The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEsby info@thehackernews.com (The Hacker News) on April 10, 2026 at 1:23 pm
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated development environments (IDEs) on a developer’s machine. The technique has been discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a
- Browser Extensions Are the New AI Consumption Channel That No One Is Talking Aboutby info@thehackernews.com (The Hacker News) on April 10, 2026 at 11:00 am
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there’s a wide-open window nobody’s guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn’t on anyone’s
- Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windowsby info@thehackernews.com (The Hacker News) on April 10, 2026 at 7:58 am
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release. “This project represents a significant
- Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosureby info@thehackernews.com (The Hacker News) on April 10, 2026 at 7:37 am
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including
- Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Serversby info@thehackernews.com (The Hacker News) on April 10, 2026 at 6:28 am
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro
- EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installsby info@thehackernews.com (The Hacker News) on April 9, 2026 at 5:26 pm
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. “This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data,” the Microsoft Defender
- UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaignsby info@thehackernews.com (The Hacker News) on April 9, 2026 at 4:23 pm
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. “LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and
- ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Storiesby info@thehackernews.com (The Hacker News) on April 9, 2026 at 12:57 pm
Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t. This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in
- The Hidden Security Risks of Shadow AI in Enterprisesby info@thehackernews.com (The Hacker News) on April 9, 2026 at 11:31 am
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to the phenomenon of
- Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025by info@thehackernews.com (The Hacker News) on April 9, 2026 at 11:15 am
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second
- Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Regionby info@thehackernews.com (The Hacker News) on April 9, 2026 at 10:40 am
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa
- New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxyby info@thehackernews.com (The Hacker News) on April 8, 2026 at 5:51 pm
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat’scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet’s targeting infrastructure. “Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices,” Darktrace said in a new report.
- Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devicesby info@thehackernews.com (The Hacker News) on April 8, 2026 at 4:30 pm
Cybersecurity researchers have lifted the curtain on a stealthy botnet that’s designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It’s capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. “Built for
- APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Alliesby info@thehackernews.com (The Hacker News) on April 8, 2026 at 1:50 pm
The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. “PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control,” Trend Micro
- Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)by info@thehackernews.com (The Hacker News) on April 8, 2026 at 11:30 am
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems. The result is Identity Dark Matter: identity activity that sits outside the visibility of centralized IAM and
- Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systemsby info@thehackernews.com (The Hacker News) on April 8, 2026 at 9:16 am
Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities. The model will be used by a small set of organizations, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike,&
- N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rustby info@thehackernews.com (The Hacker News) on April 8, 2026 at 7:47 am
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. “The threat actor’s packages were designed to impersonate legitimate developer tooling […], while quietly functioning as malware loaders, extending Contagious Interview’s established playbook into a coordinated
- Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCsby info@thehackernews.com (The Hacker News) on April 8, 2026 at 4:23 am
Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. “These attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial
- Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaignby info@thehackernews.com (The Hacker News) on April 7, 2026 at 4:48 pm
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May 2025. The large-scale exploitation campaign has been codenamed
- [Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Riskby info@thehackernews.com (The Hacker News) on April 7, 2026 at 4:29 pm
In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet the risk is actually increasing. According to new research from the Ponemon Institute, hundreds of applications within the typical enterprise remain disconnected from centralized identity systems. These “dark
- Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Accessby info@thehackernews.com (The Hacker News) on April 7, 2026 at 3:15 pm
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024. “
- Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaignby info@thehackernews.com (The Hacker News) on April 7, 2026 at 12:46 pm
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. “A purpose-built Python scanner continuously sweeps major cloud IP ranges for vulnerable targets, automatically installing malicious nodes via ComfyUI-Manager if no exploitable node is already
- The Hidden Cost of Recurring Credential Incidentsby info@thehackernews.com (The Hacker News) on April 7, 2026 at 11:30 am
When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the average cost of a breach at $4.4 million. Avoiding even one major incident is enough to justify most security investments, but that headline figure obscures the more persistent problems caused by recurring credential
- New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flipsby info@thehackernews.com (The Hacker News) on April 7, 2026 at 8:38 am
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of a host. The efforts have been codenamed GPUBreach, GDDRHammer, and GeForge. GPUBreach goes a step further than GPUHammer, demonstrating for the first time that
- China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomwareby info@thehackernews.com (The Hacker News) on April 7, 2026 at 6:35 am
A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate “high-velocity” attacks and break into susceptible internet-facing systems. “The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent




















![[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRHgJL0SczODx5PAnF85b8b0mRpiOOkIQdOWvhivyXu6H8UeZKH9ZUdaeW5IuU59q2hjMNioQWQ5vk1Km8yinGGc8GA079qvhTtFsp9PV76Kmp-3lpKh2zi3vgd_-6dFcOI6i1YHs7VkJ-p-HvOEuOwkjooBVSvYFOrVqXqNhZShZy3IUeD6BVHVvUIj50/s1600/webinar-cerby.jpg)








