CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 07:45 01/05/2026 UTC
  • VSS snapshot timeout in April 2026 KB5083769 causing third-party backup failures on Windows 11 Microsoft’s April 2026 KB5083769 security update is causing third-party backup applications to fail on Windows 11 versions 24H2 and 25H2 due to Volume Shadow Copy Service (VSS) snapshot timeouts. The update disrupts VSS operations used by backup tools from Acronis, Macrium, NinjaOne, and UrBackup, leading to failed backups and potential loss of cloud console connectivity. Users are advised to uninstall KB5083769 as a temporary mitigation. Read
  • Ukrainian nationals arrested for phishing and infostealing campaign targeting 610,000 Roblox accounts Three Ukrainian nationals were arrested for allegedly operating a phishing and infostealer-based campaign that compromised over 610,000 Roblox accounts between October 2025 and January 2026. The attackers used social engineering lures offering in-game bonuses to distribute malware that harvested credentials and session tokens, enabling unauthorized account access. Investigators identified at least 357 high-value accounts—owned by users with rare in-game items or significant Robux balances—and sold access to these accounts on Russian-language websites for cryptocurrency, generating approximately $225,000 in illicit proceeds. Authorities conducted coordinated raids across multiple locations, seizing devices, financial instruments, and physical evidence. The suspects face up to 15 years in prison if convicted of malware distribution and account theft. Read
  • SMS Blaster Phishing Takedown and Supply Chain Attacks Highlight Rising Abuse of Legitimate Tools A coordinated law enforcement operation in Canada dismantled an SMS blaster phishing ring that impersonated cellular towers to deliver fraudulent SMS messages to tens of thousands of devices, harvesting sensitive credentials. In parallel, multiple software supply chain attacks exploited npm and PyPI ecosystems: a malicious npm package impersonating TanStack exfiltrated developer environment variables during installation, and a compromised PyPI package (elementary-data) leveraged a GitHub Actions script-injection vulnerability to deploy a credential stealer. Additional campaigns weaponized legitimate remote-control tools such as the Komari agent for SYSTEM-level backdoors and introduced next-generation phishing kits (Saiga 2FA, Phoenix System) integrating advanced post-compromise capabilities and telemetry for targeted attacks. Read
  • Romanian organizer of coordinated swatting campaign sentenced to four years for federal conspiracy and threats A Romanian national who led a widespread swatting ring targeting at least 75 public officials, journalists, and four religious institutions was sentenced to four years in federal prison. The offender, 27-year-old Thomasz Szabo, orchestrated bomb threats and swatting attacks beginning in late 2020, prompting armed police responses at numerous locations. Szabo, extradited from Romania in November 2024, pleaded guilty to conspiracy and threats involving explosives in June 2025 and was also ordered three years of supervised release. The campaign included direct threats against U.S. Capitol buildings, synagogues, and senior officials, with coordinated attacks peaking between December 2023 and January 2024. Swatting operations consumed significant law enforcement and taxpayer resources, with one participant claiming to have made 25 swatting calls in a single day, costing over $500,000 in two days. Read
  • Linux Kernel Local Privilege Escalation via Copy Fail (CVE-2026-31431) A local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-31431 and dubbed "Copy Fail," enables unprivileged local attackers to gain root access on all major Linux distributions since 2017. Exploitation leverages a logic bug in the kernel's cryptographic subsystem, specifically within the authencesn template, allowing a 4-byte write to the page cache of any readable file via the AF_ALG socket interface and splice() system call. This controlled write can modify setuid-root binaries, altering their execution to grant root privileges. The flaw was introduced in 2017 through an in-place optimization in the crypto path, which reused buffers instead of separating input and output. A 732-byte Python proof-of-concept exploit achieves 100% reliability across vulnerable versions, impacting kernel releases from 4.14 through 7.0. The vulnerability has been patched upstream by reverting the problematic optimization, but official advisories remain inconsistent across distributions. Further analysis reveals the exploit's simplicity and stealth: a 10-line PoC demonstrates 100% reliable privilege escalation, while exploitation occurs entirely in temporary memory, leaving no disk-based forensic traces. The flaw also poses severe risks in containerized environments, enabling container escape from Kubernetes pods and weaponization against CI/CD runners to access deployment keys or sensitive secrets. Read
