Latest Internet & Cybersecurity News

📅April 17, 2026 at 1:00 AM
Ransomware surges with new strains like NBLOCK and Gunra; Iranian hackers target US railroads and infrastructure amid ceasefire; critical Cisco patches, quantum threats, and AI cybersecurity advances dominate headlines.
1

DragonForce Ransomware Hits Vietnam Fortress Tools JSC

DragonForce Ransomware attacked and published data from Vietnam Fortress Tools JSC, highlighting ongoing ransomware threats to manufacturing sectors. This incident is part of broader weekly intelligence on cyber-attacks and breaches reported on April 17, 2026.Source 1 Organizations are advised to monitor for similar exposures in Windows OS and network shares.Source 1

2

NBLOCK Ransomware Emerges on Underground Forums

CYFIRMA identified NBLOCK Ransomware, a file-encrypting malware using AES-256 that appends ".NBLock" to files on local and network storage. It targets Windows systems and was discovered via threat discovery processes.Source 1 Victims face data inaccessibility without decryption keys, emphasizing ransomware trends across industries.Source 1

3

Gunra Ransomware Targets Multiple Countries and Sectors

Gunra, a double-extortion group since April 2025 using Conti code, hit victims in Brazil, South Korea, US, Spain, and Canada from April 2025 to 2026. It focuses on professional services, healthcare, consumer goods, manufacturing, and finance with advanced encryption.Source 1 This underscores evolving ransomware sophistication and geographic spread.Source 1

4

Iranian Cyber Actors Target US Railroads' PLCs

Federal Railroad Administration warned of Iranian state-affiliated hackers scanning internet-connected programmable logic controllers (PLCs) in US rail systems on April 16, 2026. Compromise could disrupt services or train safety; SMART Union urges vigilance for suspicious activity.Source 2 Rail workers should secure devices and report anomalies.Source 2

5

Iran Persists Cyber Threats Despite US Ceasefire

Iranian APTs, including IRGC-linked Handala, continue targeting US critical infrastructure despite a ceasefire pause announcement. US agencies urge high alert as threats compromise systems actively.Source 1 Geopolitical tensions fuel persistent cyber risks.Source 1

6

Chinese Supercomputer in Tianjin Breached for 10 Petabytes

Hacker 'FlamingChina' claimed exfiltration of over 10 petabytes of sensitive data from National Supercomputing Center in Tianjin. This massive breach exposes state-run high-performance computing vulnerabilities.Source 1 Implications for national security and data integrity are severe.Source 1

7

Cisco Patches Critical Webex and ISE Vulnerabilities

Cisco addressed critical bugs in Webex and Identity Services Engine (ISE), with ISE flaws potentially granting attackers network control. Experts note ISE exploits offer 'keys to the kingdom' despite Webex drawing headlines.Source 6 Immediate patching is critical to prevent takeovers.Source 6

8

Nginx-ui MCP Authentication Flaw Actively Exploited

A missing authentication flaw in Nginx-ui MCP allows same-network attackers to alter configurations, enabling full system takeover. This vulnerability is under active exploitation.Source 6 Organizations using nginx-ui must apply fixes urgently.Source 6

9

OpenAI macOS App Hit by Axios Supply Chain Attack

OpenAI's macOS app-signing process suffered an Axios supply chain attack, prompting certificate revocation and rotation. This incident highlights risks in software distribution ecosystems.Source 6 Users should update apps to mitigate persistence risks.Source 6

10

Quantum 'Harvest Now, Decrypt Later' Threat Underway

Vanderbilt Quantum Forum panelists warn of ongoing 'harvest now, decrypt later' strategy where adversaries collect encrypted data for future quantum decryption. Urgent migration to post-quantum cryptography is needed despite legacy system challenges.Source 9 Cross-sector collaboration is essential for readiness.Source 9

11

Compromised DVRs Proliferate in the Wild

SANS Internet Storm Center reports on compromised DVRs detectable across networks, posing risks for botnets and surveillance breaches. Handler Jesse La Grew highlights this in the top story for April 16, 2026.Source 4 Threat level remains green, but scanning is advised.Source 4

12

Vishing Attacks Bypass Okta MFA for SSO Access

Attackers use vishing to target Okta, bypassing multi-factor authentication and gaining broad single sign-on data access. This tactic enables persistent unauthorized entry.Source 6 Enhanced verification protocols are recommended.Source 6