30</updated><title type="text">Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities</title><summary type="html">
Microsoft on Tuesday released updates to address a&amp;nbsp;record 169 security&amp;nbsp;flaws across its product portfolio, including one vulnerability that&amp;nbsp;has been actively&amp;nbsp;exploited in the&amp;nbsp;wild.
Of these 169 vulnerabilities, 157 are rated Important, eight are rated&amp;nbsp;Critical, three are rated Moderate,&amp;nbsp;and one is rated Low in&amp;nbsp;severity. Ninety-three of the flaws are </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2621238192687157548" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2621238192687157548" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html" rel="alternate" title="Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKhAYMS4CZDglUzVBKPpIJJJjC7LSHIE8r8HSYTDvQtfuqIlLk-jorWPPNvMPaiuWSriWM2WP-cyKqr_TRwlOG65EY9ZZWuRYsrzcn05wg3mkQd_-j103HEjHaUryyOF7jWj6IuAM6VwCUloPq_9RMt959E-yG8qF4n1acw3OfY73fWw4p90V0ClaY4hjo/s260-e100/windows-update.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-3065767133206053882</id><published>2026-04-15T10:00:00.001+05:30</published><updated>2026-04-15T10:11:19.512+05:30</updated><title type="text">OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams</title><summary type="html">
OpenAI on Tuesday&amp;nbsp;unveiled GPT-5.4-Cyber, a variant of its latest flagship&amp;nbsp;model, GPT‑5.4, that's specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier&amp;nbsp;model, Mythos.
"The progressive use of AI accelerates defenders – those responsible for keeping systems, data, and users safe – enabling them to find and fix problems </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3065767133206053882" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3065767133206053882" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html" rel="alternate" title="OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrjpxBjlnOwelWhtbcyO3kBGpQwkfPkbL7RytRsDo26AL5rMz4inD_rjZLSfjy5R6skvnpiOA5M1LoDaAW1bCz4Isy4RMffGJVzgm4kYy5N-V1ijfLhVHefPcneHVGZyXZRjbLZZBHQRe3_QKhKfb5hss3a5hFveU8v2WkKHq-2wUmY_ocysIGGMP8GxdV/s260-e100/gpt.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4212234738897135582</id><published>2026-04-14T21:27:00.000+05:30</published><updated>2026-04-14T21:27:00.203+05:30</updated><title type="text">New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released</title><summary type="html">
Two high-severity security vulnerabilities&amp;nbsp;have been disclosed in Composer, a package&amp;nbsp;manager for&amp;nbsp;PHP, that, if successfully exploited, could result in arbitrary command execution.
The vulnerabilities&amp;nbsp;have been&amp;nbsp;described as command injection flaws affecting the Perforce VCS (version control software) driver. Details of the two flaws are below&amp;nbsp;-

CVE-2026-40176 (CVSS</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4212234738897135582" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4212234738897135582" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/new-php-composer-flaws-enable-arbitrary.html" rel="alternate" title="New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP-RqcuX8QuBEwVkchLNSjyIAqQEuFwy0prqQ1gGqxpBFESQLuCzgGB7-cjYhJrbLhbTk_j8G4NedN06plhhqLd_Rpd01mTh8XcOHjvQ_UuJqfjTROZeh40WlSN_7gzRL4yVKX-Aj0ui2gOxo9l70b3Dy5R6srKjne-gQXIhL7fNAHYZ7rDm6-yWl4-_JD/s260-e100/php-code.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-2559949630862208233</id><published>2026-04-14T20:26:00.000+05:30</published><updated>2026-04-14T20:26:42.831+05:30</updated><title type="text">Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security</title><summary type="html">
Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel devices and push memory-safe code at a more foundational&amp;nbsp;level.
