Cyber Security News

Start. Stay. Grow.

Curated daily. The latest hacks, breaches, and cyber trends—humanized.

Daily cyber brief

Hacking Editorial Brief: April 19, 2026

Multiple Windows zero-day vulnerabilities disclosed by a security researcher are now under active exploitation in the wild. Three privilege escalation flaws affecting Microsoft Defender—tracked as BlueHammer, RedSun, and UnDefend—allow threat actors to gain SYSTEM-level or elevated administrator permissions on compromised systems. The proof-of-concept exploits were publicly released, prompting immediate adoption by attackers. Security researchers have verified the BlueHammer exploit, which abuses Windows Defender's update process to escalate privileges. Additionally, CISA added a 17-year-old Microsoft Excel vulnerability to its Known Exploited Vulnerabilities catalog after detecting active exploitation by threat actors, underscoring the persistent risk posed by legacy software flaws in production environments.

Threat actors continue to abuse trusted automation and cloud infrastructure for malware delivery and data theft. Since October 2025, attackers have weaponized n8n workflow automation platform webhooks to conduct phishing campaigns and deliver malicious payloads, leveraging the platform's trusted domain reputation to evade detection. Separately, the ShinyHunters hacking group claims to have stolen nearly 80 million records from Rockstar Games through an Anodot and Snowflake vulnerability. In enforcement news, the FBI arrested 17-year-old Matthew Lane for the massive PowerSchool breach that exposed 60 million records, with the suspect reportedly expressing relief at being caught. The cryptocurrency sector also continues to face significant losses, with April emerging as one of the most damaging months for crypto hacking incidents according to industry reports.


Sources: BleepingComputer · Help Net Security · Cyderes · PC Gamer · The Hacker News · Yahoo Finance · SlashGear

Around the Web

Last Updated: N/A

Hacker icon

Hacks + Heists

How teens are being recruited into criminal hacking on gaming sites like Roblox

ABC News investigates teen hackers and how some are being recruited into breaking the law on the interactive gaming platform Roblox.

Read more →

A 17-year-old Excel vulnerability is currently being exploited by threat actors, and it's been flagged by the US' cyber defence agency

A 17-year-old Microsoft Excel vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog because threat actors are actively exploi...

Read more →

'Thankful I Got Caught': FBI Arrests Teen Hacker After Massive PowerSchool Breach

Discover the details of the massive PowerSchool breach. We explain how the FBI arrested teen hacker Matthew Lane for stealing 60 million records.

Read more →

Angry researcher drops second Windows Defender zero-day exploit: "They mopped the floor with me"

A second Windows Defender zero-day exploit enabling privilege escalation has been released publicly, with the researcher threatening to release additi...

Read more →

Man who hacked US Supreme Court filing system sentenced to probation - TechCrunch

Nicholas Moore hacked into three U.S. government networks using stolen credentials, and then bragged about it and posted victims' personal data on ...

Read more →
Cybersecurity icon

Big Cyber

He Pled Guilty To Blackmailing Apple. What Really Happened. - Cybercrime Magazine

This week in cybersecurity from the editors at Cybercrime Magazine ... Kerem Albayrak from north London threatened to wipe 319 million accounts unless...

Read more →

TP-Link routers face exploitation attempt linked to high-severity flaw | Cybersecurity Dive

The Cybersecurity and Infrastructure Security Agency previously added the command injection vulnerability, tracked as CVE-2023-33538, to its Known ...

Read more →

Navigating FDA's Updated Cybersecurity Guidance for Medical Devices

Pre-market submissions are a key opportunity for the FDA to evaluate cybersecurity measures, expert says.

Read more →

CISA Warns of Active Exploitation of Apache ActiveMQ Vulnerability Hidden for 13 Years

CISA warns that attackers are actively exploiting a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) that went undetected for 13 years bef...

Read more →
Technology icon

Hard Tech

React2Shell (CVE-2025-55182)

A 10.0 critical severity vulnerablility affecting server-side use of React.js, tracked as CVE-2025-55182 in React.js and CVE-2025-66478 specifically f...

Read more →

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

We discovered three vulnerabilities that when chained together, allow for complete remote compromise:

Read more →

Check Point - Wrong Check Point (CVE-2024-24919)

Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This ...

Read more →

Backdoor in XZ Utils allows RCE: everything you need to know - CVE-2024-3094

Detect and mitigate CVE-2024-3094, a critical supply chain compromise, affecting XZ Utils Data compression library. Organizations should patch urgentl...

Read more →

Loading...

The Cybersecurity Chronicles

‘The Cybersecurity Chronicles: 2024‘ pulls back the curtain on the digital threats that shaped our world last year, revealing the human stories behind the headlines. From art galleries frozen by ransomware to prison tablets hacked with a minus sign, from British Library archivists racing to protect centuries of knowledge to Spotify users meticulously curating their digital identities – these stories illuminate how cybersecurity touches every aspect of modern life.

Author Mark Nole weaves together intimate portraits of the people on all sides of the digital battlefield: the defenders working through sleepless nights to protect critical infrastructure, the victims grappling with stolen identities and lost savings, and even the attackers themselves, operating from nondescript offices with project management software and performance metrics.

Through detailed reporting and narrative storytelling, Nole reveals how 2024 became the year when cybersecurity stopped being just a technical problem and emerged as a fundamentally human challenge. Whether you’re a security professional or simply someone trying to understand our increasingly digital world, these chronicles offer an unprecedented look at how technology shapes – and sometimes betrays – our trust, our privacy, and our lives.

Mark Nole Book Cover for Cybersecurity book

Stay Updated with Cyber Security News

Get the latest cybersecurity headlines, breaking news, and expert insights delivered directly to your inbox. Stay ahead of threats and informed about the digital landscape.

Join thousands of cybersecurity professionals and enthusiasts. No spam, just valuable insights.