{"total":100,"offset":0,"limit":20,"items":[{"id":"e877a6f6a9db8d3f38200ed858a8d4b4","title":"NIST to stop rating non-priority flaws due to volume increase","url":"https:\/\/www.bleepingcomputer.com\/news\/security\/nist-to-stop-rating-non-priority-flaws-due-to-volume-increase\/","excerpt":"The National Institute of Standards and Technology will stop assigning severity scores to lower-priority vulnerabilities due to the growing workload from rising submission volumes. [...]","image":"","source":"BleepingComputer","category":"news","tags":["malware","ransomware","breach"],"severity":"low","date":1776608263,"date_fmt":"Apr 19, 2026 \u00b7 14:17 UTC"},{"id":"8b4a61a0ef07d3e7ea6c91df12a3385d","title":"Critical flaw in Protobuf library enables JavaScript code execution","url":"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-flaw-in-protobuf-library-enables-javascript-code-execution\/","excerpt":"Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used JavaScript implementation of Google's Protocol Buffers. [...]","image":"","source":"BleepingComputer","category":"news","tags":["malware","ransomware","breach"],"severity":"critical","date":1776524984,"date_fmt":"Apr 18, 2026 \u00b7 15:09 UTC"},{"id":"33be2cbe458a7f153af4b523e27b121a","title":"Microsoft Teams right-click paste broken by Edge update bug","url":"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-teams-right-click-paste-broken-by-edge-update-bug\/","excerpt":"Microsoft is warning that a recent Microsoft Edge browser update introduced a bug that breaks right-click paste\u00a0in chats in the Microsoft Teams desktop client. [...]","image":"","source":"BleepingComputer","category":"news","tags":["malware","ransomware","breach"],"severity":"low","date":1776521481,"date_fmt":"Apr 18, 2026 \u00b7 14:11 UTC"},{"id":"d134451bcba12f147e6146d7aa824e82","title":"NAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, and Proxmox VE 9.0 Support","url":"https:\/\/www.bleepingcomputer.com\/news\/security\/nakivo-v112-ransomware-defense-faster-replication-vsphere-9-and-proxmox-ve-90-support\/","excerpt":"NAKIVO Inc. announced the general availability of NAKIVO Backup & Replication v11.2, focused on fast, reliable, and proactive data protection. [...]","image":"","source":"BleepingComputer","category":"news","tags":["malware","ransomware","breach"],"severity":"high","date":1776519954,"date_fmt":"Apr 18, 2026 \u00b7 13:45 UTC"},{"id":"7bb053af2b021510a8253b1a99024bb6","title":"Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks","url":"https:\/\/www.securityweek.com\/tycoon-2fa-loses-phishing-kit-crown-amid-surge-in-attacks\/","excerpt":"Threat actors are reusing Tycoon 2FA tools across other phishing kits following the platform\u2019s disruption.\nThe post Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks appeared first on Security\u2026","image":"","source":"SecurityWeek","category":"news","tags":["vulnerability","breach"],"severity":"low","date":1776508200,"date_fmt":"Apr 18, 2026 \u00b7 10:30 UTC"},{"id":"8e2e57bc370dfd187d05aafe4310e081","title":"[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data","url":"https:\/\/thehackernews.com\/2026\/04\/webinar-find-and-eliminate-orphaned-non.html","excerpt":"In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not\u00a0phishing. Not\u00a0weak passwords. Unmanaged non-human identities that nobody was\u00a0watching.\nFor every emp\u2026","image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi6vJpO9kksCQDpSksNkqDFNUCbXD70dMGYqI6P9S_XPMY5d8BR8PVdrsVQP1ZJO_-nzL6eQShM3Cap9heQ5kAglsPjfxwIcXPSsf_cfgUVnGQ2XzIWVOuo7JhxMjnHYDN6r9KlQ6LqZJisRZkjatnWChuzUkSlXRa1hFseUPq28PZ5gjGR7L2WzTFdZ3fM\/s1600\/ghost.jpg","source":"The Hacker News","category":"news","tags":["vulnerability","threat-intel"],"severity":"low","date":1776499620,"date_fmt":"Apr 18, 2026 \u00b7 08:07 UTC"},{"id":"38d25dbd0e1487ba248719a39393b9ff","title":"$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims","url":"https:\/\/thehackernews.com\/2026\/04\/1374m-hack-shuts-down-sanctioned-grinex.html","excerpt":"Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74 