  • Joint U.S. Government Guide Released to Accelerate Zero Trust Adoption in Operational Technology Environments U.S. government agencies—CISA, Department of War, Department of Energy, FBI, and Department of State—released a joint guide, Adapting Zero Trust Principles to Operational Technology, to accelerate Zero Trust adoption in operational technology (OT) environments. The guide provides practical steps for securing OT systems while meeting stringent safety and uptime requirements, emphasizing that traditional IT-centric approaches cannot be directly applied due to legacy systems and operational constraints. It highlights the expanded attack surface from IT/OT convergence and the need to address vulnerabilities such as weak segmentation, compromised credentials, and supply chain risks. The document outlines a layered Zero Trust approach tailored for OT, including asset inventories via passive monitoring, microsegmentation, identity controls adapted to legacy systems, and secure remote access with MFA. It also underscores the real-world consequences of OT cyber incidents, such as service disruption and safety hazards, and advises aligning incident response with safety procedures. Incorporating insights from observed threats like Volt Typhoon, CrashOverride, and BlackEnergy, the guidance positions Zero Trust as essential for preventing adversary access to critical physical processes. Read
  • Cross-Platform Supply Chain Attack Expands with Mini Shai-Hulud Malware via PyPI and npm Ecosystems A coordinated supply chain attack involving the "Mini Shai-Hulud" credential-stealing malware has expanded beyond npm to compromise the PyPI ecosystem, targeting the popular Python package Lightning with versions 2.6.2 and 2.6.3. The attack introduces a hidden _runtime directory containing a downloader and obfuscated JavaScript payload that executes automatically upon module import, using the Bun runtime to run an 11 MB malicious payload (router_runtime.js) for credential harvesting. The malware validates harvested GitHub tokens via api.github[.]com/user and injects a worm-like payload across up to 50 branches in accessible repositories, with commits authored to impersonate Anthropic's Claude Code. It also implements an npm-based propagation vector using postinstall hooks to spread to downstream users, mirroring techniques used in prior TeamPCP operations. Additional compromises include version 7.0.4 of intercom-client on PyPI, further aligning with the Mini Shai-Hulud campaign's modus operandi. The maintainers of Lightning acknowledged the incident while investigating a suspected compromise of their GitHub account. The attack is assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on shared technical details and recent operational activity, including the launch of an onion website following suspension from X. The compromised SAP npm packages ([email protected], @cap-js/[email protected], @cap-js/[email protected], and @cap-js/[email protected]) were published on April 29, 2026, between 09:55–12:14 UTC, each including malicious preinstall hooks that downloaded the Bun runtime from GitHub Releases and executed a heavily obfuscated execution.js payload. The payload harvested and encrypted developer and cloud secrets, exfiltrating them to attacker-controlled GitHub repositories labeled "A Mini Shai-Hulud has Appeared", while self-propagating via GitHub Actions workflow injection and abusing AI tool configurations (VS Code and Claude Code) for persistence. Additional exfiltration techniques included a Python-based memory scanner targeting CI runner secrets and a dead-drop mechanism leveraging GitHub commit searches for base64-encoded GitHub tokens. Read
Last updated: 09:45 01/05/2026 UTC
  • U.S. sanctions cyber scam operations in Southeast Asia The U.S. Department of the Treasury has sanctioned additional entities in Cambodia, including Senator Kok An, for operating large-scale cryptocurrency fraud networks embedded within scam compounds, including casinos and commercial buildings. These networks defrauded Americans of at least $10 billion in 2024 through romance baiting and fake investment platforms, with financial losses reaching millions per victim. The sanctions target 29 individuals and organizations and are coordinated with the Department of Justice, FBI, and Secret Service. Recent enforcement actions include the seizure of 503 fraudulent domains, disruption of a messaging app used for human trafficking recruitment, and criminal charges against operators in Burma and Cambodia. The U.S. has escalated efforts to dismantle these operations, which are linked to widespread human trafficking, physical abuse, and casino-based money laundering. The sanctions block U.S.-based assets and prohibit transactions with designated parties, aiming to disrupt the financial and operational infrastructure sustaining these cyber-enabled fraud networks. Read
  • TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment. Read
  • Sustained 63% annual increase in cyber-attacks against global education sector over 2023–2025 Between November 2023 and October 2025, cyber-attacks on schools and universities worldwide rose 63% year-over-year, driven by geopolitical tensions, ransomware, and hacktivism. Data breaches increased 73%, hacktivist activity 75%, and ransomware incidents 21% across 67 countries. Research-intensive institutions face targeted theft of AI, quantum, and advanced materials data, while hacktivist campaigns—including Iranian-affiliated actors—conduct DDoS, defacement, and data-leak operations. New data from the UK Cyber Security Breaches Survey 2025/2026 reveals a dramatic surge in cyber breaches among British educational institutions. In 2025/2026, 98% of higher education institutions reported breaches (up from 91%), 88% of further education colleges (up 3%), 73% of secondary schools (up 13%), and 4% of primary schools. The survey highlights phishing as the most prevalent threat, with severe consequences such as revenue loss reported by 5% of businesses. Amid stable national threat levels, small businesses regressed in cyber hygiene, and Cyber Essentials adoption stalled at 5%. Read
  • Self-propagating North Korean job-scam malware spreads via compromised developer projects in software supply chain A North Korean state-aligned actor has transformed fake job recruitment scams into a self-propagating supply-chain attack dubbed "Contagious Interview" that infects developer workstations and propagates via compromised repositories. Void Dokkaebi (aka Famous Chollima) abuses legitimate development workflows by luring developers with fake interviews, then delivering malware via malicious VS Code tasks or hidden payloads in fonts/images. Once committed to Git repositories, the infection spreads to downstream contributors, creating a worm-like chain reaction. Developers’ credentials, crypto wallets, CI/CD pipelines, and production infrastructure are primary targets. Newly identified activity connected to the same actor’s PromptMink campaign targets cryptocurrency developers via malicious npm packages, including @validate-sdk/v2, co-authored by an AI coding assistant. The layered package strategy uses legitimate-looking tools to hide malicious payloads, with payloads evolving from credential theft to broader data exfiltration, persistence mechanisms, and cross-platform binaries. Over 60 packages and 300+ versions have been identified across seven months, with evidence of LLM integration in malware development. Read
  • Rockstar Games analytics data exfiltrated via third-party Snowflake compromise linked to Anodot breach The extortion group ShinyHunters has expanded its campaign tied to the Anodot breach, claiming unauthorized access to Vimeo’s systems and threatening to leak data unless a ransom is paid. The attack leverages authentication tokens stolen from Anodot to compromise downstream victims, including Vimeo and Rockstar Games. Vimeo confirmed that exposed data included email addresses, technical data, video titles, and metadata, but excluded video content, credentials, and payment information. Operations remained unaffected, and Vimeo disabled Anodot integration and launched an investigation with law enforcement. Rockstar Games previously acknowledged a limited breach linked to the same third-party incident, with ShinyHunters leaking approximately 78.6 million records of internal analytics data. The compromised datasets included in-game revenue metrics, player behavior tracking, and Zendesk support analytics, with Rockstar asserting no operational impact. Read
  • Ransomware in Healthcare: Spillover Effects on Surrounding Hospitals Ransomware attacks on healthcare organizations continue to cause significant disruption beyond targeted institutions, affecting surrounding hospitals and entities through diverted ambulances, increased patient volume, and delayed treatments. These spillover effects are particularly severe in rural communities, where delayed care can lead to long-term health effects and fatal outcomes. The healthcare sector faces persistent ransomware threats, with Health-ISAC tracking nearly 6,000 events in critical infrastructure organizations in 2024, including 446 in healthcare, followed by 4,159 cases across all sectors in the first half of 2025. Recent data reveals that medical devices are increasingly targeted, with one-quarter of healthcare organizations reporting cyber-attacks impacting these devices in the past year. These attacks have moderate to severe impacts on patient care, ranging from delayed imaging to interruptions in critical care delivery. Legacy device vulnerabilities, recent high-profile incidents involving Medtronic and Stryker, and the rise of AI-enabled medical systems introduce additional cybersecurity challenges, underscoring the need for robust security measures and improved procurement practices. Read
  • North Korean Threat Actor BlueNoroff Targets Web3 Sector BlueNoroff, a financially motivated sub-cluster of the Lazarus Group, has expanded its long-running SnatchCrypto campaign with a large-scale cyber theft operation targeting over 100 cryptocurrency organizations across more than 20 countries. The campaign, detected in January 2026 and attributed with high confidence by Arctic Wolf Labs, used sophisticated social engineering tactics including typosquatted Zoom/Teams links, fake Calendly invites, and ClickFix-style clipboard attacks to deploy multi-stage malware chains. The group maintained persistent access for 66 days in some cases, exfiltrated live camera feeds to fuel AI-enhanced deepfake lures, and deployed advanced infrastructure including PowerShell C2 implants and AES-encrypted browser payloads. BlueNoroff remains North Korea's primary financial cybercrime unit, operating since at least 2014 and infamous for the 2016 Bangladesh Bank heist where $81 million was stolen. The group's evolving tactics demonstrate a shift from traditional financial targets to comprehensive data acquisition in the Web3 sector, including supply chain attack preparation. Read

