Attackers are rapidly exploiting CVE-2026-39987 in the marimo Python notebook platform to deploy a new NKAbuse backdoor variant hosted on Hugging Face Spaces, turning AI/ML developer environments into high‑value infection points. The campaign combines pre-auth RCE, credential theft, lateral movement…
Hackers Target Israeli Desalination Plants With ZionSiphon Sabotage Malware
A newly discovered piece of malware called ZionSiphon has raised serious concerns about the security of critical water infrastructure in Israel. The malware was built with a clear focus: to infiltrate and potentially sabotage Israeli water treatment and desalination systems,…
ZionSiphon Malware Targets ICS in Water Facilities
The malware is configured to operate on systems associated with Israeli water treatment and desalination plants. The post ZionSiphon Malware Targets ICS in Water Facilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Starlink Outage Disrupted US Navy Drone Tests
US Navy reportedly finds SpaceX’s Starlink presents single point of failure after multiple drone tests disrupted by network issues This article has been indexed from Silicon UK Read the original article: Starlink Outage Disrupted US Navy Drone Tests
“Your shipment has arrived” email hides remote access software
This DHL-themed email tries to get recipients to install remote access software attackers can use to deploy further malware, including ransomware. This article has been indexed from Malwarebytes Read the original article: “Your shipment has arrived” email hides remote access…
U.S. CISA adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in Apache ActiveMQ, tracked as CVE-2026-34197 (CVSS score of 8.8), to…
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to…
EU Tells Google To Share Search Data
European Commission preliminary findings recommend Google share data with search engines and AI chatbots to ensure competition This article has been indexed from Silicon UK Read the original article: EU Tells Google To Share Search Data
Hackers Deploy ATHR for Scalable AI-Driven Vishing and Credential Theft
Hackers are increasingly turning to telephone-oriented attack delivery (TOAD) to bypass traditional email security, and a new cybercrime platform called ATHR is accelerating this trend with AI-driven automation and integrated phishing capabilities. TOAD attacks rely on a simple but effective…
Claude Opus wrote a Chrome exploit for $2,283
Pause your Mythos panic because mainstream models anyone can use already pick holes in popular software Anthropic withheld its Mythos bug-finding model from public release due to concerns that it would enable attackers to find and exploit vulnerabilities before anyone…
Cursor AI Vulnerability Exposed Developer Devices
An indirect prompt injection could be chained with a sandbox bypass and Cursor’s remote tunnel feature for shell access to machines. The post Cursor AI Vulnerability Exposed Developer Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Cisco Webex warning, Splunk’s Enterprise fix, Git spoof tricks Claude
Cisco posts urgent Webex Services warning Splunk issues fixes for Enterprise vulnerability Git identity spoof tricks Claude into approving bad code Get the show notes here: https://cisoseries.com/cybersecurity-news-cisco-webex-warning-splunks-enterprise-fix-git-spoof-tricks-claude/ Huge thanks to our sponsor, Conveyor Happy Friday. Hope there isn’t a fresh…
Russia-Linked Grinex Crypto Exchange Suspended After Hack
Grinex, linked by Western authorities to large-scale money laundering and sanctions evasion, suspends operations after cyber-heist This article has been indexed from Silicon UK Read the original article: Russia-Linked Grinex Crypto Exchange Suspended After Hack
Payouts King Emerges: New Ransomware Operation Tied to Ex-BlackBasta Members
Payouts King is emerging as a technically sophisticated ransomware operation believed to be run by former BlackBasta affiliates, reusing their social‑engineering playbook while introducing hardened obfuscation and encryption routines. The group focuses on high‑value data theft and selective encryption, leveraging…
IT Security News Hourly Summary 2026-04-17 09h : 13 posts
13 posts were published in the last hour 7:5 : 53 DDoS Domains Taken Down by Law Enforcement 7:4 : What Is SPIFFE and How Does It Work? 7:4 : Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal…
Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits
Google shipped Android 17 Beta 4 on April 16, marking the last scheduled beta in the Android 17 release cycle. The build targets app compatibility testing and platform stability ahead of the final release, and it carries several behavior changes…
53 DDoS Domains Taken Down by Law Enforcement
Authorities in 21 countries participated in a coordinated action against DDoS-for-hire services. The post 53 DDoS Domains Taken Down by Law Enforcement appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: 53 DDoS Domains…
What Is SPIFFE and How Does It Work?
An amazing post The post What Is SPIFFE and How Does It Work? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: What Is SPIFFE and How Does It Work?
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the…
Anthropic Introduces Claude Opus 4.7 for Advanced Problem-Solving
Anthropic has officially launched Claude Opus 4.7, a major upgrade designed to tackle complex software engineering while introducing rigorous new cybersecurity safeguards. Released on April 16, 2026, this model brings enhanced problem-solving capabilities to developers and actively addresses the dual-use…
Amtrak – 2,147,679 breached accounts
In April 2026, the hacking group ShinyHunters claimed they had breached Amtrak. The group typically compromises organisations’ Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained…
Microsoft Defender 0-Day Vulnerability “RedSun” Enables Full SYSTEM Access
A newly disclosed zero-day vulnerability in Microsoft Defender, dubbed “RedSun,” allows an unprivileged user to escalate privileges to full SYSTEM-level access on fully patched Windows 10, Windows 11, and Windows Server 2019 and later systems, and as of now, remains…
Microsoft Confirms Windows 11 Updates May Force Users to Enter BitLocker Recovery Key
Microsoft has officially acknowledged a known issue affecting Windows 11 users following the release of its April 2026 Patch Tuesday cumulative updates. Devices running certain BitLocker Group Policy configurations may unexpectedly prompt users to enter their BitLocker recovery key after…
Hackers Target Trucking and Freight Firms to Steal Real-World Cargo Shipments
A new wave of cyber attacks is hitting trucking carriers and freight brokers, and the goal is not just data theft. Criminals are breaking into logistics companies digitally to steal physical cargo shipments worth millions of dollars in the real…