# Archive
Browse past daily curated stories
Thursday, April 16, 2026
-
1BleepingComputer generalCritical Nginx UI auth bypass flaw now actively exploited in the wild
A critical vulnerability (CVE-2026-33032) in Nginx UI with Model Context Protocol support is being actively exploited for authentication bypass, enabling full server takeover without credentials. The near-maximum severity flaw allows attackers to restart, create, modify, and delete NGINX configuration files with SYSTEM privileges.
-
2BleepingComputer generalNew AgingFly malware used in attacks on Ukraine govt, hospitals
New AgingFly malware is targeting Ukrainian government agencies and hospitals, stealing authentication data from Chromium-based browsers and WhatsApp messenger. The malware represents an active threat against critical infrastructure in the ongoing conflict zone.
-
3BleepingComputer generalWordPress plugin suite hacked to push malware to thousands of sites
More than 30 WordPress plugins in the EssentialPlugin package have been compromised with malicious code allowing unauthorized website access. The supply chain attack affects thousands of WordPress sites running these popular plugins.
-
4The Hacker News generalMicrosoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
Microsoft patched a record 169 vulnerabilities in April 2026 Patch Tuesday, including one actively exploited SharePoint zero-day and 157 rated as Important severity. Eight vulnerabilities are rated Critical, making this the second-largest Microsoft patch release on record.
-
5BleepingComputer generalSigned software abused to deploy antivirus-killing scripts
A digitally signed adware tool has deployed SYSTEM-privilege payloads that disabled antivirus protections on thousands of endpoints across educational, utilities, government, and healthcare sectors. The attack demonstrates how legitimate code signing can be abused to bypass security controls.
-
6BleepingComputer generalCISA flags Windows Task Host vulnerability as exploited in attacks
CISA added a Windows Task Host privilege escalation vulnerability to its Known Exploited Vulnerabilities catalog, warning federal agencies of active exploitation. The flaw allows attackers to gain SYSTEM privileges on compromised Windows systems.
-
7SecurityWeek general100 Chrome Extensions Steal User Data, Create Backdoor
Security researchers discovered 108 malicious Chrome extensions stealing user credentials, hijacking Telegram sessions, and injecting unwanted ads across 20,000 users. The extensions were published through five coordinated accounts sharing common command-and-control infrastructure.
-
8The Hacker News generaln8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
Threat actors have weaponized n8n AI workflow automation platform since October 2025 to deliver malware via phishing emails and fingerprint devices. The attack leverages trusted automation infrastructure to bypass traditional security filters.
-
9The Record threat-intelUK warns businesses to address cyber risks amid Anthropic AI panic
The UK government warned businesses to strengthen cyber defenses amid concerns over Anthropic's Mythos AI model, which can find and chain software vulnerabilities faster than humans. The advisory highlights growing fears about AI's potential to accelerate cyberattack capabilities.
-
10The Record threat-intelEducational company McGraw Hill says Salesforce misconfiguration led to data leak
Educational publisher McGraw Hill disclosed that a Salesforce misconfiguration led to a data breach after cybercriminal group ShinyHunters claimed to have stolen 45 million Salesforce records. The breach emerged when the attackers threatened to leak the data by April 14 unless ransom demands were met.