Latest updates

Browse →

Windows 11 KB5083631 update introduces non-security fixes, Secure Boot certificate refresh, and Xbox mode

Updated: · First: 01.05.2026 13:00 · 📰 1 src / 1 articles

Microsoft released the optional cumulative update KB5083631 for Windows 11 24H2 and 25H2, introducing 34 non-security changes including performance improvements, a new Xbox mode, enhanced batch file security, and Secure Boot certificate updates. The update does not include security fixes and targets quality improvements for admins to test before next Patch Tuesday. Key technical changes include a new Xbox full-screen gaming interface, stricter batch file processing mode, improved Kerberos authentication for RDP with Remote Credential Guard, and expanded Secure Boot certificate coverage with phased rollout. The update also addresses Secure Boot certificate expirations in June 2026 and introduces haptic feedback support for input devices.

Compromise of Ruby gems and Go modules via poisoned packages leads to credential theft and CI pipeline manipulation

Updated: · First: 01.05.2026 12:43 · 📰 1 src / 1 articles

A coordinated software supply chain attack leveraged sleeper packages in RubyGems and Go modules to deploy malicious payloads targeting CI pipelines, enabling credential theft, GitHub Actions tampering, and SSH persistence. The attack originated from the GitHub account "BufferZoneCorp", which published repositories and packages disguised as legitimate libraries such as activesupport-logger and go-retryablehttp. The malicious packages were designed to harvest environment variables, SSH keys, AWS secrets, and developer credentials, exfiltrating data to attacker-controlled endpoints. Go modules also contained functionality to manipulate GitHub Actions workflows, inject fake Go wrappers, and add persistent SSH access via authorized_keys. As of reporting, all identified packages have been yanked or blocked.

Linux Kernel Local Privilege Escalation via Copy Fail (CVE-2026-31431)