mill\u2026","image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhPcUvJCFRqDmEr1ZDSaUJCAymmKwZOeXdmfPY6Eekp7tLOpqjXLKHilHOHlNyuxmennQE8H5oxuRTaCncC8hsoGYEloD8OrDlR1wpbxGivBBB7KdVX8kiv_pOzC6GQ7LNPKoJGkFklpW0XutuLRPjl3I5cPta1n-BqVyAdO1luW3EUR8jyiZEtVjVTGWUK\/s1600\/grinex.jpg","source":"The Hacker News","category":"news","tags":["vulnerability","threat-intel"],"severity":"low","date":1776499140,"date_fmt":"Apr 18, 2026 \u00b7 07:59 UTC"},{"id":"fe4ab19828f541ae2ec670b025216219","title":"Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet","url":"https:\/\/thehackernews.com\/2026\/04\/mirai-variant-nexcorium-exploits-cve.html","excerpt":"Threat actors are exploiting security flaws in TBK DVR and end\u2011of\u2011life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuar\u2026","image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6cxZZMfiWctk3Me9QO6UlzVRFab0SPGMTzThjpcPHCXm49bQ0rRvtG2W6gicJw4Mi1QUuv-yTDMK5GKJju3QicyjYJwdbA86Ok8w2oU5Vg28l4s0HAVv7_c03dStaM7OPd4Yq0khmm9MeQVUYnCYThMx4JvkCnZZ5PEtCXAA90vKfsAumsMAIw085JIsz\/s1600\/botnet-ddos.jpg","source":"The Hacker News","category":"news","tags":["vulnerability","threat-intel"],"severity":"low","date":1776492060,"date_fmt":"Apr 18, 2026 \u00b7 06:01 UTC"},{"id":"b1e8295209ba0ca979a5f148241d9391","title":"How NIST's Cutback of CVE Handling Impacts Cyber Teams","url":"https:\/\/www.darkreading.com\/threat-intelligence\/nist-cutbacks-nvd-handling-impacts-cyber-teams","excerpt":"Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.","image":"","source":"Dark Reading","category":"news","tags":["vulnerability","cloud"],"severity":"low","date":1776455517,"date_fmt":"Apr 17, 2026 \u00b7 19:51 UTC"},{"id":"8fc7f5c53304f606b778c4cb8070edc4","title":"Payouts King ransomware uses QEMU VMs to bypass endpoint security","url":"https:\/\/www.bleepingcomputer.com\/news\/security\/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security\/","excerpt":"The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security. [...]","image":"","source":"BleepingComputer","category":"news","tags":["malware","ransomware","breach"],"severity":"high","date":1776453019,"date_fmt":"Apr 17, 2026 \u00b7 19:10 UTC"},{"id":"798dbc19af15d696285f7f22b9a7a447","title":"Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing","url":"https:\/\/www.darkreading.com\/threat-intelligence\/tycoon-2fa-hackers-device-code-phishing","excerpt":"In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.","image":"","source":"Dark Reading","category":"news","tags":["vulnerability","cloud"],"severity":"low","date":1776452751,"date_fmt":"Apr 17, 2026 \u00b7 19:05 UTC"},{"id":"c63a1ea3c80d93387898c9e3fd496376","title":"White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology","url":"https:\/\/www.securityweek.com\/white-house-chief-of-staff-to-meet-ith-anthropic-ceo-over-its-new-ai-technology\/","excerpt":"A White House official said the administration is engaging with advanced AI labs about their models and the security of software.\nThe post White House Chief of Staff to Meet With Anthropic CEO Over It\u2026","image":"","source":"SecurityWeek","category":"news","tags":["vulnerability","breach"],"severity":"low","date":1776452400,"date_fmt":"Apr 17, 2026 \u00b7 19:00 UTC"},{"id":"3c3afda1822b4ac631a8c12a7c56f0bb","title":"Ransomware attack continues to disrupt healthcare in London nearly two years later","url":"https:\/\/therecord.media\/ransomware-nhs-cyberattack-disruption","excerpt":"More than 18 months after a ransomware attack disrupted care at hospitals in South East London, documents show at least one NHS trust is still working without fully restored systems and managing large\u2026","image":"http:\/\/cms.therecord.media\/uploads\/NHS_London_7d0d26b37e.jpg","source":"The Record","category":"news","tags":["nation-state","threat-intel"],"severity":"high","date":1776451500,"date_fmt":"Apr 17, 2026 \u00b7 18:45 UTC"},{"id":"c70f4e01b36994d856f015dd0ccc544d","title":"Four arrested in latest \u2018PowerOFF\u2019 DDoS-for-hire takedown","url":"https:\/\/therecord.media\/ddos-hire-europol-doj-crackdown","excerpt":"More