Latest Cybersecurity News and Articles


GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data

07 April 2026
By targeting Grafana’s AI components, attackers can point to external resources and inject indirect prompts to bypass safeguards. The post GrafanaGhost: Attackers Can Abuse Grafana to Leak Enterprise Data appeared first on SecurityWeek.

Webinar Today: Why Automated Pentesting Alone Is Not Enough

07 April 2026
Join the live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline. The post Webinar Today: Why Automated Pentesting Alone Is Not Enough appeared first on SecurityWeek.

The Sound Of Cybersecurity From RSAC Conference 2026

07 April 2026
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 7, 2026 – Listen to the podcast SoundCloud knows music… and cybersecurity. Late last year, the giant music streaming and sharing platform suffered a data breach that reportedly affected approximately 20 The post The Sound Of Cybersecurity From RSAC Conference 2026 appeared first on Cybercrime Magazine.

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

07 April 2026
An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform, to enlist them into a cryptocurrency mining and proxy botnet. "A purpose-built Python scanner continuously sweeps major cloud IP ranges for vulnerable targets, automatically installing malicious nodes via ComfyUI-Manager if no exploitable node is already

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

07 April 2026
In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs are maturing, yet the risk is actually increasing. According to new research from the Ponemon Institute, hundreds of applications within the typical enterprise remain disconnected from centralized identity systems. These "dark

UK exposes Russian military intelligence hijacking vulnerable routers for cyber attacks

07 April 2026
New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.

APT28 exploit routers to enable DNS hijacking operations

07 April 2026
Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and authentication tokens.

GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack 

07 April 2026
Researchers have demonstrated that GPU Rowhammer attacks can be used to escalate privileges. The post GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack  appeared first on SecurityWeek.

The Hidden Cost of Recurring Credential Incidents

07 April 2026
When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the average cost of a breach at $4.4 million. Avoiding even one major incident is enough to justify most security investments, but that headline figure obscures the more persistent problems caused by recurring credential

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

07 April 2026
The group is using zero-days, quickly weaponizes fresh bugs, and exfiltrates and encrypts data within days of initial access. The post Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems appeared first on SecurityWeek.

German Police Unmask REvil Ransomware Leader

07 April 2026
Shchukin is accused of extorting more than $2 million as the head of the GandCrab and REvil ransomware operations. The post German Police Unmask REvil Ransomware Leader appeared first on SecurityWeek.

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

07 April 2026
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate privileges and, in some cases, even take full control of a host. The efforts have been codenamed GPUBreach, GDDRHammer, and GeForge. GPUBreach goes a step further than GPUHammer, demonstrating for the first time that

White House Seeks to Slash CISA Funding by $707 Million

07 April 2026
The Trump administration says the FY2027 budget refocuses CISA on its core mission: protecting federal agencies and critical infrastructure. The post White House Seeks to Slash CISA Funding by $707 Million appeared first on SecurityWeek.

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

07 April 2026
A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate "high-velocity" attacks and break into susceptible internet-facing systems. "The threat actor's high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent

Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

07 April 2026
The high-end casino and hotel operator has likely paid a ransom to avoid a data leak. The post Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack appeared first on SecurityWeek.

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

07 April 2026
Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution. "The CustomMCP node allows users to input configuration settings for connecting

New Trump Administration Budget Cuts $707M from CISA Funding

07 April 2026
The White House plans to cut $707M from CISA funding. 

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

06 April 2026
An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East. The activity, assessed to be ongoing, was carried out in three distinct attack waves that took place on March 3, March 13, and March 23, 2026, per Check Point. "The campaign is primarily

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

06 April 2026
Threat actors likely associated with the Democratic People's Republic of Korea (DPRK) have been observed using GitHub as command-and-control (C2) infrastructure in multi-stage attacks targeting organizations in South Korea. The attack chain, per Fortinet FortiGuard Labs, involves obfuscated Windows shortcut (LNK) files acting as the starting point to drop a decoy PDF

Google DeepMind Researchers Map Web Attacks Against AI Agents

06 April 2026
Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show. The researchers have identified six types of attacks against AI agents that can be mounted via web content to inject malicious context and trigger unexpected behavior. Web content, they explain in a research paper, […] The post Google DeepMind Researchers Map Web Attacks Against AI Agents appeared first on SecurityWeek.