The Hacker News

The Hacker News

[![Image 30: Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq1lOqG2e9eetuSt3ne59NkxH-r0lCjnTmodLlbXt29w5AH_utoClwW1RfvpY5rC7vqb1rVBR4ApELx1ROFvmuMpPpk_9R7tshflL0WwPRuD25vu1gzaFuuldwTzAbcb1m7y7TBsTLr863BQ…

[![Image 30: Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq1lOqG2e9eetuSt3ne59NkxH-r0lCjnTmodLlbXt29w5AH_utoClwW1RfvpY5rC7vqb1rVBR4ApELx1ROFvmuMpPpk_9R7tshflL0WwPRuD25vu1gzaFuuldwTzAbcb1m7y7TBsTLr863BQhLHdJGwRUmVzuLayR1gTnkmG_XCraID8EuzUzeeVLtgp7p/w72-h72-c-rw-e365/whatsapp-exploit.jpg) Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass](https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html). [![Image 31: New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyWMOJn1hR_Pua9p7XXWPbTqgrYvXyaNEXlnlLUQ0duD4P-W9fGyvbuprkiN0IMEE5_2vzt5mc603V4l_G5eH5KpKFgmk-lARuEXxcQVIgCNb-NPJghF3wvF9Wf8mF3kEJUY0TA6a3aBDw87MC9RivwM9ZVRfLRpwwNqaP67cU8nvtO8RKGsi5OsFIgSVn/w72-h72-c-rw-e365/chrome-exploit.jpg) New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released](https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html). [![Image 33: Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8T48UROZtSjRXtkxVcNT2VmXbB1texWQPAqLbm06uwmJ8VsYFb_HeXOnZx9uz9QL-LB3aWdwcLm9TbuRler7w7jjXJlL_tQweQualaW4XEVav7Ysulqx_CJyc9a0P1dO1a69W_eQhroxV1LA_p5VB9T38Xubc3zXHgwd-4sAAc2whuv4ElnC5WtFSn7SH/w72-h72-c-rw-e365/nextjs.jpg) Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials](https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html). [![Image 38: BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsBHK8DX9E30isZVcn1e-a6p8bmNUAki0SmUh1Tkt9dP8L3D4_WcwT64CI5OVuh1brb1Z4pff7onp90K76ktHbs6-H6Kr0rq9Q2f03oW91e3mA5dN5XdLDyWNns5NcfXw7BKFzH28SbpaFo9l8TmMeZ7Mt6o1ePanKeFYGa8V1S9Rez_E30SIAx2yvfuNl/w72-h72-c-rw-e365/revil-ransomware.jpg) BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks](https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html). [![Image 39: ⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZyEpyaWHYHm8-TyNZQgYtoAqrsAUDZ0_onxgp1BUSV0khgAkwy7S9fMT75sRAm2blJXN6xw6i4r0fXP_hayN2Afrr7ul6egJc2nvFJUoWqmy0iJCr5JdK9-915pCFpEtRdlOMb-BYexGAPQPdKnGjWPbPlfGFx5qOo5Dhzfjes7_k-s5bYgFDEyMCT5BJ/w72-h72-c-rw-e365/recaps.jpg) ⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More](https://thehackernews.com/2026/04/weekly-recap-axios-hack-chrome-0-day.html). [![Image 41: New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD7E4oEicfW1OaHztWEuM4qrsJFnHRPJ41f8R-2VeKUFV3Y59XaBUctumc2R91miQ3dMPnwkEcpPMqFErKmPRJhS3VRceve1GOSGGUsP6WHGIfoQAuVV10JVy312CxGYvmb2xA_eQtuO69bNb-1NzYln9P4xbsFDoPgWG3BEdri4sRRj415XQr1NENZBh0/w72-h72-c-rw-e365/grpu.jpg) New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips](https://thehackernews.com/2026/04/new-gpubreach-attack-enables-full-cpu.html). [![Image 42: Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1fiR51KBq7hNIR1D2V9e0jituEJTVutYd8b9v6KR0YdA30xWCSKJo3nfIykSdYSjZNe7gvNj3Wf3HidhZ24n-piDo8LhrE6ctyZrcLYNcJwCSP0KEe7G0Fl_xJm676Dv-4bFEh63Vv_xZ1zb9qOKhfeWFN5IexOHligHBCTHyVLAMDl0aeL2olDxnjfch/w72-h72-c-rw-e365/ai-chat.jpg) Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access](https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html).

查看原文

详细内容

1. Computer hacking – BBC News

Picture of Sophie Turner looking upset, with tears in her eyes and her hair pulled back. Meri-Tuuli Auer looking towards the camera, she is seated with her head resting in her hand. ## Hackers possibly took sensitive data, council says. A man in handcuffs is escorted by two police officers out of a building. ## AI firm claims Chinese spies used its tech to automate cyber attacks. Mike Burgess says state-linked hackers have tried to access water, transport and energy networks. Digital numbers and a fingerprint appear on a bright orange background. In the centre, framed inside a magnifying glass, is a young smiling man with close-cropped dark hair. One of the world’s most prominent cyber-criminals speaks to the BBC in an exclusive interview. Close up of silver Asahi beer can on wooden outdoor table and natural green foliage in background. ## Personal data potentially stolen in Asahi cyber-attack. #### Read the BBC In your own language.

阅读更多

2. Security News: Cybersecurity, Hacks, Privacy, National Security | WIRED

Security News · Men Are Buying Hacking Tools to Use Against Their Wives and Friends · Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything.

阅读更多

3. Hackread – Latest Cybersecurity News, Press Releases & Technology Today

Hackread – Cybersecurity News, Data Breaches, AI and More. Hackread – Cybersecurity News, Data Breaches, AI and More. Hackread – Cybersecurity News, Data Breaches, AI and More. Hackread – Cybersecurity News, Data Breaches, AI and More. Hackread – Cybersecurity News, Data Breaches, AI and More. Hackread – Cybersecurity News, Data Breaches, AI and More. ###### Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs. Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks. ## Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs. Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks. ## Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs. Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks. GrafanaGhost Vulnerability Allows Silent Data Theft via AI Injection. ## GrafanaGhost Vulnerability Allows Data Theft via AI Injection. Hackread – Cybersecurity News, Data Breaches, AI and More. Hackread – Cybersecurity News, Data Breaches, AI and More.

阅读更多

总结

本文整理了关于The Hacker News | #1 Trusted Source for Cybersecurity News的最新资讯。随着行业发展,相关信息会持续更新,敬请关注。

相关资讯

The danger of teens being recruited into criminal hacking – YouTube


本文整理自网络,发布时间:2026年04月15日 | 内容仅供参考

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注