# Archive
Browse past daily curated stories
Tuesday, April 14, 2026
-
1BleepingComputer generalAdobe rolls out emergency fix for Acrobat, Reader zero-day flaw
Adobe released an emergency security update for Acrobat Reader to fix CVE-2026-34621, a vulnerability exploited in zero-day attacks since at least December. The critical flaw allows arbitrary code execution and has a CVSS score of 8.6, making immediate patching essential for all organizations using Adobe PDF products.
-
2Dark Reading generalAdobe Patches Actively Exploited Zero-Day That Lingered for Months
Adobe patched CVE-2026-34621, a zero-day vulnerability in Acrobat and Reader that attackers exploited for at least four months using maliciously crafted PDF files. The emergency fix addresses a critical flaw that allowed arbitrary code execution, highlighting the extended exposure window organizations faced from this actively exploited vulnerability.
-
3BleepingComputer generalFBI takedown of W3LL phishing service leads to developer arrest
The FBI and Indonesian authorities dismantled the W3LL phishing platform and arrested its alleged developer in the first coordinated US-Indonesia enforcement action targeting phishing kit developers. W3LL allowed cybercriminals to create sophisticated phishing sites for just $500, demonstrating how law enforcement is adapting to combat industrialized phishing operations.
-
4BleepingComputer generalOpenAI rotates macOS certs after Axios attack hit code-signing workflow
OpenAI is rotating macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package during a supply chain attack on March 31. While no user data or internal systems were compromised, the incident forced OpenAI to take precautionary measures to protect the integrity of its macOS application certification process.
-
5BleepingComputer generalNew Booking.com data breach forces reservation PIN resets
Booking.com confirmed unauthorized access to its systems that exposed sensitive reservation and user data, forcing the company to reset reservation PINs. The breach affects an undisclosed number of customers but has been contained, representing another significant incident in the travel industry's ongoing security challenges.
-
6BleepingComputer generalCritical flaw in wolfSSL library enables forged certificate use
A critical vulnerability in the wolfSSL library enables attackers to forge certificates through improper verification of hash algorithms when checking ECDSA signatures. The flaw weakens SSL/TLS security implementations that rely on wolfSSL, requiring immediate updates for affected systems using this widely-deployed cryptographic library.
-
7BleepingComputer generalEuropean Gym giant Basic-Fit data breach affects 1 million members
Dutch fitness giant Basic-Fit announced hackers breached its systems and accessed information belonging to 1 million customers across multiple EU countries. The breach affects one of Europe's largest gym chains, exposing member data and highlighting the vulnerability of fitness industry customer databases.
-
8BleepingComputer generalStolen Rockstar Games analytics data leaked by extortion gang
Rockstar Games suffered a data breach linked to a security incident at analytics platform Anodot, with the ShinyHunters extortion gang now leaking stolen data on their leak site. The incident demonstrates how third-party vendor compromises can expose major gaming companies to data theft and extortion attempts.
-
9The Hacker News generalJanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025
JanelaRAT, a modified version of BX RAT, targeted Latin American banks with 14,739 attacks in Brazil during 2025, stealing financial and cryptocurrency data. The malware tracks mouse inputs, logs keystrokes, takes screenshots, and specifically targets financial institutions in Brazil and Mexico, showing continued focus on Latin American banking infrastructure.
-
10SecurityWeek generalCPUID Hacked to Serve Trojanized CPU-Z and HWMonitor Downloads
CPUID's website was compromised for less than 24 hours (April 9-10) by Russian-speaking threat actors who replaced legitimate CPU-Z and HWMonitor download links with trojanized versions containing STX RAT. The supply chain attack targeted users of popular hardware monitoring tools, demonstrating how attackers exploit trusted software distribution channels.