# Archive
Browse past daily curated stories
Saturday, April 18, 2026
-
1The Hacker News generalThree Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
Huntress reports active exploitation of three Microsoft Defender zero-day vulnerabilities (BlueHammer, RedSun, and UnDefend) that allow attackers to gain SYSTEM or elevated administrator privileges. Two of these flaws remain unpatched, creating immediate risk for organizations using Windows Defender across enterprise environments.
-
2BleepingComputer generalCISA flags Apache ActiveMQ flaw as actively exploited in attacks
CISA added Apache ActiveMQ vulnerability CVE-2026-34197 to its Known Exploited Vulnerabilities catalog after confirming active exploitation in attacks. The high-severity flaw went undetected for 13 years before being patched in early April, affecting widely-deployed message broker infrastructure.
-
3BleepingComputer generalPayouts King ransomware uses QEMU VMs to bypass endpoint security
Payouts King ransomware operators are leveraging QEMU virtual machine emulation to establish reverse SSH backdoors that bypass endpoint security solutions on compromised systems. This technique allows attackers to run hidden virtual environments for malware execution while evading detection by traditional security tools.
-
4BleepingComputer generalRecently leaked Windows zero-days now exploited in attacks
Three recently disclosed Windows zero-day vulnerabilities are now being actively exploited by threat actors to achieve SYSTEM-level privileges and elevated administrator permissions. The attacks target systems running Microsoft Defender and Windows components, with two vulnerabilities still lacking official patches.
-
5The Hacker News generalOperation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
Operation PowerOFF resulted in the seizure of 53 DDoS-for-hire domains and four arrests across 21 countries, disrupting services used by over 75,000 cybercriminals. The international law enforcement action exposed 3 million criminal accounts and dismantled technical infrastructure supporting commercial DDoS operations.
-
6The Record threat-intelUkraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies
Ukraine confirmed that APT28 targeted prosecutors and anti-corruption agencies by exploiting vulnerabilities in the Roundcube webmail platform. The attacks allow remote code execution when victims simply open malicious emails in their inbox, demonstrating sophisticated supply chain targeting of government communications.
-
7BleepingComputer generalGrinex exchange blames "Western intelligence" for $13.7M crypto hack
Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations after a $13.7 million hack that the company attributes to Western intelligence agencies. The exchange claims the attack required sophisticated hacking resources exclusively available to unfriendly states, highlighting geopolitical tensions in cryptocurrency security.
-
8BleepingComputer generalCisco says critical Webex Services flaw requires customer action
Cisco patched four critical vulnerabilities in Webex Services and Identity Services Engine, including CVE-2026-20184 (CVSS 9.8) affecting certificate validation in SSO integrations. The flaws enable arbitrary code execution and allow attackers to impersonate any user within cloud-based Webex Services, requiring immediate customer action.
-
9BleepingComputer generalUS nationals behind DPRK IT worker 'laptop farm' sent to prison
Two U.S. nationals received prison sentences for operating a North Korean IT worker 'laptop farm' that helped DPRK workers pose as U.S. residents to get hired by over 100 companies, including Fortune 500 firms. Kejia Wang received 9 years and Zhenxing Wang nearly 8 years for generating over $5 million for North Korea's government.
-
10The Hacker News generalNIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
NIST announced it will limit CVE enrichment in the National Vulnerability Database due to a 263% surge in vulnerability submissions, only enriching CVEs that meet specific criteria including CISA KEV listings and critical software impacts. This change affects how security teams will receive detailed vulnerability analysis and scoring information.