Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

17/04/2026 0 Comments 0 tags

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

17/04/2026 0 Comments 0 tags

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

17/04/2026 0 Comments 0 tags

The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

17/04/2026 0 Comments 0 tags

An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals.

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

17/04/2026 0 Comments 0 tags

A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

16/04/2026 0 Comments 0 tags

Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. “PowMix employs randomized

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

16/04/2026 0 Comments 0 tags

You know that feeling when you open your feed on a Thursday morning and it’s just… a lot? Yeah. This week delivered. We’ve got hackers getting creative in ways that are almost impressive

[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

16/04/2026 0 Comments 0 tags

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org,

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

16/04/2026 0 Comments 0 tags

A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without a single security control registering

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

16/04/2026 0 Comments 0 tags

A “novel” social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE