HomeWeekly DigestsThis Week
LiveThreat Threat Intelligence

Weekly Threat Intelligence Digest — Apr 27 to May 04, 2026

Weekly threat intelligence digest from 420 items (46 critical, 165 high).

May 04, 2026 420 articles analyzed
LIVETHREAT WEEKLY THREAT DIGEST April 27 – May 04 2026 This week the threat landscape crystallized around one core reality: attackers are exploiting trusted, privileged access in third‑party ecosystems to achieve outsized impact. From the VECT 2.0 ransomware that irreversibly wipes large files to an AI‑driven API token that erased a production database in seconds, the common denominator is privileged credentials held by vendors or their suppliers. Simultaneously, a wave of zero‑day exploits—cPanel, LiteLLM, GitHub, and multiple SaaS APIs—showed how quickly a single flaw can cascade across dozens of downstream customers. The convergence of privileged‑access abuse and rapid vulnerability exploitation is reshaping supply‑chain risk. 👉 Access, not just vulnerability, is the dominant risk driver for your vendor ecosystem. 🚨 EXECUTIVE RISK SNAPSHOT * Supply‑chain breach → MSPs, CI/CD pipelines, and SaaS admin consoles were the initial footholds for 6 supply‑chain attacks and 22 third‑party dependency incidents. * Privilege amplification → A compromised API token at Cursor AI and a stolen cPanel admin account each triggered enterprise‑wide data loss or ransomware‑like wiping. * Blind‑spot exposure → OT, cloud‑native services, and unmanaged sub‑vendors remain under‑reported in most TPRM inventories, creating invisible attack paths. 🔍 WHAT CHANGED THIS WEEK * Attackers are weaponizing AI agents to automate destructive actions once privileged tokens are obtained. * Zero‑day exploits are being weaponized within days of disclosure (e.g., LiteLLM CVE‑2026‑42208, cPanel CVE‑2026‑41940), shrinking the window for remediation. * Supply‑chain attackers are chaining multiple vendor compromises (Anodot → Vimeo, SAP npm → credential theft) to amplify reach. * Regulatory‑grade data loss is emerging as ransomware evolves into wipers, turning ransom payments into futile data‑recovery attempts. 🎯 WHERE YOU ARE MOST LIKELY EXPOSED * SaaS platforms that expose admin APIs or API keys (e.g., LiteLLM, Anodot, ClickUp). * Cloud hosting providers and MSPs using cPanel/WHM or similar control panels. * Vendors that integrate third‑party AI or ML services (Cursor AI, Claude, Anthropic) where token leakage can trigger massive deletions. * ERP, CRM, and data‑broker services that rely on shared authentication (Salesforce, SAP npm packages, Data Broker). * OT and IoT environments lacking formal TPRM coverage but dependent on cloud‑managed gateways (ABB, FUXA). ⚡ WHAT TPRM LEADERS SHOULD DO THIS WEEK 1. **Audit privileged third‑party access** – Pull a real‑time list of all admin/API credentials held by vendors. 👉 Ask: “Which of your staff or services have root‑level or API‑key access to our environment?” #Cybersecurity #TPRM #VendorRisk #SupplyChainSecurity #ThreatIntel #LiveThreat #VerisqAI

Articles Referenced in This Digest 420 items

Advisory (72)

HighHandling the Vulnerability Surge in the Post-Mythos Era
HighPreparing for a ‘vulnerability patch wave’
HighIf AI's So Smart, Why Does It Keep Deleting Production Databases?
HighSenate Judiciary advances bill that would bar minors from interacting with AI companions
HighShadow AI risks deepen as 31% of users get no employer training
HighDHS Shutdown Ends as CISA Faces Long Recovery
HighMeta accused of violating DSA by failing to safeguard minors
HighHouse approves spy program on second attempt, Senate fate murky
HighOpenAI's Founding Promise Goes on Trial
HighThe Exchange Online security controls organizations keep getting wrong
HighPentagon's Anthropic Fight Draws Rebuke From Ex-DOD Leaders
HighMicrosoft says Outlook.com outage is causing sign‑in failures
HighIs Your IAM Ready for AI?
MediumYour work apps are quietly handing 19 data points to someone
MediumMicrosoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha
Medium 3 easy-to-miss cybersecurity risks for small businesses
MediumCybersecurity Experts Unimpressed With CISA OT Guidance
MediumCongress punts FISA renewal to June
MediumDanger of Libredtail [Guest Diary], (Wed, Apr 29th)
MediumFIDO Alliance wants to keep AI agents from going rogue on online payments
MediumWhy Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
LowChatGPT advanced account security adds passkeys and hardware keys
InformationalSpotting third-party cyber risk before attackers do
LowGoogle Revamps Bug Bounty Programs: Android Rewards Rise, Chrome Payouts Drop in the Age of AI
LowA common charging habit was quietly killing my iPhone's battery - here's the fix
InformationalEssential Data Sources for Detection Beyond the Endpoint
LowMicrosoft tests modern Windows Run, says it's faster than legacy dialog
InformationalPalo Alto Networks Targets AI Agent Gateway With Portkey Buy
InformationalAnthropic Opens Claude Security for Wider Public
InformationalCisco Introduces Model Provenance Kit to Strengthen AI Supply Chain Security
InformationalForget productivity: Here are 5 strategic shifts that drive real AI value
Informational4 interior designers told us what smart tech you should actually buy
InformationalMoving from AI pilots to business-wide value requires a superhighway - how to ramp up
LowI used Photoshop's new AI tool to rotate objects in 3D, and it's pure magic
InformationalTop Five Sales Challenges Costing MSPs Cybersecurity Revenue
LowWindows 11 KB5083631 update released with 34 changes and fixes
InformationalCareful Adoption of Agentic AI Services
InformationalMicrosoft Agent 365, now generally available, expands capabilities and integrations
InformationalAnthropic launches Claude Security to counter rapid AI-Powered exploits
InformationalAnnouncing PAI 5.0
LowNew infosec products of the month: April 2026
InformationalIdentity is the control plane for distributed infrastructure
LowOpen-source privacy proxy masks PII before prompts reach external AI services
InformationalSocket Buys Secure Annex to Expand Supply-Chain Visibility
LowWhat’s new, updated, or recently released in Microsoft Security
LowI asked ChatGPT Images 2.0 to redesign my app UIs - and wow
InformationalThe New Partner-Vendor Relationship
InformationalPrivacy in the AI era is possible, says Proton's CEO, but one thing keeps him up at night
LowThe best cloud phone systems of 2026: Expert tested and reviewed
LowI stopped this common charging habit that was quietly killing my iPhone's battery
InformationalUS FDA Piloting Use of AI for 'Real-Time' Clinical Trials
LowSilverfort Purchases Fabrix to Bring AI to Access Decisions
InformationalAfter years of Linux, I tried GhostBSD and found it incredibly stable - and nearly unbreakable
InformationalThe best VPN for small businesses in 2026: Expert tested and reviewed
LowIs Facebook adding Gen Z phrases to your shared posts? You're not alone, bestie. Here's what's happening.
InformationalEero Signal keeps your business online during internet outages
InformationalDLP Made Easier On The Teams Running It
InformationalEurope Gliding Toward Mandatory Online Age Verification
LowThe best Apple TV VPNs of 2026: Expert tested and reviewed
LowAmazon Prime Day 2026 is likely coming earlier. Here's everything to know so far
LowThe best VPN services for iPhone in 2026: Expert tested and reviewed
Low5 ways your Windows updates are about to get a lot less painful
InformationalNSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
LowCequence Agent Personas bring granular control and governance to enterprise AI agents
InformationalSevii unveils Cyber Swarm Defense Mode to stop AI-driven attacks at scale
InformationalIdentity discovery: The overlooked lever in strategic risk reduction
InformationalAI Governance Moves From Theory to Practice
LowMicrosoft finally open sources DOS 1.0 - and it's so much more than the code
InformationalSimplifying AWS defense with Microsoft Sentinel UEBA
InformationalBreaking the Endpoint Tax: Aligning Security With Risk
LowNCSC launches SilentGlass, a plug-in device to secure HDMI and DisplayPort links
InformationalCould your choice of metrics be harming your SOC?

Breach (31)

CriticalMisconfigured Server Run by Hackers Leaks 345,000 Stolen Credit Cards
CriticalCursor AI Agent Wipes PocketOS Database and Backups in 9 Seconds
HighInstructure confirms data breach, ShinyHunters claims attack
HighMarcus & Millichap - 1,837,078 breached accounts
HighSecurity Affairs newsletter Round 575 by Pierluigi Paganini – INTERNATIONAL EDITION
HighSalt Typhoon breach IBM subsidiary in Italy: a warning for Europe’s digital defenses
HighTrellix discloses the breach of a code repository
HighTrellix Confirms Source Code Breach With Unauthorized Repository Access
HighZenBusiness - 5,118,184 breached accounts
HighEdu tech firm Instructure discloses cyber incident, probes impact
HighPrivate Chats, Photos of Celebs Exposed in Suspected Stalkerware Leak
HighAman - 215,563 breached accounts
High Hackers stole hundreds of thousands of Roblox accounts: Here’s what to do
HighAnti-DDoS Firm Heaped Attacks on Brazilian ISPs
HighLarge-scale Roblox hacking operation shut down by Ukrainian authorities
HighHackers arrested for hijacking and selling 610,000 Roblox accounts
HighShinyHunters exploit Anodot incident to target Vimeo
HighClickUp Data Leak Exposes Enterprise Emails for Over a Year
HighAlleged Chinese hacker extradited to US over cyberattacks targeting COVID-19 research
HighShinyHunters claims it stole 1.4 million records from Udemy
HighVideo service Vimeo confirms Anodot breach exposed user data
HighUkrainian police detain hackers suspected of stealing thousands of Roblox accounts for resale
High Chinese engineer stole US military and NASA software for years
HighMedical Device Maker Medtronic Says It's Been Hacked
HighPitney Bowes - 8,243,989 breached accounts
HighMedtronic discloses security incident after ShinyHunters claimed theft of 9M+ records
High A week in security (April 20 – April 26)
HighHome Security Firm ADT Breach: 5.5M Customers' Data Exposed
HighADT - 5,488,888 breached accounts
HighU.S. utility giant Itron discloses a security breach
MediumReborn Gaming - 126 breached accounts

Ransomware (4)

CriticalBroken VECT 2.0 ransomware acts as a data wiper for large files
HighPaying Ransom Won’t Help as VECT 2.0 Ransomware Destroys Data Irreversibly
HighTwo Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks
HighA Ransomware Negotiator Was Working for a Ransomware Gang

ThreatIntel (255)

CriticalCISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
CriticalBillions of Chrome Users Urged to Update After Google Patches 30 Security Flaws
CriticalcPanel zero-day exploited for months before patch release (CVE-2026-41940)
CriticalCritical cPanel and WHM bug exploited as a zero-day, PoC now available
CriticalABB Ability Symphony Plus Engineering
CriticalCISA Adds One Known Exploited Vulnerability to Catalog
CriticalABB Edgenius Management Portal
CriticalABB PCM600
CriticalABB Ability OPTIMAX
CriticalABB AWIN Gateways
Critical[webapps] Repetier-Server 1.4.10 - Path Traversal
CriticalAll supported cPanel versions hit by critical auth bug, now patched
CriticalCVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure
CriticalThese two critical Mac security features are off by default - how to turn them on and why you should
CriticalAdapting Zero Trust Principles to Operational Technology
CriticalGitHub fixes RCE flaw that gave access to millions of private repos
CriticalcPanel, WHM emergency update fixes critical auth bypass bug
CriticalHow to turn on Data Saver mode on your Android phone - and why it's critical to do so
CriticalMicrosoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
CriticalCritical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
CriticalVECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi
CriticalNSA GRASSMARLIN
HighCritrical cPanel flaw mass-exploited in "Sorry" ransomware attacks
HighTwo US cybersecurity experts sentenced in ransomware case, third awaits July ruling
High2 US Cybersecurity Experts Jailed for Aiding ALPHV (BlackCat) Ransomware
HighConsentFix v3 attacks target Azure with automated OAuth abuse
HighNew Deep#Door RAT uses stealth and persistence to target Windows
High45,000 Attacks, 5,300+ Backdoors Tied to China-Linked Cybercrime Operation
HighMalicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)
High76% of All Crypto Stolen in 2026 Is Now in North Korea
High30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
HighISMG Editors: North Korea's Fake Meetings Fuel Crypto Heists
HighPoisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
HighChina-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
HighUS ransomware negotiators get 4 years in prison over BlackCat attacks
High15-year-old detained over French govt agency data breach
HighCyber spies target Russian aviation firms to steal satellite and GPS data
HighBritish cyber agency warns of looming ‘patch wave’ as AI speeds flaw discovery
HighCyber incident responders who carried out ransomware attacks given 4-year sentences
HighThat AI Extension Helping You Write Emails? It’s Reading Them First
HighAnthropic's Mythos Has Landed: Here's What Comes Next for Cyber
HighTeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
HighNew Bluekit phishing service includes an AI assistant, 40 templates
HighHackers earning millions from hijacked cargo, FBI says
HighState CISOs Are Losing Confidence as AI Threats Surge
HighBreach Roundup: US Cyber Command Flags Election Threats
HighAgent’s claims on WhatsApp access spark security concerns
HighTraining on Fiction While the Real Threat is in Your Inbox
HighSecurity Insights: A Threat-First View for the Platform That Enforces Access
HighRisk Scenarios for the US’s Strategic Pivot
HighWarp open sources its AI terminal client
HighAutomated LLM red teaming gets a learning layer
HighHackers arrested for stealing and reselling 600,000 Roblox accounts
HighMet Police face criticism for using AI to spy on their own officers
HighCisco releases open-source toolkit for verifying AI model lineage
HighGoogle Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
HighEtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
HighFrance investigates 15-year-old over alleged hack of national ID agency
HighIran-linked Handala hackers leak US Marines data, send chilling WhatsApp threats
HighFast16 Malware
HighClaude Mythos Fears Startle Japan's Financial Services Sector
HighPopular WordPress redirect plugin hid dormant backdoor for years
HighOfficial SAP npm packages compromised to steal credentials
HighUS, China partner on scam center takedown in Dubai
HighSmashing Security podcast #465: This developer wanted to cheat at Roblox. It cost millions
HighUS-Estonian Suspect Arrested Over Alleged Scattered Spider Cyberattacks
HighPolymarket Rejects Data Breach Claims as Hacker Alleges 300K Records Stolen
HighVect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
HighSAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack
HighLearning from the Vercel breach: Shadow AI & OAuth sprawl
HighSwiss police arrest 10 suspected members of Nigeria-linked crime group Black Axe
