# Archive

Browse past daily curated stories

May 08 May 05 May 03 May 02 May 01 Apr 30 Apr 28 Apr 26 Apr 25 Apr 24 Apr 23 Apr 22 Apr 21 Apr 20 Apr 19 Apr 18 Apr 17 Apr 16 Apr 15 Apr 14 Apr 12 Apr 11 Apr 10 Apr 09 Apr 08 Apr 07 Apr 05 Apr 04 Apr 03 Apr 02

Friday, April 03, 2026

  1. 1
    0
    The Hacker News general
    Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

    Cisco Talos discovered a large-scale credential harvesting operation exploiting the React2Shell vulnerability (CVE-2025-55182) to compromise 766 Next.js hosts. Attackers stole database credentials, SSH private keys, AWS secrets, shell histories, Stripe API keys, and GitHub tokens across the breached systems.

  2. 2
    0
    BleepingComputer general
    Drift loses $280 million as hackers seize Security Council powers

    The Drift Protocol suffered a $280 million cryptocurrency theft after threat actors executed a sophisticated takeover of the platform's Security Council administrative powers. Security researchers have attributed this attack to North Korean hackers based on the operational tactics employed.

  3. 3
    0
    The Hacker News general
    Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

    Cisco patched CVE-2026-20093, a critical 9.8 CVSS vulnerability in the Integrated Management Controller (IMC) that allows unauthenticated remote attackers to bypass authentication and gain elevated system privileges. The flaw also affects Cisco SSM systems and could enable complete remote system compromise.

  4. 4
    0
    Schneier on Security threat-intel
    US Bans All Foreign-Made Consumer Routers

    The US Executive Branch banned all new foreign-manufactured consumer routers, citing supply chain vulnerabilities and cybersecurity risks to critical infrastructure. The ban applies only to new router purchases, with existing foreign-made devices remaining unaffected for current users.

  5. 5
    0
    Ars Technica Security general
    New Rowhammer attacks give complete control of machines running Nvidia GPUs

    Security researchers disclosed GDDRHammer and GeForge, new Rowhammer attacks that target Nvidia GPU memory to compromise the CPU and gain complete machine control. These attacks exploit memory bit flips in GPU GDDR memory to escalate privileges and bypass system security controls.

  6. 6
    0
    SecurityWeek general
    Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome

    Google patched CVE-2026-5281, a zero-day use-after-free vulnerability in Chrome's Dawn WebGPU component that was actively exploited in the wild. This marks the fourth Chrome zero-day fixed in 2026, with the update addressing 21 total vulnerabilities in the browser.

  7. 7
    0
    Dark Reading general
    Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate

    Hasbro disclosed a cyberattack in its 8-K SEC filing, noting "unauthorized access" to company systems discovered on March 28. The toy giant has activated business continuity plans, taken affected systems offline, and estimates remediation may take weeks to complete.

  8. 8
    0
    CyberScoop general
    Medtech giant Stryker says it’s back up after Iranian cyberattack

    Medical device manufacturer Stryker confirmed full operational recovery three weeks after the Iranian Handala hacktivist group executed a data-wiping cyberattack against the company's systems. The attack targeted Stryker's internal network infrastructure using destructive wiper malware.

  9. 9
    0
    BleepingComputer general
    New Progress ShareFile flaws can be chained in pre-auth RCE attacks

    Security researchers identified two vulnerabilities in Progress ShareFile that can be chained together to enable unauthenticated file exfiltration from enterprise file transfer environments. The pre-authentication remote code execution attack affects the widely-used secure file sharing platform.

  10. 10
    0
    The Hacker News general
    WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

    WhatsApp alerted approximately 200 users, primarily in Italy, who were tricked into installing a malicious iOS app containing spyware. The fake WhatsApp application was distributed through social engineering tactics targeting Italian users specifically.