HackMyIP

Cybersecurity News

Latest updates from top security sources

2026-05-11The Hacker News
TeamPCP Hacks Checkmarx Jenkins Plugin: Supply Chain Attack Alert

Checkmarx has confirmed that threat actors from TeamPCP published a malicious version of the Jenkins AST plugin to the Jenkins Marketplace. The compromised version, 2.0.13-829.vc72...

Supply ChainMalwareAPT
Read More → Use Tool →
2026-05-11The Hacker News
cPanel CVE-2026-41940 Under Active Exploitation - Filemanager Backdoor

Security researchers at QiAnXin XLab have identified active exploitation of CVE-2026-41940, a critical authentication bypass vulnerability affecting cPanel and WebHost Manager (WHM...

VulnerabilityMalwareAPT
Read More → Use Tool →
2026-05-11SecurityWeek
Operation HookedWing: 500+ Orgs Hit in 4-Year Phishing Campaign

A sophisticated phishing operation dubbed "Operation HookedWing" has been systematically targeting organizations across critical sectors for over four years, according to threat in...

PhishingAPTData Breach
Read More → Use Tool →
2026-05-08SecurityWeek
Ivanti Releases Patch for EPMM Zero‑Day CVE‑2026‑6973 Exploited in Attacks

Ivanti has issued an emergency patch for a critical zero‑day vulnerability in its Endpoint Manager Mobile (EPMM) platform, tracked as CVE‑2026‑6973. The flaw, rated 9.1 on the CVSS...

Zero-DayVulnerabilityAPT
Read More → Use Tool →
2026-05-08The Record
Pro-Ukraine BO Team, Head Mare Hackers Collaborate on Russian Attacks

Kaspersky researchers have uncovered a convergence between the pro‑Ukraine hacktivist group BO Team and the advanced threat actor Head Mare, revealing that the two have begun shari...

APTThreat IntelMalware
Read More → Use Tool →
2026-05-08The Hacker News
Quasar Linux RAT Steals Dev Credentials for Supply Chain Attacks

Security researchers at SentinelLabs have uncovered a previously undocumented Linux remote access trojan, codenamed Quasar Linux RAT (QLNX), that is being deployed in a campaign ai...

MalwareSupply ChainAPT
Read More → Use Tool →
2026-05-08Dark Reading
ShinyHunters Claims Second Instructure Breach: 300M+ Users Exposed

ShinyHunters, the notorious threat group behind a string of high‑profile data thefts, announced on March 5 that it had executed a second intrusion into Instructure, the education‑t...

Data BreachAPTPrivacy
Read More → Use Tool →
2026-05-07SecurityWeek
Palo Alto Zero-Day Exploited in Chinese State Hacking Campaign

Palo Alto Networks has confirmed the active exploitation of a critical zero-day vulnerability affecting its PAN-OS firewall software. The flaw, tracked as CVE-2024-3400 and rated c...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-05-07The Hacker News
PAN-OS RCE Flaw Under Active Exploitation; Root Access & Espionage Threat

Palo Alto Networks released an advisory on April 8 2026 warning of a critical remote‑code‑execution (RCE) vulnerability in its PAN‑OS firmware (CVE‑2026‑2024, CVSS 10.0). The flaw ...

Zero-DayVulnerabilityAPT
Read More → Use Tool →
2026-05-07BleepingComputer
US Sentenced for Laptop Farms Used by North Korean Remote IT Workers

Two U.S. nationals were sentenced to 18 months in federal prison each for managing laptop farms that facilitated North Korean IT workers in securing remote positions at nearly 70 A...

APTSupply ChainPrivacy
Read More → Use Tool →
2026-05-07BleepingComputer
Critical Palo Alto Networks Zero-Day Exploited for Nearly a Month

Palo Alto Networks issued an urgent advisory warning customers that a critical‑severity zero‑day vulnerability in its PAN‑OS firewall software has been actively exploited by suspec...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-05-06The Hacker News
MuddyWater APT Uses Microsoft Teams in Credential Theft Attack

The Iranian state-sponsored threat actor MuddyWater, also tracked as Mango Sandstorm, Seedworm, and Static Kitten, has been linked to a sophisticated cyberattack that leveraged Mic...

APTPhishingRansomware
Read More → Use Tool →
2026-05-06The Hacker News
CloudZ RAT Exploits Windows Phone Link to Steal Credentials and OTPs

Security analysts have uncovered a sophisticated intrusion campaign leveraging the CloudZ remote access trojan (RAT) alongside a previously undocumented plugin called Pheno to targ...

