AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud

14/04/2026 0 Comments 0 tags

Cybersecurity researchers have unmasked a novel ad fraud scheme that has been found to leverage search engine poisoning (SEO) techniques and artificial intelligence (AI)-generated content to push deceptive news stories

New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

14/04/2026 0 Comments 0 tags

Two high-severity security vulnerabilities have been disclosed in Composer, a package manager for PHP, that, if successfully exploited, could result in arbitrary command execution. The vulnerabilities have been described as command injection flaws affecting the

Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

14/04/2026 0 Comments 0 tags

Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

14/04/2026 0 Comments 0 tags

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta.

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

14/04/2026 0 Comments 0 tags

OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

14/04/2026 0 Comments 0 tags

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

14/04/2026 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

14/04/2026 0 Comments 0 tags

A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

13/04/2026 0 Comments 0 tags

Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A modified version of BX RAT,

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

13/04/2026 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL