LiveThreat Advisory
// ADVISORIES & THREAT INTEL

ADVISORIES & THREAT INTEL

APT campaigns, nation-state threats, and security advisories analyzed through a third-party risk management lens.

🔓 Breaches 🔍 Advisories 🛡️ Vulnerabilities 📡 RSS
Time: Severity: 1802 items
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFUNC1069 Deploys Fake LinkedIn & Slack Profiles to Compromise Node.js Maintainers and Poison npm Packages

North Korean threat group UNC1069 is targeting Node.js core maintainers with fabricated LinkedIn and Slack identities, aiming to embed malware in popular npm modules. The supply‑chain attack could affect any organization that relies on compromised packages, making third‑party risk oversight essential.

High · Apr 04, 2026 · HackRead
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🎣
LIVETHREAT BRIEFDevice Code Phishing Attacks Surge 37‑Fold as EvilTokens and Competing Kits Democratize OAuth Credential Hijacking

Device‑code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant have increased more than 37× in 2026, driven by kits such as EvilTokens, VENOM, and others. The kits lower the barrier for credential theft, threatening any third‑party service that supports the flow.

High · Apr 04, 2026 · BleepingComputer
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFShinyHunters Reboots BreachForums, Centralizing 918 Stolen Databases and Raising Third‑Party Exposure Risk

ShinyHunters announced the resurrection of BreachForums after hacking its own hosting server and selling the full database for $10 k. The new admin released 918 historic breach dumps—including credentials, payment cards and health data—free on Telegram, dramatically expanding the attack surface for third‑party vendors.

High · Apr 04, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFCISO Warns Generative AI Deployments Stall, Shadow AI Grows, Raising Enterprise Risk

Enterprises are struggling to move generative AI pilots like Microsoft 365 Copilot into production, creating unmanaged “shadow AI” that bypasses security controls. This advisory outlines the associated third‑party risk and mitigation steps.

Medium · Apr 04, 2026 · DataBreachToday
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFOTP Authentication Bypassed in Rising Account‑Takeover Campaigns Threatening Global Banking

Recorded Future reports that fraudsters are increasingly hijacking SMS‑based one‑time passcodes to bypass MFA, enabling account takeover and payment fraud across banks and payment processors. The trend highlights a critical weakness in OTP‑centric authentication that third‑party risk programs must address.

High · Apr 04, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFVirtual RAM Gains Popularity as RAM Prices Surge, but Performance Gains Remain Limited

Rising DRAM costs have pushed users toward virtual RAM on Windows 11 PCs. While it offers modest speed bumps, virtual RAM cannot replace physical memory and may increase storage wear, a consideration for third‑party risk managers.

Informational · Apr 04, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFPhishing Campaign Impersonating Coca‑Cola and Ferrari Harvests Google Workspace Credentials via MFA‑Bypassing Fake Sign‑In Pages

Threat actors are leveraging high‑profile brand impersonation to lure job seekers into a fake scheduling flow that captures Google Workspace passwords and defeats two‑factor authentication. Organizations using Google services should tighten verification processes and enforce hardware‑based MFA.

High · Apr 03, 2026 · Malwarebytes Labs
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFPrompt Injection Threats Target Amazon Bedrock Multi‑Agent Applications

Unit 42’s research reveals that malicious prompts can compromise Amazon Bedrock’s multi‑agent framework, exposing data and enabling unauthorized tool execution when Guardrails are mis‑configured. Third‑party risk programs must verify AI guardrail settings and incorporate prompt‑injection testing.

High · Apr 03, 2026 · Palo Alto Unit 42
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFInconsistent Privacy Labels Fail to Inform Mobile App Users, Raising TPRM Concerns

Privacy labels on mobile apps are currently inconsistent and vague, making it difficult for users and enterprises to assess data‑handling practices. This lack of transparency creates compliance and reputational risks for organizations that rely on third‑party apps.

Medium · Apr 03, 2026 · Dark Reading
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFLinkedIn Covertly Scans 6,000+ Chrome Extensions and Harvests Device Data

LinkedIn injects undisclosed JavaScript that silently detects thousands of Chrome extensions and gathers detailed device information, linking the data to user profiles. The practice creates privacy‑compliance and competitive‑intelligence risks for enterprises that rely on the platform for recruiting and sales outreach.

High · Apr 03, 2026 · BleepingComputer
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFFCC Proposes $4.5 M Fine for Voxbeam Over Hosting Suspicious Foreign Robocall Traffic

The FCC has moved to fine Voxbeam Telecommunications $4.5 million for routing unauthorized foreign call traffic that spoofed major banks, highlighting a compliance gap that can expose downstream partners to large‑scale financial‑impersonation scams.

