# Top Stories

April 12, 2026

  1. 1
    0
    SecurityWeek general Apr 10
    Critical Marimo Flaw Exploited Hours After Public Disclosure

    A critical vulnerability in Marimo was exploited in the wild within just 9 hours of public disclosure, with attackers building an exploit from the unauthenticated bug's advisory. This demonstrates the extremely narrow window defenders have to patch critical vulnerabilities before weaponization, highlighting the need for coordinated disclosure and rapid response capabilities.

  2. 2
    0
    BleepingComputer general Apr 10
    Analysis of one billion CISA KEV remediation records exposes limits of human-scale security

    Qualys analyzed 1 billion CISA KEV remediation records and found that most critical vulnerabilities are exploited before defenders can patch them, exposing fundamental limits of human-scale security operations. The research reveals that attackers consistently outpace patching efforts on Known Exploited Vulnerabilities, forcing organizations to reconsider traditional patch management strategies.

  3. 3
    0
    The Hacker News general Apr 10
    GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    The GlassWorm campaign evolved to use a new Zig dropper that infects all integrated development environments on developer machines through a malicious Open VSX extension named 'specstudio.code-wakatime-activity-tracker' that impersonates WakaTime. This supply chain attack specifically targets the developer ecosystem, potentially compromising source code and development processes across multiple IDEs.

  4. 4
    0
    SecurityWeek general Apr 10
    Juniper Networks Patches Dozens of Junos OS Vulnerabilities

    Juniper Networks patched dozens of vulnerabilities in Junos OS, including a critical-severity flaw that allows remote attackers to take over vulnerable devices without authentication. The widespread nature of these patches across Juniper's enterprise networking infrastructure highlights the continued targeting of network equipment by threat actors.

  5. 5
    0
    SecurityWeek general Apr 10
    Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000

    Chrome 147 patches 60 vulnerabilities including two critical flaws in the WebML component reported by anonymous researchers, with Google paying $86,000 in bug bounties. The critical vulnerabilities in Chrome's machine learning components demonstrate how AI-related browser features are becoming new attack surfaces for threat actors.

  6. 6
    0
    The Hacker News general Apr 11
    Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

    Citizen Lab revealed that Hungarian intelligence, El Salvador's national police, and U.S. law enforcement agencies used Webloc, an Israeli-developed advertising-based surveillance system, to track 500 million devices globally. The tool, now sold by Penlink after merging with Cobwebs Technologies in July 2023, represents a significant expansion of geolocation surveillance capabilities using commercial ad data.

  7. 7
    0
    The Record threat-intel Apr 10
    UK says it exposed Russian submarine activity near undersea cables

    The UK Ministry of Defence exposed Russian submarine activity near undersea cables, identifying a Russian attack submarine and vessels from the Main Directorate of Deep Sea Research (GUGI) conducting 'nefarious activity over critical undersea infrastructure.' This revelation highlights ongoing Russian hybrid warfare targeting critical internet infrastructure that could disrupt global communications.

  8. 8
    0
    The Hacker News general Apr 10
    Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

    Google rolled out Device Bound Session Credentials (DBSC) in Chrome 146 for Windows users to prevent session theft by cryptographically binding authentication to specific devices. This security feature renders stolen session cookies unusable by attackers, addressing a major attack vector used in account takeover campaigns targeting enterprise users.

  9. 9
    0
    SecurityWeek general Apr 10
    Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users

    Microsoft discovered a vulnerability in an EngageLab SDK that exposed millions of Android cryptocurrency wallet users to potential attacks. The security hole was reported to the vendor one year ago, demonstrating the lengthy disclosure and remediation process for third-party SDK vulnerabilities affecting mobile financial applications.

  10. 10
    0
    SecurityWeek general Apr 10
    Orthanc DICOM Vulnerabilities Lead to Crashes, RCE

    Critical vulnerabilities in Orthanc DICOM medical imaging software could allow attackers to execute arbitrary code, cause denial-of-service, or disclose sensitive information. These flaws affect medical imaging systems used in healthcare environments, presenting significant risks to patient data and hospital operations that rely on DICOM infrastructure.