LiveThreat Advisory
// ADVISORIES & THREAT INTEL

ADVISORIES & THREAT INTEL

APT campaigns, nation-state threats, and security advisories analyzed through a third-party risk management lens.

🔓 Breaches 🔍 Advisories 🛡️ Vulnerabilities 📡 RSS
Time: Severity: 2322 items
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFCoast Guard Mandates Cybersecurity Standards for U.S. Vessels and Ports, Driving Maritime OT Market Surge

The U.S. Coast Guard has issued a rule requiring cybersecurity officers, assessments, and plans for all U.S.-flagged commercial vessels and port facilities by July 2027. The mandate will reshape vendor risk assessments and inject over $1 B in compliance spend, making it a critical TPRM focus for maritime operators and OT service providers.

Medium · Apr 21, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFKPMG Survey Finds Only 8% of Enterprises Achieve Tangible AI ROI, Emphasizes Governance and Cybersecurity Investments

A KPMG survey of 2,110 C‑suite leaders shows that while 95% have AI strategies, only 8% report measurable returns. The report highlights the need for robust AI governance, data protection, and operational integration—critical considerations for third‑party risk managers evaluating AI‑enabled vendors.

Informational · Apr 21, 2026 · DataBreachToday
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFSecureRouter Cuts Encrypted AI Inference Latency by Up to 2×, Enabling Faster Private ML for Regulated Industries

University of Central Florida researchers introduced SecureRouter, an encrypted routing layer that dynamically selects AI models during MPC‑based inference. The approach halves latency compared with fixed‑model private inference, making secure AI more practical for healthcare, finance, and other data‑sensitive sectors.

Informational · Apr 21, 2026 · Help Net Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFHelp Net Security Publishes Updated List of Cybersecurity Job Openings Across Multiple Sectors (April 21 2026)

Help Net Security released a comprehensive snapshot of current cybersecurity vacancies, covering roles from DevSecOps engineers to AI security testers. The list highlights emerging skill demands that third‑party risk managers should monitor when evaluating vendor capabilities.

Informational · Apr 21, 2026 · Help Net Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFSANS Internet Storm Center Publishes Daily Stormcast – Emerging Threat Trends for April 21 2026

The SANS ISC released its April 21 2026 Stormcast podcast, outlining the latest malware, phishing, and vulnerability activity observed worldwide. TPRM teams should ingest these indicators to keep vendor risk assessments current.

Informational · Apr 21, 2026 · SANS Internet Storm Center
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFCrypto‑Stealing Wallet Apps Infiltrate Apple App Store in China, Targeting Users with Phishing and Provisioning Profile Abuse

A set of 26 counterfeit cryptocurrency wallet apps slipped into Apple’s App Store for China, using typosquatting and fake branding to lure users. Once installed, the apps redirected victims to phishing sites and abused iOS provisioning profiles to exfiltrate seed phrases, enabling full wallet takeover. The campaign highlights a supply‑chain risk for any organization that permits mobile wallet usage.

High · Apr 20, 2026 · BleepingComputer
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFSurfshark Launches Dausos VPN Protocol Claiming Up to 30% Speed Gains Over WireGuard

Surfshark unveiled Dausos, a proprietary VPN protocol using AEGIS‑256X2 encryption and dedicated per‑user tunnels. Independent testing shows promising security enhancements but performance still trails WireGuard. TPRM teams should assess audit findings and pilot the protocol before enterprise rollout.

Low · Apr 20, 2026 · ZDNet Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🦠
LIVETHREAT BRIEFOverlay‑Based Trojan Targets 800+ Android Banking Apps to Steal PINs

A sophisticated Android banking‑malware campaign is abusing screen‑overlay and Accessibility permissions to harvest PINs from over 800 mobile applications. The threat poses a high risk to financial‑service vendors and their downstream partners, demanding immediate review of mobile SDKs and device controls.

High · Apr 20, 2026 · TechRepublic Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF🕵️
LIVETHREAT BRIEFItalian Regulator Fines Poste Italiane €12.5 Million for Invasive Data Monitoring in Payment Apps

Italy’s data‑protection authority fined Poste Italiane and its Postepay subsidiary €12.5 million for illegally harvesting device‑level data from millions of users through overly invasive mobile‑app monitoring, highlighting a major privacy‑compliance risk for third‑party payment providers.

High · Apr 20, 2026 · The Record
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFQualys Publishes 2026 Enterprise Patch Remediation Benchmark Highlighting 5‑Month MTTR for Complex Apps

Qualys’ 2026 benchmark shows enterprises deployed millions of patches but still average 5 months 10 days to remediate complex third‑party software, underscoring a persistent exposure risk for third‑party risk managers.

