HomeWeekly DigestsThis Week
LiveThreat Threat Intelligence

Weekly Threat Intelligence Digest — Apr 20 to Apr 27, 2026

Weekly threat intelligence digest from 453 items (41 critical, 152 high).

April 27, 2026 453 articles analyzed
LIVETHREAT WEEKLY THREAT DIGEST April 20 – April 27, 2026 This week’s data reinforced a growing shift: attackers are bypassing traditional perimeters and striking through trusted third‑party relationships rather than exploiting direct vulnerabilities. High‑impact breaches – from the $290 M KelpDAO DeFi heist to the Vercel and Anthropic AI model exposures – all leveraged compromised API providers, cloud admin accounts, or supply‑chain components. Ransomware gangs are weaponizing MSP and managed‑service access, while zero‑day exploits in AI sandboxes and Microsoft Entra further amplify privilege‑escalation risk across the vendor ecosystem. The common denominator is privileged access that cascades downstream. 👉 Access, not a flaw, is the primary risk driver for today’s supply‑chain attacks. 🚨 EXECUTIVE RISK SNAPSHOT * Supply‑chain entry points dominate → API providers, cloud hosting platforms and MSPs were the initial footholds in 12 of the 29 breaches. * Privilege amplifies impact → Hijacked admin or service‑principal accounts enabled multi‑tenant data exfiltration (e.g., 2.1 M Amtrak records, 130 K TikTok‑downloader victims) and ransomware spread across hundreds of downstream customers. * Blind spots persist → OT converters, serial‑to‑IP devices and undocumented fourth‑party services remain largely absent from most TPRM inventories, creating invisible attack surface. 🔍 WHAT CHANGED THIS WEEK * AI‑driven supply‑chain exploits surged – Claude Mythos, Cohere Terrarium and SGLang flaws gave attackers remote code execution inside model‑hosting pipelines. * Nation‑state actors are exploiting cloud admin misconfigurations (LayerZero, Entra Agent ID) to hijack cross‑chain verification and Azure AD tenants, extending impact to every SaaS relying on those identities. * Ransomware‑as‑a‑service now incorporates botnets (SystemBC) and post‑quantum encryption, raising the speed and scale of encryption across compromised vendor environments. * Vulnerability fatigue is evident – Microsoft’s critical ASP.NET Core and Defender flaws remain partially unpatched, while 1,300 SharePoint servers stay exposed despite a recent patch. 🎯 WHERE YOU ARE MOST LIKELY EXPOSED * Vendors that expose API layers or verification services – e.g., LayerZero, Anthropic, Cohere, SGLang – because a single compromised endpoint can corrupt data across multiple customers. * Cloud hosting platforms hosting CI/CD pipelines – Vercel, Context.ai, AWS/GCP integrations – where stolen OAuth tokens or AI tool access gave attackers source‑code and deployment secrets. * Managed Service Providers and MSPs that hold privileged admin credentials for client environments – highlighted by the ADT Okta breach and Gentlemen ransomware botnet usage. #Cybersecurity #TPRM #VendorRisk #SupplyChainSecurity #ThreatIntel #LiveThreat #VerisqAI

Articles Referenced in This Digest 453 items

Advisory (76)

