Cybersecurity News
Understand the Threats. Protect What Matters.
- OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accountsby Lily Hay Newman on April 30, 2026 at 5:30 pm
OpenAI is rolling out Advanced Account Security for people concerned that their ChatGPT or Codex accounts could be potential targets of phishing attacks.
- Anti-DDoS Firm Heaped Attacks on Brazilian ISPsby BrianKrebs on April 30, 2026 at 2:04 pm
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work of a competitor trying to tarnish his company’s public image.
- 90,000 Screenshots of One Celebrity’s Phone Were Exposed Onlineby Matt Burgess, Lily Hay Newman on April 30, 2026 at 10:00 am
Spyware appears to have captured everything from intimate photos to private messages from the smartphone of European celebrity. They were publicly accessible until a researcher flagged the exposure.
- CISA and U.S. Government Partners Unveil Guide to Accelerate Zero Trust Adoption in Operational Technologyby CISA on April 29, 2026 at 12:00 pm
- Why Sharing a Screenshot Can Get You Jailed in the UAEby Dana Alomar on April 28, 2026 at 5:49 pm
The war in Iran has drawn attention to arrests in the United Arab Emirates over online content, but the legal framework behind that enforcement has existed for years.
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentialsby [email protected] (The Hacker News) on April 30, 2026 at 4:31 pm
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido Security, OX Security, Socket, and StepSecurity, the two malicious versions are versions 2.6.2 and 2.6.3, both of which were published on April 30, 2026. The campaign is assessed to be an
- ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Storiesby [email protected] (The Hacker News) on April 30, 2026 at 1:55 pm
The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a busy time to be online. Security is always a moving target. Millions of servers are currently sitting online without any passwords, and
- New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentialsby [email protected] (The Hacker News) on April 30, 2026 at 12:36 pm
Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts. “The intrusion chain begins with execution of a batch script (‘install_obf.bat’) that disables Windows security controls, dynamically extracts an
- EtherRAT Distribution Spoofing Administrative Tools via GitHub Facadesby [email protected] (The Hacker News) on April 30, 2026 at 11:30 am
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers, and security analysts by impersonating administrative utilities they rely on for daily operations. By integrating Search Engine Order (SEO)
- New Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major Distributionsby [email protected] (The Hacker News) on April 30, 2026 at 9:24 am
Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root. The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori. “An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux









