HomeWeekly DigestsThis Week
LiveThreat Threat Intelligence

Weekly Threat Intelligence Digest — Apr 13 to Apr 20, 2026

Weekly threat intelligence digest from 468 items (50 critical, 173 high).

📅 April 20, 2026 📊 468 articles analyzed
LIVETHREAT WEEKLY THREAT DIGEST April 13 – April 20, 2026 This week the data reinforced a clear shift: attackers are no longer chasing the perimeter, they’re hijacking the trusted pathways that bind our ecosystems together. From compromised OAuth apps that opened the floodgates to Vercel’s environment variables, to zero‑day exploits in Microsoft Defender and Adobe Reader that undermine the very tools we rely on to protect vendors, the dominant thread is privilege abuse within third‑party services. The result is a cascade of data loss, credential theft, and downstream exposure that ripples through supply chains. 👉 Access—especially privileged, often invisible access—is the primary risk driver. 🚨 EXECUTIVE RISK SNAPSHOT * Supply‑chain entry point → MSPs, SaaS admin consoles, CI/CD tools, and cloud‑hosting platforms were the most common breach origins. * Privilege determines impact → A single hijacked admin token at Vercel exposed customer environment variables; similar credential compromises at DraftKings and Booking.com affected tens of millions of accounts. * Visibility gaps persist → Misconfigurations in Salesforce, Cloud hosting, and API services exposed 45 M+ records, while many organizations still lack inventories of fourth‑party (vendor‑of‑vendor) dependencies. 🔍 WHAT CHANGED THIS WEEK * OAuth and API token hijacking surged – Vercel, Context.ai, and Anodot incidents show attackers targeting third‑party integrations to reach downstream data. * Zero‑day exploitation of security products accelerated – three new Microsoft Defender flaws (two still unpatched) and an actively exploited Adobe Acrobat Reader vulnerability put entire vendor stacks at risk. * App‑store supply‑chain attacks emerged – the fake Ledger Live app stole $9.5 M, highlighting the threat of malicious binaries in official marketplaces. * SaaS misconfigurations continued to generate massive breaches – Salesforce, Booking.com, and McGraw‑Hill missteps exposed 13‑45 M records each. 🎯 WHERE YOU ARE MOST LIKELY EXPOSED * Cloud hosting providers – Vercel, Azure, AWS, and any vendor using shared cloud admin accounts. * API and integration platforms – Context.ai, Anodot, n8n, and any service that issues long‑lived tokens to partners. * Identity & Access Management solutions – Okta, Azure AD, Cisco ISE, especially where SSO or OAuth is used across vendors. * Payment processors and crypto wallets – Ledger, Grinex, DraftKings, where credential compromise leads to irreversible financial loss. * Endpoint security stacks – Microsoft Defender, Adobe Reader, Fortinet, whose zero‑day flaws can be weaponized against multiple downstream clients. ⚡ WHAT TPRM LEADERS SHOULD DO THIS WEEK 1. Map privileged third‑party access • Request complete lists of admin, service‑account, and OAuth token holders from each vendor. #Cybersecurity #TPRM #VendorRisk #SupplyChainSecurity #ThreatIntel #LiveThreat #VerisqAI

📋 Articles Referenced in This Digest 468 items

📋 Advisory (98)

HighSocial media bans might steer kids into riskier corners of the internet
HighMicrosoft: Some Windows servers enter reboot loops after April patches
HighRethinking Cybersecurity for AI Speed in the Mythos Era
High[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment
HighCybersecurity Risks of Hiring a Virtual Assistant and How to Protect Your Business
HighFederal Staffers Are Still Using Claude Despite Trump Orders
HighAudit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests
HighPrepping for 'Q-Day': Why Quantum Risk Management Should Start Now
HighDeterministic + Agentic AI: The Architecture Exposure Validation Requires
High April Patch Tuesday fixes two zero-days, including one under active attack
High'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source
HighUK warns businesses to address cyber risks amid Anthropic AI panic
HighDefending Identity in the Age of AI Attacks
HighWindows 11 cumulative updates KB5083769 & KB5082052 released
HighAI adoption is outpacing the safeguards around it
HighAI Chatbots and Trust
HighPwC: Cybersecurity Risk Outpaces Corporate Ability to Manage
HighWhy Your Deprecated Endpoints Are an Attacker’s Best Friend: The Rise of Ghost APIs
MediumMicrosoft Teams right-click paste broken by Edge update bug
MediumHow NIST's Cutback of CVE Handling Impacts Cyber Teams
MediumIn defeat for Trump, House extends electronic spying program for just 10 days
MediumNIST admits defeat on NVD backlog, will enrich only highest-risk CVEs going forward
MediumThe Agentic AI Tsunami is Here: Is Your Legacy IAM Sinking or Swimming?
MediumMajority of Australian youth still use social media despite ban, researchers find
InformationalNIST to stop rating non-priority flaws due to volume increase
LowWhy I'm recommending last year's phones over 2026 models - with one exception
InformationalNAKIVO v11.2: Ransomware Defense, Faster Replication, vSphere 9, and Proxmox VE 9.0 Support
InformationalAnthropic Releases Opus 4.7, Not as ‘Broadly Capable’ as Mythos AI
LowApple's original AirTag still tracks effectively, and you can get a 4-pack for its best price ever
InformationalHealthcare Cyber Research Programs Escape Budget Knife
InformationalThe Race to Quantum-Proof the Internet Has Already Begun
InformationalFounder Liquidity Without Compromising on Growth
InformationalWorkplace stress in 2026 is still worse than before the pandemic
InformationalAndroid 17 Beta 4 arrives with post-quantum cryptography and new memory limits
InformationalCodex can now operate between apps. Where are the boundaries?
LowTop 5 Disaster Recovery Companies in 2026
LowStrengthening cyber resilience across the NHS with collaboration and innovation
InformationalCoast Guard's New Cybersecurity Rules Offers Lessons for CISOs
LowDoes Best Buy price match? Everything to know about matching prices online and in-store
LowThe best Kindles in 2026: Expert recommended
LowI ditched my iPhone's hotspot for this 5G travel router - and I'm never going back
InformationalProlonged AI use can be hazardous to your health and work: 4 ways to stay safe
InformationalWebinar: From phishing to fallout — Why MSPs must rethink both security and recovery
InformationalMoving Toward Identity Intelligence in Fraud Detection
LowEurope Spurs Digital Sovereignty With $213M Cloud Contract
LowMozilla challenges enterprise AI providers with Thunderbolt, open-source AI client under your control
LowLiongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery
LowNTT Research Launches Scale Academy to Bring Lab Technology to Market
LowHow Google's updated AI Mode will ease your tab clutter when you search
LowI tried the new Gemini app for Mac - and it's better than the website in one big way
LowThese companies are actually upskilling their workers for AI - here's how they do it
InformationalOpenAI Courts Banks in Trusted Access for Cyber Partner Push
InformationalCISA Warns of 'Detrimental Capacity Impacts' Amid Shutdown
InformationalAnthropic releases Claude Opus 4.7 with automated cybersecurity safeguards
LowImmuniWeb brings AI upgrades, post-quantum detection and more in Q1 2026
InformationalBuilding your cryptographic inventory: A customer strategy for cryptographic posture management
InformationalThe best small business VoIP providers of 2026: Expert tested and reviewed
InformationalProof of Concept: Mythos Clouds the Future of Cyber Defense
InformationalOpenAI updates Agents SDK, adds sandbox for safer code execution
LowGoogle Play is changing how Android apps access your contacts and location
LowI tried Google's new desktop app for Windows, and I'll never search the old way again
InformationalHSCC Guide Targets Third-Party AI Risk in Healthcare
LowWhatsApp New Update Lets You Chat Without Sharing Your Phone Number
InformationalSecuring Remote Server Access: Why VPNs Matter for Administrators
InformationalAnonymizing Network Traffic: A Dive into SOCKS5 and Data Encryption
InformationalDefense in Depth, Medieval Style
InformationalTenable unveils OT discovery engine to expose cyber-physical risks
InformationalBitdefender extends GravityZone with continuous email threat protection
InformationalBroadcom introduces zero-trust runtime for scalable AI agents
InformationalIncident response for AI: Same fire, different fuel
LowTechnical Enablement vs. Marketing Noise
LowThe best internal communication tools of 2026: Expert tested and reviewed
LowWhy your TV wowed you in the store but looks unnatural at home - and how to fix it ASAP
LowiPhone charging slowly? 6 quick fixes to try before blaming your battery
InformationalQualys VMDR and TotalCloud™ Now Available on Oracle Cloud Marketplace
InformationalDesigning for What’s Next: Securing AI-Scale Infrastructure Without Compromise
LowMeta is selling refurbished Ray-Bans for as low as $197 right now - but they're going fast
InformationalGoldman Sachs 'Hyperaware' as it Tests Mythos for Defense
InformationalEnterprise-Grade Security For All in 2026
InformationalGood and Bad Harness Engineering
LowWeekly Update 499
InformationalCybersecurity jobs available right now: April 14, 2026
InformationalZero trust at year two: What nobody planned for
InformationalReview: The Psychology of Information Security
InformationalDataVisor brings conversational AI agents to fraud and AML operations
LowThe new rules for AI-assisted code in the Linux kernel: What every dev needs to know
LowI followed the 'Plus 5' rule for wireless charging, and it fixed my iPhone's charge speeds
InformationalGoogle Rolls Out End-to-End Encryption to Eligible Gmail Users on Mobile
InformationalDeep Scan: Expanding Vulnerability Detection Beyond Traditional Boundaries
InformationalVIP Credential Monitoring Blog
InformationalFrance is replacing 2.5 million Windows desktops with Linux - and I mapped out its new stack
LowThis Linux distro offers an easy DNS switcher - but there's more to it that I like
InformationalBringing governance and visibility to machine and AI identities
InformationalWhy manual certificate management is running out of time
InformationalMITRE releases a shared fraud-cyber framework built from real attack data
InformationalZeroID: Open-source identity platform for autonomous AI agents
InformationalFixing vulnerability data quality requires fixing the architecture first
InformationalSiemens expands Industrial Automation DataCenter with edge AI and cybersecurity