HighCISA Hunts for Cisco Backdoor Spotted on Federal Network
HighStopping Data Leaks at the Speed of AI
HighMicrosoft traces Universal Print issues to Graph API code change
HighCyber chief: UK faces "perfect storm" for cyber security
HighUS OPM Health Insurance Data Collection Plan Draws Concern
HighPentagon Cyber Leaders Back $1.5T Budget Request
HighUK probes Telegram, teen chat sites over CSAM sharing concerns
HighItalian regulator fines national postal service orgs $15 million for data privacy violations
HighCISA Adds Eight Known Exploited Vulnerabilities to Catalog
HighPreparing for severe cyber threat: why leaders must act now
HighMicrosoft releases emergency updates to fix Windows Server issues
HighMicrosoft pulls service update causing Teams launch failures
MediumNearly half of cybersecurity pros want to quit - here's why
MediumWhy Cisco Is Eyeing Buy of Non-Human Identity Startup Astrix
MediumHow AI Increases the Load on Security Teams
MediumMaritime Cybersecurity Rules Make Waves
InformationalHelping Romance Scam Victims Require a Proactive, Empathic Approach
InformationalTekStream Targets Proactive Security With ImagineX Cyber Buy
InformationalUbuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers
LowMeta is overhauling how you sign in, manage settings, and protect your accounts
InformationalUsers advised to drop passwords and make room for passkeys
LowDoes Amazon price match other retailers? What to know
InformationalI put GPT-5.5 through a 10-round test: It scored 93/100, losing points only for exuberance
LowI tried ChatGPT Images 2.0: A fun, huge leap - and surprisingly useful for real work
InformationalSupporting AI adoption for UK cyber defence
InformationalAqua Compass MCP server enables real-time investigation and containment of runtime threats
InformationalIP Fabric MCP server adds governance and control to enterprise AIOps workflows
InformationalDoctor Lobby Urges Congress to Set AI Chatbot Safeguards
InformationalGermany Tries, Tries Again With ISP Data Retention Mandate
LowThe best Amazon Fire TV Stick VPNs of 2026: Expert tested and reviewed
LowThe best SEO reporting software of 2026: Expert tested and reviewed
InformationalGDPR works, but only where someone enforces it
InformationalA year in, Zoom’s CISO reflects on balancing security and business
LowOpenAI tackles a bad habit people have when interacting with AI
LowGoogle brings instant email verification to Android, no OTP needed
InformationalVonage, Girls Who Code Show What ‘Responsible AI’ Looks Like
InformationalPasskeys are more secure than traditional ways to log in
InformationalAI Hype vs. Reality: Is AI Really Rewriting the Vulnerability Equation?
InformationalElastic MCP Apps bring security and observability workflows into AI tools
InformationalAcronis GenAI Protection gives MSPs control over AI usage and data risks
InformationalProve Identity Platform connects verification, authentication, and fraud prevention
LowGoogle’s Workspace Intelligence promises privacy while running on your data
LowMicrosoft Teams to get efficiency mode on PCs with limited resources
InformationalPharma Giant Merck and Google Cloud Sign $1B Agentic AI Deal
InformationalWhy AI-Driven Arms Race Needs Better Threat Intelligence
InformationalWorld-first NCSC-engineered device secures vulnerable display links
InformationalThe best robot vacuums for 2026: Expert and lab tested
InformationalHow Google just revamped Gemini Enterprise for the agentic era - here's what's new
InformationalGoogle brings Auto Browse and Skills to Chrome Enterprise - and a new 'Gemini Summary'
InformationalNew Defense Department cyber strategy imminent, official says
InformationalAI-powered defense for an AI-accelerated threat landscape
LowVirtualBox 7.2.8 is out with Linux kernel 7.0 support and crash fixes
InformationalOneDrive updates focus on AI, access control, and compliance
InformationalI compared Thread, Zigbee, and Matter - here's the best smart home setup for you
InformationalI got an early look at ChatGPT Images 2.0, and it's impressive - with one exception
InformationalAirbus Acquires Quarkslab to Counter AI Reverse Engineering
InformationalCyber threats are rising. Your headcount isn’t.
InformationalStopping Fraud at Each Stage of the Customer Journey Without Adding Friction
Low Android 17 ends all-or-nothing access to your contacts
InformationalBreachLock Named Representative Vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation
InformationalDoes Walmart price match? What to know about online and in-store price matching policies
InformationalI saw Framework's new 'MacBook Pro for Linux' and it's the hardware enthusiasts deserve
InformationalDetection strategies across cloud and identities against infiltrating IT workers
InformationalNew cross domain guidance for government, industry and the wider security community
InformationalThe 5 Best VPN Extensions for Chrome
InformationalISC Stormcast For Tuesday, April 21st, 2026 https://isc.sans.edu/podcastdetail/9900, (Tue, Apr 21st)
LowI speed-tested Surfshark's new 'heavenly' Dausos VPN protocol - how it compares to WireGuard
InformationalCybersecurity jobs available right now: April 21, 2026
InformationalResearchers build an encrypted routing layer for private AI inference
InformationalWhat Enterprise 'AI Leaders' Are Doing Right
LowMicrosoft tests Windows Explorer speed, performance improvements
InformationalThe backup myth that is putting businesses at risk
InformationalEnterprise Remediation Benchmark: How Does Your Organization Compare?
InformationalWeb Traffic Visibility is the New Non-Negotiable
LowThe best robot vacuums for pet hair for 2026: Expert and lab tested
InformationalWeak vs. Strong AI Rollouts

