Cyber Security News

Start. Stay. Grow.

Curated daily. The latest hacks, breaches, and cyber trends—humanized.

Daily cyber brief

Hacking Editorial Brief – April 8, 2026

State-Sponsored Threat Groups Target Critical Infrastructure and Supply Chains

Iranian-affiliated APT actors are actively targeting internet-facing operational technology devices across U.S. critical infrastructure, including government facilities, water systems, and energy infrastructure. The campaign focuses on exploiting programmable logic controllers (PLCs), according to a CISA advisory. Separately, Russian military intelligence unit APT28 (Fancy Bear/Forest Blizzard) has compromised hundreds of small office/home office routers worldwide—primarily insecure MikroTik and TP-Link devices—to conduct DNS hijacking and man-in-the-middle attacks aimed at stealing Microsoft Outlook credentials from military and government targets. The FBI's Boston office led a national disruption operation against the Russian router compromise campaign, which affected devices across the United States.

North Korean state-sponsored group UNC1069 successfully compromised the Axios NPM package through sophisticated social engineering targeting the maintainer's account. The attackers distributed malicious packages containing a remote access Trojan to millions of downloads, representing a significant supply chain attack against the JavaScript ecosystem. The incident underscores the continued evolution of North Korean cyber operations targeting software supply chains. Additionally, a major data breach affecting the Los Angeles city attorney's office exposed 7.7 terabytes of sensitive LAPD records, including officer personnel files and internal affairs documents. Separately, a new Access Now report documents a cross-border hack-for-hire campaign targeting Egyptian journalists, while cybersecurity researchers have identified Telegram-based marketplaces where thousands of users purchase surveillance and hacking tools for domestic harassment.


Sources: CISA · Dark Reading · POLITICO · Microsoft Security · Boston Globe · Los Angeles Times · Access Now

Around the Web

Last Updated: N/A

Hacker icon

Hacks + Heists

Men Are Buying Hacking Tools to Use Against Their Wives and Friends | WIRED

Thousands of men are members of Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass ...

Read more →

Iranian hackers are targeting US energy and water sectors, federal agencies warn - Politico

... Cybersecurity and Infrastructure Security Agency on Tuesday. The guidance warns that Iran-linked hackers are targeting internet-connected ...

Read more →

North Korean Threat Group Compromises Axios NPM Package via Social Engineering

North Korean state-sponsored group UNC1069 used sophisticated social engineering to compromise the Axios NPM maintainer's account and distribute malic...

Read more →

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Iran-affiliated APT actors are targeting internet-facing operational technology devices across U.S. critical infrastructure sectors including governme...

Read more →

A hacker has allegedly breached one of China's supercomputers and is attempting to sell a ... - CNN

A hacker has allegedly stolen a massive trove of sensitive data – including highly classified defense documents and missile schematics – from a ...

Read more →
Cybersecurity icon

Big Cyber

Anthropic Announces Project Glasswing: AI-Powered Vulnerability Discovery Initiative

Anthropic announced Project Glasswing, providing its Claude Mythos frontier model to over 40 organizations including major tech giants to discover and...

Read more →

EPA, FBI, CISA, NSA Issue Joint Cybersecurity Advisory to Water System Regarding Iranian ...

... joint advisory warning to U.S. organizations, including those in the water sector, for an urgent and ongoing Iranian-affiliated cybersecurity thre...

Read more →

Iran-Linked APT Disrupting Critical U.S. Energy and Water Infrastructure

U.S. agencies issued an urgent warning that Iran-affiliated APT actors are conducting exploitation targeting PLCs and SCADA systems at U.S. energy and...

Read more →

Iranian hackers are targeting US energy and water sectors, federal agencies warn - Politico

... Cybersecurity and Infrastructure Security Agency on Tuesday. The guidance warns that Iran-linked hackers are targeting internet-connected ...

Read more →
Technology icon

Hard Tech

React2Shell (CVE-2025-55182)

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...

Read more →

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

We discovered three vulnerabilities that when chained together, allow for complete remote compromise:

Read more →

Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...

Read more →

Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094

Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...

Read more →

Loading...

The Cybersecurity Chronicles

‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.

Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.

Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Mark Nole Book Cover for Cybersecurity book

Stay Updated with Cyber Security News

Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.

Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.