🔓 Breach (25)

CriticalFake Ledger Live App on Apple Store Linked to $9.5M Crypto Theft
HighVercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
HighVercel confirms breach as hackers claim to be selling stolen data
High$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
HighKyrgyzstan-based crypto exchange Grinex shuts down after $13.7M cyber heist, blames Western Intelligence
HighRansomware attack continues to disrupt healthcare in London nearly two years later
HighScattered Spider Hacker Pleads Guilty in US Federal Court
HighDraftKings hacker sentenced to prison, ordered to pay $1.4 Million
HighMan gets 30 months for selling thousands of hacked DraftKings accounts
HighGrinex exchange blames "Western intelligence" for $13.7M crypto hack
HighAmtrak - 2,147,679 breached accounts
HighMcGraw-Hill Confirms Data Exposure, Hackers Claim 45M Salesforce Records Leaked
HighCookeville Regional Medical Center hospital data breach impacts 337,917 people
High Booking.com breach gives scammers what they need to target guests
HighResearchers Say Fiverr Left User Files Open to Google Search
HighTeen arrested in Northern Ireland over cyberattack on school network
HighMcGraw Hill - 13,500,136 breached accounts
HighComcast’s $117.5M Breach Settlement: Up to 30M People May Qualify
HighStolen Rockstar Games analytics data leaked by extortion gang
HighEuropean Gym giant Basic-Fit data breach affects 1 million members
HighLawsuit: AI Illegally Recorded Doctor-Patient Encounters
HighBooking.com Hack Exposes Customer Data, Sparks Travel Scam Fears
HighHackers access Booking.com user data, company secures systems
HighHackers claim breach of Rockstar Games via cloud analytics platform
HighNew Booking.com data breach forces reservation PIN resets

💀 Ransomware (1)

High6-Year Ransomware Campaign Targets Turkish Homes & SMBs

🕵️ ThreatIntel (289)

