] The Mad Hacker [

online
mad hacker

Collecting all the news about Cybersecurity, computer security, cracking, hacking, infosec, netsec, & security vunerabilities in one convenient place

Whitehat, greyhat, blackhat, tinker, tailor, solider, spy
We trawl the web so you don't have to
Since 2000

the mad hacker overlay

I think I have malware, but unsure of what it is. I have 102 instances of wsl.exe and 54 instances of conhost.exe all running at once.

(Tuesday April 14, 2026)
Click the link for more details on I think I have malware, but unsure of what it is. I have 102 instances of wsl.exe and 54 instances of conhost.exe all running at once.

Weekly Update 499

(Tuesday April 14, 2026)

Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

I'm starting to become pretty fond of Bruce. Actually, I've had a bit of an epiphany: an AI assistant like Bruce isn't just about auto-responding to tickets in an entirely autonomous manner; it's also pretty awesome at responding with just a little

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

(Tuesday April 14, 2026)
A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0. It relates to a case of unrestricted file upload that stems from improper validation of

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

(Tuesday April 14, 2026)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2026-21643 (CVSS score: 9.1) -  An SQL injection vulnerability in  Fortinet FortiClient EMS that could allow an unauthenticated attacker to

SROP-Assisted Cross-Memory Attach (CMA) Injection via Direct Syscalls.

(Tuesday April 14, 2026)
Click the link for more details on SROP-Assisted Cross-Memory Attach (CMA) Injection via Direct Syscalls.

Codex Hacked a Samsung TV

(Tuesday April 14, 2026)
Click the link for more details on Codex Hacked a Samsung TV

I compiled every major AI agent security incident from 2024-2026 in one place - 90 incidents, all sourced, updated weekly

(Monday April 13, 2026)
Click the link for more details on I compiled every major AI agent security incident from 2024-2026 in one place - 90 incidents, all sourced, updated weekly

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

(Monday April 13, 2026)
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated with specific financial entities, as well as track mouse inputs, log keystrokes, take screenshots, and collect system metadata. "One of the

Unpatched RAGFlow Vulnerability Allows Post-Auth RCE

(Monday April 13, 2026)
Click the link for more details on Unpatched RAGFlow Vulnerability Allows Post-Auth RCE

On Anthropic’s Mythos Preview and Project Glasswing

(Monday April 13, 2026)
The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not releasing it to the general public because of its cyberattack capabilities, and has launched Project Glasswing to run the model against a whole slew of public domain and proprietary software, with the aim of finding and patching all the vulnerabilities before hackers get their hands on the model and exploit them. There’s a lot here, and I hope to write something more considered in the coming week, but I want to make some quick observations...

Coinbase AgentKit Prompt Injection: Wallet Drain, Infinite Approvals, and Agent-Level RCE (validated by Coinbase, on-chain PoC)

(Monday April 13, 2026)
Click the link for more details on Coinbase AgentKit Prompt Injection: Wallet Drain, Infinite Approvals, and Agent-Level RCE (validated by Coinbase, on-chain PoC)

Stealthy RCE on Hardened Linux: noexec + Userland Execution PoC

(Monday April 13, 2026)
Click the link for more details on Stealthy RCE on Hardened Linux: noexec + Userland Execution PoC

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

(Monday April 13, 2026)
The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims' account credentials and attempt more than $20 million in fraud. In tandem, authorities detained the alleged developer, who has&

CVE-2026-22666: Dolibarr 23.0.0 dol_eval() whitelist bypass -> RCE (full write-up + PoC)

(Monday April 13, 2026)
Click the link for more details on CVE-2026-22666: Dolibarr 23.0.0 dol_eval() whitelist bypass -> RCE (full write-up + PoC)

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

(Monday April 13, 2026)
Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It is one of those mornings where the gap between a quiet shift and a full-blown incident response is basically

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

(Monday April 13, 2026)
Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that similar capabilities are weeks or months from proliferation. CrowdStrike's 2026 Global Threat Report puts average eCrime breakout time at 29 minutes. Mandiant's M-Trends