"The new Rust-based DNS parser significantly reduces our security risk by mitigating an entire class of vulnerabilities in a risky area, while also laying </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2559949630862208233" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2559949630862208233" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/google-adds-rust-based-dns-parser-into.html" rel="alternate" title="Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjblrgfLU8m4awyQDEqyzwguow-RuCp4UH1k5DBkrUrP87A7tsEQPPaLD_D9M4VXF5mSNrmp1eurx_QW-nVjM1nNnkyEIFyFiry3nxE0Wq3xrT0L06S6B11rEHcWzB7q78RRQySSxwLAVIncgqO5qhtY6b0A_LzYF8wtvH94G_TLQEn8UIivqrJNkH88Nf7/s260-e100/android-rust.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6586079222099441322</id><published>2026-04-14T20:00:00.002+05:30</published><updated>2026-04-15T10:13:31.278+05:30</updated><title type="text">AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud</title><summary type="html">
Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories into&amp;nbsp;Google's Discover&amp;nbsp;feed and trick users into enabling persistent browser notifications that lead to scareware and financial&amp;nbsp;scams.
The campaign, which has been </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6586079222099441322" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6586079222099441322" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/ai-driven-pushpaganda-scam-exploits.html" rel="alternate" title="AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiON8Ew8R1EO7t3yoLoTFdM2hQsDW9AtBPPBcNuPup6ZmpGta3VyYlkhiqqRlW5CDWpnU_3IJ-EAbnV6nrfzJ4V3mdWIng75afS2TPvZOs-_MLc0a5lxiLwR5H-EWmi1C0ctYCBZSBNbF9CCGcdm7BrNaWunTp8QvBkmqJwq0Yvde9bQxbhooyIYaXRiebP/s260-e100/ad-fraud.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-3680180065249514902</id><published>2026-04-14T15:50:00.000+05:30</published><updated>2026-04-14T15:50:38.744+05:30</updated><title type="text">Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads</title><summary type="html">
A nascent Android remote access trojan&amp;nbsp;called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on&amp;nbsp;Meta.
"Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3680180065249514902" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3680180065249514902" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/mirax-android-rat-turns-devices-into.html" rel="alternate" title="Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSTMJQqqJsKQgPpv94bO9xAc_tQCEJXJrZGAEmCuyUghslqHdHDYmuVYqIVLGqMLi_ZuY_zEBoDdGDQRVAX0KyGq9QcuIzQ5LVbNLBnwUwW2R7IBg0gopxAI9ml44zJsKXEoc1ig8zRbVDBNK3B4LZRE0WljzIfwnSMHx8Mv1kWYTK5qnxOB1YYl_WNWMa/s260-e100/android-malware.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-1360343917713439641</id><published>2026-04-14T15:30:00.000+05:30</published><updated>2026-04-14T15:30:00.120+05:30</updated><title type="text">Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)</title><summary type="html">
OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The&amp;nbsp;primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by nearly&amp;nbsp;400%.
The surge in AI-assisted development is creating a "velocity&amp;nbsp;gap" where the density of high-impact vulnerabilities&amp;nbsp;is scaling faster&amp;nbsp;than </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1360343917713439641" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1360343917713439641" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/analysis-of-216m-security-findings.html" rel="alternate" title="Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4H3KkiSOm6TbNn7e0Ceu3-etqqeLci47PtX9T-0WGgdGScHfd2tfFamA6oyOi62wWwKF7KwF_wcqNACSvRVJvH__1YKoP_fP7T5LFdDqX8jxFph0NSaVJjFEVhb0bjNvn5IWayqMwKyRNbp9mmW7f2JLs7I3pTF8yLuhCOHsbnpNVLrEVq6Uq63j8508/s260-e100/derailed.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4637577777191046241</id><published>2026-04-14T14:05:00.001+05:30</published><updated>2026-04-14T19:08:22.852+05:30</updated><title type="text">108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users</title><summary type="html">
Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page&amp;nbsp;visited.
According to Socket, the extensions (complete list </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4637577777191046241" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4637577777191046241" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/108-malicious-chrome-extensions-steal.html" rel="alternate" title="108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEOmjr311c0yBDI593joFXQLaRdpm6DY67lbFv83YcYlRHaJkpocwXjDZDsV9F9DM-SavZwCOZ-fg10ncUJyW3ODlfBjqG6aK_ytdBfvXFGLswxeJ69oiZXfhGKdCgVO0Angg_qlYB6oAZYo-JQRKn4toBGWcS7OTDwPV0rkus7eNw-9BllIGJa2nkeKXn/s260-e100/chrome-telegram.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4065204221338447627</id><published>2026-04-14T11:20:00.002+05:30</published><updated>2026-04-14T11:20:21.462+05:30</updated><title type="text">ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers</title><summary type="html">

A critical security vulnerability&amp;nbsp;impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the&amp;nbsp;wild.
