Advertisement · 728 × 90

Posts by securityrss.ai

Preview
NGate NFC malware targets Android users through trojanized payment app

A campaign targeting Android users in Brazil has been identified, utilizing a trojanized version of the HandyPay app to distribute NGate NFC malware. Active since November 2025, it employs two distribution methods: a fake lottery website and a counterfeit Google Play page.

3 hours ago 0 0 0 0
Preview
Crypto infrastructure company blames $290 million theft on North Korean hackers

A theft of nearly $290 million in cryptocurrency from the Kelp platform has been attributed to North Korean hackers, specifically the TraderTraitor group. The attack exploited Kelp's reliance on a single Decentralized Verifier Network (DVN) from LayerZero, which LayerZero warned against.

3 hours ago 0 0 0 0
Preview
Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims

A Florida man, Angelo Martino, pleaded guilty to conspiracy to deploy BlackCat ransomware and extort U.S. victims.

3 hours ago 0 0 0 0
Preview
CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

CISA added eight vulnerabilities to its Known Exploited Vulnerabilities catalog, including critical flaws in Cisco Catalyst SD-WAN Manager and PaperCut NG/MF. Notable vulnerabilities include CVE-2025-32975 (CVSS 10.0) allowing user impersonation in Quest KACE SMA and CVE-2023-27351 (CVSS 8.

5 hours ago 0 0 0 0
Preview
Cross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook

Threat actors are exploiting Microsoft Teams for cross-tenant impersonation, posing as IT support to socially engineer users into granting remote desktop access. This access enables credential-backed lateral movement using WinRM, targeting high-value assets like domain controllers.

8 hours ago 1 0 0 0
Preview
British hacker tied to Scattered Spider campaign pleads guilty in $8M scheme

Tyler Robert Buchanan, a 24-year-old British hacker, pleaded guilty to conspiracy to commit wire fraud and aggravated identity theft in a U.S. federal court, linked to the Scattered Spider cybercrime campaign that stole at least $8 million in cryptocurrency.

23 hours ago 0 0 0 0
Preview
White House moves to give federal agencies access to Anthropic’s Claude Mythos

The US government is preparing to authorize Anthropic’s Claude Mythos AI model for use by federal agencies, amid concerns about its potential to identify and exploit cybersecurity vulnerabilities.

1 day ago 0 0 0 0
A Deep Dive Into Attempted Exploitation of CVE-2023-33538

Active exploitation attempts of CVE-2023-33538, a command injection vulnerability in end-of-life TP-Link routers, were detected. The vulnerability allows attackers to inject commands via the ssid1 parameter, but requires authentication.

1 day ago 0 0 0 0
Preview
Vercel Confirms Data Breach — Hackers Claim Access to Internal Systems

Vercel confirmed a data breach on April 18-19, 2026, after hackers accessed internal systems via a compromised Google Workspace OAuth app linked to Context.ai. The attackers, claiming to be ShinyHunters, offered stolen data for $2 million, including employee records and access keys.

1 day ago 0 0 0 0
Preview
Claude Opus wrote a Chrome exploit for $2,283

Mohan Pedhapati utilized Anthropic's Opus 4.6 model to create a Chrome exploit targeting the V8 JavaScript engine, incurring $2,283 in API costs. He highlighted the ease of exploit development with AI, warning that any determined individual could eventually exploit unpatched software.

1 day ago 0 0 0 0
Advertisement
Preview
Hackers Target Israeli Desalination Plants With ZionSiphon Sabotage Malware

A newly identified malware, ZionSiphon, targets Israeli water treatment and desalination facilities, posing a significant threat to critical infrastructure. It features hardcoded Israeli IP addresses and politically charged messages, indicating ideological motivations.

1 day ago 0 0 0 0
Preview
New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks

Cybersecurity researchers at Fortinet's FortiGuard Labs have identified a new Mirai variant, Nexcorium, targeting DVR devices, particularly TBK DVR-4104 and DVR-4216 models, exploiting CVE-2024-3721. This malware creates a botnet for DDoS attacks, using brute-force methods with hardcoded passwords.

3 days ago 0 0 0 0
Preview
Kyrgyzstan-based crypto exchange Grinex shuts down after $13.7M cyber heist, blames Western Intelligence

Kyrgyzstan-based crypto exchange Grinex has ceased operations following a $13.7 million cyber heist, which it attributes to Western intelligence agencies. The attack targeted Russian users, with over 1 billion rubles stolen from their wallets.

3 days ago 0 0 0 0
Preview
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

A high-severity vulnerability in Apache ActiveMQ, tracked as CVE-2026-34197 (CVSS score: 8.8), is actively exploited, prompting CISA to add it to its KEV catalog. It involves improper input validation allowing code injection via the Jolokia API.

