# Top Stories
April 05, 2026
-
1The Hacker News general Apr 05Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Fortinet patched CVE-2026-35616 (CVSS 9.1), a critical pre-authentication API access bypass in FortiClient EMS that allows privilege escalation and has been actively exploited in the wild. The vulnerability stems from improper access control (CWE-284) and received out-of-band patches due to active exploitation. This affects enterprise endpoint management systems and requires immediate patching by organizations using FortiClient EMS.
-
2The Hacker News general Apr 0536 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Researchers discovered 36 malicious npm packages disguised as Strapi CMS plugins that exploit Redis and PostgreSQL databases, deploy reverse shells, harvest credentials, and install persistent implants. Each package contains three files (package.json, index.js, postinstall.js) with no description or repository information, targeting developers through supply chain attacks. This highlights the ongoing threat to JavaScript development environments through compromised package repositories.
-
3BleepingComputer general Apr 04Axios npm hack used fake Teams error fix to hijack maintainer account
Axios HTTP client maintainers revealed their developer was targeted by North Korean threat actors using a fake Microsoft Teams error fix in a social engineering campaign to hijack the maintainer account. The attack represents a sophisticated supply chain targeting effort against one of JavaScript's most popular HTTP libraries. This demonstrates how nation-state actors are increasingly targeting open-source maintainers to compromise widely-used development tools.
-
4SecurityWeek general Apr 04European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
The European Commission confirmed hackers stole over 300GB of data from their AWS environment through a Trivy supply chain attack, including personal information of EU staff and contractors. CERT-EU attributed the breach to TeamPCP threat group, affecting at least 29 other EU entities beyond the Commission. This represents a significant compromise of European government infrastructure through open-source tool manipulation.
-
5BleepingComputer general Apr 03LinkedIn secretly scans for 6,000+ Chrome extensions, collects data
Microsoft's LinkedIn is using hidden JavaScript scripts to scan visitors' browsers for over 6,000 Chrome extensions and collect device data without user consent. The "BrowserGate" report reveals LinkedIn's fingerprinting practices that monitor installed browser extensions for potential tracking and profiling purposes. This privacy violation affects millions of LinkedIn users and demonstrates how major tech companies collect unauthorized browser telemetry.
-
ADSponsoredProtect Your Business
Expert cybersecurity solutions to safeguard your organization from evolving threats.
Get Protected → -
6BleepingComputer general Apr 04Device code phishing attacks surge 37x as new kits spread online
Device code phishing attacks exploiting OAuth 2.0 Device Authorization Grant flow have surged 37 times this year as new attack kits spread online. These attacks abuse the legitimate device authorization process to hijack user accounts by tricking victims into entering codes on attacker-controlled devices. The dramatic increase indicates cybercriminals are rapidly adopting this technique to bypass traditional authentication protections.
-
7SecurityWeek general Apr 03TrueConf Zero-Day Exploited in Asian Government Attacks
A Chinese threat actor exploited a zero-day vulnerability in TrueConf video conferencing platform to attack Asian government targets, performing reconnaissance, privilege escalation, and payload execution. The attacks targeted government organizations across Asia using the previously unknown vulnerability in the Russian-developed video conferencing solution. This demonstrates continued nation-state targeting of government communications infrastructure through zero-day exploits.
-
8SecurityWeek general Apr 03React2Shell Exploited in Large-Scale Credential Harvesting Campaign
Hackers exploited React2Shell vulnerability in a large-scale credential harvesting campaign, compromising over 750 systems using automated scanning and the Nexus Listener collection framework. The campaign demonstrates how attackers are systematically exploiting web application vulnerabilities to steal credentials at scale. The use of automated tools and collection frameworks indicates a sophisticated, organized operation targeting multiple organizations simultaneously.
-
9The Hacker News general Apr 03New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
A new SparkCat malware variant has been discovered on Apple App Store and Google Play Store, hiding in enterprise messenger and food delivery apps to steal cryptocurrency wallet recovery phrase images. The malware specifically targets crypto wallet seed phrases stored as images on mobile devices, representing an evolution in mobile cryptocurrency theft techniques. This cross-platform threat demonstrates how malware authors adapt to target valuable cryptocurrency assets through legitimate app stores.
-
10BleepingComputer general Apr 03CERT-EU: European Commission hack exposes data of 30 EU entities
CERT-EU attributed the European Commission cloud hack to TeamPCP threat group, revealing the breach exposed data from at least 29 other EU entities beyond the Commission itself. The attack leveraged supply chain vulnerabilities to access multiple European Union organizations through shared cloud infrastructure. This represents one of the largest documented breaches of EU government systems, highlighting the interconnected risk in shared cloud environments.