# Archive
Browse past daily curated stories
Wednesday, April 01, 2026
-
1BleepingComputer generalHackers compromise Axios npm package to drop cross-platform malware
Hackers compromised the npm account for Axios, a JavaScript HTTP client with over 100 million weekly downloads, releasing malicious versions 1.14.1 and 0.30.4 that inject a fake dependency called "plain-crypto-js" to deliver cross-platform remote access trojans. Google attributes this supply chain attack to North Korean threat group UNC1069, which has been using similar tactics since 2023.
-
2BleepingComputer generalClaude AI finds Vim, Emacs RCE bugs that trigger on file open
Security researchers discovered remote code execution vulnerabilities in Vim and GNU Emacs text editors using simple prompts with Claude AI assistant, allowing attackers to execute arbitrary code merely by opening a malicious file. The discovery demonstrates how AI tools can be leveraged to identify critical flaws in widely-used development tools.
-
3BleepingComputer generalCisco source code stolen in Trivy-linked dev environment breach
Cisco suffered a cyberattack where threat actors used credentials stolen from the recent Trivy supply chain breach to access internal development environments and steal source code belonging to both Cisco and its customers. This incident highlights how supply chain compromises can cascade into secondary breaches of major technology vendors.
-
4The Hacker News generalTrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
A zero-day vulnerability CVE-2026-3502 (CVSS 7.8) in TrueConf video conferencing software was exploited in attacks against Southeast Asian government networks in a campaign dubbed TrueChaos. The flaw allows attackers to distribute tampered application updates due to lack of integrity checks when fetching update code.
-
5BleepingComputer generalCISA orders feds to patch actively exploited Citrix flaw by Thursday
CISA ordered federal agencies to patch Citrix NetScaler appliances against an actively exploited vulnerability by Thursday, with the bug carrying a critical severity score of 9.3 out of 10. The vulnerability enables attackers to send requests that disclose sensitive information from affected systems.
-
6SecurityWeek generalExploitation of Critical Fortinet FortiClient EMS Flaw Begins
Security researchers report active exploitation of a critical SQL injection vulnerability in Fortinet FortiClient EMS that allows unauthenticated attackers to execute arbitrary code remotely via crafted HTTP requests. The flaw represents a significant risk to organizations using Fortinet's endpoint management solution.
-
7BleepingComputer generalGIGABYTE Control Center vulnerable to arbitrary file write flaw
GIGABYTE Control Center contains an arbitrary file-write vulnerability that could allow remote, unauthenticated attackers to access files on vulnerable hosts. This hardware management software flaw affects users of GIGABYTE motherboards and systems worldwide.
-
8BleepingComputer generalHacker charged with stealing $53 million from Uranium crypto exchange
U.S. prosecutors charged Maryland resident with stealing over $53 million from the Uranium Finance cryptocurrency exchange through two separate hacking incidents, then laundering the proceeds through a cryptocurrency mixer. The case demonstrates ongoing law enforcement efforts against DeFi protocol exploitation.
-
9BleepingComputer generalDutch Finance Ministry takes treasury banking portal offline after breach
The Dutch Ministry of Finance took its treasury banking portal and other systems offline while investigating a cyberattack detected two weeks prior. The incident affects government financial operations and demonstrates the ongoing threat to critical national infrastructure.
-
10SecurityWeek generalStrongSwan Flaw Allows Unauthenticated Attackers to Crash VPNs
StrongSwan VPN software contains an integer underflow vulnerability that allows unauthenticated attackers to remotely crash VPN connections, affecting releases spanning 15 years. The flaw poses significant risks to organizations relying on StrongSwan for secure communications.