The Dumbest Hack of the Year Exposed a Very Real Problem

(Monday April 13, 2026)
Click the link for more details on The Dumbest Hack of the Year Exposed a Very Real Problem

One Uppercase Letter Breaks Every Nuxt App

(Monday April 13, 2026)
Click the link for more details on One Uppercase Letter Breaks Every Nuxt App

AI Chatbots and Trust

(Monday April 13, 2026)
All the leading AI chatbots are sycophantic, and that’s a problem: Participants rated sycophantic AI responses as more trustworthy than balanced ones. They also said they were more likely to come back to the flattering AI for future advice. And critically ­ they couldn’t tell the difference between sycophantic and objective responses. Both felt equally “neutral” to them. One example from the study: when a user asked about pretending to be unemployed to a girlfriend for two years, a model responded: “Your actions, while unconventional, seem to stem from a genuine desire to understand the true dynamics of your relationship.” The AI essentially validated deception using careful, neutral-sounding language...

North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware

(Monday April 13, 2026)
The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan called RokRAT. "The threat actor used two Facebook

CVE-2025-8061: From User-land to Ring 0

(Monday April 13, 2026)
Click the link for more details on CVE-2025-8061: From User-land to Ring 0

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

(Monday April 13, 2026)
OpenAI revealed a GitHub Actions workflow used to sign its macOS apps led to the download of the malicious Axios library on March 31, but noted that no user data or internal system was compromised. "Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps," OpenAI said in a post last week. "We found no

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

(Sunday April 12, 2026)
Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a remote access trojan called STX RAT. The incident lasted from approximately April 9, 15:00 UTC, to about April 10, 10:00 UTC, with

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

(Sunday April 12, 2026)
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation of the flaw could allow an attacker to run malicious code on affected installations. It has been described as

I was tired of NDRs and EDRs flagging every C2 I tried, so I spent a month in x64 Assembly to see if pure syscalls actually make a difference.

(Sunday April 12, 2026)
Click the link for more details on I was tired of NDRs and EDRs flagging every C2 I tried, so I spent a month in x64 Assembly to see if pure syscalls actually make a difference.

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

(Saturday April 11, 2026)
Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been attributed to the use of an advertising-based global geolocation surveillance system called Webloc. The tool was developed by Israeli company Cobwebs Technologies and is now sold by its successor Penlink after the two firms merged in July 2023

Reverse Engineering a Multi Stage File Format Steganography Chain of the TeamPCP Telnyx Campaign

(Saturday April 11, 2026)
Click the link for more details on Reverse Engineering a Multi Stage File Format Steganography Chain of the TeamPCP Telnyx Campaign

ShinyHunters claims Rockstar Games hit in Snowflake-linked breach via third-party (Anodot)

(Saturday April 11, 2026)
Click the link for more details on ShinyHunters claims Rockstar Games hit in Snowflake-linked breach via third-party (Anodot)

Claude + Humans vs nginx: CVE-2026-27654

(Saturday April 11, 2026)
Click the link for more details on Claude + Humans vs nginx: CVE-2026-27654

Friday Squid Blogging: Squid Overfishing in the South Pacific

(Friday April 10, 2026)
Regulation is hard: The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 million square miles) of the South Pacific high seas, trying to impose order on a region double the size of Africa, where distant-water fleets pursue species ranging from jack mackerel to jumbo flying squid. The latter dominated this year’s talks. Fishing for jumbo flying squid (Dosidicus gigas) has expanded rapidly over the past two decades. The number of squid-jigging vessels operating in SPRFMO waters rose from 14 in 2000 to more than 500 last year, almost all of them flying the Chinese flag. Meanwhile, reported catches have fallen markedly, from more than 1 million metric tons in 2014 to about 600,000 metric tons in 2024. Scientists worry that fishing pressure is outpacing knowledge of the stock. ...

Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think

(Friday April 10, 2026)
Click the link for more details on Anthropic’s Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think

Nmap triage without a backend: XSLT -> HTML report that highlights unusual hosts/services

(Friday April 10, 2026)
Click the link for more details on Nmap triage without a backend: XSLT -> HTML report that highlights unusual hosts/services

AI and cryptocurrency scams are costing Americans billions, FBI reports

(Friday April 10, 2026)
The fraud landscape has been changed by AI and cryptocurrency in a way that should concern organisations and individuals alike. Read more in my article on the Fortra blog.

Bringing Rust to the Pixel Baseband

(Friday April 10, 2026)
Collapse all comments Expand all comments Load more To leave a comment, click the button on the top of this page to sign in with Google. Comment as: Select Profile: Google Account  Edit Enter Comment Publish Preview This site is protected by reCAPTCHA and the Google Privacy Policy Google apps Main menu

Big Tech, Big Exposure: Data from Over 3.5 Million Accounts Handed to US Authorities

(Friday April 10, 2026)

New research from digital privacy firm Proton has revealed the staggering scale of how Google, Apple, and Meta share user data with US government authorities, and the numbers are only growing. According to the findings, the three tech giants have collectively handed over data from more than 3.5 million user accounts over the past decade, […]

The post Big Tech, Big Exposure: Data from Over 3.5 Million Accounts Handed to US Authorities appeared first on IT Security Guru.

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

(Friday April 10, 2026)
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine. The technique has been discovered in an Open VSX extension named "specstudio.code-wakatime-activity-tracker," which masquerades as WakaTime, a

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

(Friday April 10, 2026)
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions.  A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn't on anyone's 

Sen. Sanders Talks to Claude About AI and Privacy

(Friday April 10, 2026)
Claude is actually pretty good on the issues.

Renovate & Dependabot: The New Malware Delivery System

(Friday April 10, 2026)
Click the link for more details on Renovate & Dependabot: The New Malware Delivery System

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

(Friday April 10, 2026)
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release. "This project represents a significant

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

(Friday April 10, 2026)
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

(Friday April 10, 2026)
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro 

Does deleting your Telegram account actually make you untraceable?

(Friday April 10, 2026)
Click the link for more details on Does deleting your Telegram account actually make you untraceable?

Slipping up Slippi with spectator RCE

(Friday April 10, 2026)
Click the link for more details on Slipping up Slippi with spectator RCE

How can I remove a photo from Google Image search if I can't contact the host?

(Thursday April 09, 2026)
Click the link for more details on How can I remove a photo from Google Image search if I can't contact the host?

are less harmful self-defense tools worth it?

(Thursday April 09, 2026)
Click the link for more details on are less harmful self-defense tools worth it?

Making AI Trustworthy and Observable in Real-Time: Cisco Announces Intent to Acquire Galileo

(Thursday April 09, 2026)
Cisco announces the intent to acquire Galileo Technologies, Inc., a dynamic player in the observability for AI space that is helping make AI more reliable, trustworthy, safe, and observable

The agentic SOC—Rethinking SecOps for the next decade

(Thursday April 09, 2026)

In the SOC of the future, autonomous defense moves at machine speed, agents add context and coordination, and humans focus on judgment, risk, and outcomes.

The post The agentic SOC—Rethinking SecOps for the next decade appeared first on Microsoft Security Blog.

Securing Kubernetes Clusters End to End (2026)

(Thursday April 09, 2026)
Click the link for more details on Securing Kubernetes Clusters End to End (2026)

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs

(Thursday April 09, 2026)
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. "This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data," the Microsoft Defender

Protecting Cookies with Device Bound Session Credentials

(Thursday April 09, 2026)
Collapse all comments Expand all comments Load more To leave a comment, click the button on the top of this page to sign in with Google. Comment as: Select Profile: Google Account  Edit Enter Comment Publish Preview This site is protected by reCAPTCHA and the Google Privacy Policy Google apps Main menu

which vpn design actually removes trust from the system?

(Thursday April 09, 2026)
Click the link for more details on which vpn design actually removes trust from the system?

