Ransomware Hits Automotive Data Expert Autovista

Autovista, a company specializing in automotive data and analysis, has been subjected to a ransomware attack. The company is currently collaborating with external cybersecurity professionals to investigate the incident.

6-Year Ransomware Campaign Targets Turkish Homes & SMBs

A six-year ransomware campaign has been discovered targeting Turkish homes and small to medium-sized businesses. This campaign has likely gone unnoticed for so long due to the under-reporting of smaller incidents compared to major enterprise breaches. Attackers leverage various tactics including phishing emails and exploit kits.

New AgingFly malware used in attacks on Ukraine govt, hospitals

A new malware family called 'AgingFly' has been detected targeting Ukrainian government entities and hospitals. This malware is designed to steal authentication data from Chromium-based browsers and WhatsApp, likely to facilitate further compromise or espionage.

WordPress plugin suite hacked to push malware to thousands of sites

A suite of over 30 WordPress plugins, known as EssentialPlugin, has been compromised with malicious code. This allows attackers to gain unauthorized access to websites that use these plugins, potentially leading to further compromise or data theft.

Signed software abused to deploy antivirus-killing scripts

A digitally signed adware tool has been observed disabling antivirus protections on numerous endpoints across various critical sectors, including education, utilities, government, and healthcare. The malicious scripts ran with SYSTEM privileges, indicating a high level of access and control achieved by the attacker.

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

Threat actors are exploiting n8n, an AI workflow automation platform, to conduct phishing campaigns and deliver malware. By using n8n, attackers can bypass traditional security filters and leverage trusted infrastructure to deliver malicious payloads or fingerprint devices via automated emails.

Automotive data biz Autovista blames ransomware for service disruption

Automotive data provider Autovista has confirmed a ransomware attack is disrupting its services across Europe and Australia. The company has engaged external help to recover from the incident, and some of its customer organizations are advising their staff to block inbound emails from Autovista.

French cops free mother and son after 20-hour crypto kidnap ordeal

A mother and her ten-year-old son were held captive for approximately 20 hours during a cryptocurrency extortion scheme targeting the father. The father was forced to pay hundreds of thousands of euros to secure their release. This incident is part of a concerning trend in France involving such sophisticated criminal operations.

100 Chrome Extensions Steal User Data, Create Backdoor

Over 100 Chrome extensions have been discovered to be stealing user data and creating backdoors into compromised systems. These malicious extensions appear to be part of a coordinated campaign, utilizing shared command-and-control infrastructure across multiple publishing accounts.

Mirax RAT Targeting Android Users in Europe

The Mirax RAT is being offered as a service (MaaS) to a select group of affiliates, primarily Russian speakers. This malware can compromise Android devices, turning them into residential proxy nodes and posing a threat to users in Europe.

7 biggest healthcare security threats

The healthcare industry is experiencing a significant surge in cyberattacks, including phishing, ransomware, and web application attacks, exacerbated by the increased reliance on remote service delivery. Cybercriminals are targeting healthcare organizations for their sensitive patient and corporate data, with many providers struggling to cope due to under-resourcing and vulnerable systems.

April Patch Tuesday roundup: Zero day vulnerabilities and critical bugs

Microsoft's April Patch Tuesday addresses 167 security issues, with a particular focus on critical vulnerabilities in Windows Internet Key Exchange, Microsoft SharePoint, and a SAP SQL injection flaw. One of the most pressing is an actively exploited zero-day vulnerability in SharePoint Server (CVE-2026-32201), which allows attackers to spoof the platform and access sensitive information.

Over 100 Chrome extensions in Web Store target users accounts and data

Over 100 malicious Google Chrome extensions have been discovered in the official Chrome Web Store. These extensions are designed to steal user accounts and data, specifically targeting Google OAuth2 Bearer tokens, and also engage in ad fraud and deploy backdoors.

EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses

EDR killers, which exploit bring-your-own-vulnerable-driver (BYOVD) techniques, pose a significant challenge to endpoint detection and response systems. While difficult to counter, these attacks are not insurmountable, and enhanced defenses are required to mitigate their impact.

Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto

A fake Ledger Live application was discovered on Apple's App Store, which masqueraded as the legitimate cryptocurrency wallet software. This malicious app successfully defrauded 50 victims out of approximately $9.5 million in cryptocurrency within a short period.

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

A malware strain named JanelaRAT, a derivative of BX RAT, has been actively targeting banks in Latin America, with a significant number of attacks recorded in Brazil in 2025. This malware is designed to steal financial and cryptocurrency data, capture user inputs like mouse movements and keystrokes, take screenshots, and collect system metadata.

The silent “Storm”: New infostealer hijacks sessions, decrypts server-side

A new infostealer dubbed 'Storm' has been identified that bypasses local decryption of stolen browser data. Instead, it sends this data directly to attacker-controlled servers for decryption, enabling advanced techniques like session hijacking. This method allows attackers to effectively bypass user passwords and multi-factor authentication (MFA).

Scans for EncystPHP Webshell, (Mon, Apr 13th)

Attackers are increasingly scanning for and deploying webshells with more sophisticated defenses, such as EncystPHP. This specific webshell is noted to be popular among threat actors compromising vulnerable FreePBX systems. Defenders should be aware of these evolving tactics.

CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads

A Russian-speaking threat actor compromised CPUID, the provider of CPU-Z and HWMonitor utilities, to distribute malware. Download links were replaced to serve trojanized versions of these legitimate software tools, embedding a new malware called STX RAT.