CriticalCritical flaw in Protobuf library enables JavaScript code execution
CriticalThree Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
CriticalU.S. CISA adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog
CriticalResearcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
CriticalHorner Automation Cscape and XL4, XL7 PLC
CriticalAVEVA Pipeline Simulation
CriticalFortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
CriticalSweden reports cyberattack attempt on heating plant amid rising energy threats
CriticalCisco says critical Webex Services flaw requires customer action
CriticalHackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
CriticalZDI-26-270: TrendAI Apex One Console Directory Traversal Remote Code Execution Vulnerability
CriticalCritical Nginx UI auth bypass flaw now actively exploited in the wild
CriticalMicrosoft Issues Massive Windows Patch for 160+ Bugs, Including Two Zero-Days
CriticalCVE-2026-33032: severe nginx-ui bug grants unauthenticated server access
CriticalApril Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
CriticalActively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
CriticalMicrosoft Patch Tuesday for April 2026 fixed actively exploited SharePoint zero-day
CriticalOpenAI expands its cyber defense program with GPT-5.4-Cyber for vetted researchers
CriticalSitehop’s SAFEcore Edge enables ultra-low-latency, hardware-enforced post-quantum encryption
CriticalAdobe Issues Emergency Patch for Critical PDF Flaw Exploited For Months
CriticalPatch Tuesday, April 2026 Edition
CriticalMicrosoft and Adobe Patch Tuesday, April 2026 Security Update Review
CriticalWhy Data Trust Is Key to AI Success
CriticalwolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now
CriticalPrivilege Elevation Dominates Massive Microsoft Patch Update
CriticalCritical Patches Issued for Microsoft Products, April 14, 2026
CriticalMicrosoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days
CriticalAttackers target unpatched ShowDoc servers via CVE-2025-0520
CriticalShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers
CriticalMarch 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day
CriticalAdobe rolls out emergency fix for Acrobat, Reader zero-day flaw
CriticalAdobe issues emergency fix for Acrobat Reader flaw exploited in the wild (CVE-2026-34621)
HighHow to spot a North Korean fake in a job interview
HighSmokedMeat: Open-source tool shows what attackers do inside CI/CD pipelines
HighSECURITY AFFAIRS MALWARE NEWSLETTER ROUND 93
HighCyber attacks fuel surge in cargo theft across logistics industry
HighCross‑tenant helpdesk impersonation to data exfiltration: A human-operated intrusion playbook
HighNexcorium Mirai variant exploits TBK DVR flaw to launch DDoS attacks
HighHidden VMs: how hackers leverage QEMU to stealthily steal data and spread malware
HighOperation PowerOFF: 75K Users of DDoS-for-Hire Services Identified and Warned
HighTycoon 2FA Phishers Scatter, Adopt Device Code Phishing
HighPayouts King ransomware uses QEMU VMs to bypass endpoint security
HighFour arrested in latest ‘PowerOFF’ DDoS-for-hire takedown
HighFinance Chiefs Warn New AI Models May Rattle Global Banking
HighNew Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks
HighNew RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps
HighMythos and Cybersecurity
HighContaining a domain compromise: How predictive shielding shut down lateral movement
High “Your shipment has arrived” email hides remote access software
HighInside ZionSiphon: politically driven malware aims at Israeli water systems
HighOperation PowerOFF: 53 DDoS domains seized and 3 Million criminal accounts uncovered
HighSometimes changing the password on your email mailbox isn’t enough
HighSinger loses life savings to fake wallet downloaded from the Apple App Store
HighEvery Old Vulnerability Is Now an AI Vulnerability
HighInside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops
HighUkraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies
HighOperation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
HighLumma Stealer infection with Sectop RAT (ArechClient2), (Fri, Apr 17th)
HighFrom Bazooka to Fake Nikes
HighOperation PowerOFF identifies 75k DDoS users, takes down 53 domains
HighBreach Roundup: Mr. Raccoon Wants Your Password
HighNewly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
HighDissecting Sapphire Sleet’s macOS intrusion from lure to compromise
HighPowMix botnet targets Czech workforce
HighData breach at edtech giant McGraw Hill affects 13.5 million accounts
HighZDI-26-268: Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability
HighZDI-26-274: Microsoft Qlib fit Deserialization of Untrusted Data Remote Code Execution Vulnerability
HighBeyond the breach: inside a cargo theft actor’s post-compromise playbook
HighTwo US nationals jailed over scheme that generated $5 million for the North Korean regime
HighCargo theft malware actor spent a month inside a decoy network before researchers pulled the plug
HighUAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
HighHidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu
HighObsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks
High Fake YouTube copyright notices can steal your Google login
High AI clickbait can turn your notifications into a scam feed
HighSmashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying
HighNew AgingFly malware used in attacks on Ukraine govt, hospitals
HighThreat landscape for industrial automation systems in Q4 2025
