ICYMI: 2026-04-16
Latest Headlines
Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu
Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
Government Can’t Win the Cyber War Without the Private Sector
OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
Splunk Enterprise Update Patches Code Execution Vulnerability
Microsoft Paid Out $2.3 Million at Zero Day Quest 2026 Hacking Contest
NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software
Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments
SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection
Microsoft 365 Web Services Hit by Google Chrome 147 Compatibility Issue
Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers
New UAC-0247 Campaign Steals Browser and WhatsApp Data From Hospitals and Governments
Critical Cisco ISE Vulnerabilities Let Remote Attackers Execute Malicious Code
McGraw Hill Confirms Data Breach Exposing 13.5 Million Users’ Personal Data
Fake Proton VPN Sites and Gaming Mods Spread NWHStealer in New Windows Malware Campaign
Hackers Abuse n8n AI Workflow Automation to Deliver Malware Through Trusted Webhooks
Cisco Webex Services Vulnerability Let Remote Attacker Impersonate Any User
Nginx-ui Vulnerability Actively Exploited in Attack – Enables Full Server Takeover
– MTZ