Informational · Apr 20, 2026 · Qualys Blog
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🕵️
LIVETHREAT BRIEFMicrosoft Teams Abuse: Helpdesk Impersonation Enables Remote Access and Data Exfiltration

Microsoft reports that threat actors are abusing external Teams chats to pose as IT staff, tricking users into granting Quick Assist remote control. The attackers then use native tools for lateral movement and exfiltrate data to cloud storage, posing a high‑risk scenario for any organization that enables external collaboration.

High · Apr 20, 2026 · BleepingComputer
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFPotential Personal Data Exposure in French Identity Document Agency (ANTS) Cyberattack

A security incident on France's ANTS portal may have exposed login credentials, names, emails, birth dates and other personal identifiers of citizens. The breach's origin and the number of affected users are unclear, raising concerns for any third‑party services that rely on ANTS‑verified identity data.

High · Apr 20, 2026 · The Record
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFBackup Myth Leaves Businesses Vulnerable to Operational Downtime

A recent BleepingComputer piece warns that many firms treat backups as full protection, ignoring the need for rapid recovery and business continuity. The gap leads to costly downtime, making it a critical consideration for third‑party risk managers.

Informational · Apr 20, 2026 · BleepingComputer
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🌊
LIVETHREAT BRIEFSophisticated DDoS Attack Disrupts Bluesky Social Platform, Affecting 43 Million Users

Bluesky suffered a coordinated DDoS assault on April 15 2024 that knocked out feeds, notifications, threads and search for its 43 M user base. The outage underscores the need for robust third‑party DDoS mitigation clauses and heightened monitoring of state‑aligned threat actors.

High · Apr 20, 2026 · The Record
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFZDNet Publishes Advisory on Top Robot Vacuums for Pet Hair – Highlights IoT Device Risks for Offices

ZDNet’s 2026 guide ranks the best robot vacuums for pet hair, a category of consumer IoT devices now entering corporate office spaces. The advisory flags potential security gaps and urges third‑party risk teams to vet these devices before procurement.

Low · Apr 20, 2026 · ZDNet Security
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFMicrosoft Tests Windows Explorer Speed and Performance Improvements for Windows 11 Insiders

Microsoft is testing optional pre‑loading and reliability fixes for File Explorer in Windows 11 Insider builds, aiming to reduce launch times and eliminate visual glitches. Organizations should evaluate the impact on endpoint policies and third‑party integrations.

Low · Apr 20, 2026 · BleepingComputer
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFTechRepublic Recommends Top 5 Chrome VPN Extensions for 2026

TechRepublic published a curated list of the five best Chrome VPN extensions for 2026, outlining their security features, privacy policies, and pricing. Organizations should vet these third‑party tools before allowing them on corporate devices to avoid data‑exposure risks.

Informational · Apr 20, 2026 · TechRepublic Security
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFSupply Chain Compromise of Axios NPM Packages Injects Remote Access Trojan via Malicious Dependency

Two compromised Axios npm releases (1.14.1 and 0.30.4) bundled a malicious plain‑crypto‑js dependency that downloads a remote‑access trojan. The threat targets developers, CI/CD pipelines, and any environment that installs the tainted packages, exposing credentials and internal networks. Third‑party risk programs must treat open‑source components as critical attack surfaces.

High · Apr 20, 2026 · CISA Advisories
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFCISA Adds Eight Actively Exploited Vulnerabilities to KEV Catalog – Immediate Remediation Required

CISA has placed eight CVEs into its Known Exploited Vulnerabilities catalog after observing active attacks. The vulnerabilities affect a diverse set of software products, creating supply‑chain risk for any organization that relies on these vendors. TPRM teams should accelerate patching and verify third‑party remediation.

CVE-2023-27351CVE-2024-27199
High · Apr 20, 2026 · CISA Advisories
Read Full Intelligence Brief →
THREAT INTELLT BRIEF🔍
LIVETHREAT BRIEFScattered Spider Hacker Pleads Guilty After $8 M Crypto Theft via Smishing Campaigns

A British hacker tied to the Scattered Spider collective admitted to a $8 million cryptocurrency theft campaign that leveraged SMS‑phishing to steal credentials and launch ransomware attacks on firms such as MGM Resorts. The case highlights the need for robust credential controls and employee awareness in third‑party risk programs.

High · Apr 20, 2026 · The Record
Read Full Intelligence Brief →
ADVISORYLT BRIEF📋
LIVETHREAT BRIEFNCSC Urges UK Critical Service Leaders to Prepare for Severe Cyber Threats

The UK NCSC warns that sophisticated threat actors are increasingly targeting critical national infrastructure, urging leaders to embed cyber‑resilience in supplier contracts and governance. Immediate TPRM actions are recommended to mitigate operational downtime, financial loss, and reputational damage.

High · Apr 20, 2026 · NCSC UK
Read Full Intelligence Brief →
Page 1 of 111