Updated: 30.04.2026 23:41 · First: 30.04.2026 16:54 · 📰 2 src / 2 articles

A local privilege escalation vulnerability in the Linux kernel, tracked as CVE-2026-31431 and dubbed "Copy Fail," enables unprivileged local attackers to gain root access on all major Linux distributions since 2017. Exploitation leverages a logic bug in the kernel's cryptographic subsystem, specifically within the authencesn template, allowing a 4-byte write to the page cache of any readable file via the AF_ALG socket interface and splice() system call. This controlled write can modify setuid-root binaries, altering their execution to grant root privileges. The flaw was introduced in 2017 through an in-place optimization in the crypto path, which reused buffers instead of separating input and output. A 732-byte Python proof-of-concept exploit achieves 100% reliability across vulnerable versions, impacting kernel releases from 4.14 through 7.0. The vulnerability has been patched upstream by reverting the problematic optimization, but official advisories remain inconsistent across distributions. Further analysis reveals the exploit's simplicity and stealth: a 10-line PoC demonstrates 100% reliable privilege escalation, while exploitation occurs entirely in temporary memory, leaving no disk-based forensic traces. The flaw also poses severe risks in containerized environments, enabling container escape from Kubernetes pods and weaponization against CI/CD runners to access deployment keys or sensitive secrets.

Bluekit phishing kit integrates AI assistant and all-in-one attack management

Updated: · First: 30.04.2026 21:58 · 📰 1 src / 1 articles

A new phishing kit named Bluekit, identified in active development as of April 2026, provides cybercriminals with a unified platform for phishing campaign creation, execution, and data exfiltration. The kit includes an AI Assistant panel supporting multiple language models (Llama, GPT-4.1, Claude, Gemini, DeepSeek) to draft phishing emails and over 40 realistic templates targeting email providers (Gmail, Outlook, Yahoo, ProtonMail), cloud services (iCloud), developer platforms (GitHub), and cryptocurrency services (Ledger). Operators can purchase domains, configure anti-analysis mechanisms, block VPN/proxy traffic, and monitor victim sessions in real-time. Stolen credentials are exfiltrated via private Telegram channels. The platform’s experimental AI features and rapid iteration suggest it is designed to lower the barrier to entry for phishing operations while enabling scale and customization.

Romanian organizer of coordinated swatting campaign sentenced to four years for federal conspiracy and threats

Updated: · First: 30.04.2026 20:45 · 📰 1 src / 1 articles

A Romanian national who led a widespread swatting ring targeting at least 75 public officials, journalists, and four religious institutions was sentenced to four years in federal prison. The offender, 27-year-old Thomasz Szabo, orchestrated bomb threats and swatting attacks beginning in late 2020, prompting armed police responses at numerous locations. Szabo, extradited from Romania in November 2024, pleaded guilty to conspiracy and threats involving explosives in June 2025 and was also ordered three years of supervised release. The campaign included direct threats against U.S. Capitol buildings, synagogues, and senior officials, with coordinated attacks peaking between December 2023 and January 2024. Swatting operations consumed significant law enforcement and taxpayer resources, with one participant claiming to have made 25 swatting calls in a single day, costing over $500,000 in two days.

Cross-Platform Supply Chain Attack Expands with Mini Shai-Hulud Malware via PyPI and npm Ecosystems

Updated: 30.04.2026 19:31 · First: 29.04.2026 19:26 · 📰 3 src / 4 articles

A coordinated supply chain attack involving the "Mini Shai-Hulud" credential-stealing malware has expanded beyond npm to compromise the PyPI ecosystem, targeting the popular Python package Lightning with versions 2.6.2 and 2.6.3. The attack introduces a hidden _runtime directory containing a downloader and obfuscated JavaScript payload that executes automatically upon module import, using the Bun runtime to run an 11 MB malicious payload (router_runtime.js) for credential harvesting. The malware validates harvested GitHub tokens via api.github[.]com/user and injects a worm-like payload across up to 50 branches in accessible repositories, with commits authored to impersonate Anthropic's Claude Code. It also implements an npm-based propagation vector using postinstall hooks to spread to downstream users, mirroring techniques used in prior TeamPCP operations. Additional compromises include version 7.0.4 of intercom-client on PyPI, further aligning with the Mini Shai-Hulud campaign's modus operandi. The maintainers of Lightning acknowledged the incident while investigating a suspected compromise of their GitHub account. The attack is assessed as an extension of the Mini Shai-Hulud campaign, with TeamPCP identified as the likely threat actor based on shared technical details and recent operational activity, including the launch of an onion website following suspension from X. The compromised SAP npm packages ([email protected], @cap-js/[email protected], @cap-js/[email protected], and @cap-js/[email protected]) were published on April 29, 2026, between 09:55–12:14 UTC, each including malicious preinstall hooks that downloaded the Bun runtime from GitHub Releases and executed a heavily obfuscated execution.js payload. The payload harvested and encrypted developer and cloud secrets, exfiltrating them to attacker-controlled GitHub repositories labeled "A Mini Shai-Hulud has Appeared", while self-propagating via GitHub Actions workflow injection and abusing AI tool configurations (VS Code and Claude Code) for persistence. Additional exfiltration techniques included a Python-based memory scanner targeting CI runner secrets and a dead-drop mechanism leveraging GitHub commit searches for base64-encoded GitHub tokens.