HighCapsule Security debuts with $7 million funding to secure AI agent behavior
HighWindows is getting stronger RDP file protections to fight phishing attacks
High From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere
HighYour Supply Chain Breach Is Someone Else's Payday
HighEducational company McGraw Hill says Salesforce misconfiguration led to data leak
HighAI Tools Will Accelerate International Fraud at Scale
HighThe n8n n8mare: How threat actors are misusing AI workflow automation
HighPHP Composer flaws enable remote command execution via Perforce VCS
HighMicrosoft, Salesforce Patch AI Agent Data Leak Flaws
HighThe exploit gap is closing, and your patch cycle wasn’t built for this
HighRaspberry Pi OS 6.2 disables passwordless sudo by default
HighMicrosoft adds Windows protections for malicious Remote Desktop files
HighNew ‘JanaWare’ ransomware targeting Turkish citizens as cybercriminal ecosystem fragments
HighWhy Data Protection Vendor Commvault Is Eyeing Going Private
HighSecuring non-human identities: automated revocation, OAuth, and scoped permissions
HighUS, UK and Canada disrupt $45M crypto theft in Operation Atlantic
HighPersonal data of 1 million gym members compromised in Basic-Fit security incident
HighMultiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution
HighHow Hackers Are Thinking About AI
HighW3LL phishing service sold for $500 dismantled by the FBI
HighMicrosoft ends desktop detour for sensitivity labels in Office web apps
HighNew PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released
High5 Ways Zero Trust Maximizes Identity Security
HighMcGraw-Hill confirms data breach following extortion threat
High Omnistealer uses the blockchain to steal everything it can
HighShinyHunters claim the hack of Rockstar Games breach and started leaking data
HighRansomware-Linked ViperTunnel Malware Hits UK and US Businesses
HighBooking.com Confirms Data Breach as Hackers Access Customer Details
High29 million leaked secrets in 2025: Why AI agents credentials are out of control
HighBooking.com data breach: Customer reservation data exposed
High108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
HighAnalysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)
HighFBI takedown of W3LL phishing service leads to developer arrest
HighClaude Mythos Could Flood Vendors With Fixes They Deferred
HighOpenSSF Flags Malware Campaign on Slack Posing as Linux Foundation Figures
HighBITTER APT Uses Signal, Google, and Zoom Lures to Spread ProSpy Spyware
HighScans for EncystPHP Webshell, (Mon, Apr 13th)
HighOn Anthropic’s Mythos Preview and Project Glasswing
High$12 million frozen, 20,000 victims identified in crypto scam crackdown
HighHackers hijacked CPUID downloads, served STX RAT to victims
HighYour MTTD Looks Great. Your Post-Alert Gap Doesn't
HighFBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts
HighJanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025
HighFBI, Indonesia take down W3LL phishing tool
HighAnatomy of an Autonomous AI Agent Risk: How Qualys ETM Connects the Dots on OpenClaw
HighThe silent “Storm”: New infostealer hijacks sessions, decrypts server-side
HighCitizen Lab: Webloc tracked 500M devices for global law enforcement
HighiPhone forensics expose Signal messages after app removal in U.S. case
HighMailbox rules in O365—a post-exploitation tactic in cloud ATO
HighJanelaRAT: a financial threat targeting users in Latin America
HighOpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
HighNorth Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware
MediumMaximizing Mythos Returns Requires AI Cybersecurity Pipeline
MediumNew CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files
MediumNew ZionSiphon Malware Discovered Targeting Israeli Water Systems
MediumApache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
MediumNIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
MediumFoxit, LibRaw vulnerabilities
MediumZionSiphon malware designed to sabotage water treatment systems
MediumCISA Adds One Known Exploited Vulnerability to Catalog
MediumA Deep Dive Into Attempted Exploitation of CVE-2023-33538
MediumFrom clinics to government: UAC-0247 expands cyber campaign across Ukraine
MediumAI platform n8n abused for stealthy phishing and malware delivery
MediumOpenAI Launches GPT-5.4-Cyber to Boost Defensive Cybersecurity
MediumMarch 2026 Cyber Attacks Statistics
MediumUkrainian emergency services and hospitals hit by espionage campaign using new AgingFly malware
MediumCryptohack Roundup: $45 Million Fraud Operation Disrupted
MediumZDI-26-265: Fortinet FortiWeb cgi_buf_alloc Integer Overflow Denial-of-Service Vulnerability
MediumZDI-26-284: DriveLock Directory Traversal Information Disclosure Vulnerability
MediumZDI-26-287: DriveLock Directory Traversal Information Disclosure Vulnerability
MediumZDI-26-288: DriveLock Directory Traversal Information Disclosure Vulnerability
MediumZDI-26-292: QNAP TS-453E QVRPro excpostgres Exposed Dangerous Method Remote Code Execution Vulnerability
Medium[Guest Diary] Compromised DVRs and Finding Them in the Wild, (Thu, Apr 16th)
MediumWordPress plugin suite hacked to push malware to thousands of sites
MediumU.S. CISA adds Microsoft SharePoint Server, and Microsoft Office Excel flaws to its Known Exploited Vulnerabilities catalog
MediumFake Claude AI Installer Targets Windows Users with PlugX Malware
MediumNavigating the Unique Security Risks of Asia's Digital Supply Chain
