Breaking News – Cyber Threats (last 6h)
Generated: 2026-04-09 08:00 PDT
- When attackers already have the keys, MFA is just another door to open
BleepingComputer • 2026-04-09 07:02 • www.bleepingcomputer.com
Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—blocking phishing relays and MFA bypass. […]
https://www.bleepingcomputer.com/news/security/when-attackers-already-have-the-keys-mfa-is-just-another-door-to-open/ - ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
The Hacker News • 2026-04-09 05:57 • thehackernews.com
Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t.
This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in
https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html - Webinar: From noise to signal – What threat actors are targeting next
BleepingComputer • 2026-04-09 05:20 • www.bleepingcomputer.com
Threat actors often signal their intentions before launching attacks, from dark web chatter to access-broker listings and credential requests. Join our upcoming webinar with Flare Systems to learn how to turn those early warning signs into proactive defensive action before an intrusion begins. […]
https://www.bleepingcomputer.com/news/security/webinar-from-noise-to-signal-what-threat-actors-are-targeting-next/ - The Hidden Security Risks of Shadow AI in Enterprises
The Hacker News • 2026-04-09 04:31 • thehackernews.com
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to the phenomenon of
https://thehackernews.com/2026/04/the-hidden-security-risks-of-shadow-ai.html - Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
The Hacker News • 2026-04-09 04:15 • thehackernews.com
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.
The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second
https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html - On Microsoft’s Lousy Cloud Security
Schneier on Security • 2026-04-09 03:51 • www.schneier.comProPublica has a scoop:
In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.
The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government…
https://www.schneier.com/blog/archives/2026/04/on-microsofts-lousy-cloud-security.html - Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region
The Hacker News • 2026-04-09 03:40 • thehackernews.com
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX.
Two of the targets included prominent Egyptian journalists and government critics, Mostafa
https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html - Eurail says December data breach impacts 300,000 individuals
BleepingComputer • 2026-04-09 03:31 • www.bleepingcomputer.com
Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach. […]
https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/ - The long road to your crypto: ClipBanker and its marathon infection chain
Securelist • 2026-04-09 02:30 • securelist.com
Threat actors are distributing a Trojan disguised as Proxifier software; through a multi-stage infection chain, it delivers ClipBanker – malware that replaces cryptocurrency wallet addresses in the clipboard.
https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/ - Hackers exploiting Acrobat Reader zero-day flaw since December
BleepingComputer • 2026-04-09 02:22 • www.bleepingcomputer.com
Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December. […]
https://www.bleepingcomputer.com/news/security/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
