The cybersecurity world faced a barrage of threats this week, from sophisticated supply chain compromises and active nation-state operations to critical vulnerabilities requiring immediate patching. Google has introduced a public verification system for Android apps to combat supply chain attacks, allowing developers to publish cryptographic proofs of their app’s origin on a transparency log. Meanwhile, the official installers for DAEMON Tools Lite were compromised in a supply chain attack, distributing malware that installed a backdoor known as GHOSTPULSE on victims’ machines. Separately, a China-linked threat cluster named UAT-8302, also tracked as VANGUARD PANDA, has been observed targeting government entities across South America, Europe, and Asia by sharing custom malware payloads across regional operations.
Critical Vulnerabilities Under Active Attack
Multiple critical vulnerabilities are being actively exploited in the wild. Palo Alto Networks PAN-OS is under active attack via CVE-2026-23918 (https://cve.org/CVE-2026-23918), a command injection flaw in the management interface that enables remote code execution. Apache has patched CVE-2026-23918 (https://cve.org/CVE-2026-23918), a critical HTTP/2 vulnerability that could lead to denial of service and potential remote code execution. The MetInfo CMS is being targeted using CVE-2026-29014 (https://cve.org/CVE-2026-29014) for remote code execution attacks. A Mirai-based botnet variant called xlabs_v1 is exploiting exposed Android Debug Bridge (ADB) ports to hijack IoT devices. Additionally, the Iranian state-sponsored group MuddyWater has been spotted using Microsoft Teams calls to trick users into granting remote access, deploying a fake ransomware attack as cover for credential theft. A new RAT called CloudZ is exploiting the Windows Phone Link feature to steal credentials and OTPs from users.
Emerging Threats and Security Awareness
Researchers are raising alarms about two critical blind spots in enterprise security. A majority of organizations have failed to close a known backdoor that provides attackers a direct path into internal networks. Furthermore, as enterprises rapidly deploy AI agents for automation, security teams often lack visibility into what these autonomous systems are doing once inside the perimeter, creating new attack surfaces. The Hacker News has announced the launch of the ‘Cybersecurity Stars Awards 2026’ to recognize excellence in the field with submissions now open.
Source: The Hacker News