The vulnerability in question&amp;nbsp;is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4&amp;nbsp;out of&amp;nbsp;10.0.
It relates to a case of unrestricted file upload that stems from improper validation of </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4065204221338447627" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4065204221338447627" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/showdoc-rce-flaw-cve-2025-0520-actively.html" rel="alternate" title="ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjthzbWdOOZKL2JKvluG78cobCs7bGxvHsfzSMHt4XgX1OO9h-r7W_dlYCCDrCoKo2dAXhh264NTGUrFKBpM8pv0WcePn5gUp1atSJ4-iC4_wr0jmo7nDZ46JYCs8P_5DLs5RcHi81-L7Wiw35cLHNWqCPe50LJ1a3tqfxwfB3S3ufQjYQfUrfRDwMo1BYE/s260-e100/showdoc.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-6767459880769194772</id><published>2026-04-14T11:09:00.002+05:30</published><updated>2026-04-14T19:08:37.952+05:30</updated><title type="text">CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software</title><summary type="html">
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on&amp;nbsp;Monday added half a dozen security flaws to its Known Exploited Vulnerabilities&amp;nbsp;(KEV) catalog, citing evidence of active exploitation.
The list of vulnerabilities is as follows&amp;nbsp;-

CVE-2026-21643 (CVSS score: 9.1) -&amp;nbsp; An SQL injection vulnerability in&amp;nbsp; Fortinet FortiClient EMS that could allow an </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6767459880769194772" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/6767459880769194772" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/cisa-adds-6-known-exploited-flaws-in.html" rel="alternate" title="CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkkewWzrjyqzejet7cyCWdTUMfgjGZgkDpis6rUlh7qnyPpmcN1k_vVdKvziAZq2cOkFQDrJNM8E6WE8Cl7oPNdq94MOXJLa0nkbEmAFCB_MnjLQzTy-WjHGa6yuLhm7dPzuW3YEQeFIfOT1Tr25NgALeTL6vFDhzmJrCRMLL0GBpOhkwQm_Zirk_9aNjr/s260-e100/warning.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-8633866856133590508</id><published>2026-04-13T22:45:00.002+05:30</published><updated>2026-04-14T10:48:13.685+05:30</updated><title type="text">JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025</title><summary type="html">
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT.
A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated with specific financial entities, as well as track mouse inputs, log keystrokes, take screenshots, and collect system metadata.
"One of the </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8633866856133590508" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8633866856133590508" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/janelarat-malware-targets-latin.html" rel="alternate" title="JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMP1knUStbLpgNZ-k52a4ctZyxeERGEeqqVfX75PVTgtdu6XpoIlhHiFAwa4nTwg0089TuczQY5YZOgHOQk-TpVZNxs0piNVCPHsgBPSreTcKQ8gwISSDK7JI4oipfjfrnehwPCqWcyBnxobYaKM7TTu5SN23pUJ5K9fCbORLy2g_ZsSzkmxkp8VVdghfP/s260-e100/1000066319.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-3107111452640382511</id><published>2026-04-13T20:16:00.002+05:30</published><updated>2026-04-14T10:48:58.677+05:30</updated><title type="text">FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts</title><summary type="html">
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit&amp;nbsp;called W3LL to steal thousands of victims' account credentials and attempt more than $20 million in&amp;nbsp;fraud.
