New ATHR vishing platform uses AI voice agents for automated attacks

A new cybercrime platform named ATHR has been discovered that leverages AI-powered voice agents to conduct fully automated vishing attacks. These attacks aim to harvest user credentials by combining AI and human operators for social engineering.

[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

The article highlights that in 2024, unmanaged non-human identities, such as compromised service accounts and forgotten API keys, were the primary cause of cloud breaches (68%), overshadowing phishing and weak passwords. It emphasizes the vast number of automated credentials (40-50 per employee) that often go unmonitored after projects end or employees depart.

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

A Taboola pixel, approved by a bank, secretly redirected logged-in banking users to a Temu tracking endpoint. This occurred without the bank's knowledge, user consent, or triggering any security alerts. The issue highlights a "First-Hop Bias" blind spot where initial approvals bypass deeper security scrutiny.

US nationals behind DPRK IT worker 'laptop farm' sent to prison

Two U.S. nationals have been sentenced to prison for facilitating North Korean IT workers to gain employment with over 100 U.S. companies by falsely posing as American residents. This operation allowed North Korea to circumvent sanctions and generate revenue through its IT sector. The individuals involved face significant prison sentences for their roles in this scheme.

6-Year Ransomware Campaign Targets Turkish Homes & SMBs

A six-year ransomware campaign has been discovered targeting Turkish homes and small to medium-sized businesses. This campaign has likely gone unnoticed for so long due to the under-reporting of smaller incidents compared to major enterprise breaches. Attackers leverage various tactics including phishing emails and exploit kits.

New AgingFly malware used in attacks on Ukraine govt, hospitals

A new malware family called 'AgingFly' has been detected targeting Ukrainian government entities and hospitals. This malware is designed to steal authentication data from Chromium-based browsers and WhatsApp, likely to facilitate further compromise or espionage.

CISA flags Windows Task Host vulnerability as exploited in attacks

CISA has issued a warning to U.S. government agencies regarding a Windows Task Host vulnerability that can be exploited for privilege escalation. Successful exploitation allows attackers to gain SYSTEM privileges on affected systems, posing a significant security risk.

French cops free mother and son after 20-hour crypto kidnap ordeal

A mother and her ten-year-old son were held captive for approximately 20 hours during a cryptocurrency extortion scheme targeting the father. The father was forced to pay hundreds of thousands of euros to secure their release. This incident is part of a concerning trend in France involving such sophisticated criminal operations.

Mirax RAT Targeting Android Users in Europe

The Mirax RAT is being offered as a service (MaaS) to a select group of affiliates, primarily Russian speakers. This malware can compromise Android devices, turning them into residential proxy nodes and posing a threat to users in Europe.

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

Security researchers discovered that a cheap $10 domain name registration could have inadvertently given attackers access to a large number of endpoints, potentially including critical operational technology (OT) and government networks. The identified adware was also capable of disabling existing cybersecurity defenses to facilitate further malicious activity.

Scanning for AI Models, (Tue, Apr 14th)

Starting March 10, 2026, DShield sensors began detecting probes targeting various AI models like Claude, OpenClaw, and Hugging Face. This activity has been consistently observed in the DShield database since its inception.

Your Supply Chain Breach Is Someone Else's Payday

TeamPCP has been observed conducting supply chain attacks by compromising legitimate software tools. Their objective is to steal credentials for various malicious activities, including payroll fraud, theft of logistics information, and ransomware operations.

Microsoft's massive Patch Tuesday: It's raining bugs

Microsoft's April Patch Tuesday addresses a significant number of vulnerabilities, including one actively exploited SharePoint Server spoofing flaw and another disclosed by a researcher. A total of 163 bugs were patched across various Microsoft products.

Wargame Exercise Demonstrates How Social Media Manipulation Works

A wargame exercise named "Capture the Narrative" simulated social media manipulation by having students create bots to influence a fictional election. This exercise aimed to educate participants on how influence operations can be carried out in real-world political contexts.