Fake Claude Website Distributes PlugX RAT

A fake website impersonating Anthropic's Claude AI chatbot has been identified distributing the PlugX Remote Access Trojan (RAT). The malware employs DLL sideloading techniques for execution and includes functionalities to clean up its tracks after deployment.

March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day

In March 2026, there was a significant surge in high-impact vulnerabilities, with Recorded Future's Insikt Group identifying 31 critical flaws, a substantial increase from the previous month. Notably, the Interlock ransomware group is actively exploiting a zero-day vulnerability in Cisco's Firepower Management Center (FMC).

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

Threat actors compromised the CPUID website, which distributes popular hardware monitoring tools, and served trojanized versions of CPU-Z and HWMonitor. For less than 24 hours, users downloading these tools were at risk of installing the STX Remote Access Trojan (RAT). The breach lasted from April 9th to April 10th, 2024.

Hacker Unknown now known, named on Europol’s most-wanted list

German police have identified Daniil Shchukin, also known as UNKN, Unknown, GandCrab, and Revi, as the alleged leader of a major global ransomware group. Shchukin and an accomplice, Anatoly Kravchuk, have been placed on Europol's most-wanted list for their alleged involvement in widespread extortion, causing significant economic damage.

Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitor

Attackers compromised the CPUID project's API, altering download links on their official website. This allowed them to distribute malware disguised as legitimate installers for CPU-Z and HWMonitor. The compromised downloads were then distributed to users seeking legitimate system monitoring software.

CPUID site hijacked to serve malware instead of HWMonitor downloads

The CPUID website was compromised, with attackers hijacking backend systems to serve malware instead of legitimate software downloads. This six-hour breach redirected users seeking tools like HWMonitor to malicious files, including credential stealers.

Obfuscated JavaScript or Nothing, (Thu, Apr 9th)

A phishing email contained a RAR archive with a JavaScript file named 'cbmjlzan.JS'. This file has a SHA256 hash of a8ba9ba93b4509a86e3d7dd40fd0652c2743e32277760c5f7942b788b74c5285 and is only detected as malicious by 15 out of many antivirus engines on VirusTotal.

Hackers have been exploiting an unpatched Adobe Reader vulnerability for months

A security researcher discovered that a vulnerability in Adobe Reader has been actively exploited by malware for at least four months. This exploit collects system information to aid attackers in future data theft and malicious activities, and it remains effective even on the latest Adobe Reader versions.

Healthcare IT solutions provider ChipSoft hit by ransomware attack

Dutch healthcare software vendor ChipSoft has been targeted by a ransomware attack, leading to the shutdown of its website and digital patient services. The attack has disrupted access for healthcare providers and patients relying on ChipSoft's solutions. The extent of the data breach and the specific ransomware group responsible are still under investigation.

Crypto? Huh. Good gawd y'all, what is it good for? $45M in this case

Law enforcement agencies from the US, UK, and Canada have disrupted a global cryptocurrency scam worth $45 million. They have frozen $12 million in stolen funds and identified over 20,000 cryptocurrency wallet addresses linked to victims in 30 countries.

Months-old Adobe Reader zero-day uses PDFs to size up targets

Malicious PDFs are being used to exploit a suspected zero-day vulnerability in Adobe Acrobat Reader. These PDFs profile targets by harvesting system data, determining which victims are most valuable for further compromise and deployment of second-stage payloads.

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

This article highlights a variety of cybersecurity threats, including a hybrid P2P botnet and a 13-year-old Remote Code Execution (RCE) vulnerability in Apache. It points out how older vulnerabilities are being exploited and how attackers are leveraging trusted platforms and tools. The bulletin emphasizes a trend of quiet escalations rather than high-profile zero-days.

New ClickFix variant bypasses Apple safeguards with one‑click script execution

A new variant of ClickFix malware for macOS bypasses security measures by using a single click to execute malicious scripts via the applescript:// URL scheme, launching the native Script Editor. This method circumvents recent Apple protections that scan commands pasted into Terminal, streamlining the infection chain and delivering the Atomic Stealer payload.

Hackers use pixel-large SVG trick to hide credit card stealer

Hackers are exploiting a vulnerability in nearly 100 online stores using the Magento e-commerce platform to steal credit card information. They are hiding malicious code within a tiny, pixel-sized SVG image, making it difficult for security measures to detect. This allows them to steal sensitive financial data from unsuspecting customers.

Criminal wannabes even more dangerous than the pros, says ex-FBI cyber chief

An ex-FBI cyber chief, Cynthia Kaiser, now at Halcyon Ransomware Research Center, states that amateur criminals pose a greater threat than professional ones. This is because their lack of skill can lead to data being permanently lost as they may not be able to decrypt it even if ransomed.

New macOS stealer campaign uses Script Editor in ClickFix attack

A new campaign is targeting macOS users with the Atomic Stealer malware by employing a refined version of the ClickFix attack. This attack tricks users into executing commands within the Terminal application, leveraging macOS's Script Editor to achieve its malicious goals.

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

The Russian state-sponsored hacking group APT28 has launched a new spear-phishing campaign targeting Ukraine and NATO allies. This campaign is distributing a newly discovered malware suite called PRISMEX, which utilizes advanced techniques like steganography, COM hijacking, and cloud service abuse for its command and control infrastructure.

Evasive Masjesu DDoS Botnet Targets IoT Devices

A new DDoS botnet named Masjesu has been identified, specifically targeting Internet of Things (IoT) devices. This botnet is designed for evasion, focusing on persistence rather than rapid, widespread infection. It actively avoids blacklisted IP addresses and critical infrastructure to maintain its operational stealth.