Breach (24)

CriticalKelpDAO suffers $290 million heist tied to Lazarus hackers
CriticalCrypto infrastructure company blames $290 million theft on North Korean hackers
HighUdemy - 1,401,259 breached accounts
HighSecurity Affairs newsletter Round 574 by Pierluigi Paganini – INTERNATIONAL EDITION
HighWeek in review: Claude Mythos finds 271 Firefox flaws, Vercel breach
High Medical data of 500,000 UK volunteers listed for sale on Alibaba
HighPoor Risk Analysis Cost 4 Firms $1.7 Million in HIPAA Fines
HighADT confirms data breach after ShinyHunters leak threat
HighCarnival - 7,531,359 breached accounts
HighSmashing Security podcast #464: Rockstar got hacked. The data was junk. The secrets it revealed were not
HighCyberattack on French government agency triggers phishing alert
HighReport: Discord Group Uses Claude's Supposedly Secret Mythos
HighMalicious TikTok Downloader Extensions Quietly Compromised 130K Users
HighDiscord-Linked Group Accessed Anthropic’s Claude Mythos AI in Vendor Breach
HighToxic Combinations: When Cross-App Permissions Stack into Risk
HighCloud platform Vercel says company breached through third-party AI tool
HighAmtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak
HighVercel Breach Linked to Context.ai, ShinyHunters Says It’s Not Involved
HighVercel Employee's AI Tool Access Led to Data Breach
HighHealth AI Firm Faces Lawsuits Over DNA Data Use, Disclosure
HighScattered Spider member Tyler Buchanan pleads guilty to major crypto theft
HighFrance’s ANTS ID System website hit by cyberattack, possible data breach
HighBritish Scattered Spider hacker pleads guilty to crypto theft charges
HighSeiko USA website defaced as hacker claims customer data theft

Ransomware (5)

HighKyber ransomware gang toys with post-quantum encryption on Windows
HighRansomware Negotiator Pleads Guilty to BlackCat Scheme
HighRansomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
HighFormer ransomware negotiator pleads guilty to BlackCat attacks
HighThe Gentlemen ransomware now uses SystemBC for bot-powered attacks

ThreatIntel (325)

