Limited time: Exclusive early access to our threat dashboard — only 5 spots left. Don't miss this offer, act now — ending soon!

✓ SSL encrypted ✓ GDPR compliant ✓ Satisfaction guaranteePrivacy Policy Terms of Service405+ articles 11 categories 24/7 coverage
★★★★★ 4.9/5 — Trusted by 1000+ cybersecurity professionals worldwide
"NewsNukem has become my go-to source for cybersecurity intel. Fast, accurate, no fluff." — Security Analyst, Fortune 500 company
"Finally a cybersecurity news source that cuts through the noise. The AI-powered coverage catches threats I would have missed." — CISO, European fintech startup

Get Started Free — Subscribe to threat alerts

✓ Money-back guarantee · ✓ Risk-free · ✓ Cancel anytime

$ BREAKING

US and UK cyber leaders assess threat from advanced AI hacking model

New reports from US and UK security experts reveal the offensive cyber capabilities of a test AI model, signaling a new era of AI-driven threats.

ai security2 min read · Apr 14, 2026Read More →

Majority of Australian youth still use social media despite school ban, researchers find

New research reveals that a statewide social media ban in NSW schools is largely ineffective, with two-thirds of students easily bypassing restriction

6 min readApr 14

The Mythos incident: When AI closes the gap between detection and disaster

Anthropic's hypothetical 'Mythos' AI autonomously exploited zero-days in all major OSes, highlighting a critical 'post-alert gap' where detection is t

6 min readApr 14

Docker flaw lets attackers bypass authorization to gain host access

A high-severity flaw in Docker Engine, CVE-2026-34040, allows attackers to bypass security plugins and gain full access to host systems.

2 min readApr 13

GrafanaGhost exploit bypasses AI guardrails for silent data exfiltration

A new chained exploit, GrafanaGhost, uses AI prompt injection and a URL flaw to silently steal sensitive data from popular Grafana dashboards.

2 min readApr 13

Russian state-linked APT28 exploits SOHO routers in global DNS hijacking campaign

Russian state-linked hackers APT28 are exploiting insecure home and office routers globally in a widespread DNS hijacking campaign for cyber espionage

7 min readApr 13

AI-assisted campaign floods GitHub with over 300 malicious repositories

Researchers uncovered 'RepoStorm,' a campaign using AI to create hundreds of fake GitHub repositories that distribute info-stealing malware to develop

2 min readApr 13

Russia's Forest Blizzard nabs rafts of logins via SOHO routers

Russia's APT28 spies on global organizations by modifying DNS settings in vulnerable SOHO routers, enabling widespread, 'malwareless' credential theft

6 min readApr 13

Iranian state hackers target US critical infrastructure using basic exploits

A joint US agency warning reveals Iranian APTs are targeting internet-exposed Rockwell PLCs, leveraging default credentials to threaten physical syste

5 min readApr 13

Tech giants launch AI-powered ‘Project Glasswing’ to find critical software vulnerabilities

The OpenSSF, Google, and Anthropic are using AI models like Gemini and Claude to proactively find and fix security flaws in critical open-source softw

2 min readApr 13

Feds dismantle sprawling Russian GRU botnet that hijacked 18,000 routers for espionage

A detailed analysis of Operation Moonglow, the FBI takedown of a Russian GRU botnet that used custom malware on SOHO routers to steal Microsoft creden

6 min readApr 13

North Korean hackers spread over 1,700 malicious packages across major code registries

A North Korea-linked campaign has published over 1,700 malicious packages in multiple code registries, targeting developers using a wide array of lang

2 min readApr 13

Beyond the battlefield: Russia's relentless cyber war on Ukraine during the 2022 Easter truce

While a kinetic "Easter truce" was violated in 2022, Russia's cyber war against Ukraine intensified, targeting critical infrastructure with wipers and

7 min readApr 13