News

The Hacker News
thehackernews.com > 2026 > 04 > microsoft-details-cookie-controlled-php.html

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

1+ day, 13+ min ago  (359+ words) Threat'actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research'Team. "Instead of exposing command execution through URL parameters…...

The Hacker News
thehackernews.com > 2026 > 04 > why-third-party-risk-is-biggest-gap-in.html

Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture

1+ day, 4+ hour ago  (525+ words) The next major'breach hitting your clients probably won't come'from inside their'walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor nobody in IT knows about. That's the new attack surface,…...

The Hacker News
thehackernews.com > 2026 > 04 > unc1069-social-engineering-of-axios.html

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

1+ day, 4+ hour ago  (394+ words) The'maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked'as UNC1069. Maintainer Jason Saayman said the attackers tailored their social engineering efforts…...

The Hacker News
thehackernews.com > 2026 > 04 > new-sparkcat-variant-in-ios-android.html

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

1+ day, 6+ hour ago  (238+ words) Cybersecurity researchers'have discovered a new version of'the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the'trojan was discovered targeting both the mobile operating'systems. Russian cybersecurity company'Kaspersky said it'found two infected apps on…...

The Hacker News
thehackernews.com > 2026 > 04 > hackers-exploit-cve-2025-55182-to.html

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

1+ day, 20+ hour ago  (551+ words) A'large-scale credential harvesting operation'has been'observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS) secrets, shell command history, Stripe API keys, and GitHub tokens at'scale. Cisco'Talos has attributed the operation…...

The Hacker News
thehackernews.com > 2026 > 04 > cisco-patches-98-cvss-imc-and-ssm-flaws.html

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

2+ day, 24+ min ago  (281+ words) Cisco'has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system with elevated privileges. The'vulnerability, tracked as CVE…...

The Hacker News
thehackernews.com > 2026 > 04 > threatsday-bulletin-pre-auth-chains.html

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

2+ day, 3+ hour ago  (246+ words) The'latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No'corporate fluff or boring lectures here, just a quick and honest look at the messy reality of keeping systems safe this'week. It'is definitely worth…...

The Hacker News
thehackernews.com > 2026 > 04 > the-state-of-trusted-open-source-report.html

The State of Trusted Open Source Report

2+ day, 4+ hour ago  (1288+ words) Fast forward a few months, and software development is accelerating at a pace that most didn't see coming. AI'is increasingly embedded across the development lifecycle, from code generation to infrastructure automation, as models become more advanced and better at meeting…...

The Hacker News
thehackernews.com > 2026 > 04 > researchers-uncover-mining-operation.html

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

2+ day, 4+ hour ago  (354+ words) "Beyond cryptomining, the threat actor monetizes infections through CPA (Cost Per Action) fraud, directing victims to content locker pages under the guise of software registration," Elastic Security Labs researchers Jia Yu Chan, Cyril Fran'ois, and Remco'Sprooten said in an analysis…...

The Hacker News
thehackernews.com > 2026 > 04 > apple-expands-ios-1877-update-to-more.html

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

2+ day, 8+ hour ago  (616+ words) Apple'on'Wednesday expanded the availability of iOS 18.7.7'and iPadOS 18.7.7'to a broader range of devices to protect users from the risk posed by a recently disclosed exploit kit known'as DarkSword. "We enabled the availability of iOS 18.7.7'for more devices on April…...