CriticalCritical bug in CrowdStrike LogScale let attackers access files
CriticalOver 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)
CriticalThe Top 8 Enterprise VPN Solutions
CriticalCritical minerals and cyber operations
CriticalCan AI Attack the Cloud? Lessons From Building an Autonomous Cloud Offensive Multi-Agent System
CriticalHackers exploit file upload bug in Breeze Cache WordPress plugin
CriticalSpiceJet Online Booking System
CriticalIntrado 911 Emergency Gateway (EGW)
CriticalYadea T5 Electric Bicycle
CriticalHangzhou Xiongmai Technology Co., Ltd XM530 IP Camera
CriticalCarlson Software VASCO-B GNSS Receiver
CriticalCISA orders feds to patch BlueHammer flaw exploited as zero-day
CriticalMicrosoft Patch Still Leaves 1,300 SharePoint Servers Exposed
CriticalCritical BRIDGE:BREAK flaws impact Lantronix and Silex Technology converters
CriticalMicrosoft out-of-band updates fixed critical ASP.NET Core privilege escalation flaw
CriticalDon’t Wait for a Patch. Mitigate RedSun Zero-Day Risk in Microsoft Defender Today 
CriticalProgress Software fixes sneaky WAF bypass vulnerability (CVE-2026-21876)
CriticalMicrosoft releases emergency patches for critical ASP.NET flaw
CriticalCISA flags new SD-WAN flaw as actively exploited in attacks
CriticalSurge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk
CriticalCISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133)
CriticalSiemens RUGGEDCOM CROSSBOW Station Access Controller (SAC)
CriticalSiemens Industrial Edge Management
CriticalSiemens SINEC NMS
CriticalZero Motorcycles Firmware
CriticalSiemens SINEC NMS
CriticalHardy Barth Salia EV Charge Controller
CriticalSiemens Analytics Toolkit
CriticalSenseLive X3050
CriticalSiemens RUGGEDCOM CROSSBOW Secure Access Manager Primary
CriticalSilex Technology SD-330AC and AMC Manager
Critical Mythos: An AI tool too powerful for public release
Critical52M-Download protobuf.js Library Hit by RCE in Schema Handling
CriticalAnthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
HighTrigona ransomware adopts custom tool to steal data and evade detection
HighIran’s cyber threat may be less ‘shock and awe’ than ‘low and slow,’ officials say
HighFlurry of Supply-Chain Software Library Attacks
HighSignal phishing campaign targets Germany’s Bundestag President Julia Klöckner
HighNew ClickFix attack Hides in Native Windows Tools to Reduce Detection Risk
HighHiding Bluetooth Trackers in Mail
HighIndirect prompt injection is taking hold in the wild
HighMicrosoft to roll out Entra passkeys on Windows in late April
HighWindows Update gets new controls to reduce forced restarts
HighNorth Korea's Lazarus Targets macOS Users via ClickFix
HighAI Phishing Is No. 1 With a Bullet for Cyberattackers
HighGovernment adoption of AI agents could outpace the private sector
HighNASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software
HighFIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
HighToronto police arrest three in Canada’s first mobile SMS blaster case
HighWhite House Warns of AI Model 'Extraction' Campaigns
HighHacker with a special interest in breaching sports institutions ends behind bars
HighAI is speeding up nation-state cyber programs
HighLuxury cosmetics giant Rituals discloses data breach impacting member personal details
HighCosmetics giant Rituals discloses data breach affecting customers
HighTrigona ransomware attacks use custom exfiltration tool to steal data
HighCloudsmith Raises $72M for Software Supply-Chain Security
HighVercel Finds More Compromised Accounts in Context.ai-Linked Breach
High[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
HighHouse Republicans unveil data privacy law that would override state protections
HighTrigona Affiliates Deploy Custom Exfiltration Tool to Streamline Data Theft
HighRAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace
HighHackers Use Hidden Website Instructions in New Attacks on AI Assistants
HighRansomware, fraud, and lawsuits drive cyber insurance claims to new peaks
HighScenario: Open-source framework for automated AI app red-teaming
HighGopherWhisper APT group hides command and control traffic in Slack and Discord
HighNew GopherWhisper APT group abuses Outlook, Slack, Discord for comms
HighUnwary Chinese Hackers Hardcoded Credentials into Backdoors
High Malicious trading website drops malware that hands your browser to attackers
High'The Gentlemen' Rapidly Rises to Ransomware Prominence
HighThe shadowy SIM farms behind those incessant scam texts - and how to stay safe
HighMalicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
HighDDoS wave continues as Mastodon hit after Bluesky incident
HighLABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
HighWhen Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks
HighICE Uses Graphite Spyware
HighNew Mirai variants target routers and DVRs in parallel campaigns
HighNew npm supply-chain attack self-spreads to steal auth tokens
HighInside Caller-as-a-Service Fraud: The Scam Economy Has a Hiring Process
High Researcher claims Claude Desktop installs “spyware” on macOS
HighHackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data
HighNew Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert
HighBluesky Back Online After DDoS Attack, as Iran-Linked 313 Team Takes Credit
HighMustang Panda Hits India and S. Korea with Updated LOTUSLITE Backdoor
HighDPRK Fake Job Scams Self-Propagate in 'Contagious Interview'
HighGoogle bets $32B on AI agent cyber force as security arms race escalates
HighLotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack
HighHarvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
HighUK cyber agency handling four major incidents a week as nation-state attacks surge
HighFrench police arrest suspected hacker behind dozens of data breaches
HighIR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist
HighShadow AI, deepfakes, and supply chain compromise are rewriting the financial sector threat playbook
HighOver 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks
High Fake Google Antigravity downloads are stealing accounts in minutes
HighExploits Turn Windows Defender into Attacker Tool
HighSystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation
HighPhishing and MFA exploitation: Targeting the keys to the kingdom
HighRansomware negotiator caught secretly assisting BlackCat extortion scheme
HighEmerging Enterprise Security Risks of AI
HighNew Lotus data wiper used against Venezuelan energy, utility firms
HighFrench govt agency confirms breach as hacker offers to sell data
HighUkraine busts ‘bot farm’ supplying thousands of fake Telegram accounts to Russian spies
HighEU targets two Russian propaganda networks with new sanctions
HighThe Ungoverned Workforce: Cybersecurity Insiders Finds 92% Lack Visibility Into AI Identities
HighChinese APT Targets Indian Banks, Korean Policy Circles
HighNGate NFC malware targets Android users through trojanized payment app
HighA single platform powers SIM farm proxy networks across 17 countries
HighOpenAI’s Chronicle feature lets Codex read your screen, raising privacy concerns
HighRansomware negotiator admits role in attacks he was hired to resolve
HighNo Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks
High‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
HighBad Apples: Weaponizing native macOS primitives for movement and execution
HighBluesky hit by 24-hour DDoS attack as pro-Iran group claims responsibility
HighThe US NSA is using Anthropic’s Claude Mythos despite supply chain risk
HighNGate Android malware uses HandyPay NFC app to steal card data
High Big Tech can stop scams. They just don’t (Lock and Code S07E08)
HighOver 800 Android Apps Targeted in PIN-Stealing Trojan Campaign
HighFracturing Software Security With Frontier AI Models
HighMicrosoft: Teams increasingly abused in helpdesk impersonation attacks
HighChina's Apple App Store infiltrated by crypto-stealing wallet apps
HighBluesky blames app outage on ‘sophisticated’ DDoS attack
HighCyberattack at French identity document agency may have exposed personal data
High​​Supply Chain Compromise Impacts Axios Node Package Manager​
High A week in security (April 13 – April 19)
HighVercel Confirms Major Security Incident as Hacker Claims $2M Ransom Demand
HighI tried to wipe my digital footprint without paying for a data removal service - 5 free ways
HighMeta and PortSwigger drive offensive security further to find what others miss
HighVercel breached via compromised third-party AI tool
High⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
HighVercel Traces Customer Data Theft to Agentic AI Tool Breach
HighThird-party AI hack triggers Vercel breach, internal environments accessed
HighBritish hacker tied to Scattered Spider campaign pleads guilty in $8M scheme
MediumGopherWhisper: new China-linked APT targets Mongolia with Go-based malware
MediumSECURITY AFFAIRS MALWARE NEWSLETTER ROUND 94
MediumU.S. CISA adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalog
MediumResearchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
MediumThreat actor uses Microsoft Teams to deploy new “Snow” malware
MediumCISA reports persistent FIRESTARTER backdoor on Cisco ASA device in federal network
MediumCISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
Medium12-year-old Pack2TheRoot bug lets Linux users gain root privileges
MediumTeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware
MediumTGR-STA-1030: New Activity in Central and South America
MediumThe npm Threat Landscape: Attack Surface and Mitigations
MediumNew Cisco firewall malware can only be killed by pulling the plug
MediumOver 10,000 Zimbra servers vulnerable to ongoing XSS attacks
MediumNew ‘Pack2TheRoot’ flaw gives hackers root Linux access
MediumFirestarter malware survives Cisco firewall updates, security patches
MediumPhantomRPC: A new privilege escalation technique in Windows RPC
MediumTropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
MediumZDI-26-296: Delta Electronics ASDA-Soft PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
MediumZDI-26-297: Siemens SINEC NMS Improper Authentication Privilege Escalation Vulnerability
MediumZDI-26-298: Siemens SINEC NMS Authentication Bypass Vulnerability
MediumZDI-26-299: Docker Desktop Enhanced Container Isolation Exposed Dangerous Function Local Privilege Escalation Vulnerability
MediumWith AI’s help, North Korean hackers stumbled into a near-undetectable attack
MediumUNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware
MediumSurveillance companies exploiting telecom system to spy on targets’ locations, research shows
MediumCISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March
MediumiOS Flaw Let Deleted Notifications Linger, Apple Issues Fix
MediumHarvester APT Expands Spying Operations with New GoGra Linux Malware
MediumUAT-4356's Targeting of Cisco Firepower Devices
MediumBad Memories Still Haunt AI Agents
MediumApple just fixed an iOS flaw exploited by the FBI - here's what happened
MediumApple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages
MediumThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories
MediumMilesight Cameras
MediumFIRESTARTER Backdoor
MediumCISA Adds One Known Exploited Vulnerability to Catalog
MediumMicrosoft Graph API misused by new GoGra Linux malware for hidden communication
MediumU.S. CISA adds a flaw in Microsoft Defender to its Known Exploited Vulnerabilities catalog
MediumApple Patches Exploited Notification Flaw, (Thu, Apr 23rd)
MediumApple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)
MediumIf cyber espionage via HDMI worries you, NCSC built a device to stop it
MediumHackers deployed wiper malware in destructive attacks on Venezuela’s energy sector
MediumNorth Korean hackers siphon more than $12 million from crypto users in sprawling campaign
MediumMirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers
Medium5 Key Takeaways from “Inside the Shape-Shifting Inbox: Understanding Modern Polymorphic Campaigns”
MediumMustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
MediumZDI-26-294: (0Day) Microsoft Windows library-ms NTLM Response Information Disclosure Vulnerability
