Docker208IN STACK · 2026-04-14 21:48
Why We Chose the Harder Path: Docker Hardened Images, One Year Later
We're coming up on a year since launching Docker Hardened Images (DHI) last May, and crossing a milestone earlier this month made me stop and reflect on what we've actually been building. Earlier this month, we crossed over 500k daily pulls of DHIs, and over 25k continuously patched OS level artifacts in our SLSA Build...
Rapid7 Blog40 · 2026-04-14 12:31
Your Cloud Detection Strategy in 2026: What to Expect at the Global Cybersecurity Summit
Cloud environments have changed how security teams detect and respond to threats. Signals come from more places, identities are harder to track, and attacks rarely stay within a single system. For many teams, the challenge is no longer visibility. It is having the risk context to understand what matters and act on it quickly. This shift is reflected in the conversations shaping this year’s Rapid7 Global Cybersecurity Summit. Taking place May 12-13, the summit explores how detection and respon...
Elastic Security Labs40 · 2026-04-14 00:00
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT
Elastic Security Labs uncovers a novel social engineering campaign that abuses the popular note-taking application, Obsidian's legitimate community plugin ecosystem. The campaign, which we track as REF6598, targets individuals in the financial and cryptocurrency sectors through elaborate social engineering on LinkedIn and Telegram.
The Hacker News28 · 2026-04-14 05:50
ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers
A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0. It relates to a case of unrestricted file upload that stems from improper validation of
ElcomSoft blog22 · 2026-04-14 14:00
Low-Level Extraction for iOS 17 and 18
We’ve just updated iOS Forensic Toolkit to version 10.0, significantly expanding its low-level extraction capabilities for both the extraction agent and bootloader-based methods. Previously, agent-based extraction was capped at iOS 16.6.1. This release finally covers the remainder of the iOS 16 branch, and adds support for the entire iOS 17 branch as well as iOS […]
SentinelOne17IoCs DETECTED · 2026-04-14 22:59
Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack
On April 9, 2026, cpuid.com was actively serving malware through its own official download button. Threat actors had compromised the CPUID domain at the API level and were silently redirecting legitimate download requests to attacker-controlled infrastructure. The attack ran for approximately 19 hours. Users who navigated directly to the official site received a legitimate, properly […]
Tenable Blog17 · 2026-04-14 20:45
Claude Mythos: Prepare for your board’s cybersecurity questions about the latest AI model from Anthropic
With the Federal Reserve Chairman meeting with bank CEOs to discuss the security implications of Claude Mythos, you can bet that your board of directors will ask you about the impact of the AI model on your cybersecurity strategy. Here’s how to prepare. Key takeaways Anthropic announced Claude Mythos Preview, its most powerful general-purpose frontier model to date, and highlighted its exceptional ability to find software vulnerabilities that no human vulnerability research had previously di...
Cyber Kendra17 · 2026-04-14 17:01
Cloudflare Mesh Wants to Replace Your VPN — and It's Built for AI Agents, Not Just Humans
The way teams think about private network access has quietly changed. A year ago, the things knocking on your internal APIs were your developers and your services. Today, there's a growing third category: AI agents — running autonomously, without interactive logins, against infrastructure that was never designed to let them in. Cloudflare wants to solve that. Today, the company launched Cloudflare Mesh, a private networking product built on post-quantum encryption that connects servers, lapto...
SitePoint17 · 2026-04-14 16:29
DeepSeek V4 Preview: What the Fast, Expert, and Vision Modes Suggest
Short news analysis with mode-by-mode breakdown, why it matters for developers, and a practical watchlist for release day Continue reading DeepSeek V4 Preview: What the Fast, Expert, and Vision Modes Suggest on SitePoint .
Qualys Threat Research15 · 2026-04-14 20:16
Microsoft and Adobe Patch Tuesday, April 2026 Security Update Review
April 2026’s Patch Tuesday arrives with Microsoft addressing a fresh set of vulnerabilities across its ecosystem, reinforcing the ongoing need for timely patching in an increasingly threat-heavy landscape. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for April 2026 This month’s release addresses 163 vulnerabilities, including eight critical-severity vulnerabilities. In this month’s updates, Microsoft has addressed one publicly disclosed zero-day vulnerability and...
Cyber Kendra14 · 2026-04-14 15:17
PHP Composer Hit by Two Command Injection Flaws That Work Even Without Perforce Installed
If you use PHP's Composer package manager, stop what you're doing and run composer.phar selfupdate right now. Two newly disclosed command injection vulnerabilities — CVE-2026-40261 and CVE-2026-40176 — in Composer's Perforce VCS driver could let an attacker execute arbitrary commands on your system, and here's the unsettling part: Perforce doesn't even need to be installed on your machine for the attack to work. Both flaws were patched today in Composer 2.9.6 and 2.2.27 (LTS), disclosed by m...