⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
The Hacker News·60-word summary·1 min read
This week’s security recap highlights ongoing threats exploiting trusted third-party tools, with attackers gaining internal access through compromised downloads and browser extensions. The pattern involves manipulating trusted channels, including update paths, to deliver malware. These tactics demonstrate a shift in attack methods, emphasizing the importance of vigilance in maintaining trust and security across software supply chains.
Microsoft has warned that threat actors are increasingly abusing Microsoft Teams in helpdesk impersonation attacks, using legitimate tools for access and lateral movement within enterprise networks. The trend highlights growing security concerns around the misuse of trusted collaboration platforms, emphasizing the need for enhanced security measures to prevent such impersonation and unauthorized access.
WhatsApp has been found to leak user metadata, allowing strangers to infer limited information about users without direct messaging or knowledge. This security concern, reported in April 2026, raises potential risks for malicious activities, as attackers could exploit the metadata to target users. The leak highlights ongoing privacy vulnerabilities within popular messaging platforms.
Iran has expressed openness to US talks amid ongoing tensions, as former President Trump warned of a potential ceasefire breach. The situation has increased market volatility, reflecting uncertainty about US-Iran relations and the prospects for peace. The geopolitical instability continues to influence global markets, with no clear resolution in sight as diplomatic efforts remain uncertain.
Layerzero, a blockchain bridge, reported no contagion after a $290 million exploit, but concerns about its security and validation models remain. The incident has increased scrutiny on bridge infrastructure, with Chainlink’s Zach Rynes criticizing the design. The event highlights ongoing risks in cross-chain protocols and the need for improved security measures.
Circle’s delayed response contributed to North Korean hackers stealing $230 million in crypto, highlighting security vulnerabilities in crypto platforms. The incident, which occurred recently, raises concerns over regulatory scrutiny and investor confidence in the industry. The theft underscores the importance of prompt security measures to prevent large-scale cyberattacks in the crypto space.
Backups alone are insufficient for business continuity during cyberattacks or outages. Datto emphasizes the importance of Business Continuity and Disaster Recovery (BCDR) strategies to maintain operations during ransomware incidents and system failures. Relying solely on backups can leave businesses vulnerable, highlighting the need for comprehensive BCDR plans to ensure resilience in the face of security threats.