# Archive

Browse past daily curated stories

May 09 May 08 May 05 May 03 May 02 May 01 Apr 30 Apr 28 Apr 26 Apr 25 Apr 24 Apr 23 Apr 22 Apr 21 Apr 20 Apr 19 Apr 18 Apr 17 Apr 16 Apr 15 Apr 14 Apr 12 Apr 11 Apr 10 Apr 09 Apr 08 Apr 07 Apr 05 Apr 04 Apr 03

Wednesday, April 01, 2026

  1. 1
    0
    BleepingComputer general
    Hackers compromise Axios npm package to drop cross-platform malware

    Hackers compromised the npm account for Axios, a JavaScript HTTP client with over 100 million weekly downloads, releasing malicious versions 1.14.1 and 0.30.4 that inject a fake dependency called "plain-crypto-js" to deliver cross-platform remote access trojans. Google attributes this supply chain attack to North Korean threat group UNC1069, which has been using similar tactics since 2023.

  2. 2
    0
    BleepingComputer general
    Claude AI finds Vim, Emacs RCE bugs that trigger on file open

    Security researchers discovered remote code execution vulnerabilities in Vim and GNU Emacs text editors using simple prompts with Claude AI assistant, allowing attackers to execute arbitrary code merely by opening a malicious file. The discovery demonstrates how AI tools can be leveraged to identify critical flaws in widely-used development tools.

  3. 3
    0
    BleepingComputer general
    Cisco source code stolen in Trivy-linked dev environment breach

    Cisco suffered a cyberattack where threat actors used credentials stolen from the recent Trivy supply chain breach to access internal development environments and steal source code belonging to both Cisco and its customers. This incident highlights how supply chain compromises can cascade into secondary breaches of major technology vendors.

  4. 4
    0
    The Hacker News general
    TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

    A zero-day vulnerability CVE-2026-3502 (CVSS 7.8) in TrueConf video conferencing software was exploited in attacks against Southeast Asian government networks in a campaign dubbed TrueChaos. The flaw allows attackers to distribute tampered application updates due to lack of integrity checks when fetching update code.

  5. 5
    0
    BleepingComputer general
    CISA orders feds to patch actively exploited Citrix flaw by Thursday

    CISA ordered federal agencies to patch Citrix NetScaler appliances against an actively exploited vulnerability by Thursday, with the bug carrying a critical severity score of 9.3 out of 10. The vulnerability enables attackers to send requests that disclose sensitive information from affected systems.

  6. 6
    0
    SecurityWeek general
    Exploitation of Critical Fortinet FortiClient EMS Flaw Begins

    Security researchers report active exploitation of a critical SQL injection vulnerability in Fortinet FortiClient EMS that allows unauthenticated attackers to execute arbitrary code remotely via crafted HTTP requests. The flaw represents a significant risk to organizations using Fortinet's endpoint management solution.

  7. 7
    0
    BleepingComputer general
    GIGABYTE Control Center vulnerable to arbitrary file write flaw

    GIGABYTE Control Center contains an arbitrary file-write vulnerability that could allow remote, unauthenticated attackers to access files on vulnerable hosts. This hardware management software flaw affects users of GIGABYTE motherboards and systems worldwide.

  8. 8
    0
    BleepingComputer general
    Hacker charged with stealing $53 million from Uranium crypto exchange

    U.S. prosecutors charged Maryland resident with stealing over $53 million from the Uranium Finance cryptocurrency exchange through two separate hacking incidents, then laundering the proceeds through a cryptocurrency mixer. The case demonstrates ongoing law enforcement efforts against DeFi protocol exploitation.

  9. 9
    0
    BleepingComputer general
    Dutch Finance Ministry takes treasury banking portal offline after breach

    The Dutch Ministry of Finance took its treasury banking portal and other systems offline while investigating a cyberattack detected two weeks prior. The incident affects government financial operations and demonstrates the ongoing threat to critical national infrastructure.

  10. 10
    0
    SecurityWeek general
    StrongSwan Flaw Allows Unauthenticated Attackers to Crash VPNs

    StrongSwan VPN software contains an integer underflow vulnerability that allows unauthenticated attackers to remotely crash VPN connections, affecting releases spanning 15 years. The flaw poses significant risks to organizations relying on StrongSwan for secure communications.