CyberLabRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ SecurityWeek

Adobe Patches Reader Zero-Day Exploited for Months

By: Eduard Kovacs β€” April 12th 2026 at 07:45

The vulnerability is tracked as CVE-2026-34621 and Adobe has confirmed that it can be exploited for arbitrary code execution.

The post Adobe Patches Reader Zero-Day Exploited for Months appeared first on SecurityWeek.

☐ β˜† βœ‡ Zone-H.org Special Defacements

https://www.justice.gov.mw/goblok.php

β€” April 11th 2026 at 14:41
https://www.justice.gov.mw/goblok.php notified by Miyomar
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://www.police.gov.mw/goblok.php

β€” April 11th 2026 at 14:28
https://www.police.gov.mw/goblok.php notified by Miyomar
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://www.malawi.gov.mw/goblok.php

β€” April 11th 2026 at 14:22
https://www.malawi.gov.mw/goblok.php notified by Miyomar
☐ β˜† βœ‡ BleepingComputer

Over 20,000 crypto fraud victims identified in international crackdown

By: Sergiu Gatlan β€” April 11th 2026 at 14:20
An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States. [...]
☐ β˜† βœ‡ BleepingComputer

ChatGPT rolls out new $100 Pro subscription to challenge Claude

By: Mayank Parmar β€” April 11th 2026 at 02:08
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan. [...]
☐ β˜† βœ‡ Dark Reading:

Hims Breach Exposes the Most Sensitive Kinds of PHI

By: Nate Nelson β€” April 10th 2026 at 20:02
Threat actors breached the telehealth brand, and now they may know who's bald, overweight, and impotent. What could they do with that information?

hims_ZUMAPressInc._Alamy.jpg

☐ β˜† βœ‡ Dark Reading:

Your Next Breach Will Look Like Business as Usual

By: Jeanette Miller-Osborn β€” April 10th 2026 at 19:21
These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.

login_page_Yuen_Man_Cheung_Alamy.jpg

☐ β˜† βœ‡ BleepingComputer

Nearly 4,000 US industrial devices exposed to Iranian cyberattacks

By: Sergiu Gatlan β€” April 10th 2026 at 15:52
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation. [...]
☐ β˜† βœ‡ Dark Reading:

FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats

β€” April 10th 2026 at 15:52

325351_DR23_Graphics_General_Large_Text_v1.png

☐ β˜† βœ‡ Dark Reading:

Orange Business Reimagines Enterprise Voice Communications With Trust and AI

β€” April 10th 2026 at 15:05

325351_DR23_Graphics_General_Large_Text_v1.png

☐ β˜† βœ‡ SecurityWeek

In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack

By: SecurityWeek News β€” April 10th 2026 at 14:44

Other noteworthy stories that might have slipped under the radar: Jones Day hacked, Internet Bug Bounty program paused due to AI, new Mac stealer malware.

The post In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

Analysis of one billion CISA KEV remediation records exposes limits of human-scale security

By: Sponsored by Qualys β€” April 10th 2026 at 14:01
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before defenders can patch them. [...]
☐ β˜† βœ‡ SecurityWeek

Juniper Networks Patches Dozens of Junos OS Vulnerabilities

By: Ionut Arghire β€” April 10th 2026 at 13:44

A critical-severity flaw could be exploited remotely, without authentication, to take over a vulnerable device.

The post Juniper Networks Patches Dozens of Junos OS Vulnerabilities appeared first on SecurityWeek.

☐ β˜† βœ‡ Dark Reading:

Industrial Controllers Still Vulnerable As Conflicts Move to Cyber

By: Robert Lemos β€” April 10th 2026 at 13:30
The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.

industrial-facility-with-worker-1st_footage-shutterstock.jpg

☐ β˜† βœ‡ Exploit-DB.com

[local] NetBT e-Fatura - Privilege Escalation

β€” April 10th 2026 at 00:00
NetBT e-Fatura - Privilege Escalation
☐ β˜† βœ‡ Exploit-DB.com

[webapps] D-Link DIR-650IN - Authenticated Command Injection

β€” April 10th 2026 at 00:00
D-Link DIR-650IN - Authenticated Command Injection
☐ β˜† βœ‡ BleepingComputer

CPUID hacked to deliver malware via CPU-Z, HWMonitor downloads

By: Bill Toulas β€” April 10th 2026 at 13:12
Hackers gained access to an API for the CPUID project andΒ changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools. [...]
☐ β˜† βœ‡ SecurityWeek

Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

By: SecurityWeek News β€” April 10th 2026 at 12:41

The US government has warned that Iran-linked hackers are manipulating PLCs and SCADA systems to cause disruption.

The post Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday appeared first on SecurityWeek.

☐ β˜† βœ‡ Dark Reading:

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

By: Alexander Culafi β€” April 9th 2026 at 13:00
Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.

Anthropic_logo_Adrian_Vidal_Alamy.jpg

☐ β˜† βœ‡ BleepingComputer

Microsoft: Canadian employees targeted in payroll pirate attacks

By: Sergiu Gatlan β€” April 10th 2026 at 11:56
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking their accounts in payroll pirate attacks. [...]
☐ β˜† βœ‡ SecurityWeek

Orthanc DICOM Vulnerabilities Lead to Crashes, RCE

By: Ionut Arghire β€” April 10th 2026 at 11:53

Attackers could exploit these vulnerabilities in denial-of-service, information disclosure, and arbitrary code execution attacks.

The post Orthanc DICOM Vulnerabilities Lead to Crashes, RCE appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000

By: Eduard Kovacs β€” April 10th 2026 at 10:44

The critical vulnerabilities affect Chrome’s WebML component and they have been reported by anonymous researchers.

The post Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000 appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

Google rolls out Gmail end-to-end encryption on mobile devices

By: Sergiu Gatlan β€” April 10th 2026 at 10:44
Google says Gmail end-to-end encryption (E2EE) is now available on all Android and iOS devices, allowing enterprise users to read and compose emails without additional tools. [...]
☐ β˜† βœ‡ SecurityWeek

MITRE Releases Fight Fraud Framework

By: Ionut Arghire β€” April 10th 2026 at 09:51

The document provides a behavior-based model of the tactics and techniques employed by fraudsters.

The post MITRE Releases Fight Fraud Framework appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Critical Marimo Flaw Exploited Hours After Public Disclosure

By: Ionut Arghire β€” April 10th 2026 at 09:12

Within nine hours, a hacker built an exploit from the unauthenticated bug’s advisory and started using it in the wild.

The post Critical Marimo Flaw Exploited Hours After Public Disclosure appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Google Rolls Out Cookie Theft Protections in Chrome

By: Ionut Arghire β€” April 10th 2026 at 07:50

New Device Bound Session Credentials render stolen session cookies unusable by cryptographically binding authentication.

The post Google Rolls Out Cookie Theft Protections in Chrome appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users

By: Eduard Kovacs β€” April 10th 2026 at 07:33

The security hole affected an EngageLab SDK and it was reported by Microsoft to the vendor one year ago.

The post Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users appeared first on SecurityWeek.

☐ β˜† βœ‡ SANS Internet Storm Center

Obfuscated JavaScript or Nothing, (Thu, Apr 9th)

β€” April 10th 2026 at 06:40
I spotted an interesting piece of JavaScript code that was delivered via a phishing email in a RAR archive. The file was called β€œcbmjlzan.JS” (SHA256:a8ba9ba93b4509a86e3d7dd40fd0652c2743e32277760c5f7942b788b74c5285) and is only identified as malicious by 15 AV’s on VirusTotal[1].
☐ β˜† βœ‡ BleepingComputer

New β€˜LucidRook’ malware used in targeted attacks on NGOs, universities

By: Bill Toulas β€” April 9th 2026 at 22:04
A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations and universities in Taiwan. [...]
☐ β˜† βœ‡ BleepingComputer

New VENOM phishing attacks steal senior executives' Microsoft logins

By: Bill Toulas β€” April 9th 2026 at 21:37
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials of C-suite executives across multiple industries. [...]
☐ β˜† βœ‡ Dark Reading:

Russia's 'Fancy Bear' APT Continues Its Global Onslaught

By: Alexander Culafi β€” April 9th 2026 at 20:50
Victims don't need to match the cyber espionage group's technical sophistication, experts say. But patching and some form of zero trust are now non-negotiable.

Grizzly_bear_photo-fox_Alamy.jpg

☐ β˜† βœ‡ Zone-H.org Special Defacements

https://cl.puma.com/media/customer_address/v/a/vanda.txt

β€” April 9th 2026 at 08:12
https://cl.puma.com/media/customer_address/v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://www.lindt.co.uk//media/customer_address//v/a/vanda.txt

β€” April 9th 2026 at 07:47
https://www.lindt.co.uk//media/customer_address//v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://tr.puma.com/media/customer_address/v/a/vanda.txt

β€” April 9th 2026 at 07:07
https://tr.puma.com/media/customer_address/v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://uk.store.eu.panasonic.net/media/customer_address//v/a/vanda.txt

β€” April 9th 2026 at 06:44
https://uk.store.eu.panasonic.net/media/customer_address//v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://www.lindt.ch//media/customer_address//v/a/vanda.txt

β€” April 9th 2026 at 05:58
https://www.lindt.ch//media/customer_address//v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://www.lindt.com//media/customer_address//v/a/vanda.txt

β€” April 9th 2026 at 05:52
https://www.lindt.com//media/customer_address//v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://www.chocolate.lindt.com//media/customer_address//v/a/vanda.txt

β€” April 9th 2026 at 05:50
https://www.chocolate.lindt.com//media/customer_address//v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://admin.leroymerlin.co.za//media/customer_address//v/a/vanda.txt

β€” April 9th 2026 at 05:33
https://admin.leroymerlin.co.za//media/customer_address//v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ Zone-H.org Special Defacements

https://leroymerlin.co.za/media/customer_address//v/a/vanda.txt

β€” April 9th 2026 at 05:31
https://leroymerlin.co.za/media/customer_address//v/a/vanda.txt notified by VandaTheGod
☐ β˜† βœ‡ ZDI: Upcoming Advisories

ZDI-CAN-30380: Apple

β€” April 9th 2026 at 05:00
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Michael DePlante (@izobashi) of TrendAI Zero Day Initiative' was reported to the affected vendor on: 2026-04-09, 3 days ago. The vendor is given until 2026-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
☐ β˜† βœ‡ ZDI: Upcoming Advisories

ZDI-CAN-28694: AVG

β€” April 9th 2026 at 05:00
A CVSS score 7.3 AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2026-04-09, 3 days ago. The vendor is given until 2026-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
☐ β˜† βœ‡ ZDI: Upcoming Advisories

ZDI-CAN-30375: Adobe

β€” April 9th 2026 at 05:00
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'DongHyeon Hwang (kind_killerwhale)' was reported to the affected vendor on: 2026-04-09, 3 days ago. The vendor is given until 2026-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
☐ β˜† βœ‡ Dark Reading:

'BlueHammer' Windows Zero-Day Exploit Signals Microsoft Bug Disclosure Issues

By: Elizabeth Montalbano β€” April 9th 2026 at 20:13
Under the alias 'Chaotic Eclipse,' a researcher released a PoC exploit for a zero-day flaw that allows for system takeover by a local user, citing an undisclosed beef with Microsoft.

Hammernails_MichaelFlippo_Alamy.jpg

☐ β˜† βœ‡ BleepingComputer

Healthcare IT solutions provider ChipSoft hit by ransomware attack

By: Bill Toulas β€” April 9th 2026 at 19:46
Dutch healthcare software vendor ChipSoft has been impacted by a ransomware attack that forced the company to take offline its website and digital services for patients and healthcare providers. [...]
☐ β˜† βœ‡ BleepingComputer

Google Chrome adds infostealer protection against session cookie theft

By: Ionut Ilascu β€” April 9th 2026 at 18:33
Google has rolled out Device Bound Session Credentials (DBSC) protection in Chrome 146 for Windows, designed to block info-stealing malware from harvesting session cookies. [...]
☐ β˜† βœ‡ Dark Reading:

Do Ceasefires Slow Cyberattacks? History Suggests Not

By: Nate Nelson β€” April 9th 2026 at 17:04
The cybersecurity community is waiting with bated breath to see if Iranian hackers will honor a ceasefire that doesn't actually name or directly involve them.

US_Iran_flags-Karen_Hovsepyan-Alamy.jpg

☐ β˜† βœ‡ ZDI: Upcoming Advisories

ZDI-CAN-29340: OriginLab

β€” April 9th 2026 at 05:00
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'rgod' was reported to the affected vendor on: 2026-04-09, 3 days ago. The vendor is given until 2026-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
❌