Dear blog readers, In my most recent analysis I decided to take a deeper look inside some of the domains which belong to members of the XSS forum are known to have been used as malicious software phone back C&C…
IT Security News Hourly Summary 2026-04-04 21h : 3 posts
3 posts were published in the last hour 18:5 : Qilin ransomware group claims the hack of German political party Die Linke 18:5 : US Lawmakers Question VPN Surveillance, Seek Transparency on Privacy Risks 18:5 : Why Single-Signal Fraud Detection…
Qilin ransomware group claims the hack of German political party Die Linke
Qilin ransomware claims it stole data from Germany’s Die Linke and threatens to leak it; the party confirmed the incident, but not a breach. The Qilin ransomware group claims it stole data from Die Linke, a German political party, and…
US Lawmakers Question VPN Surveillance, Seek Transparency on Privacy Risks
Now under scrutiny: demands from American legislators for clearer rules on state tracking of online tools like virtual private networks. Backed by six congressional Democrats – including Ron Wyden – a letter reaches out to intelligence chief Tulsi Gabbard,…
Why Single-Signal Fraud Detection Fails Against Modern Multi-Stage Cyber Attacks
A Modern fraud operations resemble a coordinated relay, where multiple tools and actors manage different stages—from account creation to final cash-out. Focusing on just one indicator, such as IP address or email, leaves gaps that attackers can easily exploit…
China-based TA416 Targets European Businesses via Phishing Campaigns
Chinese state-sponsored attacks A China-based hacker is targeting European government and diplomatic entities; the attack started in mid-2025, after a two-year period of no targeting in the region. The campaign has been linked to TA416; the activities coincide with DarkPeony,…
U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in TrueConf Client, tracked as CVE-2026-3502 (CVSS score of 7.8), to…
UNC1069 Targets Node.js Maintainers via Fake LinkedIn, Slack Profiles
North Korean group UNC1069 targets Node.js maintainers using fake LinkedIn and Slack profiles to spread malware and compromise open source packages. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article:…
IT Security News Hourly Summary 2026-04-04 18h : 1 posts
1 posts were published in the last hour 15:34 : [un]prompted 2026 – Security Guidance as a Service
[un]prompted 2026 – Security Guidance as a Service
Author, Creator & Presenter: Shruti Datta Gupta, Product Security Engineer, Adobe & Chandrani Mukherjee, Product Security Engineer, Adobe Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’) YouTube…
Microsoft Identifies Cookie Driven PHP Web Shells Maintaining Access on Linux Servers
Server-side intrusions are experiencing a subtle but consequential shift in their anatomy, where visibility is no longer obscured by complexity, but rather clearly visible. Based on recent findings from Microsoft Defender’s Security Research Team, there is evidence of a…
FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)
Defused Cyber has spotted a critical Fortinet FortiClient Endpoint Management Server (EMS) zero-day vulnerability (CVE-2026-35616) being exploited in the wild. This time around, the confirmation of active exploitation came almost immediately from Fortinet, as well. “Fortinet has observed [CVE-2026-35616] to…
Critical Fortinet FortiClient EMS 0-Day Vulnerability Actively Exploited in the Wild
Fortinet has issued an emergency hotfix after security researchers disclosed a critical zero-day vulnerability in FortiClient EMS that is already being actively exploited by threat actors. Tracked as CVE-2026-35616 and carrying a CVSSv3 score of 9.1 (Critical), the flaw enables…
The Risks and Rewards of AI SEO in High-Stakes Search Environments
In cybersecurity, search visibility is not just about traffic. It is about trust, accuracy, and… The Risks and Rewards of AI SEO in High-Stakes Search Environments on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.…
After fighting malware for decades, this cybersecurity veteran is now hacking drones
Mikko Hyppönen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones. This…
Top Node.js Maintainers Targeted in Sophisticated Social Engineering Scheme
A highly coordinated social engineering campaign is actively targeting top open-source developers in the Node.js and npm ecosystem. Following the recent compromise of the popular package Axios, which sees over 100 million weekly downloads, several high-impact software maintainers have reported…
Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware
The cybersecurity community is on high alert following a massive source code leak from Anthropic. On March 31, 2026, the company accidentally exposed the complete source code for Claude Code, its flagship terminal-based coding assistant. The leak occurred due to…
New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In
A dangerous attack chain in Progress ShareFile that can allow attackers to take over exposed on-premises servers without first logging in. The issues affect customer-managed ShareFile Storage Zones Controller 5.x deployments, and Progress says customers should upgrade to version 5.12.4…
Jenny was a Friend of Mine – MCPs and Friends
Alt title: Bullying LLMs into submission to find 0days at scale This article has been indexed from ZephrSec – Adventures In Information Security Read the original article: Jenny was a Friend of Mine – MCPs and Friends
Hackers Are Posting the Claude Code Leak With Bonus Malware
Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as part of an ongoing supply chain hacking spree, and more. This article has been indexed from Security Latest…
European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
Hackers stole over 300GB of data from the Commission’s AWS environment, including personal information. The post European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Using AI at Work? Here’s How to Avoid Accidentally Leaking Company Data
The rapid adoption of Generative AI Applications across enterprises has transformed productivity, automation, and decision-making. AI tools now power daily workflows by drafting emails, writing code, and analyzing data. But with this convenience comes a growing risk, unintentional data exposure.…
IT Security News Hourly Summary 2026-04-04 12h : 2 posts
2 posts were published in the last hour 9:9 : Hackers Launch Social Engineering Offensive Against Key Node.js Maintainers 9:9 : European Commission breach exposed data of 30 EU entities, CERT-EU says
Hackers Launch Social Engineering Offensive Against Key Node.js Maintainers
Following the high-profile supply chain compromise of the widely used Axios package, a highly coordinated social engineering campaign has been uncovered targeting top-tier Node.js and npm maintainers. Security researchers confirm that the Axios breach was part of a scalable operation…