Categories Breaking News

Breaking News – Cyber Threats – 2026-04-23 08:00 PDT

Breaking News – Cyber Threats (last 6h)

Generated: 2026-04-23 08:00 PDT

  • Cosmetics giant Rituals discloses data breach affecting customers
    BleepingComputer • 2026-04-23 07:16 • www.bleepingcomputer.com
    Dutch cosmetics giant Rituals disclosed a data breach after attackers stole the personal information of an undisclosed number of customers from its “My Rituals” membership database. […]
    https://www.bleepingcomputer.com/news/security/cosmetics-giant-rituals-discloses-data-breach-affecting-customers/
  • Regular Password Resets Aren’t as Safe as You Think
    BleepingComputer • 2026-04-23 07:10 • www.bleepingcomputer.com
    Password resets are one of the easiest ways for attackers to bypass security controls. Specops Software shows how helpdesk social engineering turns a seemingly legitimate reset request into full account compromise. […]
    https://www.bleepingcomputer.com/news/security/regular-password-resets-arent-as-safe-as-you-think/
  • Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
    The Hacker News • 2026-04-23 06:42 • thehackernews.com
    Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from Socket.
    “The affected package version appears to be @bitwarden/cli@2026.4.0, and the malicious code was published in ‘bw1.js,’ a file included in the package contents,” the application security company said.
    “The attack appears to have leveraged a
    https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html
  • Microsoft: Some Teams users can’t join meetings after Edge update
    BleepingComputer • 2026-04-23 06:18 • www.bleepingcomputer.com
    Microsoft confirmed that a recent Microsoft Edge browser update introduced a bug that prevents Windows users from joining Teams meetings. […]
    https://www.bleepingcomputer.com/news/microsoft/microsoft-some-teams-users-cant-join-meetings-after-edge-update/
  • ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
    The Hacker News • 2026-04-23 06:17 • thehackernews.com
    You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes.
    The supply chain is messy. Packages you did not check are stealing data, adding backdoors, and spreading. Attacking the systems behind apps is easier than breaking the apps themselves. The exploits are simple but still work
    https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html
  • UK warns of Chinese hackers using proxy networks to evade detection
    BleepingComputer • 2026-04-23 05:28 • www.bleepingcomputer.com
    The United Kingdom’s National Cyber Security Centre (NCSC-UK) and international partners warned that China-nexus hackers are increasingly using large-scale proxy networks of hijacked consumer devices to evade detection and disguise their malicious activity. […]
    https://www.bleepingcomputer.com/news/security/uk-warns-of-chinese-hackers-using-botnets-of-hijacked-consumer-devices-to-evade-detection/
  • New GopherWhisper APT group abuses Outlook, Slack, Discord for comms
    BleepingComputer • 2026-04-23 05:06 • www.bleepingcomputer.com
    A previously undocumented state-backed threat actor named GopherWhisper is using a Go-based custom toolkit and legitimate services like Microsoft 365 Outlook, Slack, and Discord in attacks against government entities. […]
    https://www.bleepingcomputer.com/news/security/new-gopherwhisper-apt-group-abuses-outlook-slack-discord-for-comms/
  • [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
    The Hacker News • 2026-04-23 05:03 • thehackernews.com
    Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly.
    Well, that world is already here.
    Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time you have to fix a vulnerability before it gets attacked is shrinking to zero. We call this the Collapsing Exploit Window, and it means your
    https://thehackernews.com/2026/04/webinar-mythos-reality-check-beating.html
  • Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
    The Hacker News • 2026-04-23 04:30 • thehackernews.com
    Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has given access to Apple, Microsoft, Google, Amazon, and a coalition of others to find and patch bugs before adversaries can.
    Mythos Preview, the model that led to Project Glasswing, found
    https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html
  • CISA orders feds to patch BlueHammer flaw exploited as zero-day
    BleepingComputer • 2026-04-23 04:05 • www.bleepingcomputer.com
    CISA has ordered U.S. federal agencies to patch a Microsoft Defender privilege escalation flaw (dubbed BlueHammer) that has been exploited in zero-day attacks. […]
    https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/
  • FBI Extracts Deleted Signal Messages from iPhone Notification Database
    Schneier on Security • 2026-04-23 04:05 • www.schneier.com

    404 Media reports (alternate site):

    The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database….

    The news shows how forensic extraction—­when someone has physical access to a device and is able to run specialized software on it&#821…
    https://www.schneier.com/blog/archives/2026/04/fbi-extracts-deleted-signal-messages-from-iphone-notification-database.html

  • Apple Patches Exploited Notification Flaw, (Thu, Apr 23rd)
    SANS ISC Diary (full) • 2026-04-23 03:18 • isc.sans.edu

    Apple yesterday released iOS/iPadOS 26.4.2 and iOS/iPadOS 18.7.8. This update fixes a single Notification Services vulnerability, CVE-2026-28950:


    https://isc.sans.edu/diary/rss/32922

  • China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
    The Hacker News • 2026-04-23 02:04 • thehackernews.com
    Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper.
    “The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal,” Slovakian cybersecurity company ESET said in a report shared with The Hacker
    https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like