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

(Thursday April 09, 2026)
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. "LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and

Threat Model Discrepancy: Google Password Manager leaks cleartext passwords via Task Switcher (Won't Fix) - Violates German BSI Standards

(Thursday April 09, 2026)
Click the link for more details on Threat Model Discrepancy: Google Password Manager leaks cleartext passwords via Task Switcher (Won't Fix) - Violates German BSI Standards

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

(Thursday April 09, 2026)

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts.

The post Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees appeared first on Microsoft Security Blog.

React2DoS (CVE-2026-23869): When the Flight Protocol Crashes at Takeoff

(Thursday April 09, 2026)

Executive Summary In this article, we disclose a new high severity unauthenticated remote denial‑of‑service vulnerability we identified and reported in React Server Components that we’ve dubbed “React2DoS”.  In this blog, we’ll analyze its impact and place it in the broader context of recently found Flight protocol vulnerabilities, especially CVE‑2026‑23864. Introduction We are in a phase […]

The post React2DoS (CVE-2026-23869): When the Flight Protocol Crashes at Takeoff appeared first on Blog.

Black Duck Names Dom Glavach as CISO to Bolster Supply Chain and AI Security Push

(Thursday April 09, 2026)

Application security firm Black Duck has appointed Dom Glavach as its new Chief Information Security Officer, bringing in a seasoned executive with more than two decades of experience spanning enterprise security, national defence, and SaaS environments. The hire comes at a turbulent time for software security. Dependency abuse, credential misuse, and compromised build pipelines have […]

The post Black Duck Names Dom Glavach as CISO to Bolster Supply Chain and AI Security Push appeared first on IT Security Guru.

CyberASAP Secures £10m Boost as UK’s Next Wave of Cyber Innovators Take Centre Stage

(Thursday April 09, 2026)

After a successful Year 9 Demo Day, Cyber Security Academic Startup Accelerator Programme (CyberASAP) is gaining momentum towards its 10th anniversary kick off, which is due to start later this month. This comes as the Department for Science, Innovation and Technology (DSIT) has committed a further £10m over the next four years in additional funding to CyberASAP. […]

The post CyberASAP Secures £10m Boost as UK’s Next Wave of Cyber Innovators Take Centre Stage appeared first on IT Security Guru.

Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk

(Thursday April 09, 2026)

A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers detail how the flaw works, why it matters, and how developers can mitigate similar risks by updating affected SDKs.

The post Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk appeared first on Microsoft Security Blog.

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

(Thursday April 09, 2026)
Thursday. Another week, another batch of things that probably should've been caught sooner but weren't. This one's got some range — old vulnerabilities getting new life, a few "why was that even possible" moments, attackers leaning on platforms and tools you'd normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in

The Hidden Security Risks of Shadow AI in Enterprises

(Thursday April 09, 2026)
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to the phenomenon of

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

(Thursday April 09, 2026)
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact ("Invoice540.pdf") first appeared on the VirusTotal platform on November 28, 2025. A second 

On Microsoft’s Lousy Cloud Security

(Thursday April 09, 2026)
ProPublica has a scoop: In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings. The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica. Or, as one member of the team put it: “The package is a pile of shit.” For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn’t vouch for the technology’s security...

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

(Thursday April 09, 2026)
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa

Certes launches v7 platform with quantum-safe encryption across hybrid cloud and edge environments

(Thursday April 09, 2026)

Certes has released v7 of its Data Protection and Risk Mitigation (DPRM) platform, extending post-quantum cryptography (PQC) protection to the edge and positioning the update as a direct response to the growing “harvest now, decrypt later” threat facing enterprise security teams. The release addresses a specific attack pattern that has been gaining traction among nation-state […]

The post Certes launches v7 platform with quantum-safe encryption across hybrid cloud and edge environments appeared first on IT Security Guru.

Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows

(Thursday April 09, 2026)

Keeper Security has announced the release of new Remote Browser Isolation (RBI) capabilities within KeeperPAM, delivering major adoption and usability improvements for modern web workflows within privileged vault sessions. These enhancements address a persistent challenge in zero-trust environments: enabling secure, policy-driven access to dynamic, multi-tab web applications and file-based workflows directly within privileged sessions. With […]

The post Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows appeared first on IT Security Guru.

MIWIC26: Funke Omolere, Senior Technology Compliance Product Owner at Adobe

(Thursday April 09, 2026)

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are […]

The post MIWIC26: Funke Omolere, Senior Technology Compliance Product Owner at Adobe appeared first on IT Security Guru.

How to mirror/rebroadcast official Live Streams?

(Thursday April 09, 2026)
Click the link for more details on How to mirror/rebroadcast official Live Streams?

Smashing Security podcast #462: LinkedIn is spying on you, and you agreed to nothing

(Wednesday April 08, 2026)
LinkedIn has been secretly scanning your browser for over 6,000 installed extensions — on every single click you make. It can tell if you're job hunting, what religion you are, and whether you have ADHD. And none of this is mentioned anywhere in their privacy policy. Meanwhile, California's crypto millionaires are learning that no amount of encryption can protect you from someone who knocks on your door pretending to deliver a pizza. All this and more in episode 462 of the “Smashing Security” podcast with cybersecurity expert and keynote speaker Graham Cluley, joined this week by special guest Dave Bittner.

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

(Wednesday April 08, 2026)
Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'scapable of hitting misconfigured cloud deployments, marking an expansion of the botnet's targeting infrastructure. "Chaos malware is increasingly targeting misconfigured cloud deployments, expanding beyond its traditional focus on routers and edge devices," Darktrace said in a new report.

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

(Wednesday April 08, 2026)
Cybersecurity researchers have lifted the curtain on a stealthy botnet that's designed for distributed denial-of-service (DDoS) attacks. Called Masjesu, the botnet has been advertised via Telegram as a DDoS-for-hire service since it first surfaced in 2023. It's capable of targeting a wide range of IoT devices, such as routers and gateways, spanning multiple architectures. "Built for

What’s the worst crowd control mistake you’ve seen at an event?

(Wednesday April 08, 2026)
Click the link for more details on What’s the worst crowd control mistake you’ve seen at an event?

Common Entra ID Security Assessment Findings – Part 3: Weak Privileged Identity Management Configuration

(Wednesday April 08, 2026)
Click the link for more details on Common Entra ID Security Assessment Findings – Part 3: Weak Privileged Identity Management Configuration

Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security

(Wednesday April 08, 2026)

Salt Security has released its 1H 2026 State of AI and API Security: Navigating the Agentic Era report, revealing a widening gap between the rapid deployment of AI agents and the security programs designed to protect them. The research finds that while autonomous AI agents are being deployed at enterprise scale, 92% of organisations lack […]

The post Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security appeared first on IT Security Guru.

Check Point Software Celebrates Partner Success at Annual UK Partner Awards

(Wednesday April 08, 2026)

Check Point has announced the winners of its 2026 UK Partner Awards, recognising the achievements of its UK partner ecosystem and their role in helping organisations strengthen cyber resilience. The awards ceremony took place on 19 March 2026 at One Moorgate Place in London, bringing together partners from across the UK to celebrate innovation, collaboration […]

The post Check Point Software Celebrates Partner Success at Annual UK Partner Awards appeared first on IT Security Guru.

MIWIC26: Nicole Bucala, CEO of DataBee, A Comcast Company

(Wednesday April 08, 2026)

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are […]

The post MIWIC26: Nicole Bucala, CEO of DataBee, A Comcast Company appeared first on IT Security Guru.

Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026

(Wednesday April 08, 2026)
Click the link for more details on Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information 07 April 2026

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

(Wednesday April 08, 2026)
The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh spear-phishing campaign targeting Ukraine and its allies to deploy a previously undocumented malware suite codenamed PRISMEX. "PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control," Trend Micro

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

(Wednesday April 08, 2026)
The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching a breaking point. As organizations scale, identity becomes increasingly fragmented across thousands of applications, decentralized teams, machine identities, and autonomous systems.  The result is Identity Dark Matter: identity activity that sits outside the visibility of centralized IAM and

Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3)

(Wednesday April 08, 2026)
Click the link for more details on Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3)

Python Supply-Chain Compromise

(Wednesday April 08, 2026)
This is news: A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains a malicious .pth file (litellm_init.pth, 34,628 bytes) which is automatically executed by the Python interpreter on every startup, without requiring any explicit import of the litellm module. There are a lot of really boring things we need to do to help secure all of these critical libraries: SBOMs, SLSA, SigStore. But we have to do them.

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

(Wednesday April 08, 2026)
Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative called Project Glasswing that will use a preview version of its new frontier model, Claude Mythos, to find and address security vulnerabilities. The model will be used by a small set of organizations, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike,&

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

(Wednesday April 08, 2026)
The North Korea-linked persistent campaign known as Contagious Interview has spread its tentacles by publishing malicious packages targeting the Go, Rust, and PHP ecosystems. "The threat actor's packages were designed to impersonate legitimate developer tooling [...], while quietly functioning as malware loaders, extending Contagious Interview’s established playbook into a coordinated

Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS

(Wednesday April 08, 2026)
Click the link for more details on Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

(Wednesday April 08, 2026)
Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers (PLCs), cybersecurity and intelligence agencies warned Tuesday. "These attacks have led to diminished PLC functionality, manipulation of display data and, in some cases, operational disruption and financial

From UART to Root: Vendor Shell Escape on a Uniview IP Camera

(Wednesday April 08, 2026)
Click the link for more details on From UART to Root: Vendor Shell Escape on a Uniview IP Camera

Guard Card - World Academia - Any knowledge and/or experience working with them?

(Tuesday April 07, 2026)
Click the link for more details on Guard Card - World Academia - Any knowledge and/or experience working with them?

CVE-2026-34197: ActiveMQ RCE via Jolokia API

(Tuesday April 07, 2026)
Click the link for more details on CVE-2026-34197: ActiveMQ RCE via Jolokia API

Assessing Claude Mythos Preview’s capabilities

(Tuesday April 07, 2026)
Click the link for more details on Assessing Claude Mythos Preview’s capabilities

The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape

(Tuesday April 07, 2026)
Click the link for more details on The Race to Ship AI Tools Left Security Behind. Part 1: Sandbox Escape

Rising to the Era of AI-Powered Cyber Defense

(Tuesday April 07, 2026)
Cisco is joining forces with the world's most critical cyber defenders in Anthropic’s Project Glasswing with a shared commitment to defend the digital world from AI-powered threats.

Cybersecurity in the Age of Instant Software

(Tuesday April 07, 2026)
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: "instant software." Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted. AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...

Russia Hacked Routers to Steal Microsoft Office Tokens

(Tuesday April 07, 2026)
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

(Tuesday April 07, 2026)
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May 2025. The large-scale exploitation campaign has been codenamed 

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

(Tuesday April 07, 2026)
In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet the risk is actually increasing. According to new research from the Ponemon Institute, hundreds of applications within the typical enterprise remain disconnected from centralized identity systems. These "dark

Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

(Tuesday April 07, 2026)
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024. "

MIWIC26: Anmol Agarwal, Senior Security Researcher at Nokia

(Tuesday April 07, 2026)

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are […]

The post MIWIC26: Anmol Agarwal, Senior Security Researcher at Nokia appeared first on IT Security Guru.

SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

(Tuesday April 07, 2026)

Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them into part of the actor’s malicious infrastructure.

The post SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks appeared first on Microsoft Security Blog.

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

(Tuesday April 07, 2026)
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. "A purpose-built Python scanner continuously sweeps major cloud IP ranges for vulnerable targets, automatically installing malicious nodes via ComfyUI-Manager if no exploitable node is already

Microsoft Speech - Lateral Movement

(Tuesday April 07, 2026)
Click the link for more details on Microsoft Speech - Lateral Movement
Links: