# Top Stories

April 08, 2026

  1. 1
    0
    The Hacker News general Apr 08
    Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

    Iran-affiliated cyber actors are targeting internet-exposed programmable logic controllers (PLCs) across U.S. critical infrastructure sectors, causing diminished PLC functionality, manipulated display data, operational disruptions, and financial losses. Federal agencies warn these attacks against operational technology devices represent an escalation in threats to critical infrastructure operations.

  2. 2
    0
    Krebs on Security threat-intel Apr 07
    Russia Hacked Routers to Steal Microsoft Office Tokens

    Russian military intelligence unit APT28 (Forest Blizzard) exploited vulnerabilities in MikroTik and TP-Link routers to hijack DNS traffic and harvest Microsoft Office authentication tokens from over 18,000 networks. The campaign allowed state-backed hackers to steal credentials without deploying malware by redirecting traffic through attacker-controlled infrastructure.

  3. 3
    0
    CyberScoop general Apr 07
    Feds quash widespread Russia-backed espionage network spanning 18,000 devices

    Federal agencies disrupted Russia-backed Forest Blizzard espionage network that compromised 18,000 devices to steal credentials and tokens for Microsoft accounts and other services. The GRU-attributed threat group hijacked network traffic through compromised SOHO routers in a large-scale credential theft operation.

  4. 4
    0
    BleepingComputer general Apr 07
    FBI: Americans lost a record $21 billion to cybercrime last year

    Americans lost a record $21 billion to cybercrime in 2025, representing a 26% increase from the previous year according to the FBI's annual report. Investment scams, business email compromise, tech support fraud, and data breaches were the primary drivers of these unprecedented financial losses.

  5. 5
    0
    BleepingComputer general Apr 07
    Max severity Flowise RCE vulnerability now exploited in attacks

    Hackers are actively exploiting CVE-2025-59528, a maximum-severity vulnerability in the Flowise AI platform that allows remote code execution through improper validation of user-supplied JavaScript. Over 12,000 Flowise instances are exposed to the internet, with VulnCheck confirming active exploitation of the CVSS 10.0 flaw.

  6. 6
    0
    The Hacker News general Apr 07
    Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access

    Docker Engine vulnerability CVE-2026-34040 (CVSS 8.8) allows attackers to bypass authorization plugins (AuthZ) and gain host access under specific circumstances. The flaw stems from an incomplete fix for CVE-2024-41110, a previous maximum-severity vulnerability in the same component discovered in July 2024.

  7. 7
    0
    BleepingComputer general Apr 07
    Hackers exploit critical flaw in Ninja Forms WordPress plugin

    A critical vulnerability in the Ninja Forms File Uploads premium WordPress add-on allows unauthenticated attackers to upload arbitrary files and execute remote code. The flaw affects the popular WordPress form builder plugin's premium file upload functionality.

  8. 8
    0
    Dark Reading general Apr 07
    Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

    Microsoft identifies Storm-1175, a China-based cybercrime group deploying Medusa ransomware through exploitation of N-day and zero-day vulnerabilities in high-velocity attacks. The financially motivated threat actor demonstrates proficiency in rapidly identifying and compromising exposed perimeter assets.

  9. 9
    0
    BleepingComputer general Apr 07
    Snowflake customers hit in data theft attacks after SaaS integrator breach

    Over a dozen companies suffered data theft attacks after a SaaS integration provider was breached and Snowflake customer authentication tokens were stolen. The attacks highlight supply chain risks when third-party integrators handle access credentials for multiple downstream customers.

  10. 10
    0
    Dark Reading general Apr 06
    Fortinet Issues Emergency Patch for FortiClient Zero-Day

    Fortinet issued emergency patches for CVE-2026-35616, an authentication bypass zero-day in FortiClient that is being actively exploited in the wild. This represents the latest in a series of Fortinet vulnerabilities that threat actors have successfully weaponized against enterprise networks.