More than 1,370 Microsoft SharePoint servers remain publicly exposed to an actively exploited spoofing vulnerability, putting countless corporate networks at severe risk. Identified by threat intelligence researchers at The Shadowserver Foundation, these unpatched systems are vulnerable to sophisticated attacks that…
IT Security News Hourly Summary 2026-04-22 09h : 3 posts
3 posts were published in the last hour 6:11 : Hackers Tie Iranian Espionage to CastleRAT and ChainShell 6:11 : French Authorities Confirm Data Breach Amid Hackers’ Data Leak Allegations 6:11 : Microsoft Emergency .NET 10.0.7 Update to Patch Elevation…
Hackers Tie Iranian Espionage to CastleRAT and ChainShell
A direct operational link between Iran’s MuddyWater espionage group and the Russian TAG-150 CastleRAT malware-as-a-service (MaaS) platform, showing how state and criminal ecosystems are now tightly intertwined. Investigators recovered 15 malware samples, including at least two CastleRAT “builds” and a…
French Authorities Confirm Data Breach Amid Hackers’ Data Leak Allegations
The French National Agency for Secure Documents (ANTS) has officially confirmed a severe data breach affecting its central government portal. This critical infrastructure system manages the issuance of national identity cards, passports, vehicle registration certificates, and driver’s licenses nationwide. Recent…
Microsoft Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability
Microsoft has issued an emergency out-of-band (OOB) security update for .NET 10, releasing version 10.0.7 on April 21, 2026, to address a critical elevation of privilege vulnerability discovered in the Microsoft.AspNetCore.DataProtection NuGet package. The out-of-band release was prompted after customers…
Microsoft Issues Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability
Microsoft has issued an emergency out-of-band security update to address a severe vulnerability within the .NET framework. The critical release of .NET 10.0.7 patches an Elevation of Privilege flaw that inadvertently surfaced after a recent routine system update. Out-of-band patches…
Microsoft-Signed Binary Helps Deliver LOTUSLITE in India Spy Campaign
Microsoft-signed developer tooling is being abused to quietly deploy a new LOTUSLITE backdoor variant against India’s banking sector, in what researchers link to the China‑nexus Mustang Panda espionage cluster with moderate confidence. The backdoor retains its espionage profile, offering remote…
Exclusive Anthropic Cyber Tool Mythos Accessed by Unapproved Actors
A group of unauthorized users has successfully bypassed access controls to reach Claude Mythos Preview, Anthropic’s closely guarded cybersecurity AI. This breach highlights critical concerns about third-party vendor security and the severe risks posed by advanced offensive AI falling into…
What the ransom note won’t say
An attack is what you see, but a business operation is what you’re up against This article has been indexed from WeLiveSecurity Read the original article: What the ransom note won’t say
New NGate variant hides in a trojanized NFC payment app
ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI This article has been indexed from WeLiveSecurity Read the original article: New NGate variant hides in a trojanized NFC payment app
Mythos found 271 Firefox flaws – but none a human couldn’t spot
Mozilla CTO says AI means developers finally have a chance to get on top of security The Mozilla Foundation has revealed it tested Anthropic’s bug-finding “Mythos” AI model and feels the results it experienced represent a watershed moment for software…
Vercel Breach Started With AI Tool
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Cybersecurity Today Read the original article: Vercel Breach Started With AI Tool
Unauthorized Group Gains Access to Anthropic’s Exclusive Cyber Tool Mythos
A group of unauthorized users has reportedly breached access controls surrounding Claude Mythos Preview, Anthropic’s powerful and closely guarded AI-driven cybersecurity tool, raising serious concerns about third-party vendor security and the risks of placing advanced offensive AI capabilities in the…
A Cybersecurity Lifeline for Lean IT Teams: Introducing C.R.E.W.
“Too small to target” is a dangerous cybersecurity myth, while “Where do I start?,” is a legitimate cyber defense question. Imagine leaving your office unlocked overnight—not because you don’t have anything valuable, but because you assume no one would bother…
ISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Wednesday, April 22nd, 2026…
Lattice-based Signature Schemes for MCP Host Authentication
Learn how to use lattice-based signature schemes like CRYSTALS-Dilithium for securing Model Context Protocol (MCP) host authentication in a post-quantum world. The post Lattice-based Signature Schemes for MCP Host Authentication appeared first on Security Boulevard. This article has been indexed…
IT Security News Hourly Summary 2026-04-22 03h : 2 posts
2 posts were published in the last hour 0:34 : Winter 2025 SOC 1 report is now available with 184 services in scope 0:8 : [Guest Diary] Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot…
Winter 2025 SOC 1 report is now available with 184 services in scope
Amazon Web Services (AWS) is pleased to announce that the Winter 2025 System and Organization Controls (SOC) 1 report is now available. The report covers 184 services over the 12-month period from January 1, 2025 – December 31, 2025, giving…
[Guest Diary] Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd)
[This is a Guest Diary by L. Carty, an ISC intern as part of the SANS.edu Bachelor's Degree in Applied Cybersecurity (BACS) program [1].] This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article:…
Oracle April 2026 Critical Patch Update Addresses 241 CVEs
Oracle addresses 241 CVEs in its second quarterly update of 2026 with 481 patches, including 34 critical updates. Key takeaways: The second Critical Patch Update (CPU) for 2026 contains fixes for 241 unique CVEs in 481 security updates 34 issues…
How Security Teams Can Transform Data into Action
For today’s cybersecurity professionals, the biggest problem isn’t a lack of data – they have plenty of it. They just don’t know how to transform it into actionable insights. The problem isn’t a lack of defense tools either. Quite to…
$293M KelpDAO Crypto Heist Exposes Cross-Chain Weaknesses in DeFi
A $293M KelpDAO hack shows how attackers exploited cross-chain weaknesses to trigger widespread DeFi risk. The post $293M KelpDAO Crypto Heist Exposes Cross-Chain Weaknesses in DeFi appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Nation-states want to cause harm, not just steal cash – stop handing your cyber defenses to the cheapest contractor
NCSC boss says China’s whole-of-state cyber machine has become Britain’s peer competitor in cyberspace State-sponsored cyberattacks from Chinese intelligence and military agencies display “an eye-watering level of sophistication,” UK National Cyber Security Centre CEO Richard Horne is expected to say…
IT Security News Hourly Summary 2026-04-22 00h : 3 posts
3 posts were published in the last hour 21:55 : IT Security News Daily Summary 2026-04-21 21:31 : Two MDO field reports every IT security lead should read 21:7 : Ransomware negotiator caught secretly assisting BlackCat extortion scheme