n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

15/04/2026 0 Comments 0 tags

Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. “By leveraging

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

15/04/2026 0 Comments 0 tags

A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April’s Patch Tuesday releases. Topping the list is an SQL injection vulnerability impacting SAP

Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

15/04/2026 0 Comments 0 tags

A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8),

Deterministic + Agentic AI: The Architecture Exposure Validation Requires

15/04/2026 0 Comments 0 tags

Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations

Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

15/04/2026 0 Comments 0 tags

Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169 vulnerabilities, 157 are rated Important,

OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

15/04/2026 0 Comments 0 tags

OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that’s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model, Mythos. “The progressive

AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud

14/04/2026 0 Comments 0 tags

Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories

New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

14/04/2026 0 Comments 0 tags

Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been described as command injection flaws affecting the

Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

14/04/2026 0 Comments 0 tags

Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

14/04/2026 0 Comments 0 tags

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta.