Blogs & insights
Latest Dark Nuvens blogs
AI is changing the game and so are the risks
Artificial Intelligence (AI) is transforming businesses operations, from automating tasks to analysing data faster than any human can. With every...
Close your cybersecurity gaps before attackers find them
We all know that in today’s fast-moving digital world, it’s not a matter of if your systems will be prodded by cybercriminals, it’s when. From...
No business is too small: Why hackers are interested in you
Think your business is too small to be hacked? Think again. In 2024, 70% of organisations globally suffered a significant cyber attack, and small...
Bridging the cyber skills gap: Outsourcing your cybersecurity needs
Cybercrime is rising fast, but skilled professionals who can defend against it are in short supply, especially across Africa. Building a full-time...
Caught in the web: How cyber ‘spiders’ harvest your personal information
Ever heard of cyber spiders? They’re not the creepy kind but are just as dangerous. Cyber spiders are bots used by criminals to scan the internet,...
The Hacker News feed
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- [Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Databy info@thehackernews.com (The Hacker News) on April 18, 2026 at 8:07 am
In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, and OAuth grants. When projects end or employees leave, most
- $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claimsby info@thehackernews.com (The Hacker News) on April 18, 2026 at 7:59 am
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The exchange said it fell victim to what it described as a large-scale cyber attack that bore hallmarks of foreign intelligence agency involvement. This attack led to the theft of over 1
- Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnetby info@thehackernews.com (The Hacker News) on April 18, 2026 at 6:01 am
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE-2024-3721 (CVSS score: 6.3), a medium-severity command injection vulnerability affecting
- Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatchedby info@thehackernews.com (The Hacker News) on April 17, 2026 at 1:21 pm
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse (
- Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaulby info@thehackernews.com (The Hacker News) on April 17, 2026 at 10:47 am
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing third-party apps to access the contact lists and a user's location in





![[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6vJpO9kksCQDpSksNkqDFNUCbXD70dMGYqI6P9S_XPMY5d8BR8PVdrsVQP1ZJO_-nzL6eQShM3Cap9heQ5kAglsPjfxwIcXPSsf_cfgUVnGQ2XzIWVOuo7JhxMjnHYDN6r9KlQ6LqZJisRZkjatnWChuzUkSlXRa1hFseUPq28PZ5gjGR7L2WzTFdZ3fM/s1600/ghost.jpg)