4 days ago 0 0 0 0
Preview
AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Google's annual ads safety report reveals that its AI tool, Gemini, successfully blocked over 99% of policy-violating ads in 2025, removing 8.3 billion ads, including 602 million related to scams. The company suspended over 4 million advertiser accounts for scam activity.

4 days ago 0 0 0 0
Preview
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

Microsoft Threat Intelligence reported on a macOS cyber campaign by North Korean actor Sapphire Sleet, using social engineering to compromise systems.

4 days ago 0 0 0 0
Preview
Microsoft Defender 0-Day Vulnerability “RedSun” Enables Full SYSTEM Access

A zero-day vulnerability in Microsoft Defender, named “RedSun,” allows unprivileged users to escalate privileges to full SYSTEM access on fully patched Windows 10, 11, and Server 2019 and later. This exploit, tracked as CVE-2026-33825 with a CVSS score of 7.

4 days ago 2 0 0 0
Officials seize 53 DDoS-for-hire domains in ongoing crackdown

Authorities from 21 countries seized 53 domains and arrested four individuals linked to DDoS-for-hire operations, impacting over 75,000 cybercriminals in "Operation PowerOFF.

4 days ago 0 0 0 0
Preview
Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug

A threat actor targeting trucking and logistics companies compromised a load board platform on February 27, 2026, delivering a malicious payload via email.

4 days ago 0 0 0 0
Preview
Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads

A critical vulnerability in the model context protocol (MCP), created by Anthropic, could expose 150 million downloads and over 200,000 vulnerable instances. Researchers at Ox Security reported that the flaw allows arbitrary command execution, risking sensitive data access.

4 days ago 1 0 1 0
Advertisement
Preview
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical vulnerabilities in Identity Services and Webex Services that could lead to arbitrary code execution and user impersonation. Key vulnerabilities include CVE-2026-20184 (CVSS 9.

4 days ago 0 0 0 0
Preview
NIST to limit work on CVE entries as submissions surge

NIST announced changes to its CVE enrichment process due to a surge in vulnerability submissions, stating it will only enrich records that meet specific criteria. This shift aims to focus on critical vulnerabilities, particularly those in a federal catalog of exploited vulnerabilities.

5 days ago 0 1 0 0
Preview
Two U.S. Nationals Sentenced for Facilitating Fraudulent Remote Information Technology Worker Scheme that Generated $5M in Revenue for the Democratic People’s Republic of Korea

Two U.S. nationals, Kejia Wang and Zhenxing Wang, were sentenced for facilitating a scheme that enabled North Korean IT workers to pose as U.S. residents and generate over $5 million for the DPRK.

5 days ago 0 0 0 0
Preview
The n8n n8mare: How threat actors are misusing AI workflow automation

Cisco Talos reports an increase in the misuse of the n8n AI workflow automation platform for phishing campaigns from October 2025 to March 2026. Attackers exploit n8n's webhook URLs to deliver malware and perform device fingerprinting.

5 days ago 1 0 0 0
Preview
'This activity appears to be part of a broader issue': education company McGraw Hill becomes latest to see its Salesforce data hacked

McGraw Hill confirmed a data breach involving unauthorized access to a limited set of Salesforce-hosted data, attributed to a misconfiguration within Salesforce's environment. The ransomware group ShinyHunters claims to have stolen 45 million records, demanding a ransom by April 14, 2026.

5 days ago 0 0 0 0
Preview
Sweden says pro-Russian hackers attempted to breach thermal power plant

A pro-Russian hacker group attempted to breach a thermal power plant in western Sweden in spring 2025, but the intrusion was thwarted by the facility's security measures, according to Swedish officials. The attackers are believed to have links to Russian intelligence.

5 days ago 0 0 0 0
Preview
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

A critical vulnerability (CVE-2026-33032) in nginx-ui, an open-source Nginx management tool, allows full server takeover via an authentication bypass. The flaw, with a CVSS score of 9.8, enables attackers to exploit the unprotected /mcp_message endpoint.

5 days ago 1 0 0 0
Advertisement
Preview
Someone planted backdoors in dozens of WordPress plug-ins used in thousands of websites

Dozens of WordPress plug-ins were taken offline after a backdoor was discovered, enabling malicious code distribution to websites using them. The backdoor was added following the acquisition of Essential Plugin, which has over 400,000 installs.

6 days ago 0 0 0 0
Preview
Mirax Android Trojan Turns Devices Into Residential Proxy Nodes

A newly identified Android banking trojan, Mirax, is spreading across Europe, targeting Spanish-speaking users and affecting over 200,000 accounts through social media ads.

6 days ago 0 0 0 0
Preview
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

Cybersecurity researchers identified 108 malicious Chrome extensions affecting approximately 20,000 users, designed to steal Google and Telegram data. These extensions, published under five identities, communicate with a shared command-and-control infrastructure.

6 days ago 0 0 0 0