News
Multiple TP-Link Vulnerabilities Allow Attackers to Seize Control of the Device
3+ hour, 8+ min ago (452+ words) Cybersecurity researchers have identified five distinct security flaws in the TP-Link Archer AX53 v1. 0 router. When exploited, these flaws allow attackers on the same network to execute system commands, cause system crashes, and steal sensitive configuration files, ultimately leading to the complete…...
Hackers Use SVG Onload Trick to Hide Magecart Skimmer on Magento Checkout Pages
5+ hour, 25+ min ago (310+ words) A massive Magecart campaign compromising 99 Magento e-commerce stores using an innovative evasion technique. Discovered on April 7, 2026, the attack relies on invisible Scalable Vector Graphics (SVG) elements to inject credit card skimmers directly into checkout pages. This "double-tap" skimmer displays a…...
Internet-exposed ICS devices running insecure Modbus leave critical infrastructure open to disruption, Comparitech finds
2+ hour, 56+ min ago (706+ words) Industrial Cyber Internet-exposed ICS devices running insecure Modbus leave critical infrastructure open to disruption, Comparitech finds New research from Comparitech underscores how exposed ICS (industrial control systems) continue to present a tangible risk to critical infrastructure, with 179 internet-facing ICS devices…...
Lazarus and Kimsuky prove why infrastructure-level analysis is crucial for cybersecurity
1+ hour, 34+ min ago (793+ words) Infrastructure hunting is no longer a supporting discipline - it is the vantage point North Korea runs one of the world's most aggressive cyber operations. From billion-dollar cryptocurrency theft to high-profile supply chain compromises, its state-backed operators hammer security teams with…...
HPE Aruba Private 5 G Vulnerability Opens Door to Credential Theft Attacks
3+ hour, 17+ min ago (406+ words) A newly disclosed security flaw in HPE Aruba Networking Private 5 G Core On-Prem is putting enterprise networks at severe risk of credential theft. The security defect, officially tracked as CVE-2026-23818, stems from an open redirect issue embedded within the platform's…...
US cybersecurity agency issues an urgent alert as Iranian hackers attack critical infrastructure " CISA guidance warns organizations to immediately shield certain programmable logic controllers from the internet to thwart future attacks
1+ hour, 44+ min ago (273+ words) Iranian-affiliated cyber attacks are causing downtime and financial loss The April 7, 2026 CISA guidance lists the "widespread use" of these programmable logic controllers in several critical industries as a direct threat. The report notes that "malicious interactions" have, in some instances,…...
Researchers find way to bypass Apple's on-device LLM safeguards
2+ hour, 35+ min ago (299+ words) Researchers identified a method to bypass Apple's safeguards, enabling its on-device language model to carry out attacker-defined actions through prompt injection. Apple has responded by enhancing its security measures against such vulnerabilities. The findings, detailed in two blog posts on…...
How A Simple PDF File Can Put Your Computer At Hacking Risk
21+ hour, 42+ min ago (349+ words) If you use Adobe Reader on your laptop or PC, even opening a simple PDF file can put your device at risk. According to a report, hackers are using a serious bug (called a zero-day flaw) to target users through…...
Android SDK Vulnerability Exposes 30+ Million Crypto Wallets to Critical Data Theft
15+ hour, 9+ min ago (459+ words) Researchers emphasize that the exploit does not require sophisticated techniques. A malicious application installed on the same device could potentially trigger the vulnerability. This scenario highlights the risk of sideloading applications from unofficial sources. The table below outlines the core…...
"Just Microsoft things": I looked into Vera Crypt, Wire Guard, and Windscribe's account terminations, and there's no conspiracy here
2+ hour, 10+ min ago (377+ words) Windows and Xbox shift toward user feedback, but fans are questioning the timing Hacker spent weeks setting up an elaborate axios hijack involving Teams Windows Wrap " Is Microsoft sabotaging its own OS? VPN and encryption developers were recently locked out…...