Post

Cybersecurity Newsfeed - 28/04/26

Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.

Cybersecurity Newsfeed - 28/04/26

Cybersecurity Newsfeed

📅 28/04/26

🛡️ Vulnerabilities

  • 15-Year-Old OpenSSH Root Flaw: A critical race condition in the sshd server has been discovered that allowed full root shell access for over a decade and a half. While complex to exploit, the potential impact on global Linux/Unix infrastructure is immense. More info

  • Firefox Tracking & Tor Fingerprinting (CVE-2026-6770): A bug in the Firefox engine enabled cross-site tracking, compromising the anonymity of Tor Browser users. Mozilla has issued an emergency patch to fix the network request inconsistency. More info

  • 73 Malicious VS Code Extensions: Researchers identified dozens of fake extensions in the Visual Studio Code Marketplace designed to exfiltrate source code, environment variables, and auth tokens from developer environments. More info

🎯 Adversaries

  • UNC6692 Social Engineering & Cloud Abuse: This threat actor is abusing legitimate services like Google Drive and Dropbox to deliver RATs and infostealers, bypassing traditional security perimeters via trusted domains. More info

  • Silk Typhoon Hacker Extradited: An alleged operative of the Silk Typhoon group has been extradited to the U.S. to face charges related to long-term network intrusions against government agencies and defense contractors. More info

  • BlackFile Group Targets Retail: The group is using specialized malware to compromise Point-of-Sale (PoS) systems, scraping memory for credit card data and intercepting internal retail communications. More info

  • Fake Crypto Apps Target iOS & macOS: Deceptive apps masquerading as legitimate crypto management tools have bypassed App Store reviews to steal private keys from high-net-worth investors. More info

  • Vidar Infostealer Uses Fake CAPTCHAs: Attackers are now using fraudulent CAPTCHA challenges to trick users into downloading malicious JPEG and TXT files containing infostealer payloads. More info

  • Malicious AI Prompt Injection Rising: Google reports an increase in “jailbreaking” attempts on LLMs. While technical sophistication remains low, the frequency of attempts to bypass safety filters is growing. More info

  • 20-Year-Old Malware Rewrites ICS History: The discovery of legacy code targeting hardware controllers suggests that early cyber sabotage efforts were far more advanced than previously documented. More info

  • Fake CAPTCHA IRSF Scams: A new scheme uses the Keitaro traffic distribution system and fake security checks to redirect users to high-cost fraudulent phone services. More info

  • Supply Chain Hit: PyPI Package Compromised: A PyPI package with 11 million monthly downloads was hacked to push an infostealer after a developer’s account was compromised. More info

  • 82 Chrome Extensions Harvesting Data: Malicious extensions with millions of installs were found harvesting and selling browsing histories and personal identifiers to third-party brokers. More info

💥 Breaches & Leaks

  • ADT Data Breach Affects 5.5 Million: The home security giant confirmed a breach of customer names, emails, and addresses via a compromised third-party support interface. More info

  • Medtronic Confirms Breach: Following hacker claims of 9 million stolen records, the medical tech firm confirmed an intrusion into an internal system containing patient health information. More info

  • ShinyHunters Leak Zara, Udemy, 7-Eleven Data: The group has claimed responsibility for leaking massive datasets containing customer records and internal corporate info from several major brands. More info

📚 Others

  • Canada Arrests “SMS Blaster” Operators: Three individuals in Toronto were arrested for using rogue cellular devices to mimic cell towers and push phishing links directly to mobile phones. More info

⬅ Back to Archive

This post is licensed under CC BY 4.0 by the author.