MediumZDI-26-295: (0Day) PublicCMS getXml Server-Side Request Forgery Information Disclosure Vulnerability
MediumPhishing reclaims the top initial access spot, attackers experiment with AI tools
MediumNew GoGra malware for Linux uses Microsoft Graph API for comms
Medium[Guest Diary] Beyond Cryptojacking: Telegram tdata as a Credential Harvesting Vector, Lessons from a Honeypot Incident, (Wed, Apr 22nd)
MediumA .WAV With A Payload, (Tue, Apr 21st)
MediumCISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
MediumGoogle Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution
MediumNGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs
Medium22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters
MediumSiemens TPM 2.0
MediumU.S. CISA adds Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known Exploited Vulnerabilities catalog
Medium2026’s Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable
MediumHandling the CVE Flood With EPSS, (Mon, Apr 20th)
MediumResearchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems
MediumA Token Flaw Turned Azure's AI Agent Into a Spy
MediumAI Model Claude Opus turns bugs into exploits for just $2,283
InformationalHow to audit what ChatGPT knows about you - and reclaim your data privacy
InformationalFramework Laptop 13 Pro vs. MacBook Neo: These Windows rivals are more similar than expected
InformationalOwn a Hisense TV? I'd change these expert settings to noticeably improve the picture quality
InformationalAmerican utility firm Itron discloses breach of internal IT network
InformationalCheckmarx supply chain attack impacts Bitwarden npm distribution path
InformationalZorin OS vs. Solus: I tested two great Linux distros for beginners to find out which is best
InformationalThe Apple Music student discount saves you $5/month and gives you free Apple TV - here's how
InformationalI drove a bulldozer over this SSD enclosure so you don't have to - here's the result
InformationalMicrosoft rolls out revamped Windows Insider Program
InformationalFake CAPTCHA Scam Abuses Verification Clicks to Send Costly International Texts
InformationalUS Busts Myanmar Ring Targeting US Citizens in Financial Fraud
InformationalFrom Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026
InformationalADT says customer data stolen in cyber intrusion
InformationalOpenAI’s GPT-5.5 is out with expanded cybersecurity safeguards
InformationalCompromised everyday devices power Chinese cyber espionage operations
InformationalDORA and operational resilience: Credential management as a financial risk control
InformationalNew BlackFile extortion group linked to surge of vishing attacks
InformationalWhite House Says China-Linked Actors Tried to ‘Steal American AI’
InformationalWhat Is Cloud Security? A 2026 Guide
InformationalHealth Records of 500,000 UK Biobank Volunteers Listed Online in China
InformationalGlasswing Secured the Code. The Rest of Your Stack Is Still on You
InformationalThe best website builder for SEO in 2026: Expert tested and reviewed
InformationalThe best inventory management software of 2026: Expert tested and reviewed
InformationalThe Microsoft Surface Pro is nearly 40% off at Best Buy - and we highly recommend it
InformationalThe 4 streaming services I swear by - and my bill is just $40 a month
InformationalHow I used Claude AI to plan an entire hiking trip to the Adirondacks in 30 minutes - for free
InformationalI'm automating these 5 unexpected home devices - and life has been so much easier
InformationalFCC's router ban expands to portable hotspots - 4 things this means for you
Informational26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
InformationalBridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
InformationalNorway's prime minister proposes ban on social media access for young teens
InformationalPentagon grapples with securing AI as it moves toward autonomous warfare
InformationalChina-linked threat actors use consumer device botnets to evade detection, warn UK and partners
InformationalCheckmarx supply chain attack impacts Bitwarden npm distribution path
InformationalFrench Police Arrest HexDex Hacker Over Mass Data Theft and Leaks
Informational1-15 April 2026 Cyber Attacks Timeline
InformationalMicrosoft now lets admins uninstall Copilot on enterprise devices
InformationalISC Stormcast For Friday, April 24th, 2026 https://isc.sans.edu/podcastdetail/9906, (Fri, Apr 24th)
InformationalCoding is a Meta-Task
InformationalChina-Backed Hackers Are Industrializing Botnets
InformationalTropic Trooper APT Takes Aim at Home Routers, Japanese Targets
InformationalThis high-tech eye massager makes a great Mother's Day gift - and it's on sale
InformationalHow indirect prompt injection attacks on AI work - and 6 ways to shut them down
InformationalI tried this free Windows cleanup tool to see if it'd speed up my PC - and it worked
InformationalWhere AI in CI/CD is working for engineering teams
InformationalIT spending to hit $6.31 trillion record, thanks to AI
InformationalA study of 1,000 Android apps finds a privacy policy logging gap
InformationalUS sanctions Cambodian senator for millions earned through scam compounds
InformationalToday, trust is the superpower that makes innovation possible
Informationalfast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
InformationalFrontier AI and the Future of Defense: Your Top Questions Answered
InformationalFBI Extracts Deleted Signal Messages from iPhone Notification Database
InformationalUK warns of Chinese hackers using proxy networks to evade detection
InformationalMicrosoft: Some Teams users can’t join meetings after Edge update
InformationalRegular Password Resets Aren’t as Safe as You Think
InformationalNew Checkmarx supply-chain breach affects KICS analysis tool
InformationalBitwarden CLI npm package compromised to steal developer credentials
Informational Roblox clamps down on chats and age checks as legal pressure builds
InformationalIt pays to be a forever student
