Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Attackers are leveraging a Mirai botnet variant called Nexcorium to compromise TBK DVRs and end-of-life TP-Link Wi-Fi routers. The campaign specifically exploits CVE-2024-3721, a command injection vulnerability in TBK DVRs, to enlist these devices into a distributed denial-of-service (DDoS) botnet.

Critical sandbox bypass fixed in popular Thymeleaf Java template engine

Maintainers of the Thymeleaf Java template engine have released a critical fix for a Server-Side Template Injection (SSTI) vulnerability, tracked as CVE-2026-40478. This flaw allows unauthenticated attackers to bypass sandbox protections and execute malicious code on servers by injecting crafted input into the template engine. The vulnerability impacts all Thymeleaf versions prior to 3.1.4.RELEASE, and due to the widespread use of Thymeleaf in the Java Spring ecosystem, a significant number of enterprise applications could be affected.

Flawed Cisco update threatens to stop APs from getting further patches

A flawed Cisco software update has introduced a critical vulnerability in over 200 Cisco IOS XE wireless access point models. This flaw causes a log file to grow rapidly, consuming flash memory and preventing further software updates, potentially rendering the devices insecure or bricked.

How NIST's Cutback of CVE Handling Impacts Cyber Teams

NIST is reducing its enrichment of CVE data, leading industry groups and ad hoc coalitions to step in and fill the void. This shift means that organizations will rely more on these external groups for detailed information about vulnerabilities. The move may create a more fragmented approach to vulnerability management if not handled carefully.

Payouts King ransomware uses QEMU VMs to bypass endpoint security

The Payouts King ransomware group is employing a novel technique by using QEMU virtual machines as a reverse SSH backdoor. This allows them to operate hidden VMs on compromised systems, effectively evading detection by endpoint security solutions.

Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

Cybercriminals are shifting their tactics from traditional 2FA phishing to a more sophisticated method known as device code phishing. This new technique exploits a service's legitimate new-device login flow to trick victims into inadvertently providing their account access credentials.

Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker

Journalists were able to track the location of a Dutch navy frigate by mailing a Bluetooth tracker to the vessel. This incident highlights an operational security (opsec) lapse, despite significant military investment in security training and policies. The tracker was reportedly purchased for a nominal sum.

Grinex exchange blames "Western intelligence" for $13.7M crypto hack

Kyrgyzstan-based cryptocurrency exchange Grinex has suspended operations following a $13.7 million hack. The exchange has attributed the attack to Western intelligence agencies. This incident highlights ongoing risks in the cryptocurrency space, particularly concerning the potential for state-sponsored attacks.

Every Old Vulnerability Is Now an AI Vulnerability

Artificial intelligence is not creating novel software vulnerabilities but is instead making existing ones more exploitable and dangerous. AI tools can be used by attackers to quickly discover and weaponize known flaws in legacy systems and software.

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Threat actors are actively exploiting three zero-day vulnerabilities in Microsoft Defender, identified as BlueHammer, RedSun, and UnDefend. These flaws allow attackers to gain elevated privileges within compromised systems, with two of the vulnerabilities remaining unpatched.

White House moves to give federal agencies access to Anthropic’s Claude Mythos

The White House is preparing to grant federal agencies access to a modified version of Anthropic's Claude Mythos AI model. This move aims to leverage the AI's capabilities for identifying cybersecurity vulnerabilities, despite ongoing supply-chain risk designations against Anthropic by the Department of Defense.

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

This article highlights several distinct cybersecurity-related news items. These include the passage of the Satellite Cybersecurity Act, a $90,000 reward offered for a Chrome browser vulnerability, and the arrest of a teenage hacker. Other mentions cover ShinyHunters targeting Rockstar Games, an exploited ShowDoc vulnerability, and the EPA increasing its cybersecurity budget.

Caught, Quarantined, Re-installed: RedSun turns Microsoft Defender on itself

A new proof-of-concept exploit named 'RedSun' has been disclosed, which abuses Microsoft Defender's handling of cloud-tagged files to escalate privileges. The exploit leverages a flaw where Defender attempts to restore rather than delete certain flagged files, allowing attackers to overwrite system files and gain SYSTEM-level privileges.

Mythos and Cybersecurity

Anthropic has developed Claude Mythos Preview, an AI model capable of identifying and exploiting software vulnerabilities. Due to its power, Anthropic has restricted access to a limited number of organizations under Project Glasswing, rather than releasing it publicly.

Another DraftKings Hacker Sentenced to Prison

Kamerin Stokes, involved in the DraftKings data breach, has been sentenced to prison. He continued to sell stolen credentials on an online marketplace even after pleading guilty to his role in the attack.

Recent Apache ActiveMQ Vulnerability Exploited in the Wild

A remote code execution vulnerability in Apache ActiveMQ, identified as CVE-2026-34197, has been actively exploited in the wild. This vulnerability became publicly known in early April. The article highlights the ongoing exploitation of this specific flaw.

Voter Disenfranchisement: A Privacy Issue

The article discusses how certain electoral systems and voter registration processes can lead to voter disenfranchisement, which is framed as a privacy issue. It highlights concerns about data accuracy, access to information, and potential manipulation within these systems.

Two North Korean IT Worker Scheme Facilitators Jailed in the US

Two individuals have been sentenced in the US for their roles in a scheme that facilitated North Korean IT workers obtaining employment at numerous US companies. The facilitators misused the identities of dozens of US citizens to help these North Korean workers secure these positions.