MediumCISA flags Windows Task Host vulnerability as exploited in attacks
MediumMirax malware campaign hits 220K accounts, enables full remote control
MediumActive HanGhost Loader Campaign Targets Enterprise Payment and Logistics Workflows
MediumCISA Adds Two Known Exploited Vulnerabilities to Catalog
MediumYour Fraud Detection Model Is Already Too Late to the Party
MediumMirax RAT Targets Android Devices Through Meta Apps
MediumDavMail 6.6.0 patches a regex flaw and advances its Microsoft Graph backend
MediumOligo enables real-time exploit detection and blocking at application runtime
MediumAI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud
Medium16-31 March 2025 Cyber Attacks Timeline
MediumFake Claude AI installer abuses DLL sideloading to deploy PlugX
MediumU.S. CISA adds Adobe, Fortinet, Microsoft Exchange Server, and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog
MediumCISA Adds Seven Known Exploited Vulnerabilities to Catalog
MediumEmpty Attestations: OT Lacks the Tools for Cryptographic Readiness
MediumCSA: CISOs Should Prepare for Post-Mythos Exploit Storm
Medium A week in security (April 6 – April 12)
MediumCPUID watering hole attack spreads STX RAT malware
MediumRockstar Games receives “pay or leak” warning after cyberattack
InformationalISC Stormcast For Monday, April 20th, 2026 https://isc.sans.edu/podcastdetail/9898, (Mon, Apr 20th)
InformationalSecurity Affairs newsletter Round 573 by Pierluigi Paganini – INTERNATIONAL EDITION
InformationalGitLab 18.11 brings agentic AI to security fixes, CI pipelines, and delivery analytics
InformationalGoogle wipes out 602 million scam ads with Gemini on duty
InformationalGoogle Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
Informational “iCloud storage is full” scam is back, and now it wants your payment details
InformationalISC Stormcast For Friday, April 17th, 2026 https://isc.sans.edu/podcastdetail/9896, (Fri, Apr 17th)
Informational'Harmless' Global Adware Transforms Into an AV Killer
InformationalNorth Korea Uses ClickFix to Target macOS Users' Data
InformationalPanorama del cibercrimen en América Latina y el Caribe
InformationalAI-powered website builders have come a long way - here's your best option in 2026
InformationalHuman Trust of AI Agents
Informational A fake Slack download is giving attackers a hidden desktop on your machine
InformationalMore than pretty pictures: Wendy Bishop on visual storytelling in tech
InformationalMalicious WordPress Plugins with Backdoors Compromise Thousands of Websites
InformationalMicrosoft's Original Windows Secure Boot Certificate Is Expiring
InformationalTwo-Factor Authentication Breaks Free from the Desktop
InformationalTidal vs. Qobuz: I tried both hi-res streaming services, and they couldn't be more different
InformationalOpenAI's Codex Desktop can run your computer now - and has its own browser
InformationalMicrosoft: April Windows Server 2025 update may fail to install
InformationalUS nationals behind DPRK IT worker 'laptop farm' sent to prison
InformationalMost "AI SOCs" Are Just Faster Triage. That's Not Enough.
InformationalNew ATHR vishing platform uses AI voice agents for automated attacks
InformationalGoogle expands Gemini AI use to fight malicious ads on its platform
InformationalCargo thieving hackers running sophisticated remote access campaigns, researchers find
InformationalNew Jersey men given lengthy sentences for running North Korean laptop farms
InformationalObfuscation vs the Optimizer: An LLVM Middle-End Arms Race
InformationalISC Stormcast For Thursday, April 16th, 2026 https://isc.sans.edu/podcastdetail/9894, (Thu, Apr 16th)
InformationalWe're All Building a Single Digital Assistant
InformationalIran War: Future Scenario and Business Implications
Informational4 Essential Integration Workflows for Operationalizing Threat Intelligence Recorded Future
InformationalThe same Microsoft Surface I bought 4 months ago is 69% more expensive now - here's why
InformationalNIST to limit work on CVE entries as submissions surge
InformationalMassive Chrome Extension Scam Exposes 20,000 Users to Data Theft
Informational108 malicious Chrome extensions caught stealing Google and Telegram data from 20,000 users
InformationalHalf of all US employees use AI at work now - and waste almost 8 hours a week doing it
InformationalMicrosoft's latest Windows update now confirms if your PC is Secure Boot-protected - how it works
InformationalWhy Netgear just got the first FCC router ban exemption in the US
InformationalMicrosoft fixes bug behind Windows Server 2025 automatic upgrades
InformationalMicrosoft: April updates trigger BitLocker key prompts on some servers
InformationalRolling Networks: Securing the Transportation Sector
InformationalSigned software abused to deploy antivirus-killing scripts
InformationalSweden says pro-Russian hackers attempted to breach thermal power plant
Informational13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds
InformationalShinyHunters Leak Rockstar Games Data, No Player Records Impacted
InformationalRetaining defensive advantage in the age of frontier AI cyber capabilities 
InformationalISC Stormcast For Wednesday, April 15th, 2026 https://isc.sans.edu/podcastdetail/9892, (Wed, Apr 15th)
InformationalMicrosoft Bets $10 Billion to Boost Japan's AI, Cybersecurity
InformationalWhat changed in nginx 1.30.0 and what it means for your upstream config
InformationalOpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