High · Apr 03, 2026 · The Record
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🎣
LIVETHREAT BRIEFChina‑Linked TA416 Conducts PlugX Malware and OAuth Phishing Campaign Against European Government Entities

TA416, a China‑aligned threat group, has been targeting European government and diplomatic organizations since mid‑2025 using OAuth‑based phishing and the PlugX remote‑access trojan. The campaign threatens third‑party risk by compromising credentials and establishing persistent footholds in public‑sector supply chains.

High · Apr 03, 2026 · The Hacker News
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFSupply Chain Attacks Compromise Popular JavaScript Libraries Axios and Trivy, Threatening Millions of Downstream Organizations

Threat actors altered the Axios HTTP client and injected malicious code into the Trivy security scanner, exposing millions of downstream organizations that rely on these open‑source components. The incidents highlight the systemic risk of third‑party dependencies and the need for rigorous supply‑chain controls in third‑party risk programs.

High · Apr 03, 2026 · Cisco Talos Intelligence
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFNorth Korean Hackers Exploit GitHub to Spy on South Korean Companies

FortiGuard Labs reports a high‑severity espionage campaign where North Korean actors used malicious GitHub repositories and CI/CD pipelines to harvest credentials and exfiltrate proprietary source code from South Korean firms, highlighting a critical supply‑chain risk for third‑party development platforms.

High · Apr 03, 2026 · HackRead
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFMalicious Axios NPM Versions Deploy RAT via Supply Chain Attack, Threatening Millions of JavaScript Projects

Two compromised Axios npm releases (v1.14.1 and v0.30.4) were published on March 31 2026, each containing a post‑install script that fetched a platform‑specific remote‑access trojan. The supply‑chain breach puts any organization that depends on the library at risk of credential exfiltration and further lateral attacks, making rapid remediation essential for third‑party risk management.

High · Apr 03, 2026 · Cisco Talos Intelligence
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFGoogle Meet Now Available on Apple CarPlay – Audio‑Only Meetings Directly from Your Dashboard

Google has introduced native Google Meet support for Apple CarPlay, enabling audio‑only meetings from the car’s infotainment screen. The limited feature set removes video and chat functions to keep drivers focused, but it creates new data‑in‑transit paths that third‑party risk managers should evaluate.

Low · Apr 03, 2026 · ZDNet Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFBudget MSI Pro MP243W 24‑inch Monitor Recommended for Cost‑Conscious Offices

ZDNet’s hands‑on review finds the $84 MSI Pro MP243W delivers acceptable performance for everyday office tasks, but its limited brightness and speaker quality mean organizations should verify firmware update policies before large‑scale deployment.

Low · Apr 03, 2026 · ZDNet Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFAdvisory: Employee Wearable Health Trackers (Oura Ring, Apple Watch) Pose Data Privacy Considerations for Enterprises

ZDNet’s side‑by‑side review of the Oura Ring and Apple Watch highlights continuous biometric monitoring and cloud syncing, raising privacy and third‑party risk concerns for organizations allowing wearables in the workplace.

Low · Apr 03, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🦠
LIVETHREAT BRIEFNoVoice Malware Found in 50 Google Play Apps, Exposing 2.3M Android Users

Security researchers discovered the NoVoice Android malware hidden in 50 Google Play applications, collectively downloaded over 2.3 million times. The infection targets outdated devices and bypasses Google’s automated scans, raising supply‑chain risk for enterprises that allow third‑party mobile apps.

High · Apr 03, 2026 · TechRepublic Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFCookie‑Controlled PHP Web Shells Enable Persistent Remote Code Execution on Linux Servers

Microsoft Defender researchers reveal a novel technique where attackers use HTTP cookies to command PHP web shells on Linux servers, persisting via cron jobs. The approach bypasses typical URL‑parameter filters and threatens any third‑party service running PHP, raising urgent TPRM concerns.

High · Apr 03, 2026 · The Hacker News
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFAI Firm Mercor Confirms 4 TB Data Breach via LiteLLM Supply‑Chain Attack

Mercor, an AI SaaS vendor, disclosed a breach after a malicious LiteLLM update enabled attackers to steal roughly 4 TB of proprietary data and internal systems, highlighting critical supply‑chain risks for third‑party risk managers.

High · Apr 03, 2026 · HackRead
Read Full Intelligence Brief →
Page 1 of 86