than 20 countries participated in a coordinated takedown of platforms selling cheap access to distributed denial-of-service (DDoS) attacks.","image":"http:\/\/cms.therecord.media\/uploads\/Power_Off_fdd5aa054d.jpg","source":"The Record","category":"news","tags":["nation-state","threat-intel"],"severity":"low","date":1776450600,"date_fmt":"Apr 17, 2026 \u00b7 18:30 UTC"},{"id":"16b26aa869a8f1aba833d72f2baa34c9","title":"Grinex exchange blames \"Western intelligence\" for $13.7M crypto hack","url":"https:\/\/www.bleepingcomputer.com\/news\/security\/grinex-exchange-blames-western-intelligence-for-137m-crypto-hack\/","excerpt":"Kyrgyzstan-based cryptocurrency exchange Grinex has suspended its operations after suffering a $13.7 million hack attributed to Western intelligence agencies. [...]","image":"","source":"BleepingComputer","category":"news","tags":["malware","ransomware","breach"],"severity":"low","date":1776438533,"date_fmt":"Apr 17, 2026 \u00b7 15:08 UTC"},{"id":"30c6947a3da8329ab15b6519a6b80ea0","title":"CoChat Launches AI Collaboration Platform to Combat Shadow AI","url":"https:\/\/www.securityweek.com\/cochat-launches-ai-collaboration-platform-to-combat-shadow-ai\/","excerpt":"CoChat is fundamentally an AI collaboration platform designed for teamwork and to bring visibility and governance into enterprise AI shadows.\nThe post CoChat Launches AI Collaboration Platform to Comb\u2026","image":"","source":"SecurityWeek","category":"news","tags":["vulnerability","breach"],"severity":"low","date":1776438000,"date_fmt":"Apr 17, 2026 \u00b7 15:00 UTC"},{"id":"435688bc544e3f60ced095dbb2afc261","title":"Every Old Vulnerability Is Now an AI Vulnerability","url":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/every-old-vulnerability-ai-vulnerability","excerpt":"AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones.","image":"","source":"Dark Reading","category":"news","tags":["vulnerability","cloud"],"severity":"low","date":1776437238,"date_fmt":"Apr 17, 2026 \u00b7 14:47 UTC"},{"id":"d2a4176872e20cb2dc4a40130d838eb5","title":"Ukraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies","url":"https:\/\/therecord.media\/ukraine-confirms-suspected-apt28-campaign-targeting-prosecutors","excerpt":"The intrusions exploited vulnerabilities in the open-source Roundcube webmail platform that allow attackers to execute malicious code when a victim simply opens an email in their inbox.","image":"http:\/\/cms.therecord.media\/uploads\/irina_grotkjaer_8_Sm_Djh_Oym_HA_unsplash_195fcf3066.jpg","source":"The Record","category":"news","tags":["nation-state","threat-intel"],"severity":"low","date":1776435120,"date_fmt":"Apr 17, 2026 \u00b7 14:12 UTC"},{"id":"d9a8fdbf47535503ffa4463b0fc662b0","title":"Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops","url":"https:\/\/www.bleepingcomputer.com\/news\/security\/inside-an-underground-guide-how-threat-actors-vet-stolen-credit-card-shops\/","excerpt":"In cybercrime markets, trust isn't assumed, it's verified. Flare reveals how underground guides teach actors to evaluate carding shops based on data quality, reputation, and survivability. [...]","image":"","source":"BleepingComputer","category":"news","tags":["malware","ransomware","breach"],"severity":"low","date":1776434471,"date_fmt":"Apr 17, 2026 \u00b7 14:01 UTC"},{"id":"92ccca8535c0b07ee554c56f66dabacb","title":"Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched","url":"https:\/\/thehackernews.com\/2026\/04\/three-microsoft-defender-zero-days.html","excerpt":"Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems.\nThe activity involves\u00a0the exploi\u2026","image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjJ8x3Yg0CYomOu1IpHfhfmiqJtgaMSnnoE2tJR6RdXGIy1rLRTORge-ukCLYkEj6xzeGTvmuy-68qfU4me_nG7pvwZi21h7ycQFwY3OXCH1_p_g35BAYeaHdz3uRKJD2mQCjUIcxha2WzMePpup2VHarxZVxy3QNtaRAjET-2FK7GemiuvyI8MpNPFVyEQ\/s1600\/defender.jpg","source":"The Hacker News","category":"news","tags":["vulnerability","threat-intel"],"severity":"low","date":1776432060,"date_fmt":"Apr 17, 2026 \u00b7 13:21 UTC"}]}