Latest Cybersecurity News and Articles


Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

10 April 2026
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including

Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users

10 April 2026
The security hole affected an EngageLab SDK and it was reported by Microsoft to the vendor one year ago. The post Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users appeared first on SecurityWeek.

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

10 April 2026
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro 

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

09 April 2026
Data has allegedly been stolen from a state-run Chinese supercomputer.

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets

09 April 2026
Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk. "This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data," the Microsoft Defender

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

09 April 2026
A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and suspected universities to deploy a new Lua-based malware called LucidRook. "LucidRook is a sophisticated stager that embeds a Lua interpreter and Rust-compiled libraries within a dynamic-link library (DLL) to download and

Apple Intelligence AI Guardrails Bypassed in New Attack

09 April 2026
RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode manipulation. The post Apple Intelligence AI Guardrails Bypassed in New Attack appeared first on SecurityWeek.

Can we Trust AI? No – But Eventually We Must

09 April 2026
From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on probability rather than truth, yet enterprises are deploying it at speed without fully understanding the risks. The post Can we Trust AI? No – But Eventually We Must appeared first on SecurityWeek.

Math Problem: Cybercrime Divided By Cybersecurity

09 April 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 9, 2026 – Read the full story in Illumio “Gartner says we are all going to spend $240 billion USD (on cybersecurity this year), but Cybersecurity Ventures says that cybercrime losses (were predicted The post Math Problem: Cybercrime Divided By Cybersecurity appeared first on Cybercrime Magazine.

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

09 April 2026
Thursday. Another week, another batch of things that probably should've been caught sooner but weren't. This one's got some range — old vulnerabilities getting new life, a few "why was that even possible" moments, attackers leaning on platforms and tools you'd normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter more in

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

09 April 2026
Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini endpoints. The post Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access appeared first on SecurityWeek.

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

09 April 2026
The bugs could allow attackers to modify protected resources and escalate their privileges to administrator. The post Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

The Hidden Security Risks of Shadow AI in Enterprises

09 April 2026
As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these tools may boost productivity, automate tasks, or fill gaps in existing workflows, they also operate outside the visibility of security teams, bypassing controls and creating new blind spots in what is known as shadow AI. While similar to the phenomenon of

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

09 April 2026
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025. The finding, detailed by EXPMON's Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact ("Invoice540.pdf") first appeared on the VirusTotal platform on November 28, 2025. A second 

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

09 April 2026
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. The post The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security appeared first on SecurityWeek.

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

09 April 2026
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings from Access Now, Lookout, and SMEX. Two of the targets included prominent Egyptian journalists and government critics, Mostafa

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

09 April 2026
Tracked as UNC6783, the threat actor is likely linked to Mr. Raccoon, the hacker behind the alleged theft of Adobe data from a BPO. The post Google Warns of New Campaign Targeting BPOs to Steal Corporate Data appeared first on SecurityWeek.

Adobe Reader Zero-Day Exploited for Months: Researcher

09 April 2026
Reputable researcher Haifei Li has come across what appears to be a PDF designed to exploit an unpatched vulnerability. The post Adobe Reader Zero-Day Exploited for Months: Researcher appeared first on SecurityWeek.

300,000 People Impacted by Eurail Data Breach

09 April 2026
In December 2025, hackers stole names and passport numbers from the European travel company’s network. The post 300,000 People Impacted by Eurail Data Breach appeared first on SecurityWeek.

$3.6 Million Stolen in Bitcoin Depot Hack

09 April 2026
A hacker transferred more than 50 bitcoin from the Bitcoin ATM operator’s wallets after stealing credentials.  The post $3.6 Million Stolen in Bitcoin Depot Hack appeared first on SecurityWeek.