In tandem, authorities detained the alleged developer, who has&amp;</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3107111452640382511" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/3107111452640382511" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/fbi-and-indonesian-police-dismantle.html" rel="alternate" title="FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb77IQHAfOvWFPWb_cgV_YJGdRtNJJJWBcjYH6M6cCawBv2tQdybani7Qet_LGwH1tTBHJ2P3Lr6gWdY0sz3547YLzkSLWX3T2l84-A7ndRK3T55QblpJ-j2ovE9Lq0CoNb6ckWziwD2UjKP_awFJXbGr3yuZ1IMPndUyCo_WfoJ9nnyTPFf-K4HVy5A8g/s260-e100/well-fbi.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-1349883429568210510</id><published>2026-04-13T18:31:00.003+05:30</published><updated>2026-04-14T13:23:56.677+05:30</updated><title type="text">⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More</title><summary type="html">
Monday&amp;nbsp;is back, and the weekend’s backlog of chaos is officially hitting the fan. We&amp;nbsp;are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It&amp;nbsp;is one of those mornings where the gap between a quiet shift and a full-blown incident response is basically </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1349883429568210510" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/1349883429568210510" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/weekly-recap-fiber-optic-spying-windows.html" rel="alternate" title="⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNd-YcwKXoD_PmPblT00GaI9GQJvtJTHZk-5RBS1QEtLRupE9KKh-ogAP61b-cLzJm90PHDoRVnhiUzxlqcn-3gB2EtBG2TYxt8erP8UmLj3t1L_9Ykh3vfbCXFBXAoeylbbTeK7jxJIDmqCqThPziWi0XOzbyMZ-UEWGl_PhP4xePoRbsm_RqpUKmQNW/s260-e100/recaps-main.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-7017097040407304406</id><published>2026-04-13T17:11:00.002+05:30</published><updated>2026-04-13T20:20:38.240+05:30</updated><title type="text">Your MTTD Looks Great. Your Post-Alert Gap Doesn't</title><summary type="html">
Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo&amp;nbsp;Alto Networks' Wendi&amp;nbsp;Whitmore warned that similar capabilities are weeks or months from proliferation. CrowdStrike's 2026 Global Threat Report puts average eCrime breakout time at 29 minutes. Mandiant's M-Trends </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/7017097040407304406" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/7017097040407304406" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/your-mttd-looks-great-your-post-alert.html" rel="alternate" title="Your MTTD Looks Great. Your Post-Alert Gap Doesn't" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6yIgStY_TVvAIztG3gjTOWA2HNY1juzcSFQVACCzI1G1EU97z9wTsAO9HJECkmv0RcAYSxu4xSALf9jELTrtC9ruDKbMS5DPq2U2TYXLtvxZ1F4sRaQ2KIe-FfGpB8kZEhs1LEuOvaEnvGO-50RM227cjDVRFdBaXeC8r5WPOQHG3n2SB8ui3USopqHM/s260-e100/pro.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-8160602177279351019</id><published>2026-04-13T14:45:00.002+05:30</published><updated>2026-04-13T14:45:11.636+05:30</updated><title type="text">North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware</title><summary type="html">
The North Korean hacking group tracked&amp;nbsp;as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan&amp;nbsp;called RokRAT.
"The threat actor used two Facebook </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8160602177279351019" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8160602177279351019" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/north-koreas-apt37-uses-facebook-social.html" rel="alternate" title="North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm-HTAVB66ntSv8R4Bgh9szlrPPh6ah0eJGTDheDntj2w9bW9XzWcgs2CAGsN_C8DS7T4M7V8q18_DtgMZu3mJONEewq_oWlpefdtwp6BgudRjw2Z68jXoP8tHCdxSyvZ-xvVuPlh-xpxEeIRHk1v2mq5KqZxS1z316ncG5j2Q9HQe_bJhIJE4XWONvyYL/s260-e100/telegram.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-8211047069132492548</id><published>2026-04-13T12:20:00.003+05:30</published><updated>2026-04-14T10:48:43.627+05:30</updated><title type="text">OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident</title><summary type="html">
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised.
"Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps,"&amp;nbsp;OpenAI said in a post last week. "We found no </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8211047069132492548" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/8211047069132492548" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/openai-revokes-macos-app-certificate.html" rel="alternate" title="OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE5gb0KURzHAgdXMKzxbNFW1AJ8G2ezWXrHrLReEmbX6BKaG3-tIjiDVcjk-4nIZ3Kg2_564qiWXVVGcERIi4vaUvjqG-BuENXb7i6P3M2rdOHz-S9DOcKIHZ-pa1odUyUdTI-lLify_9CRXYcZu3hyY2LXeTMp1wMRr7mnu7yQdIIjGrFXCAecG4-XVpS/s260-e100/openai.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-2896792663548285619</id><published>2026-04-12T11:24:00.001+05:30</published><updated>2026-04-13T19:18:02.333+05:30</updated><title type="text">CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</title><summary type="html">

Unknown threat actors compromised CPUID ("cpuid[.]com"), a website&amp;nbsp;that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX&amp;nbsp;RAT.
