[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

The Hacker NewsApr 07, 2026SaaS Security / Enterprise Security In the rapid evolution of the 2026 threat landscape,…

OnePlus Nord 6 Launched in India With Snapdragon 8s Gen 4 SoC, 9,000mAh Battery: Price, Specifications

OnePlus Nord 6 was launched in India on Tuesday. The latest addition to the OnePlus Nord…

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign…

Rubin Observatory Discovers Over 11,000 Asteroids Within Weeks of Imaging

Observations with the Rubin Observatory have already located more than 11,000 new asteroids and improved the…

Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign

An active campaign has been observed targeting internet-exposed instances running ComfyUI, a popular stable diffusion platform,…

Fujifilm XT-30 III Mirrorless Digital Camera Launched in India With X-Trans CMOS 4 Sensor: Price, Features

The Fujifilm X-T30 III was launched in India on Tuesday, following its global debut in October…

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

Ravie LakshmananApr 07, 2026Vulnerability / Threat Intelligence A China-based threat actor known for deploying Medusa ransomware has…

Star Wars: Maul – Shadow Lord Now Available for Streaming Online: What You Need to Know

Star Wars: Maul – Shadow Lord is an animated action series that is going to premiere…

How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers

The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where…

Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

Ravie LakshmananApr 06, 2026Cybersecurity / Hacking This week had real hits. The key software got tampered with. Active bugs…