HighAlleged Silk Typhoon hacker extradited to the United States to face charges
High[webapps] Xibo CMS 4.3.0 - RCE via SSTI
HighNew DHL Phishing Scam Uses 11-Step Attack Chain to Steal Passwords
HighVidar Rises to Top of Chaotic Infostealer Market
HighFeuding Ransomware Groups Leak Each Other's Data
HighBlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
HighThe Money Mule Solution: What Every Scam Has in Common
HighPolice arrest 10 suspected members of Black Axe cybercrime gang
HighAI prompt confidentiality and false citations worry researchers
HighChina-linked hackers led phishing campaigns targeting journalists and activists, researchers say
HighGoogle Bets Up to $40B on Anthropic as AI Compute Race Grows
HighGermany Caught Up in Likely Russian Signal Phishing
HighOT Cybersecurity Frozen Out by Frontier Labs
HighSignal Phishing Campaign Targets German Officials in Suspected Russian Operation
HighADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs
HighThe Role of Aggregated Liquidity in Modern Crypto Markets
HighWhy Unofficial Download Sources Are Still a Security Risk in 2026
HighA Vulnerability in OpenSSH Could Allow for Authentication Bypass
HighFresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
HighLazarus Doesn't Need AGI
HighUS reportedly charges Scattered Spider hacker arrested in Finland
HighAI Agent Wipes Startup's Data in 9-Second API Call
HighFrench police arrest 21-year-old “HexDex” hacker over 100 alleged data breaches
HighCrypto-Targeting North Koreans Wield Fake Zoom Meetings
HighThe Meta 2FA Trap: From Verified Badge to Account Takeover
HighTeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns, (Mon, Apr 27th)
High⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
HighShinyHunters Leaks Data of Udemy, Zara, 7-Eleven in Salesforce Linked Breach
HighParsing Agentic Offensive Security's Existential Threat
High20-Year-Old Malware Rewrites History of Cyber Sabotage
HighMedtronic confirms breach after hackers claim 9 million records theft
HighHome security giant ADT data breach affects 5.5 million people
HighHackers impersonate Microsoft Teams help desk to breach corporate networks
HighFast16: Pre-Stuxnet malware that targeted precision engineering software
HighPhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
HighMythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side
MediumPipelock: Open-source AI agent firewall
MediumWeek in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months
MediumTelegram Mini Apps abused for crypto scams, Android malware delivery
MediumZDI-26-307: FlowiseAI Flowise Airtable_Agent Code Injection Remote Code Execution Vulnerability
MediumNew Global Scam Uses Fake Meeting Links to Run PowerShell Malware
Medium9-Year-Old Linux Kernel Vulnerability “Copy Fail” Enables Full Root Access
MediumNine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)
MediumNew Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions
MediumNew Linux ‘Copy Fail’ flaw gives hackers root on major distros
MediumABB System 800xA, Symphony Plus IEC 61850
MediumInternet censorship index reveals Russia’s lead and widespread content blocking
Medium Scam-checking just got a lot easier: Malwarebytes is now in Claude 
Medium Microsoft won’t patch PhantomRPC: Feature or bug?
MediumCursor AI IDE vulnerability allows code execution via hidden Git hooks
MediumLotus Wiper Attack Targets Venezuelan Energy Firms, Utilities
MediumNew Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs
MediumZDI-26-305: (0Day) OpenAI Codex Sandbox Escape Vulnerability
MediumAfter Mythos: New Playbooks For a Zero-Window Era
MediumBrazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign
MediumCISA Adds Two Known Exploited Vulnerabilities to Catalog
MediumZDI-26-300: Flowise AccountService resetPassword Authentication Bypass Vulnerability
MediumZDI-26-301: Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
MediumZDI-26-302: Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability
MediumZDI-26-303: Foxit PDF Reader AcroForm Signature Use-After-Free Information Disclosure Vulnerability
MediumZDI-26-304: Foxit PDF Reader AcroForm Annotation Use-After-Free Remote Code Execution Vulnerability
MediumWhat Anthropic’s Mythos Means for the Future of Cybersecurity
MediumUNC6692 Combines Social Engineering, Malware, Cloud Abuse
MediumGlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions
MediumRobinhood account creation flaw abused to send phishing emails
MediumUNC6692 Hackers Exploit Microsoft Teams to Deploy SNOW Malware
MediumDisinformation campaign targeted Tibetan parliament-in-exile elections
MediumFirefox bug CVE-2026-6770 enabled cross-site tracking and Tor fingerprinting
MediumResearchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware
InformationalSECURITY AFFAIRS MALWARE NEWSLETTER ROUND 95
InformationalCarding service Jerry’s Store leak exposes 345,000 stolen payment cards
InformationalDigital attacks drive a new wave of cargo theft, FBI says
Informational6 Best Enterprise Antivirus Software Choices in 2026
InformationalSamsung’s Free Android Upgrade Brings Better Security to Galaxy Phones
InformationalMicrosoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise
InformationalOpenAI Introduces Password-Free Login for Millions of ChatGPT Users
InformationalCriminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations
InformationalHackers Use Jenkins Access to Deploy DDoS Botnet Against Gaming Servers
InformationalBest AirPods of 2026: Expert tested and reviewed
InformationalSamsung will give you a free 32-inch Odyssey monitor right now - how to qualify
InformationalDownload: Automating Pentest Delivery Guide
InformationalMicrosoft now lets admins choose pre-installed Store apps to uninstall
InformationalMicrosoft fixes Remote Desktop warnings displaying incorrectly
InformationalCriminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations
LowStory retracted
InformationalISC Stormcast For Friday, May 1st, 2026 https://isc.sans.edu/podcastdetail/9914, (Fri, May 1st)
InformationalAI traffic is getting bigger, louder, and less predictable
InformationalAI is changing collaboration security faster than most organizations realize: key insights from the 2026 AI and Human Risk Landscape report
InformationalEmail threat landscape: Q1 2026 trends and insights
InformationalPost-quantum encryption for Cloudflare IPsec is generally available
InformationalFrom Strategy to Architecture: How Cisco is Building a Quantum-Safe Future
InformationalManaged vs Self-Managed Cloud Hosting: Choosing the Best Option for Your Business
InformationalOracle Red Bull Racing Team Revs Up Automation to Boost Security
InformationalBuilding with AI: Here's What No Briefing Will Tell You
InformationalSamsung Galaxy vs. Google Pixel: My take after testing dozens of phones from both brands
InformationalI fixed my Wi-Fi dead zones at home with these 6 simple changes
InformationalSony vs. Bose: My buying advice after listening to flagship headphones from both brands
InformationalAnthropic's new Claude Security tool scans your codebase for flaws - and helps you decide what to fix first
InformationalAfter testing this Linux laptop, I understand why MacBooks are the superior choice
LowThousands of readers bought these 10 useful tools and gadgets (No. 5 gets weird)
InformationalSilver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
InformationalBad bots make up 40% of internet traffic
InformationalProxmox Backup Server 4.2 arrives with S3 storage support and parallel sync jobs
InformationalResearchers develop tool to expose GPS signal spoofing in transit networks
InformationalNew Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
InformationalThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
InformationalPyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials
InformationalPolice dismantles 9 crypto scam centers, arrests 276 suspects
InformationalWhat Happens in the First 24 Hours After a New Asset Goes Live
InformationalApril KB5083769 Windows 11 update causes backup software failures
InformationalFBI links cybercriminals to sharp surge in cargo theft attacks
InformationalMoldova’s health insurance agency reports possible data leak after cyberattack
InformationalTrump’s cyber ambassador nominee advances to full Senate vote
InformationalZambia cancels global digital freedoms conference days before start
InformationalAuditing Application Permissions in Microsoft Entra ID: Hidden Risks, Pitfalls, and Quarkslab's QAZPT Tool
InformationalISC Stormcast For Thursday, April 30th, 2026 https://isc.sans.edu/podcastdetail/9912, (Thu, Apr 30th)
LowToday's Odd Web Requests, (Wed, Apr 29th)
InformationalHealth is Tim Cook's defining legacy - and your Apple Watch proves it
InformationalForget Samsung Galaxy S26 Ultra: I found alternatives that are nearly as good for less money
InformationalMotorola Razr Ultra (2026) vs. Samsung Galaxy Z Flip 7: I tried both, and there's a clear winner
InformationalOperation Road Trap: Fake toll and parking texts are spreading worldwide
Informational8 best practices for CISOs conducting risk reviews
InformationalBrinker Introduces a Novel Approach to Deepfake Detection
InformationalNew AI-Powered Bluekit Phishing Kit Targets Major Platforms with MFA Bypass Attacks
InformationalWhat to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
InformationalWebinar: How to Automate Exposure Validation to Match the Speed of AI Attacks