The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00&amp;nbsp;UTC, with </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2896792663548285619" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/2896792663548285619" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/cpuid-breach-distributes-stx-rat-via.html" rel="alternate" title="CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCPq2en6ihCNpYdSr5mWkN43O4Rl3tXYz77I2achAfYSy7Emoaj8fNqmFHLOydg6Ai6DwDKBEKD91ywcO9eT2t-rrFxEiThe79Rsa4dap_UcNZSEdWl9NRGeaMqP_vsbWnKf2mMNHQ86cabK4wlspLPWRHMJ7Gj5guX6ynx57RhsDLbJeSDAdPR_BjGFNU/s260-e100/downloads.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-150119151877043109</id><published>2026-04-12T09:55:00.005+05:30</published><updated>2026-04-14T13:24:23.191+05:30</updated><title type="text">Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</title><summary type="html">
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that&amp;nbsp;has come under active exploitation in the&amp;nbsp;wild.
The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations.
It&amp;nbsp;has been&amp;nbsp;described as </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/150119151877043109" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/150119151877043109" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html" rel="alternate" title="Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg1374h3OcQ3MPg1BngGcQC6U8eVWUh3Ye84l6WpQKxC1a8_x1Mpp0K8-0DDfJU0YtVqWoUZcNE-bJ_bsfraWWWfafJoP8pF7jDlcb8L4LqNDYWtbhoaDcSbpcmEwNjDi0hzkie5VVRmqntS8uZe4hrAd4IDcc0CO95Bsj8y1rP7LhfPsCkvQIkOtx-B7D/s260-e100/adobe-adobe.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-954950858109540027</id><published>2026-04-11T11:32:00.001+05:30</published><updated>2026-04-11T11:32:26.878+05:30</updated><title type="text">Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data</title><summary type="html">
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law&amp;nbsp;enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called&amp;nbsp;Webloc.
The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after&amp;nbsp;the two firms merged in July&amp;nbsp;2023</summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/954950858109540027" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/954950858109540027" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/citizen-lab-law-enforcement-used-webloc.html" rel="alternate" title="Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJjyKn2cWWKQvAjaegOP6UqdtgG4Cr6nQdwobWhvYvaSKO-VGcFFSSAvT6ngpo8T9n0BitFhLNKPv669Qp3I_2ZajEs3DbveUT5qhc4zVWHRbjJH4fv0_84_FNhPFnN7EPFa9szLDP6B5G-1owBpAGGFILLSX4q8ZobwLXjI9CPn0DfExp6y0_33OdtmkV/s260-e100/location-data.jpg" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-4802841478634147276.post-4457746158640829120</id><published>2026-04-10T18:53:00.001+05:30</published><updated>2026-04-10T18:53:17.453+05:30</updated><title type="text">GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs</title><summary type="html">
Cybersecurity researchers have flagged yet another evolution of the&amp;nbsp;ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's&amp;nbsp;machine.
The technique has been discovered in an Open VSX extension named&amp;nbsp;"specstudio.code-wakatime-activity-tracker," which masquerades as WakaTime, a </summary><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4457746158640829120" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/4802841478634147276/posts/default/4457746158640829120" rel="self" type="application/atom+xml"/><link href="https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html" rel="alternate" title="GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs" type="text/html"/><author><name>Ravie Lakshmanan</name><uri>http://www.blogger.com/profile/09767675513435997467</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioOU2XpKmyRPz5kTr4GhD1YLJ2t7F6yv7bQD1upkiwmGwmzirnDAz92GvtjckyoBhBjaRqeR9XPm6e0yHdKLowfDDgZNkRlCvCneJEncgiviFu7PgD4wQg3Bo5JDhgg6JTytg_fY2M-iKeykCLebOdStW4A76JKnPbEQazihNOhKOdM9Ou8keMBh4IY4jo/s260-e100/software.jpg" width="72"/></entry></feed>