Cyber Security News

Start. Stay. Grow.

Curated daily. The latest hacks, breaches, and cyber trends—humanized.

Daily cyber brief

Hacking Editorial Brief — April 18, 2026

Active exploitation of recently disclosed Windows vulnerabilities is underway following the public leak of zero-day exploits. Threat actors are leveraging three Windows flaws, including the BlueHammer and RedSun privilege escalation vulnerabilities targeting Windows Defender. A frustrated security researcher has now released a second Windows Defender zero-day exploit publicly, with threats to publish additional remote code execution exploits. Separately, a proof-of-concept exploit for CVE-2026-39808 in Fortinet's FortiSandbox has been released, enabling unauthenticated attackers to execute arbitrary OS commands with root privileges.

Law enforcement actions continue against cybercriminals linked to financially motivated hacking campaigns. A British national pleaded guilty in California federal court to conspiracy charges related to hacking at least a dozen companies and stealing over $8 million in virtual assets. The defendant is affiliated with Scattered Spider, a threat group that emerged from "The Com" — a cybercrime community composed primarily of Western adolescent hackers. In a separate case, Nicholas Moore received one year probation for hacking three U.S. government networks including the Supreme Court filing system using stolen credentials. Federal investigators are also warning of increased Gen Z recruitment into cybercrime operations through gaming platforms, which serve as initial contact points for threat actor talent acquisition.


Sources: Bleeping Computer · Cybernews · Cybersecurity News · Justice Department · GovInfoSecurity · TechCrunch · KATU

Around the Web

Last Updated: N/A

Hacker icon

Hacks + Heists

Angry researcher drops second Windows Defender zero-day exploit: "They mopped the floor with me"

A second Windows Defender zero-day exploit enabling privilege escalation has been released publicly, with the researcher threatening to release additi...

Read more →

Man who hacked US Supreme Court filing system sentenced to probation - TechCrunch

Nicholas Moore hacked into three U.S. government networks using stolen credentials, and then bragged about it and posted victims' personal data on ...

Read more →

'It's the vibe': Court brawl hinges on alleged industrial-scale data hack - The Age

Was it industrial espionage on a massive scale, or is an Australian property data giant just hiding behind a case inspired by 'The Castle' in this ...

Read more →

EU's new age-check app faces hacking and privacy concerns - MSN

Critics warn of hacking and surveillance risks. Telegram CEO Pavel Durov has sharply criticized the EU's new age-verification app, calling it ...

Read more →

PoC Exploit Released for Microsoft Defender 0-Day Vulnerability

A proof-of-concept exploit for CVE-2026-33825 (BlueHammer), a critical Microsoft Defender zero-day vulnerability enabling local privilege escalation, ...

Read more →
Cybersecurity icon

Big Cyber

He Pled Guilty To Blackmailing Apple. What Really Happened. - Cybercrime Magazine

This week in cybersecurity from the editors at Cybercrime Magazine ... Kerem Albayrak from north London threatened to wipe 319 million accounts unless...

Read more →

TP-Link routers face exploitation attempt linked to high-severity flaw | Cybersecurity Dive

The Cybersecurity and Infrastructure Security Agency previously added the command injection vulnerability, tracked as CVE-2023-33538, to its Known ...

Read more →

Navigating FDA's Updated Cybersecurity Guidance for Medical Devices

Pre-market submissions are a key opportunity for the FDA to evaluate cybersecurity measures, expert says.

Read more →

CISA Warns of Active Exploitation of Apache ActiveMQ Vulnerability Hidden for 13 Years

CISA warns that attackers are actively exploiting a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) that went undetected for 13 years bef...

Read more →
Technology icon

Hard Tech

React2Shell (CVE-2025-55182)

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...

Read more →

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

We discovered three vulnerabilities that when chained together, allow for complete remote compromise:

Read more →

Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...

Read more →

Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094

Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...

Read more →

Loading...

The Cybersecurity Chronicles

‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.

Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.

Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Mark Nole Book Cover for Cybersecurity book

Stay Updated with Cyber Security News

Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.

Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.