InformationalGoogle’s Pixel Update Sparks ‘Severe’ Battery Drain Across Multiple Models
InformationalApple Fixes iPhone Bug After FBI Retrieved Signal Messages
InformationalInternational cyber agencies share fresh advice to defend against China-linked covert networks
Informational Defending against China-nexus covert networks of compromised devices
InformationalExecutive Summary: Defending against China-nexus covert networks of compromised devices
InformationalElectricity Is a Growing Area of Cyber Risk
InformationalAfrica Relinquishes Cyberattack Lead to Latin America — For Now
Informational'Zealot' Shows What AI's Capable of in Staged Cloud Attack
InformationalChinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
InformationalThe best smart TV VPNs of 2026: Expert tested and reviewed
InformationalSonos Era 300 vs. Denon Home 400: Why I'm pulling the plug on the more popular speaker
Informational98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere
InformationalI paired headphones to my streaming stick for the first time - and fixed a big TV annoyance
InformationalBuilt for a hostile internet: Canonical VP of Engineering on Ubuntu 26.04 LTS
InformationalMy favorite MagSafe car charger easily handles bumpy roads (and it's on sale)
InformationalWhy I recommend this $450 Samsung phone over competing models by Google and OnePlus
InformationalWant free e-books? Stuff Your Kindle Day has 150+ titles discounted - today only
InformationalWatch out, Whoop: I'd switch to Google's new Fitbit tracker if these features are true
InformationalChina-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
InformationalProject Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
InformationalBitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
InformationalMedical data of 500,000 Britons put up for sale on Chinese website
InformationalTrump’s pick for CISA director withdraws from consideration
InformationalChina-linked hackers targeted Mongolian government using Slack, Discord for covert communications
InformationalDefending Against China-Nexus Covert Networks of Compromised Devices
InformationalISC Stormcast For Thursday, April 23rd, 2026 https://isc.sans.edu/podcastdetail/9904, (Thu, Apr 23rd)
InformationalEvolution of Chinese-Language Guarantee Telegram Marketplaces
Informational[local] AVAST Antivirus 25.11 - Unquoted Service Path
Informational[webapps] WordPress Plugin 5.2.0 - Broken Access Control
Informational[local] Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation
InformationalNCSC: Leave passwords in the past - passkeys are the future
InformationalUK: Russian Hacking Reaches New Levels of Hostility
InformationalWeaponizing Apathy: How Threat Actors Exploit Vulnerabilities and Legitimate Software
InformationalHarvester: APT Group Expands Toolset With New GoGra Linux Backdoor
InformationalMicrosoft: Most Windows 11 Users Don’t Need Third-Party Antivirus
InformationalK2view vs Broadcom For Test Data Management
InformationalSelf-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
InformationalChina’s cyber capabilities now equal to the US, warns Dutch intelligence
InformationalVenezuela energy sector targeted by highly destructive Lotus wiper
InformationalThunderbird 150 arrives with encrypted message search and OpenPGP improvements
InformationalApple Intelligence flaw kept stolen tokens reusable on another device
InformationalPentAGI: Open-source autonomous AI penetration testing system
InformationalISC Stormcast For Wednesday, April 22nd, 2026 https://isc.sans.edu/podcastdetail/9902, (Wed, Apr 22nd)
Informational[Podcast] It's not you, it's your printer: State-sponsored and phishing threats in 2025
InformationalNorth Korea’s Lazarus APT stole $290M from Kelp DAO
InformationalUK regulator to probe Telegram, teen chat sites for potential child safety violations
InformationalGrinex crypto exchange shuts down, blames Western agencies for $13.7M breach
InformationalThreat Intel Scraping Without Burning Your Cover or Your Stack
InformationalMoonshot AI's new Kimi K2.6 swarms your complex tasks with 1,000 collaborating agents
InformationalSamsung is ending Messages in July: 5 replacements I'd switch to now
Informational5 Apple products explain my optimism for John Ternus as the next CEO
InformationalScaling agentic AI demands a strong data foundation - 4 steps to take first
InformationalSilobreaker Mimir adds agentic AI to intelligence workflows with governance and transparency
InformationalScattered Spider hacker pleads guilty to stealing $8 million in cryptocurrency
Informational5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time
InformationalSiemens SCALANCE
InformationalChrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks
InformationalBritish Hacker Tyler Buchanan Pleads Guilty to $8M Hacking Scheme in US
InformationalHow to Remove Objects from Video: AI Tools & Pro Tips (2026)
InformationalFake TikTok Downloaders on Chrome and Edge Spying on 130,000 Users
InformationalWhatsApp Leaks User Metadata to Attackers
InformationalThe best website builders for small businesses in 2026: Expert tested and reviewed
InformationalI tested DJI's tiny 4K action camera for weeks - and now I'm ditching my GoPro for it
InformationalT-Mobile is practically giving away the Apple Watch Series 11 - here's how to get one
InformationalApple's foldable iPhone hinges on one key feature for me - and it's not the hardware
InformationalThere's a right way to wear your Apple Watch - and it affects your data
InformationalThe new Roku City screensaver game has me hooked - and it's free to play
InformationalGoogle Pixel phones have a useful voicemail feature that's hidden by default - how to enable it
InformationalFakeWallet crypto stealer spreading through iOS apps in the App Store
InformationalEU pushes for stronger cloud sovereignty, awards €180 million to four providers
InformationalAI platform ATHR makes voice phishing a one-person job
InformationalWhy Most AI Deployments Stall After the Demo
InformationalMaking opportunistic cyberattacks harder by design