ZionSiphon Malware Targets ICS in Water Facilities

A new malware strain named ZionSiphon has been identified, specifically targeting Industrial Control Systems (ICS) within Israeli water treatment and desalination facilities. This malware is configured to operate on systems critical to the operation of these essential services.

Microsoft: Some Windows servers enter reboot loops after April patches

Microsoft has issued a warning that some Windows domain controllers are experiencing unexpected reboot loops following the installation of the April 2026 security updates. The issue appears to be affecting specific configurations, and Microsoft is actively investigating a resolution. Users are advised to hold off on applying these updates until further guidance is provided.

Cursor AI Vulnerability Exposed Developer Devices

A vulnerability in Cursor AI could allow attackers to gain shell access to developer machines. This was achieved by chaining an indirect prompt injection with a sandbox bypass and Cursor's remote tunnel feature.

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

NIST is limiting the enrichment of CVEs in its National Vulnerability Database (NVD) due to a 263% surge in submissions. Only CVEs meeting specific criteria will receive detailed analysis, while others will be listed without enrichment. This change aims to manage the overwhelming volume of vulnerability data.

Claude Opus wrote a Chrome exploit for $2,283

The article reports that Anthropic's advanced AI model, Claude Opus, was used to generate a Chrome exploit, which was then sold on a dark web forum for $2,283. This incident highlights concerns about AI models being used by malicious actors to discover and weaponize zero-day vulnerabilities.

Recently leaked Windows zero-days now exploited in attacks

Threat actors are actively exploiting three recently disclosed Windows zero-day vulnerabilities in live attacks. These exploits are being used to gain SYSTEM or elevated administrator privileges on compromised systems. The vulnerabilities allow for privilege escalation, a critical step in many attack chains.

Risky Bulletin: NIST gives up enriching most CVEs

NIST has announced it will no longer enrich most CVE (Common Vulnerabilities and Exposures) data, significantly reducing the descriptive information available for many security flaws. This decision aims to reduce processing costs and expedite the release of CVE data. The change could impact automated security tools and analysts who rely on this enriched data for threat prioritization.

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

A high-severity vulnerability in Apache ActiveMQ Classic, CVE-2026-34197, has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog due to active exploitation. This mandates federal agencies to patch the flaw, highlighting its immediate and significant threat.

Lumma Stealer infection with Sectop RAT (ArechClient2), (Fri, Apr 17th)

The SANS Internet Storm Center is reporting a new infection chain involving Lumma Stealer and the Sectop RAT, also known as ArechClient2. This sophisticated attack leverages Lumma Stealer to compromise systems and then deploys the Sectop RAT to maintain persistence and potentially steal further information.

Anthropic won't own MCP 'design flaw' putting 200K servers at risk, researcher says

A design flaw in Anthropic's Model Context Protocol (MCP) could expose up to 200,000 servers to complete takeover, according to security researchers. Anthropic, however, argues that the behavior is an intended feature stemming from a poor design choice. This disagreement highlights potential security risks in widely adopted AI protocols.

RCE by design: MCP architectural choice haunts AI agent ecosystem

An architectural choice in Anthropic's reference implementation of the Model Context Protocol (MCP) may expose AI agent systems to remote code execution. Unsafe defaults in how MCP configurations are handled over the STDIO interface have allowed researchers to execute commands on real company services and thousands of open-source projects.

ZionSiphon malware designed to sabotage water treatment systems

A new malware named ZionSiphon has been identified, specifically designed to target operational technology within water treatment and desalination facilities. Its primary objective is to disrupt and sabotage the critical operations of these systems.

NIST cuts down CVE analysis amid vulnerability overload

NIST is changing how it handles CVEs due to an overwhelming volume of submissions, leading to a significant backlog. The agency will now prioritize enriching CVEs in CISA's Known Exploited Vulnerabilities catalog and those related to federal government software and critical software.

Stop New York's Attack on 3D Printing

New York's proposed budget includes provisions mandating censorware on all 3D printers sold in the state, which would surveil prints for forbidden designs and create felony charges for possessing or sharing certain design files. Experts argue this algorithmic print blocking is unfeasible and will stifle innovation, free expression, and privacy.

North Korea Uses ClickFix to Target macOS Users' Data

North Korean threat actors, under the guise of Sapphire Sleet, are targeting macOS users with a malware called ClickFix. This attack leverages deceptive tactics, such as fake job offers and phony Zoom updates, to trick users into downloading the malware. ClickFix is designed to steal credentials and sensitive data from compromised Mac devices.

'Harmless' Global Adware Transforms Into an AV Killer

A previously benign adware campaign, Dragon Boss, has evolved to become a significant threat by incorporating capabilities to evade Windows Defender. The update, released in March 2025, establishes persistence through scheduled tasks and manipulates system settings to exclude future malicious payloads from antivirus detection.

North Korea targets macOS users in latest heist

North Korean threat actors are targeting macOS users with a new campaign that employs social engineering and a fake Zoom software update. The malware is designed to steal user credentials and cryptocurrency, leveraging a technique that requires manual execution by the victim.

How Push Notifications Can Betray Your Privacy (and What to Do About It)

Push notifications on smartphones can reveal sensitive information, as both Apple and Google require judicial orders to share this data with law enforcement. Forensic tools can even recover deleted notification content, including from secure messaging apps. The article outlines how notifications can be a privacy risk at the transmission stage (via cloud servers) and on the device itself.