InformationalMicrosoft says backend change broke Teams Free chat and calls
InformationalEuropean Commission accuses Meta of breaching child safety rules
InformationalAI-powered honeypots: Turning the tables on malicious AI agents
InformationalISC Stormcast For Wednesday, April 29th, 2026 https://isc.sans.edu/podcastdetail/9910, (Wed, Apr 29th)
Informational[local] Atlona ATOMERX21 - Authenticated Command Injection
InformationalDecoding Q1 2026’s $152.9 Billion Crypto Custody Concentration
InformationalFive defender priorities from the Talos Year in Review
LowHTTP Requests with X-Vercel-Set-Bypass-Cookie Header, (Tue, Apr 28th)
InformationalAI-Ready, Simpler, and More Secure WAN: Cisco SD-WAN Innovations
InformationalNew Linux FIRESTARTER Backdoor Targets Cisco Firepower Devices
InformationalStablecoins: Always-On Money Needs Always-On Controls
InformationalPack2TheRoot: 12-Year-Old Linux PackageKit Flaw Enables Full Compromise
InformationalQ1 2026 Cyber Attack Statistics
InformationalCanonical's approach to AI is refreshingly thoughtful - Microsoft should take note
InformationalI tested a BlackBerry-style Android phone with a keyboard, and it's weirdly practical in 2026
InformationalYou can save 50% on this Sony soundbar right now - but the deal ends tonight
InformationalWant a free Apple Watch? T-Mobile will give you the SE 3 - how to get yours today
InformationalUser interfaces as we know them are dead - 4 ways to prep for 'disposable' UIs
InformationalI was not expecting a Razer keyboard to enhance my office productivity - here's how it did
InformationalMicrosoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
InformationalChinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
InformationalMicrosoft asks iPhone users to reauthenticate after Outlook outage
InformationalMicrosoft: New Remote Desktop warnings may display incorrectly
InformationalInside an OPSEC Playbook: How Threat Actors Evade Detection
InformationalMicrosoft to deprecate legacy TLS in Exchange Online starting July
InformationalCheckmarx confirms LAPSUS$ hackers leaked its stolen GitHub data
InformationalVideo site Vimeo blames security incident on Anodot breach
InformationalCyber Command, NSA chief warns foreign adversaries likely to target midterms
InformationalNew Android spyware Morpheus linked to Italian surveillance firm
InformationalMicrosoft fixes Entra ID flaw enabling privilege escalation
InformationalISC Stormcast For Tuesday, April 28th, 2026 https://isc.sans.edu/podcastdetail/9908, (Tue, Apr 28th)
InformationalAI Is Not the Villain (or the Hero)
InformationalFrom DMV to Wallet: Understanding Verifiable Digital Credential Issuance
InformationalWeekly Update 501
Informational82 Chrome Extensions Found Selling User Data, 6.5 Million Users Affected
InformationalGitHub Copilot shifts to usage-based pricing June 1 - why that's no surprise
Informational77% of IT managers say their AI agents are out of control - 5 ways to rein in yours
InformationalAlleged Silk Typhoon hacker extradited to US for cyberespionage
InformationalCanada arrests three for operating “SMS blaster” device in Toronto
InformationalMoney launderer for crypto thieves given 5-year sentence
InformationalTennessee becomes second state to ban cryptocurrency ATMs over scam concerns
InformationalSupreme Court signals location data searches should require a warrant
InformationalChinese spy posed as researcher in spear-phishing campaign targeting NASA to steal defense software
InformationalCheckmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
InformationalThe EU Digital Wallet: Why Waiting is Not an Option
InformationalVidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files
InformationalThis bestselling gaming device is not a Nintendo or a PlayStation - and I highly recommend it
InformationalI tested ChatGPT Images 2.0 vs. Gemini Nano Banana to see which is better - this model wins
Informational6 MacOS settings I immediately change on every new Mac - and why
InformationalSamsung Wallet just got a travel feature that I hope Google Wallet copies ASAP
InformationalI tried this Bluetti power station with wheels - now every other charger feels outdated
InformationalDeepfake Voice Attacks are Outpacing Defenses: What Security Leaders Should Know
InformationalMoney launderer linked to $230M crypto heist gets 70 months in prison
InformationalWebinar: Spotting cyberattacks before they begin
InformationalPyPI package with 1.1M monthly downloads hacked to push infostealer
InformationalItaly extradites alleged Chinese state hacker to US
InformationalItaly moves to extradite Chinese national to the U.S. over hacking charges
InformationalFake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud

Vulnerability (58)

CriticalU.S. CISA adds a flaw in WebPros cPanel to its Known Exploited Vulnerabilities catalog
CriticalCVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
Critical Actively exploited cPanel bug exposes millions of websites to takeover
CriticalCritical cPanel Vulnerability Lets Attackers Bypass Login, Gain Root Access
CriticalFederal agencies must patch cPanel bug by Sunday, CISA says
CriticalLinux 'Copy Fail' Flaw Delivers Root-Level Access to Distros
Critical[webapps] SUSE Manager 4.3.15 - Code Execution
Critical[webapps] deephas 1.0.7 - Prototype Pollution
Critical[webapps] Js2Py 0.74 - RCE
Critical[local] Windows 11 25H2 - Heap Overflow
Critical[webapps] FUXA 1.2.8 - Authentication Bypass + RCE Exploit
CriticalMicrosoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch
CriticalCritical cPanel Authentication Vulnerability Identified — Update Your Server Immediately
Critical[webapps] LangChain Core 1.2.4 - SSTI/RCE
Critical[webapps] OpenKM 6.3.12 - Multiple
Critical[webapps] Craft CMS 5.6.16 - RCE
CriticalClaude Mythos Has Found 271 Zero-Days in Firefox
CriticalOracle Quarterly Critical Patches Issued April 21, 2026
CriticalLiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure
CriticalHackers are exploiting a critical LiteLLM pre-auth SQLi flaw
CriticalCVE-2026-3854 GitHub flaw enables remote code execution
HighWireshark 4.6.5 Released, (Sun, May 3rd)
HighCISA Adds One Known Exploited Vulnerability to Catalog
HighSonicWall patches three SonicOS flaws in Gen 6, 7 and 8 firewalls. Patch them now
HighAnother AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
HighCopy Fail: New Linux bug enables Root via page‑cache corruption
High[webapps] Erugo 0.2.14 - Remote Code Execution (RCE)
High[webapps] Cybersecurity AI (CAI) Framework 0.5.10 - Command Injection
High[webapps] Camaleon CMS v2.9.0 - Path Traversal
High[webapps] Frigate NVR 0.16.3 - Remote Code Execution
High[webapps] NiceGUI 3.6.1 - Path Traversal
High[webapps] SumatraPDF 3.5.2 - Remote Code Execution
High[webapps] JUNG Smart Visu Server 1.1.1050 - Dos
High[webapps] BusyBox 1.37.0 - Path Traversal
High[webapps] HUSTOJ Zip-Slip v26.01.24 - RCE
High[local] Windows 11 23H2 - Denial of Service (DoS)
High[local] Google Chrome 145.0.7632.75 - CSSFontFeatureValuesMap
High[webapps] Python-Multipart 0.0.22 - Path Traversal
HighAI Finds 38 Security Flaws in Electronic Health Record Platform
HighReverse Engineering With AI Unearths High-Severity GitHub Bug
HighHackers exploit RCE flaws in Qinglong task scheduler for cryptomining
HighCISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
HighCISA orders feds to patch Windows flaw exploited as zero-day
HighU.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog
High[local] Fedora - Local Privilege Escalation
High[webapps] FacturaScripts 2025.43 - XSS
High[webapps] JuzaWeb CMS 3.4.2 - Authenticated Remote Code Execution
High[webapps] GUnet OpenEclass E-learning platform < 4.2 - Remote Code Execution (RCE)
High[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)
High[webapps] GeographicLib v2.5.1 - stack buffer overflow
High[local] GNU InetUtils 2.6 - Telnetd Remote Privilege Escalation
High[webapps] HAX CMS 24.x - Stored Cross-Site Scripting (XSS)
HighZDI-26-306: Oracle VirtualBox SoundBlaster 16 Race Condition Local Privilege Escalation Vulnerability
HighMultiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
HighResearchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
HighResearchers Find 38 Flaws in OpenEMR. They've Been Fixed
HighUnpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
Medium[webapps] phpMyFAQ 4.0.16 - Improper Authorization

Daily breach, advisory, and vulnerability briefs publish every weekday.

View Live Breach Feed ← All Weekly Digests