Cybersecurity News

Live Security News

Real-time disclosures, zero-day alerts, and threat intelligence filtered for security leaders.

Featured image for: Drift loses $280 million as hackers seize Security Council powers
BleepingComputer
Apr 2, 2026

Drift loses $280 million as hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]

Source File
Featured image for: Drift loses $280 million North Korean hackers seize Security Council powers
BleepingComputer
Apr 2, 2026

Drift loses $280 million North Korean hackers seize Security Council powers

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]

Source File
Featured image for: Verge subscribers: Join us for a movie night in New York City, hosted by The Vergecast
The Verge
Apr 2, 2026

Verge subscribers: Join us for a movie night in New York City, hosted by The Vergecast

The Vergecast is hosting a special in-person screening of Sneakers in partnership with IFC in New York City, and we're opening presale tickets exclusively to Verge subscribers. Sneakers is a movie about what happens when technology becomes more powerful than …

Source File
Featured image for: Special Dinner Invite Email Scam got me.
BleepingComputer
Apr 2, 2026

Special Dinner Invite Email Scam got me.

Special Dinner Invite Email Scam got me. - posted in Virus, Trojan, Spyware, and Malware Removal Help: I was sent a special dinner e-invite from a friend but it appears to be a potential virus.  It downloaded a program and when complete it opened Ninite.  Acc…

Source File
Featured image for: Money transfer app Duc exposed thousands of driver’s licenses and passports to the open web
TechCrunch
Apr 2, 2026

Money transfer app Duc exposed thousands of driver’s licenses and passports to the open web

An exposed Amazon-hosted server allowed anyone to access reams of customer data without needing a password.

Source File
Featured image for: 'This rootkit is highly persistent; a standard factory reset will not remove it': "NoVoice" Android malware on Google Play infects 50 apps across 2.3 million devices, here's what we know
TechRadar
Apr 2, 2026

'This rootkit is highly persistent; a standard factory reset will not remove it': "NoVoice" Android malware on Google Play infects 50 apps across 2.3 million devices, here's what we know

NoVoice can clone people's WhatsApp accounts on different devices, experts warn.

Source File
Featured image for: Residential proxies evaded IP reputation checks in 78% of 4B sessions
BleepingComputer
Apr 2, 2026

Residential proxies evaded IP reputation checks in 78% of 4B sessions

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users. [...]

Source File
Featured image for: 'By replacing a legitimate update with a malicious one, they turned the product’s update flow into a malware distribution channel': Experts find flaw in TrueConf video conferencing tool used by governments, military
TechRadar
Apr 2, 2026

'By replacing a legitimate update with a malicious one, they turned the product’s update flow into a malware distribution channel': Experts find flaw in TrueConf video conferencing tool used by governments, military

Sophisticated cyber-espionage campaign recently uncovered targeting government entities in Southeast Asia.

Source File
Featured image for: Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime
BleepingComputer
Apr 2, 2026

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector. [...]

Source File
Featured image for: New Progress ShareFile flaws can be chained in pre-auth RCE attacks
BleepingComputer
Apr 2, 2026

New Progress ShareFile flaws can be chained in pre-auth RCE attacks

Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments. [...]

Source File
Featured image for: Medtech giant Stryker fully operational after data-wiping attack
BleepingComputer
Apr 2, 2026

Medtech giant Stryker fully operational after data-wiping attack

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group. [...]

Source File
Featured image for: Fortis solutions on the rise of human-governed AI: Building trust through intelligent infrastructure
The Next Web
Apr 2, 2026

Fortis solutions on the rise of human-governed AI: Building trust through intelligent infrastructure

Fortis Solutions, an enterprise technology partner with decades of experience across infrastructure, cybersecurity, and data systems, approaches artificial intelligence as a force that is redefining how work is performed while preserving the importance of hum…

Source File