CyberLabRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ SecurityWeek

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

By: Ionut Arghire β€” April 14th 2026 at 08:57

The security defects allow attackers to escalate privileges and execute arbitrary code remotely.

The post Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

European Gym giant Basic-Fit data breach affects 1 million members

By: Bill Toulas β€” April 13th 2026 at 21:50
Dutch fitness giant Basic-Fit announced that hackers breached its systems and gained access to information belonging to a million of its customers. [...]
☐ β˜† βœ‡ Dark Reading:

CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

By: Alexander Culafi β€” April 13th 2026 at 21:29
Security experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos in a new paper from the Cloud Security Alliance (CSA).

storm_Doug_McCutcheon_LGPL_Alamy.jpg

☐ β˜† βœ‡ Dark Reading:

Adobe Patches Actively Exploited Zero-Day That Lingered for Months

By: Jai Vijayan β€” April 13th 2026 at 20:52
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.

adobe_PJ_McDonnell_shutterstock.jpg

☐ β˜† βœ‡ BleepingComputer

Stolen Rockstar Games analytics data leaked by extortion gang

By: Lawrence Abrams β€” April 13th 2026 at 20:08
Rockstar Games has suffered a data breach linked to a recent security incident at Anodot, with the ShinyHunters extortion gang now leaking the stolen data on its data leak site. [...]
☐ β˜† βœ‡ BleepingComputer

Critical flaw in wolfSSL library enables forged certificate use

By: Bill Toulas β€” April 13th 2026 at 19:56
A critical vulnerability in the wolfSSL SSL/TLS library can weaken security via improper verification of the hash algorithm or its size when checking Elliptic Curve Digital Signature Algorithm (ECDSA) signatures. [...]
☐ β˜† βœ‡ Dark Reading:

Empty Attestations: OT Lacks the Tools for Cryptographic Readiness

By: Brad McInnis β€” April 13th 2026 at 19:10
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.

Quantum_Cryptography_Nick_Gregory_Alamy.jpg

☐ β˜† βœ‡ BleepingComputer

FBI takedown of W3LL phishing service leads to developer arrest

By: Lawrence Abrams β€” April 13th 2026 at 18:55
The FBIΒ Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arresting the alleged developer in what is described as the first coordinated enforcement action between the United States and Indonesia targeting a phishing kit developer. [...]
☐ β˜† βœ‡ BleepingComputer

OpenAI rotates macOS certs after Axios attack hit code-signing workflow

By: Lawrence Abrams β€” April 13th 2026 at 17:39
OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package during a recent supply chain attack. [...]
☐ β˜† βœ‡ BleepingComputer

New Booking.com data breach forces reservation PIN resets

By: Bill Toulas β€” April 13th 2026 at 17:30
Booking.com has confirmed via a statement to BleepingComputer that it has detected unauthorized access to its systems that has exposed sensitive reservation and user data. [...]
☐ β˜† βœ‡ BleepingComputer

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw

By: Bill Toulas β€” April 13th 2026 at 15:37
Adobe has released an emergency security update for Acrobat Reader to fix a vulnerability, tracked asΒ CVE-2026-34621, thatΒ has been exploited in zero-day attacks since at least December. [...]
☐ β˜† βœ‡ Dark Reading:

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials

By: Elizabeth Montalbano β€” April 13th 2026 at 15:08
The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.

chinaiptheft_Pixels_Hunter_shutterstock.jpg

☐ β˜† βœ‡ SecurityWeek

Booking.com Says Hackers Accessed User Information

By: Eduard Kovacs β€” April 13th 2026 at 14:25

The online travel platform has not said how many customers’ booking information was exposed, but said the issue has been contained.Β 

The post Booking.com Says Hackers Accessed User Information appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

The silent β€œStorm”: New infostealer hijacks sessions, decrypts server-side

By: Sponsored by Varonis β€” April 13th 2026 at 14:05
New "Storm" infostealer skips local decryption, sending browser data to attacker servers. Varonis shows how server-side decryption enables session hijacking, bypassing passwords and MFA. [...]
☐ β˜† βœ‡ SecurityWeek

BrowserGate: Claims of LinkedIn β€˜Spying’ Clash With Security Research Findings

By: Kevin Townsend β€” April 13th 2026 at 14:00

Claims that β€œMicrosoft is running one of the largest corporate espionage operations in modern history” face scrutiny as researchers analyze LinkedIn’s browser extension probing

The post BrowserGate: Claims of LinkedIn β€˜Spying’ Clash With Security Research Findings appeared first on SecurityWeek.

