# Top Stories
April 08, 2026
-
1The Hacker News general Apr 08Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
Iran-affiliated cyber actors are targeting internet-exposed programmable logic controllers (PLCs) across U.S. critical infrastructure sectors, causing diminished PLC functionality, manipulated display data, operational disruptions, and financial losses. Federal agencies warn these attacks against operational technology devices represent an escalation in threats to critical infrastructure operations.
-
2Krebs on Security threat-intel Apr 07Russia Hacked Routers to Steal Microsoft Office Tokens
Russian military intelligence unit APT28 (Forest Blizzard) exploited vulnerabilities in MikroTik and TP-Link routers to hijack DNS traffic and harvest Microsoft Office authentication tokens from over 18,000 networks. The campaign allowed state-backed hackers to steal credentials without deploying malware by redirecting traffic through attacker-controlled infrastructure.
-
3CyberScoop general Apr 07Feds quash widespread Russia-backed espionage network spanning 18,000 devices
Federal agencies disrupted Russia-backed Forest Blizzard espionage network that compromised 18,000 devices to steal credentials and tokens for Microsoft accounts and other services. The GRU-attributed threat group hijacked network traffic through compromised SOHO routers in a large-scale credential theft operation.
-
4BleepingComputer general Apr 07FBI: Americans lost a record $21 billion to cybercrime last year
Americans lost a record $21 billion to cybercrime in 2025, representing a 26% increase from the previous year according to the FBI's annual report. Investment scams, business email compromise, tech support fraud, and data breaches were the primary drivers of these unprecedented financial losses.
-
5BleepingComputer general Apr 07Max severity Flowise RCE vulnerability now exploited in attacks
Hackers are actively exploiting CVE-2025-59528, a maximum-severity vulnerability in the Flowise AI platform that allows remote code execution through improper validation of user-supplied JavaScript. Over 12,000 Flowise instances are exposed to the internet, with VulnCheck confirming active exploitation of the CVSS 10.0 flaw.
-
ADSponsoredProtect Your Business
Expert cybersecurity solutions to safeguard your organization from evolving threats.
Get Protected → -
6The Hacker News general Apr 07Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
Docker Engine vulnerability CVE-2026-34040 (CVSS 8.8) allows attackers to bypass authorization plugins (AuthZ) and gain host access under specific circumstances. The flaw stems from an incomplete fix for CVE-2024-41110, a previous maximum-severity vulnerability in the same component discovered in July 2024.
-
7BleepingComputer general Apr 07Hackers exploit critical flaw in Ninja Forms WordPress plugin
A critical vulnerability in the Ninja Forms File Uploads premium WordPress add-on allows unauthenticated attackers to upload arbitrary files and execute remote code. The flaw affects the popular WordPress form builder plugin's premium file upload functionality.
-
8Dark Reading general Apr 07Storm-1175 Deploys Medusa Ransomware at 'High Velocity'
Microsoft identifies Storm-1175, a China-based cybercrime group deploying Medusa ransomware through exploitation of N-day and zero-day vulnerabilities in high-velocity attacks. The financially motivated threat actor demonstrates proficiency in rapidly identifying and compromising exposed perimeter assets.
-
9BleepingComputer general Apr 07Snowflake customers hit in data theft attacks after SaaS integrator breach
Over a dozen companies suffered data theft attacks after a SaaS integration provider was breached and Snowflake customer authentication tokens were stolen. The attacks highlight supply chain risks when third-party integrators handle access credentials for multiple downstream customers.
-
10Dark Reading general Apr 06Fortinet Issues Emergency Patch for FortiClient Zero-Day
Fortinet issued emergency patches for CVE-2026-35616, an authentication bypass zero-day in FortiClient that is being actively exploited in the wild. This represents the latest in a series of Fortinet vulnerabilities that threat actors have successfully weaponized against enterprise networks.