MalwareAPTAuthentication
Read More → Use Tool →
2026-05-06Dark Reading
UAE Cyberattacks Triple, Critical Infrastructure at Risk

As the conflict with Iran intensifies, cyber operatives have turned their focus on the United Arab Emirates, with breach attempts spiking threefold over the past few weeks. Securit...

APTVulnerability
Read More → Use Tool →
2026-05-06BleepingComputer
MuddyWater Deploys Chaos Ransomware Decoy Using Microsoft Teams

MuddyWater, the Iranian advanced persistent threat (APT) group also tracked as Static Kitten, has been observed disguising its espionage operations behind a non‑functional Chaos ra...

APTRansomwarePhishing
Read More → Use Tool →
2026-05-05The Hacker News
China-Linked UAT-8302 Hits South America Governments with Shared APT Malware

Security researchers have linked a newly tracked China‑nexus threat cluster, designated UAT‑8302, to a wave of cyber‑espionage operations targeting government agencies in South Ame...

APTMalwareThreat Intel
Read More → Use Tool →
2026-05-05The Hacker News
ScarCruft Supply Chain Attack Injects BirdCall Malware into Gaming Platform

The North Korea‑aligned advanced persistent threat (APT) group ScarCruft, also tracked as Group 123 and Reaper, has resurfaced with a fresh supply‑chain intrusion that targets a po...

APTSupply ChainMalware
Read More → Use Tool →
2026-05-05The Hacker News
Microsoft Exposes Credential Theft Phishing Targeting 35K Users in 26 Countries

Microsoft’s Threat Intelligence Center (MSTIC) has released details of a large‑scale credential‑harvesting operation that successfully targeted roughly 35,000 users in 26 countries...

PhishingThreat IntelAPT
Read More → Use Tool →
2026-05-05BleepingComputer
New Quasar Linux Malware Targets Developers with Rootkit and Backdoor Features

Security researchers have uncovered a previously undocumented Linux implant, dubbed Quasar Linux (QLNX), that is actively targeting software developers. Discovered during an invest...

MalwareAPTSupply Chain
Read More → Use Tool →
2026-05-05BleepingComputer
ScarCruft APT37 Deploys BirdCall Android Malware via Game Platform

The North Korean threat group APT37, also tracked as ScarCruft, has been observed delivering an Android variant of its BirdCall backdoor through a supply‑chain compromise of a popu...

Supply ChainAPTMalware
Read More → Use Tool →
2026-05-04The Hacker News
Silver Fox ABCDoor Malware Hits India, Russia via Tax Phishing

The China-based advanced persistent threat (APT) group Silver Fox, also tracked as Monarch, SwimSnake, The Great Thief of Valley, UTG-Q-1000, and Void Arachne, has launched a sophi...

APTPhishingMalware
Read More → Use Tool →
2026-05-04The Hacker News
cPanel Zero-Day Exploit Targets Gov, MSP Networks

Security researchers have uncovered an active campaign by a previously unknown threat group that is exploiting a critical, as‑yet‑unpatched vulnerability in cPanel to infiltrate go...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-05-04Dark Reading
Cybercriminal Syndicates Exploit Supply Chain to Boost Physical Cargo Theft

Physical cargo theft is no longer the domain of opportunistic street gangs; it has morphed into a high‑tech enterprise orchestrated by transnational cybercriminal syndicates. Accor...

Supply ChainAPTThreat Intel
Read More → Use Tool →
2026-05-04Dark Reading
Silver Fox APT Targets India, Russia with Tax-Themed ABCDoor Attacks

Security researchers have uncovered a sophisticated campaign by the China-backed advanced persistent threat (APT) group Silver Fox, targeting organizations in India and Russia with...

APTMalwarePhishing
Read More → Use Tool →
2026-05-01The Hacker News
Vietnamese Hackers Hijack 30K Facebook Accounts via Google AppSheet Phishing

A newly uncovered Vietnamese‑linked phishing campaign has compromised roughly 30,000 Facebook accounts by abusing Google’s low‑code AppSheet platform as a covert relay. Researchers...

PhishingData BreachAPT
Read More → Use Tool →
2026-05-01The Hacker News
China-Linked Hackers Target Asian Governments, NATO State, Activists

Cybersecurity researchers have uncovered a sophisticated espionage operation linked to Chinese state actors, targeting a broad spectrum of victims across Asia and a NATO member sta...

APTThreat IntelMalware
Read More → Use Tool →
2026-05-01Dark Reading
North Korean APTs Dominate 2026 Crypto Theft, AI in the Mix

North Korean advanced persistent threat (APT) groups have consolidated their dominance over the cryptocurrency threat landscape in 2026, accounting for an estimated 76 % of all dig...

APTAI ThreatsThreat Intel
Read More → Use Tool →
2026-04-30The Hacker News
EtherRAT Spoofs Admin Tools via GitHub in Supply Chain Attack

Atos Threat Research Center (TRC) uncovered in March 2026 a highly resilient malicious operation that distributes a remote‑access trojan called EtherRAT. The campaign abuses GitHub...

MalwareSupply ChainAPT
Read More → Use Tool →
2026-04-29Dark Reading
Lotus Wiper Malware Targets Venezuelan Energy and Utilities

A coordinated cyberattack leveraging a newly identified wiper malware, named Lotus Wiper, has struck several energy companies and utility providers in Venezuela, according to a rep...

MalwareAPT
Read More → Use Tool →
2026-04-29The Hacker News
North Korean Hackers Deploy AI-Embedded npm Malware & RATs

Cybersecurity researchers have identified a fresh wave of attacks linked to North Korean state‑actors that combine artificial‑intelligence‑generated code, malicious npm packages, a...

Supply ChainMalwareAPT
Read More → Use Tool →
2026-04-28Dark Reading
BlueNoroff Leverages Fake Zoom Calls, Deepfakes to Target Crypto Execs

BlueNoroff, the North Korean threat group tracked as an advanced persistent threat (APT), has refined its attack playbook by weaponizing fake Zoom calls to snare cryptocurrency exe...

APTDeepfakeAI Threats
Read More → Use Tool →
2026-04-28Dark Reading
Feuding Ransomware Groups 0APT and KryBit Expose Each Other's Operations

The ransomware ecosystem was rocked in early 2026 when two prominent ransomware‑as‑a‑service (RaaS) operations, 0APT and KryBit, turned on each other, spilling a treasure trove of ...

RansomwareAPTThreat Intel
Read More → Use Tool →
2026-04-28The Hacker News
China's Silk Typhoon Hacker Extradited to US Over COVID Research Cyberattacks

A Chinese national linked to the Silk Typhoon advanced persistent threat (APT) group has been handed over to U.S. authorities after being arrested in Italy in July 2025. Xu Zewei, ...

APTThreat IntelIncident Response
Read More → Use Tool →
2026-04-27Dark Reading
UNC6692 APT Deploys Snow Malware via Microsoft Teams, AWS S3

Cybersecurity researchers have identified a sophisticated campaign conducted by the threat actor UNC6692, who is combining social engineering, custom malware, and cloud infrastruct...

APTMalwareCloud Security
Read More → Use Tool →
2026-04-27Dark Reading
Fast16: 20-Year-Old Malware That Predates Stuxnet Found

Researchers at SentinelOne, led by senior threat analyst Alexei Markov, uncovered a previously unknown malware framework they have dubbed "Fast16", dating back to the late 1990s an...

MalwareAPTThreat Intel
Read More → Use Tool →
2026-04-27The Hacker News
PhantomCore Exploits TrueConf Flaws to Target Russian Networks

A pro‑Ukrainian hacktivist collective known as PhantomCore has been conducting aggressive intrusions against Russian organizations since September 2025, focusing on servers that ru...

VulnerabilityAPTThreat Intel
Read More → Use Tool →
2026-04-25The Hacker News
Pre-Stuxnet 'fast16' Lua Malware Found Targeting Engineering Software

Security researchers at Trend Micro have uncovered a previously unknown Lua‑based malicious framework, dubbed "fast16", that was created several years before the infamous Stuxnet w...

MalwareAPT
Read More → Use Tool →
2026-04-24Dark Reading
North Korea's Lazarus Targets macOS Users via ClickFix

Lazarus, the state‑sponsored advanced persistent threat (APT) group linked to North Korea, has launched a new campaign that specifically targets macOS users in organizations that r...

APTMalwarePhishing
Read More → Use Tool →
2026-04-24Dark Reading
Tropic Trooper APT Targets Home Routers and Japanese Entities

Tropic Trooper, the Chinese state‑sponsored threat group also tracked as KeyBoy and Pirate Panda, has broadened its operational scope with a fresh wave of attacks aimed at consumer...

APTVulnerabilityThreat Intel
Read More → Use Tool →
2026-04-24Dark Reading
Chinese APT Exploits Outlook, Slack, Discord & file.io to Spy on Mongolia

Security researchers at Secureworks’ Counter Threat Unit (CTU) have uncovered a sophisticated espionage operation conducted by a Chinese state‑sponsored APT that targeted Mongolian...

APTCloud SecurityMalware
Read More → Use Tool →
2026-04-24The Hacker News
CISA: FIRESTARTER Backdoor Compromises Federal Cisco Firepower Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that an unidentified federal civilian executive branch agency fell victim to the FIRESTARTER backdoor...

