Smart Slider updates hijacked to push malicious WordPress, Joomla versions

Attackers hijacked the update system for Smart Slider 3 Pro and pushed a malicious version (3.5.1.35) that installed multiple backdoors, created a hidden administrator account, and exfiltrated site credentials. PatchStack analysis shows the toolkit is multi-layered and persistent—using mu-plugins, theme and core file implants, and a database-independent loader—so affected WordPress and Joomla sites should restore a clean backup or immediately update to 3.5.1.36 and follow full cleanup procedures. #SmartSlider3 #PatchStack #WordPress #Joomla

Read More
Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Researchers warn that hardcoded Google API keys embedded in Android apps can be extracted to authenticate to Google’s Gemini AI, exposing developer resources and potentially user data. CloudSEK, Truffle Security, and Quokka found thousands of vulnerable keys across apps and websites, enabling attackers to access files, exhaust quotas, and bill LLM…

Read More
Can we Trust AI? No – But Eventually We Must

Businesses risk overreliance on large language models because they are probabilistic, ungrounded, and prone to hallucinations, bias, sycophancy, and model collapse—weaknesses attackers and misuse can exploit. A growing AI security industry (e.g., DeepKeep, AI Sequrity, Kamiwaza) is building provenance, guardrails, drift detection and agent-level controls to mitigate operational, reputational and adversarial…

Read More
Russian Hackers Exploit SOHO Routers for DNS Hijacking Campaign

The rise of SOHO router compromise campaigns, led by the Russia-linked threat actor Forest Blizzard, has turned poorly secured home and small-office devices into covert infrastructure for DNS hijacking and large-scale surveillance. By altering router DNS settings (often using dnsmasq) and conducting adversary-in-the-middle attacks against services like Outlook on the web…

Read More
Webinar: From noise to signal – What threat actors are targeting next

BleepingComputer will host a live webinar on April 30, 2026 exploring how threat actors leave observable signals across dark web forums, Telegram channels, and access broker marketplaces before launching attacks. Speakers from RansomLook and Flare Systems will explain how to identify meaningful chatter, track shifting attacker tactics, and turn external threat intelligence into prioritized defensive actions. #RansomLook #FlareSystems

Read More
When attackers already have the keys, MFA is just another door to open

Figure’s February 2026 breach exposed 967,200 email records, creating a large operational input that enables credential stuffing, AI-driven phishing, and help-desk social engineering without any exploited vulnerability. Legacy MFA is structurally insufficient against real-time relay (AiTM) attacks and MFA fatigue; true protection requires cryptographic origin binding, hardware-bound keys, and live biometric verification. #Figure #Evilginx

Read More
UNC6783 Turns BPO Providers into Cyberattack Gateways

UNC6783 is targeting business process outsourcing (BPO) companies as a pathway to infiltrate major organizations, using phishing, social engineering, live-chat impersonation, and fake updates to steal sensitive data and deploy remote access malware. Google’s analysis and Mandiant recommendations emphasize measures such as FIDO2 hardware keys, live-chat monitoring, blocking Zendesk-like domains, and…

Read More
Hackers steal .6 million from crypto ATM giant Bitcoin Depot

Bitcoin Depot, operator of over 25,000 Bitcoin ATMs, disclosed that attackers stole approximately 50.903 BTC (about $3.665 million) from company-controlled wallets after a March 23, 2026 breach. The company says the incident was contained to its corporate environment, engaged external cybersecurity experts and law enforcement, and warned its insurance may not fully cover resulting losses. #BitcoinDepot #ByteFederal

Read More
Hackers exploiting Acrobat Reader zero-day flaw since December

Attackers have been exploiting a zero-day in Adobe Reader via specially crafted PDFs since at least December, using a sophisticated fingerprinting-style exploit that runs on the latest Reader without user interaction. The exploit harvests local data using Acrobat APIs and can deploy follow-on RCE/SBX stages, so researchers advise not opening PDFs from untrusted sources until Adobe issues a patch. #AdobeReader #HaifeiLi

Read More