Categories Breaking News

Breaking News – Cyber Threats – 2026-04-09 08:00 PDT

Breaking News – Cyber Threats (last 6h)

Generated: 2026-04-09 08:00 PDT

  • When attackers already have the keys, MFA is just another door to open
    BleepingComputer • 2026-04-09 07:02 • www.bleepingcomputer.com
    Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication verifies the user—not the session—blocking phishing relays and MFA bypass. […]
    https://www.bleepingcomputer.com/news/security/when-attackers-already-have-the-keys-mfa-is-just-another-door-to-open/
  • ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
    The Hacker News • 2026-04-09 05:57 • thehackernews.com
    Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t.
    This one’s got some range — old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in
    https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html
  • Webinar: From noise to signal – What threat actors are targeting next
    BleepingComputer • 2026-04-09 05:20 • www.bleepingcomputer.com
    Threat actors often signal their intentions before launching attacks, from dark web chatter to access-broker listings and credential requests. Join our upcoming webinar with Flare Systems to learn how to turn those early warning signs into proactive defensive action before an intrusion begins. […]
    https://www.bleepingcomputer.com/news/security/webinar-from-noise-to-signal-what-threat-actors-are-targeting-next/
  • The Hidden Security Risks of Shadow AI in Enterprises
    The Hacker News • 2026-04-09 04:31 • thehackernews.com
    As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to the phenomenon of
    https://thehackernews.com/2026/04/the-hidden-security-risks-of-shadow-ai.html
  • Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
    The Hacker News • 2026-04-09 04:15 • thehackernews.com
    Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.
    The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second 
    https://thehackernews.com/2026/04/adobe-reader-zero-day-exploited-via.html
  • On Microsoft’s Lousy Cloud Security
    Schneier on Security • 2026-04-09 03:51 • www.schneier.com

    ProPublica has a scoop:

    In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.

    The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government…
    https://www.schneier.com/blog/archives/2026/04/on-microsofts-lousy-cloud-security.html

  • Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region
    The Hacker News • 2026-04-09 03:40 • thehackernews.com
    An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX.
    Two of the targets included prominent Egyptian journalists and government critics, Mostafa
    https://thehackernews.com/2026/04/bitter-linked-hack-for-hire-campaign.html
  • Eurail says December data breach impacts 300,000 individuals
    BleepingComputer • 2026-04-09 03:31 • www.bleepingcomputer.com
    Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach. […]
    https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/
  • The long road to your crypto: ClipBanker and its marathon infection chain
    Securelist • 2026-04-09 02:30 • securelist.com
    Threat actors are distributing a Trojan disguised as Proxifier software; through a multi-stage infection chain, it delivers ClipBanker – malware that replaces cryptocurrency wallet addresses in the clipboard.
    https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/
  • Hackers exploiting Acrobat Reader zero-day flaw since December
    BleepingComputer • 2026-04-09 02:22 • www.bleepingcomputer.com
    Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December. […]
    https://www.bleepingcomputer.com/news/security/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like