Trending in Cybersecurity
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Google’s Android Apps Get Public Verification to Stop Supply Chain Attacksby info@thehackernews.com (The Hacker News) on May 6, 2026 at 9:13 am
Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. “This new public ledger ensures the Google apps on your device are exactly what we intended to build and distribute,” Google’s product and security teams said. The initiative builds upon the foundation of Pixel Binary Transparency, which Google introduced in October 2021
- Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPsby info@thehackernews.com (The Hacker News) on May 6, 2026 at 8:34 am
Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of facilitating credential theft. “According to the functionalities of the CloudZ RAT and Pheno plugin, this was with the intention of stealing victims’ credentials and potentially one-time passwords (OTPs),”
- Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Executionby info@thehackernews.com (The Hacker News) on May 6, 2026 at 6:14 am
Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300, has been described as a case of unauthenticated remote code execution. It carries a CVSS score of 9.3 if the User-ID Authentication Portal is configured to enable access from the internet or any
- Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCEby info@thehackernews.com (The Hacker News) on May 5, 2026 at 4:19 pm
The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution (RCE). The vulnerability, tracked as CVE-2026-23918 (CVSS score: 8.8), has been described as a case of “double free and possible RCE” in the HTTP/2 protocol handling. This issue
- DAEMON Tools Supply Chain Attack Compromises Official Installers with Malwareby info@thehackernews.com (The Hacker News) on May 5, 2026 at 4:07 pm
A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. “These installers are distributed from the legitimate website of DAEMON Tools and are signed with digital certificates belonging to DAEMON Tools developers,” Kaspersky researchers Igor Kuznetsov, Georgy Kucherin, Leonid
- China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regionsby info@thehackernews.com (The Hacker News) on May 5, 2026 at 2:19 pm
A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. The activity is being tracked by Cisco Talos under the moniker UAT-8302, with post-exploitation involving the deployment of custom-made malware families that have been put
- The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closedby info@thehackernews.com (The Hacker News) on May 5, 2026 at 11:58 am
Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. Your perimeter controls don’t see it. Your MFA doesn’t stop it. And when an attacker gets hold of one, they don’t need a password. OAuth
- MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacksby info@thehackernews.com (The Hacker News) on May 5, 2026 at 11:56 am
Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution. “MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code
- We Scanned 1 Million Exposed AI Services. Here’s How Bad the Security Actually Isby info@thehackernews.com (The Hacker News) on May 5, 2026 at 10:30 am
While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption is putting that progress at risk. Businesses are moving fast to self-host LLM infrastructure, drawn by the promise of AI as a force multiplier and the pressure to deliver more value faster. But speed is coming at the expense of security. In the wake of the
- ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windowsby info@thehackernews.com (The Hacker News) on May 5, 2026 at 9:07 am
The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to have enabled the
- Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug APIby info@thehackernews.com (The Hacker News) on May 5, 2026 at 7:37 am
A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the “/papi/esearch/data/devops/
- Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countriesby info@thehackernews.com (The Hacker News) on May 5, 2026 at 6:35 am
Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures and legitimate email services to direct users to attacker-controlled domains and steal authentication tokens. The multi-stage campaign, observed between April 14 and 16, 2026, targeted more than 35,000 users across over 13,000 organizations in 26 countries,