☐ β˜† βœ‡ SANS Internet Storm Center

Scans for EncystPHP Webshell, (Mon, Apr 13th)

β€” April 13th 2026 at 13:02
Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attentionΒ and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the "EncystPHP" web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems.
☐ β˜† βœ‡ SecurityWeek

OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack

By: Eduard Kovacs β€” April 13th 2026 at 12:34

The AI giant is taking action after determining that a macOS code signing certificate may have been compromised.

The post OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

By: Eduard Kovacs β€” April 13th 2026 at 11:34

Law enforcement in the US, UK and Canada identified more than $45 million in cryptocurrency and froze $12 million.

The post International Operation Targets Multimillion-Dollar Crypto Theft Schemes appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads

By: Eduard Kovacs β€” April 13th 2026 at 10:52

Download links were replaced by a Russian-speaking threat actor to distribute a recently emerged malware named STX RAT.

The post CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Fake Claude Website Distributes PlugX RAT

By: Ionut Arghire β€” April 13th 2026 at 09:52

The malware mimics the legitimate Anthropic installation, relies on DLL sideloading, and cleans up after itself.

The post Fake Claude Website Distributes PlugX RAT appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users

By: Ionut Arghire β€” April 13th 2026 at 08:31

The feature allows enterprise users to compose and read end-to-end encrypted messages natively on their mobile devices.

The post Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

Critical Marimo pre-auth RCE flaw now under active exploitation

By: Bill Toulas β€” April 12th 2026 at 14:20
A critical pre-authentication remote code execution (RCE) vulnerability in Marimo is now under active exploitation, leveraged for credential theft. [...]
☐ β˜† βœ‡ SecurityWeek

Adobe Patches Reader Zero-Day Exploited for Months

By: Eduard Kovacs β€” April 12th 2026 at 07:45

The vulnerability is tracked as CVE-2026-34621 and Adobe has confirmed that it can be exploited for arbitrary code execution.

The post Adobe Patches Reader Zero-Day Exploited for Months appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

Over 20,000 crypto fraud victims identified in international crackdown

By: Sergiu Gatlan β€” April 11th 2026 at 14:20
An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency fraud across Canada, the United Kingdom, and the United States. [...]
☐ β˜† βœ‡ BleepingComputer

ChatGPT rolls out new $100 Pro subscription to challenge Claude

By: Mayank Parmar β€” April 11th 2026 at 02:08
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in addition to the $200 Max monthly plan. [...]
☐ β˜† βœ‡ Dark Reading:

Hims Breach Exposes the Most Sensitive Kinds of PHI

By: Nate Nelson β€” April 10th 2026 at 20:02
Threat actors breached the telehealth brand, and now they may know patients' personal health details. What could they do with that information?

hims_ZUMAPressInc._Alamy.jpg

☐ β˜† βœ‡ Dark Reading:

Your Next Breach Will Look Like Business as Usual

By: Jeanette Miller-Osborn β€” April 10th 2026 at 19:21
These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.

login_page_Yuen_Man_Cheung_Alamy.jpg

☐ β˜† βœ‡ BleepingComputer

Nearly 4,000 US industrial devices exposed to Iranian cyberattacks

By: Sergiu Gatlan β€” April 10th 2026 at 15:52
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation. [...]
☐ β˜† βœ‡ Dark Reading:

FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats

β€” April 10th 2026 at 15:52

325351_DR23_Graphics_General_Large_Text_v1.png

☐ β˜† βœ‡ Dark Reading:

Orange Business Reimagines Enterprise Voice Communications With Trust and AI

β€” April 10th 2026 at 15:05

325351_DR23_Graphics_General_Large_Text_v1.png

☐ β˜† βœ‡ SecurityWeek

In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack

By: SecurityWeek News β€” April 10th 2026 at 14:44

Other noteworthy stories that might have slipped under the radar: Jones Day hacked, Internet Bug Bounty program paused due to AI, new Mac stealer malware.

The post In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

Analysis of one billion CISA KEV remediation records exposes limits of human-scale security

By: Sponsored by Qualys β€” April 10th 2026 at 14:01
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are exploited before defenders can patch them. [...]
☐ β˜† βœ‡ SecurityWeek

Juniper Networks Patches Dozens of Junos OS Vulnerabilities

By: Ionut Arghire β€” April 10th 2026 at 13:44

A critical-severity flaw could be exploited remotely, without authentication, to take over a vulnerable device.

The post Juniper Networks Patches Dozens of Junos OS Vulnerabilities appeared first on SecurityWeek.

☐ β˜† βœ‡ Dark Reading:

Industrial Controllers Still Vulnerable As Conflicts Move to Cyber

By: Robert Lemos β€” April 10th 2026 at 13:30
The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.

industrial-facility-with-worker-1st_footage-shutterstock.jpg

☐ β˜† βœ‡ BleepingComputer

CPUID hacked to deliver malware via CPU-Z, HWMonitor downloads

By: Bill Toulas β€” April 10th 2026 at 13:12
Hackers gained access to an API for the CPUID project andΒ changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools. [...]
☐ β˜† βœ‡ SecurityWeek

Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

By: SecurityWeek News β€” April 10th 2026 at 12:41

The US government has warned that Iran-linked hackers are manipulating PLCs and SCADA systems to cause disruption.

The post Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday appeared first on SecurityWeek.

☐ β˜† βœ‡ Dark Reading:

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

By: Alexander Culafi β€” April 9th 2026 at 13:00
Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.

Anthropic_logo_Adrian_Vidal_Alamy.jpg

☐ β˜† βœ‡ BleepingComputer

Microsoft: Canadian employees targeted in payroll pirate attacks

By: Sergiu Gatlan β€” April 10th 2026 at 11:56
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking their accounts in payroll pirate attacks. [...]
☐ β˜† βœ‡ SecurityWeek

Orthanc DICOM Vulnerabilities Lead to Crashes, RCE

By: Ionut Arghire β€” April 10th 2026 at 11:53

Attackers could exploit these vulnerabilities in denial-of-service, information disclosure, and arbitrary code execution attacks.

The post Orthanc DICOM Vulnerabilities Lead to Crashes, RCE appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000

By: Eduard Kovacs β€” April 10th 2026 at 10:44

The critical vulnerabilities affect Chrome’s WebML component and they have been reported by anonymous researchers.

The post Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000 appeared first on SecurityWeek.

☐ β˜† βœ‡ BleepingComputer

Google rolls out Gmail end-to-end encryption on mobile devices

By: Sergiu Gatlan β€” April 10th 2026 at 10:44
Google says Gmail end-to-end encryption (E2EE) is now available on all Android and iOS devices, allowing enterprise users to read and compose emails without additional tools. [...]
☐ β˜† βœ‡ SecurityWeek

MITRE Releases Fight Fraud Framework

By: Ionut Arghire β€” April 10th 2026 at 09:51

The document provides a behavior-based model of the tactics and techniques employed by fraudsters.

The post MITRE Releases Fight Fraud Framework appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Critical Marimo Flaw Exploited Hours After Public Disclosure

By: Ionut Arghire β€” April 10th 2026 at 09:12

Within nine hours, a hacker built an exploit from the unauthenticated bug’s advisory and started using it in the wild.

The post Critical Marimo Flaw Exploited Hours After Public Disclosure appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Google Rolls Out Cookie Theft Protections in Chrome

By: Ionut Arghire β€” April 10th 2026 at 07:50

New Device Bound Session Credentials render stolen session cookies unusable by cryptographically binding authentication.

The post Google Rolls Out Cookie Theft Protections in Chrome appeared first on SecurityWeek.

☐ β˜† βœ‡ SecurityWeek

Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users

By: Eduard Kovacs β€” April 10th 2026 at 07:33

The security hole affected an EngageLab SDK and it was reported by Microsoft to the vendor one year ago.

The post Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users appeared first on SecurityWeek.

☐ β˜† βœ‡ SANS Internet Storm Center

Obfuscated JavaScript or Nothing, (Thu, Apr 9th)

β€” April 10th 2026 at 06:40
I spotted an interesting piece of JavaScript code that was delivered via a phishing email in a RAR archive. The file was called β€œcbmjlzan.JS” (SHA256:a8ba9ba93b4509a86e3d7dd40fd0652c2743e32277760c5f7942b788b74c5285) and is only identified as malicious by 15 AV’s on VirusTotal[1].
☐ β˜† βœ‡ BleepingComputer

New β€˜LucidRook’ malware used in targeted attacks on NGOs, universities

By: Bill Toulas β€” April 9th 2026 at 22:04
A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations and universities in Taiwan. [...]
❌