Vulnerability (23)

CriticalMicrosoft Entra Agent ID Flaw Enabled Tenant Takeover via Privilege Escalation
CriticalCohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
CriticalMicrosoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
CriticalGoogle Fixes Critical RCE Flaw in AI-Based Antigravity Tool
CriticalSGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
HighLMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
HighCISA Adds Four Known Exploited Vulnerabilities to Catalog
High Apple fixes iOS bug that kept deleted notifications, including chat previews
HighMozilla Fixes 271 Firefox Bugs Using Anthropic’s Mythos AI
HighCISA Adds One Known Exploited Vulnerability to Catalog
HighClaude Mythos finds 271 Firefox flaws, Mozilla believes it shifts security toward defenders
HighNew Mirai campaign exploits RCE flaw in EoL D-Link routers
HighApple fixes iOS bug that retained deleted notification data
HighOracle Critical Patch Update, April 2026 Security Update Review
HighMultiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
HighMicrosoft Vulnerabilities Drop, But Critical Flaws Double, Report Warns
HighActively exploited Apache ActiveMQ flaw impacts 6,400 servers
HighMicrosoft Defender Flaws Exploited on Windows, Two Left Unpatched
HighThe MCP Disclosure Is the AI Era’s ‘Open Redirect’ Moment
HighSerial-to-IP Devices Hide Thousands of Old and New Bugs
HighCVE-2023-33538 under attack for a year, but exploitation still unsuccessful
LowNew Firefox update patches a whopping 271 bugs, thanks to Claude Mythos
LowZDI-26-293: (0Day) Microsoft Office URI Handler NTLM Response Information Disclosure Vulnerability

Daily breach, advisory, and vulnerability briefs publish every weekday.

View Live Breach Feed ← All Weekly Digests