Post

Cybersecurity Newsfeed - 15/04/26

Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.

Cybersecurity Newsfeed - 15/04/26

Cybersecurity Newsfeed

📅 15/04/26

🛡️ Vulnerabilities

  • Microsoft April 2026 Patch Tuesday: Microsoft addressed 167 vulnerabilities, including two zero-day flaws actively exploited in the wild. The updates cover Windows, Office, and Azure, with several classified as critical for remote code execution. More info

  • Critical Flaws in PHP Composer: New vulnerabilities discovered in the popular PHP dependency manager could allow attackers to execute arbitrary code on developer machines and CI/CD servers by exploiting package metadata. More info

  • wolfSSL Vulnerability Impacts IoT & Military: A critical flaw in the wolfSSL library could allow attackers to execute arbitrary code or cause DoS conditions on IoT routers and military-grade communication systems. More info

  • CISA Adds Two Flaws to KEV Catalog: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities catalog, citing evidence of active exploitation and mandating federal remediation. More info

  • ShowDoc Servers Targeted (CVE-2025-0520): Attackers are scanning for unpatched ShowDoc servers to exploit a critical RCE vulnerability, threatening unauthorized access to sensitive internal documentation. More info

🎯 Adversaries

  • 0APT (Krybit) Launches “SPAT” Campaign: This threat group is targeting government and financial institutions using custom-built malware designed for stealthy data exfiltration and persistent surveillance. More info

  • Fake Claude AI Spreads PlugX: Attackers are leveraging the popularity of AI tools by using fraudulent installers to deploy the PlugX RAT via DLL sideloading, bypassing traditional antivirus detections. More info

  • ViperTunnel Ransomware Hits UK & US: A new ransomware strain is targeting businesses using a unique tunneling protocol to exfiltrate data while bypassing standard network security controls. More info

  • Mirax Android RAT: A new mobile Trojan allows attackers to remotely control infected devices, enabling audio/video recording and GPS tracking, often spread through third-party app stores. More info

  • OmniStealer Abuses Blockchain C2: This malware uses blockchain transactions for its command-and-control infrastructure, making it exceptionally difficult for defenders to block via traditional IP or domain filtering. More info

  • EDR Killer Ecosystem Expansion: Threat actors are increasingly utilizing “Bring Your Own Vulnerable Driver” (BYOVD) tactics to disable EDR solutions, necessitating stricter driver blocklists. More info

  • Malicious Chrome Extensions Surge: Over 100 malicious extensions were identified in the Web Store, sharing a common C2 infrastructure and designed to steal session cookies and bypass MFA. More infoAdditional info
  • Windows Protection for Malicious RDP: Microsoft is introducing stricter validation checks for .rdp files to prevent credential theft and lateral movement via crafted remote desktop configurations. More info

💥 Breaches & Leaks

  • Kraken Extorted After Insider Breach: The cryptocurrency exchange was targeted by hackers who successfully extorted the platform following an internal breach involving a malicious insider. More info

  • McGraw Hill Confirms Data Breach: The educational publishing giant confirmed a breach following an extortion threat, potentially exposing student and employee information to cybercriminal groups. More info

  • $95M Stolen via Fake Ledger Live App: A fraudulent app on the Apple App Store successfully stole millions in crypto by tricking users into entering their hardware wallet recovery phrases. More info

📚 Others

  • OpenSSL 4.0.0 Released: This major update introduces significant security enhancements, including FIPS 140-3 compliance and improved support for post-quantum cryptography. More info

  • DavMail 6.6.0 Update: The popular Exchange gateway released version 6.6.0, addressing stability issues and implementing security hardening for credential authentication. More info


⬅ Back to Archive

This post is licensed under CC BY 4.0 by the author.