InformationalA New Way to Buy Recorded Future: Solutions and Packages Built for the 2026 Threat Landscape
InformationalYou can try Linux 7.0 now on these distros - here's what's new
InformationalIs your Pixel battery draining faster lately? These 4 temporary fixes helped me
InformationalTired of Gemini interrupting you? This Google Home update fixes that and more
InformationalI love Sony's new Bluetooth turntable, so why do I feel so conflicted using it
InformationalA data removal service helped me reclaim my privacy - see if you need one, too
InformationalThis simple email trick saves me from annoying marketing spam (and it's free to do)
InformationalOver 100 Chrome Web Store extensions steal user accounts, data
InformationalCrypto-exchange Kraken extorted by hackers after insider breach
InformationalBig tech fails to opt-out users requesting not to be tracked much of the time, new research says
InformationalStudy: Off-the-Shelf LLMs Not Ready for Clinical Prime Time
InformationalCISA Workers Recalled Despite Shutdown
InformationalOpenAI Touts Wider Access to Its New Cyber Model
InformationalManaged OAuth for Access: make internal apps agent-ready in one click
InformationalScaling MCP adoption: Our reference architecture for simpler, safer and cheaper enterprise deployments of MCP
InformationalState-sponsored threats: Different objectives, similar access paths
InformationalMicrosoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
InformationalKraken Exchange Faces Extortion After Insider Recorded System Footage
InformationalSecurity Risk Advisors Purple Team Participants Can Now Earn CPE Credits
InformationalHow Digital Annotations Are Replacing Paper Markups in Business
InformationalMicrosoft Patch Tuesday April 2026., (Tue, Apr 14th)
InformationalScanning for AI Models, (Tue, Apr 14th)
InformationalWhy Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
InformationalWar Game Exercise Demonstrates How Social Media Manipulation Works
InformationalEDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses
InformationalMultiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
InformationalUpcoming Speaking Engagements
InformationalBasic-Fit hack compromises data of up to 1 million members
InformationalClaroty advances CPS security with Visibility Orchestration in xDome
InformationalTesting reveals Claude Mythos’s offensive capabilities and limits
InformationalOpenSSL 4.0.0 release cuts deprecated protocols and gains post-quantum support
InformationalGoogle Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security
InformationalGoogle $135M Settlement: Millions of Android Users May Qualify for Payout
InformationalIran War: Future Scenario and Business Improvements
InformationalAfter using these JBL headphones, I'm wondering if we're all too distracted by Sony and Bose
InformationalI added a MagSafe charger to my nightstand and realized its untapped potential: 3 ways it's useful
InformationalI'm ready for a foldable iPhone, but only if Apple does this right
InformationalWhy the Apple Watch's 20-minute calibration test is worth your time - especially if you're data curious
InformationalHow to use Google Messages' new Trash feature to recover texts you accidentally deleted
InformationalHow to share audio from your Android phone to multiple earbuds (and why it's genius)
InformationalChrome's new 'Skills' update lets you save AI prompts now - for one-click reuse
InformationalI tested every 'allergy-friendly' smart home gadget - these 6 actually keep the pollen out
InformationalMicrosoft rolls out fast-track to reinstate Windows hardware dev accounts
InformationalFake Ledger Live app on Apple’s App Store stole $9.5M in crypto
InformationalRussia appears to block social media platform Bluesky amid wider internet restrictions
InformationalVirginia enacts ban on precise geolocation data sales as momentum for similar prohibitions builds
InformationalBSIM explained once and for all!
InformationalISC Stormcast For Tuesday, April 14th, 2026 https://isc.sans.edu/podcastdetail/9890, (Tue, Apr 14th)
InformationalAgentic AI memory attacks spread across sessions and users, and most organizations aren’t ready
InformationalGoogle to penalize sites that hijack the back button
InformationalBinary Defense expands NightBeacon with threat-aligned Detection Coverage Index
InformationalMirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads
InformationalCybersecurity in an Age of Geopolitical Fracture
InformationalOpenAI Rotates macOS Certificates Following Axios Supply Chain Breach
InformationalAPT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials
InformationalThe best Zoom alternatives in 2026: Expert tested and reviewed
InformationalAs an Android user, this MagSafe wallet is the clearest reason why Qi2 magnets shouldn't be ignored
InformationalI bought an earwax camera for my toolkit and use it for everything but my ears
InformationalOpenAI rotates macOS certs after Axios attack hit code-signing workflow
InformationalInteractive Brokers Phishing Scam: Fake IRS W-8BEN Renewal Alert
InformationalPreparing for Post-Quantum Cryptography: The Secure Firewall Roadmap
InformationalIran-linked group Handala claims to have breached three major UAE organizations
InformationalAlleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand
InformationalISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)
LowGoogle makes it harder to exploit Pixel 10 modem firmware
InformationalHack at Dutch gym chain Basic-Fit exposes customer data in several EU countries

