Rockstar Games Data Breach: ShinyHunters Leak 78.6M Internal Analytics Records

Digital art depicting hackers with laptops around a shattered logo, conveying urgency.

The cybercrime group ShinyHunters has released a large cache of Rockstar Games corporate data after the publisher reportedly refused to pay ransom by an imposed deadline. According to the attackers, the dump contains more than 78.6 million records tied to internal analytics and monitoring of Rockstar’s online services, raising serious questions about SaaS supply chain … Read more

Booking.com Data Breach: Expert Analysis of the Recent Reservation Data Exposure

Split scene showcasing secure booking on one side and cybersecurity threats on the other.

One of the world’s largest online travel platforms, Booking.com, has reported a cyber incident that resulted in unauthorized access to information about certain users’ reservations. As part of its response, the company has forcibly reset PIN codes for a number of current and past bookings and started emailing affected customers to notify them of the … Read more

April Patch Tuesday: Critical SAP, Adobe, Microsoft and Fortinet Vulnerabilities

Visual contrast of data security and cyber threat themes in a digital landscape.

The April Patch Tuesday cycle has introduced a cluster of critical security vulnerabilities across key enterprise products from SAP, Adobe, Microsoft and Fortinet. Several flaws are already being actively exploited, significantly increasing the risk for organizations that delay patch deployment or lack mature vulnerability management processes. Critical SAP SQL Injection (CVE-2026-27681) Puts Financial Planning at … Read more

GlassWorm Malware Abuses Zig Dropper in Fake VS Code Extension to Infect Developer IDEs

Aerial view of a city skyline with colorful network icons and symbols overlaid.

A new wave of the GlassWorm malware campaign is targeting software developers by abusing a fake Visual Studio Code extension. Security researchers have identified a Zig-based native dropper embedded in a counterfeit WakaTime activity tracker, capable of silently compromising almost every VS Code–compatible IDE installed on a developer’s workstation. Malicious WakaTime Look‑Alike Extension Hits Open … Read more

Marimo CVE-2026-39987: Critical Remote Code Execution Exploited Within Hours of Disclosure

Two figures analyze a critical cybersecurity issue in a futuristic control room.

A critical vulnerability in the popular open-source data notebook Marimo has highlighted how quickly attackers now weaponize newly disclosed security issues. According to telemetry from Sysdig, the first real-world exploitation attempt of CVE-2026-39987 was observed less than 10 hours after the public advisory was released. CVE-2026-39987 in Marimo: Unauthenticated Remote Code Execution via WebSocket The … Read more

Compromised Smart Slider 3 Pro Update Delivers Backdoor to WordPress Sites

Close-up of a USB device and padlock with a skull, indicating an update process.

A coordinated supply chain attack on the update mechanism of the Smart Slider 3 Pro plugin for WordPress resulted in the short‑term distribution of a malicious version containing a full backdoor. For several hours, site owners who updated through the legitimate vendor infrastructure installed a compromised build that could silently take over their WordPress installations. … Read more

Critical EngageLab SDK Android Vulnerability Threatened Cryptocurrency Wallet Security

Cybersecurity scene with a hacker, locked phone, and digital treasures.

A high‑risk vulnerability in the widely used EngageLab SDK for Android push notifications and analytics has exposed millions of devices to potential data theft, including users of cryptocurrency and digital asset wallets. According to the Microsoft Defender Security Research Team, the flaw enabled attackers to bypass core Android protections and gain unauthorized access to sensitive … Read more

LucidRook Lua Malware Targets Taiwanese NGOs in Stealthy Cyber-Espionage Campaign

Sunset view of Taipei with a train crossing a bridge and an elegant pagoda.

A previously undocumented threat cluster, tracked by Cisco Talos as UAT-10362, has been linked to a targeted cyber‑espionage campaign against Taiwanese non‑governmental organizations and, likely, academic institutions. The operators rely on a new Lua‑based Windows malware family dubbed “LucidRook”, illustrating a broader trend: advanced threat actors are increasingly adopting less common programming languages to evade … Read more

Hack‑for‑Hire Campaign Targets MENA Journalists with Apple, Google Phishing and Android Spyware Links

Man distressed by cybercrime, staring at a laptop with hacker interface.

International digital rights and security groups Access Now, Lookout and SMEX have uncovered a long‑running hack‑for‑hire phishing campaign against journalists, activists and government employees across the Middle East and North Africa (MENA). The operation appears to be linked to a mercenary actor with suspected ties to Indian state interests and to the previously documented Bitter … Read more