Cybersecurity News

Live Security News

Real-time disclosures, zero-day alerts, and threat intelligence filtered for security leaders.

Featured image for: Hasbro has been hacked, and the maker of Peppa Pig says recovery could take weeks
The Next Web
Apr 1, 2026

Hasbro has been hacked, and the maker of Peppa Pig says recovery could take weeks

Somewhere in Hasbro’s network, someone was where they should not have been. The $14.4 billion toy and entertainment conglomerate, owner of Peppa Pig, Transformers, Monopoly, Dungeons & Dragons, Nerf, Play-Doh, and Power Rangers ,disclosed on Wednesday that it…

Source File
Featured image for: WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch
TechCrunch
Apr 1, 2026

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

The Meta-owned company said it identified around 200 users who were tricked into installing a fake version of WhatsApp that was actually Italian-made spyware.

Source File
Featured image for: Gigabyte warns users Control Center flaw could let hackers hijack your files
TechRadar
Apr 1, 2026

Gigabyte warns users Control Center flaw could let hackers hijack your files

A Windows utility tool was found vulnerable to a critical flaw that enabled RCE, DoS, and other risks.

Source File
Featured image for: 'What if the AI agent you just deployed was secretly working against you?': Vertex AI 'double agent' flaw exposes customer data and Google's internal code
TechRadar
Apr 1, 2026

'What if the AI agent you just deployed was secretly working against you?': Vertex AI 'double agent' flaw exposes customer data and Google's internal code

Misconfigured AI agents can lead to data disclosure and other risks.

Source File
Featured image for: Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch
TechCrunch
Apr 1, 2026

Hasbro says it was hacked, and may take 'several weeks' to recover | TechCrunch

The American toymaking giant noted that it was continuing to "implement measures to secure its business operations," suggesting that the hackers may still be in the company's systems.

Source File
Featured image for: Looking for a job? It could be a scam — NordVPN uncovers phishing campaign impersonating top brands' recruiters
TechRadar
Apr 1, 2026

Looking for a job? It could be a scam — NordVPN uncovers phishing campaign impersonating top brands' recruiters

Cybercriminals are impersonating top brands like Meta, Disney, and Spotify in a highly sophisticated new phishing campaign designed to hijack your Facebook account. Here is everything you need to know to stay safe.

Source File
Featured image for: Why NIST’s AI agent standards initiative is a turning point for enterprise security
TechRadar
Apr 1, 2026

Why NIST’s AI agent standards initiative is a turning point for enterprise security

The launch of NIST’s AI Agent Standards Initiative marks a pivotal moment in AI cybersecurity.

Source File
Featured image for: 'Hundreds of thousands of stolen secrets could potentially be circulating as a result of these recent attacks': Google says North Korean hackers behind major attack on Axios
TechRadar
Apr 1, 2026

'Hundreds of thousands of stolen secrets could potentially be circulating as a result of these recent attacks': Google says North Korean hackers behind major attack on Axios

North Korean hackers used an updated version of a known backdoor to target a popular npm package.

Source File
Featured image for: Routine Access Is Powering Modern Intrusions, a New Threat Report Finds
BleepingComputer
Apr 1, 2026

Routine Access Is Powering Modern Intrusions, a New Threat Report Finds

Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents. [...]

Source File
Featured image for: Why is OpenClaw so popular in China?
TechRadar
Apr 1, 2026

Why is OpenClaw so popular in China?

OpenClaw has gone viral in China in a way it hasn't elsewhere. Government subsidies, cheap local AI, and widespread job anxiety all help explain why.

Source File
Featured image for: Anthropic confirms it leaked 512,000 lines of Claude Code source code — spilling some of its biggest secrets
TechRadar
Apr 1, 2026

Anthropic confirms it leaked 512,000 lines of Claude Code source code — spilling some of its biggest secrets

Claude Code's entire source code has been leaked and the internet is up in arms.

Source File
Featured image for: Here are the OpenClaw security risks you should know about
TechRadar
Apr 1, 2026

Here are the OpenClaw security risks you should know about

OpenClaw can browse the web, run shell commands, and send emails on your behalf, but it comes with documented security risks that every user should understand before deploying it.

Source File