Cybersecurity

InfoSec news, vulnerabilities, CTFs, tools, and career advice.

3 members 248 posts Β· Technology Live

Sign in and join this Nook to post a Cranny.

Sign In Join Free
πŸ“‘ The Hacker News by The Hacker News Β· Apr 5, 2026

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis an…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 5, 2026

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in theΒ wild. TheΒ vulnerability, trackedΒ as CVE-2026…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 3, 2026

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025,Β following a two-yearΒ period of minimal targeting in theΒ region. …

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 3, 2026

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

ThreatΒ actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from th…

πŸ’¬ 0 Crumbs β†’
Network Ad Demo Market Place

Come over to the demo marketplace to see examples of what you can make.

Create and add in different products from other sites you sell on and categorize them to make it easier for people to find them.

Shop Now
πŸ“‘ The Hacker News by The Hacker News Β· Apr 3, 2026

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture

The next majorΒ breach hitting your clients probably won't comeΒ from inside theirΒ walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a s…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 3, 2026

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

TheΒ maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean …

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 3, 2026

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

Cybersecurity researchersΒ have discovered a new version ofΒ the SparkCat malware on the Apple App Store and Google Play Store, more than a year after theΒ trojan was discovered targe…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 3, 2026

Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1,Β 2026. "Ea…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 2, 2026

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

AΒ large-scale credential harvesting operationΒ has beenΒ observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private k…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 2, 2026

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

CiscoΒ has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 2, 2026

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

TheΒ latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. NoΒ corporate fluff or boring lectures here, just a quick and honest loo…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 2, 2026

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

AΒ financially motivated operationΒ codenamed REF1695Β has beenΒ observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since NovemberΒ 202…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 2, 2026

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected withΒ spyware. According to …

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 2, 2026

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

AppleΒ onΒ Wednesday expanded the availability of iOS 18.7.7Β and iPadOS 18.7.7Β to a broader range of devices to protect users from the risk posed by a recently disclosed exploit kit …

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 1, 2026

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka Metam…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 1, 2026

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script (VBS) files. The activity, beginning in late Febru…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 1, 2026

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation β€” Patch Released

Google on Thursday released security updates for its Chrome web browser to address 21 vulnerabilities, including a zero-day flaw that it said has been exploited in the wild. The hi…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 1, 2026

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next. Threat actors now use malware less frequently i…

πŸ’¬ 0 Crumbs β†’
πŸ“‘ The Hacker News by The Hacker News Β· Apr 1, 2026

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. "We …

πŸ’¬ 0 Crumbs β†’