MalwareZero-DayAPT
Read More → Use Tool →
2026-04-24The Hacker News
NASA Employees Targeted by Chinese Phishing Campaign Against Defense Software

NASA's Office of Inspector General (OIG) has disclosed a sophisticated spear‑phishing campaign orchestrated by a Chinese national who masqueraded as a U.S. defense researcher. The ...

PhishingAPTSupply Chain
Read More → Use Tool →
2026-04-24The Hacker News
Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Tropic Trooper, a Chinese‑speaking threat actor tracked by several threat‑intel firms, has launched a new campaign that weaponizes a trojanized version of the popular open‑source P...

APTMalwareSupply Chain
Read More → Use Tool →
2026-04-23Dark Reading
China-Backed Hackers Industrializing Botnets for Covert Attacks

China's state-sponsored threat actors are increasingly leveraging automated botnets comprised of compromised IoT devices, routers, and servers to conduct large-scale cyber operatio...

APTMalwareThreat Intel
Read More → Use Tool →
2026-04-23Dark Reading
Africa Cyberattack Volume Falls 22% as Hackers Target Latin America

According to the latest Dark Reading analysis, the weekly number of cyberattacks directed at African organizations dropped by 22 % over the past year, falling from roughly 5,400 in...

Threat IntelAPTRansomware
Read More → Use Tool →
2026-04-23The Hacker News
UNC6692 Spoofs IT Help Desk via Microsoft Teams to Deploy SNOW Malware

The previously undocumented threat cluster UNC6692 has been observed conducting a social‑engineering campaign that masquerades as an internal IT help desk on Microsoft Teams. The a...

MalwarePhishingAPT
Read More → Use Tool →
2026-04-23The Hacker News
China-Linked GopherWhisper Infiltrates 12 Mongolian Gov Systems

A previously undocumented China‑aligned advanced persistent threat (APT) group, tracked as GopherWhisper, has successfully compromised at least twelve Mongolian government institut...

APTMalwareThreat Intel
Read More → Use Tool →
2026-04-22Dark Reading
Power Grid Cyber-Risks: Voltage Manipulation Threats and Defenses

Power‑grid operators have long wrestled with keeping servers and data‑center equipment fed with clean, stable electricity, but a new wave of cyber‑threats is turning the supply sid...

APTVulnerabilitySupply Chain
Read More → Use Tool →
2026-04-21KrebsOnSecurity
Scattered Spider Member Tylerb Pleads Guilty to Wire Fraud, ID Theft

Tyler Robert Buchanan, a 24‑year‑old British national known in the cybercrime underground as “Tylerb,” pleaded guilty on June 5 2024 in a U.S. District Court to one count of wire‑f...

APTPhishingData Breach
Read More → Use Tool →
2026-04-21Dark Reading
Chinese APT Targets Indian Banks, Korean Policy in New Cyber Campaign

A newly identified Chinese advanced persistent threat (APT) group has launched a coordinated cyber‑espionage campaign against major Indian financial institutions and South Korean p...

APTThreat IntelMalware
Read More → Use Tool →
2026-04-16Dark Reading
North Korea's Sapphire Sleet Deploys ClickFix Attacks on macOS Users

Security researchers have identified a sophisticated campaign by North Korean threat actor Sapphire Sleet targeting macOS users through ClickFix attack vectors. The group, tracked ...

APTPhishingMalware
Read More → Use Tool →
2026-04-07KrebsOnSecurity
Russia Exploits Router Flaws to Harvest Microsoft Office Tokens

Security researchers have linked a new wave of cyber‑attacks to Russia’s military intelligence, specifically the APT groups tied to the GRU, which are actively exploiting known vul...

APTVulnerabilityAuthentication
Read More → Use Tool →
2026-03-19Ars Technica
DarkSWord iPhone Exploit Exposes Millions to Attack

Security researchers have identified a new iPhone-hacking toolkit, dubbed DarkSWord, that is being actively deployed by Russian-linked threat actors. The toolkit exploits a previou...

Zero-DayAPTVulnerability
Read More → Use Tool →
2026-03-11KrebsOnSecurity
Iran-Backed Hackers Claim Wiper Attack on Stryker Medtech

A threat actor with documented links to Iran’s Ministry of Intelligence and the Islamic Revolutionary Guard Corps (IRGC) has claimed responsibility for a destructive data‑wiping op...

APTMalware
Read More → Use Tool →
2022-08-30Threatpost
Watering Hole Attacks Spread ScanBox Keylogger via APT TA423

Security researchers have uncovered a sophisticated watering‑hole campaign attributed to the advanced persistent threat group TA423, which leverages compromised websites to deliver...

APTMalwareThreat Intel
Read More → Use Tool →