China-linked cloud credential heist runs on typos and SMTP

China-linked APT41 (Winnti) group is using a Linux-based backdoor to steal cloud credentials from major cloud providers like AWS, GCP, Azure, and Alibaba Cloud. The malware employs SMTP port 25 for covert command and control and uses typosquatted domains for exfiltration.

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities, CVE-2009-0238 and CVE-2026-32201, to its Known Exploited Vulnerabilities (KEV) Catalog due to evidence of their active exploitation. These vulnerabilities represent significant risks and frequent attack vectors for cyber actors. Federal agencies are required to remediate these, and all organizations are strongly urged to prioritize them in their vulnerability management.

Triad Nexus Evades Sanctions to Fuel Cybercrime

A cybercrime operation named Triad Nexus is successfully evading sanctions and takedowns by exploiting major service providers. This allows them to continue their illicit activities and distance themselves from international restrictions.

How Hackers Are Thinking About AI

A study analyzing cybercrime forum conversations reveals how cybercriminals perceive and discuss the exploitation of AI. While expressing curiosity about AI's criminal applications, they also harbor doubts about its effectiveness and impact on their operations, with documented attempts to misuse legitimate AI tools and develop bespoke criminal models.

Cyber-Inspekteur: Hybride Attacken nehmen weiter zu

Hybrid attacks targeting critical infrastructure in Germany and deployed Bundeswehr troops abroad have significantly increased since 2022, according to Vizeadmiral Thomas Daum, Inspector of Cyber and Information Space of the German Armed Forces. These attacks, attributed to state-sponsored actors from Russia, China, Iran, and North Korea, include cyber intrusions, disinformation campaigns, and physical sabotage attempts, as observed during the NATO cyber defense exercise 'Locked Shields'.

FBI takedown of W3LL phishing service leads to developer arrest

The FBI, in collaboration with Indonesian authorities, has dismantled the W3LL global phishing platform and arrested its alleged developer. This operation marks the first coordinated enforcement action between the US and Indonesia against a phishing kit developer, leading to the seizure of significant infrastructure.

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

A malware strain named JanelaRAT, a derivative of BX RAT, has been actively targeting banks in Latin America, with a significant number of attacks recorded in Brazil in 2025. This malware is designed to steal financial and cryptocurrency data, capture user inputs like mouse movements and keystrokes, take screenshots, and collect system metadata.

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials

The China-linked APT41 threat group has been observed deploying a new backdoor designed to evade detection, specifically targeting cloud environments like AWS, Google Cloud, Azure, and Alibaba Cloud. This backdoor aims to harvest cloud credentials, and the group is employing typosquatting techniques to mask its command and control (C2) communications.

Booking.com Says Hackers Accessed User Information

Booking.com has reported that hackers gained access to user information. The company stated that the issue has since been contained, but did not specify the number of customers affected.

Scans for EncystPHP Webshell, (Mon, Apr 13th)

Attackers are increasingly scanning for and deploying webshells with more sophisticated defenses, such as EncystPHP. This specific webshell is noted to be popular among threat actors compromising vulnerable FreePBX systems. Defenders should be aware of these evolving tactics.

OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack

OpenAI has confirmed it was impacted by a supply chain hack linked to North Korea, involving the Axios platform. The breach may have resulted in the compromise of a macOS code signing certificate, raising concerns about the integrity of software distributed by OpenAI.

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, indicating they are actively being exploited by malicious actors. These vulnerabilities affect various software like Microsoft products, Adobe Acrobat, and Fortinet. The KEV Catalog helps organizations prioritize remediation efforts to mitigate risks.

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

An international law enforcement operation involving the US, UK, and Canada has successfully disrupted multimillion-dollar cryptocurrency theft schemes. The operation resulted in the identification of over $45 million in stolen cryptocurrency and the freezing of $12 million.

CPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads

A Russian-speaking threat actor compromised CPUID, the provider of CPU-Z and HWMonitor utilities, to distribute malware. Download links were replaced to serve trojanized versions of these legitimate software tools, embedding a new malware called STX RAT.