⚠️ Vulnerability (55)

CriticalWeek in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
CriticalShowDoc Vulnerability Patched in 2020 Now Used in Active Server Takeovers
CriticalMicrosoft Defender under attack as three zero-days, two of them still unpatched, enable elevated access
CriticalCisco fixed four critical flaws in Identity Services and Webex
CriticalNew Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges
CriticalAnviz Multiple Products
CriticalThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
CriticalZDI-26-266: Fortinet FortiWeb cat_cgi_paths Out-Of-Bounds Write Remote Code Execution Vulnerability
CriticalZDI-26-269: TrendAI Apex One Console Directory Traversal Remote Code Execution Vulnerability
CriticalZDI-26-280: (Pwn2Own) HP DeskJet 2855e JobStatusEvent Stack-based Buffer Overflow Remote Code Execution Vulnerability
CriticalCisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
CriticalCritical MCP Integration Flaw Puts NGINX at Risk
CriticalCISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software
CriticalCritical flaw in wolfSSL library enables forged certificate use
CriticalAdobe Patches Actively Exploited Zero-Day That Lingered for Months
Critical⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More
Critical Simply opening a PDF could trigger this Adobe Reader zero-day
HighMirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
HighMultiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
HighApple AirTag tracking can be misled by replayed Bluetooth signals
HighNIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities
HighRecently leaked Windows zero-days now exploited in attacks
HighCISA flags Apache ActiveMQ flaw as actively exploited in attacks
HighDelta Electronics ASDA-Soft
HighZDI-26-258: (0Day) Docker Desktop extension-manager Exposed Dangerous Function Local Privilege Escalation Vulnerability
HighZDI-26-259: (0Day) Docker Desktop cli-plugins Incorrect Permission Assignment Local Privilege Escalation Vulnerability
HighZDI-26-260: (0Day) Docker Desktop System Editor Uncontrolled Search Path Element Privilege Escalation Vulnerability
HighZDI-26-261: (0Day) Docker Desktop credentialHelper Directory Traversal Privilege Escalation Vulnerability
HighZDI-26-264: Adobe ColdFusion fetchCFSettingFile Directory Traversal Information Disclosure Vulnerability
HighZDI-26-267: Malwarebytes Anti-Malware Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
HighZDI-26-271: Avast Premium Security Gen Self Protection Driver Exposed Dangerous Function Local Privilege Escalation Vulnerability
HighZDI-26-272: ATEN Unizon RpcProvider Missing Authentication Denial-of-Service Vulnerability
HighZDI-26-273: Microsoft Olive Deserialization of Untrusted Data Remote Code Execution Vulnerability
HighZDI-26-275: Microsoft Qlib _mount_nfs_uri Command Injection Remote Code Execution Vulnerability
HighZDI-26-276: Microsoft Windows Secure Kernel Double Free Local Privilege Escalation Vulnerability
HighZDI-26-277: Microsoft Windows afd.sys Race Condition Local Privilege Escalation Vulnerability
HighZDI-26-278: Microsoft Windows win32kfull Improper Locking Local Privilege Escalation Vulnerability
HighZDI-26-279: Microsoft Windows Snipping Tool Improper Input Validation Remote Code Execution Vulnerability
HighZDI-26-281: Microsoft vcpkg OpenSSL Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
HighZDI-26-282: GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
HighZDI-26-283: GStreamer qtdemux Stack-based Buffer Overflow Remote Code Execution Vulnerability
HighZDI-26-286: DriveLock SQL Injection Privilege Escalation Vulnerability
HighZDI-26-289: Linux Kernel ETS Scheduler Race Condition Local Privilege Escalation Vulnerability
HighZDI-26-290: NI LabVIEW LVLIB File Parsing Memory Corruption Remote Code Execution Vulnerability
HighZDI-26-291: NI LabVIEW LVCLASS File Parsing Memory Corruption Remote Code Execution Vulnerability
HighMicrosoft pays $2.3M for cloud and AI flaws at Zero Day Quest
HighMicrosoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
HighMicrosoft releases Windows 10 KB5082200 extended security update
HighGrafanaGhost: The AI That Leaked Everything Without Being Hacked
MediumClothing Retailer Patches Website Flaw Exposing Customer Data
MediumZDI-26-262: Adobe ColdFusion deleteVersion Directory Traversal Arbitrary File Deletion Vulnerability
MediumZDI-26-263: Adobe ColdFusion subscribeToEndpoints Authentication Bypass Vulnerability
MediumZDI-26-285: DriveLock Directory Traversal Information Disclosure Vulnerability
MediumTails 7.6.2 patches vulnerability that could expose saved files
InformationalThe Q1 vulnerability pulse

Daily breach, advisory, and vulnerability briefs publish every weekday.

View Live Breach Feed ← All Weekly Digests