Ukrainian nationals arrested for phishing and infostealing campaign targeting 610,000 Roblox accounts

Updated: · First: 30.04.2026 19:00 · 📰 1 src / 1 articles

Three Ukrainian nationals were arrested for allegedly operating a phishing and infostealer-based campaign that compromised over 610,000 Roblox accounts between October 2025 and January 2026. The attackers used social engineering lures offering in-game bonuses to distribute malware that harvested credentials and session tokens, enabling unauthorized account access. Investigators identified at least 357 high-value accounts—owned by users with rare in-game items or significant Robux balances—and sold access to these accounts on Russian-language websites for cryptocurrency, generating approximately $225,000 in illicit proceeds. Authorities conducted coordinated raids across multiple locations, seizing devices, financial instruments, and physical evidence. The suspects face up to 15 years in prison if convicted of malware distribution and account theft.

VSS snapshot timeout in April 2026 KB5083769 causing third-party backup failures on Windows 11

Updated: · First: 30.04.2026 18:23 · 📰 1 src / 1 articles

Microsoft’s April 2026 KB5083769 security update is causing third-party backup applications to fail on Windows 11 versions 24H2 and 25H2 due to Volume Shadow Copy Service (VSS) snapshot timeouts. The update disrupts VSS operations used by backup tools from Acronis, Macrium, NinjaOne, and UrBackup, leading to failed backups and potential loss of cloud console connectivity. Users are advised to uninstall KB5083769 as a temporary mitigation.

Compromised DDoS Mitigation Provider’s Infrastructure Used to Operate Mirai-based Botnet Targeting Brazilian ISPs

Updated: · First: 30.04.2026 17:04 · 📰 1 src / 1 articles

A Brazilian DDoS mitigation provider, Huge Networks, had its infrastructure compromised to operate a Mirai-based botnet targeting Brazilian ISPs with large-scale reflection and amplification attacks. The botnet leveraged TP-Link Archer AX21 routers vulnerable to CVE-2023-1389 (patched April 2023) and DNS reflection/amplification techniques to generate high-volume traffic solely against Brazilian IP ranges. Attack scripts and private SSH keys belonging to the company’s CEO were exposed in an open directory, revealing coordinated scanning and DDoS operations over the past several years.

Automated attacker enumeration of newly exposed assets within 24 hours of public availability

Updated: · First: 30.04.2026 17:02 · 📰 1 src / 1 articles

Within minutes of an internet-exposed asset becoming publicly reachable, automated scanning infrastructure catalogues open ports, service versions, and TLS certificates, enabling rapid attacker enumeration and targeting. By the six-hour mark, passive reconnaissance transitions to active probing of management interfaces and exploitable services such as SSH, RDP, and web panels. Between 12 and 24 hours, default credentials, unpatched vulnerabilities, and misconfigurations are routinely leveraged to achieve compromise, as demonstrated by honeypot deployments showing 80% compromise rates within 24 hours. Exposures often originate from unintentional asset creation—backend APIs referenced in JavaScript files or forgotten development instances—rather than deliberate deployments.

Joint U.S. Government Guide Released to Accelerate Zero Trust Adoption in Operational Technology Environments

Updated: 30.04.2026 17:00 · First: 29.04.2026 15:00 · 📰 2 src / 2 articles

U.S. government agencies—CISA, Department of War, Department of Energy, FBI, and Department of State—released a joint guide, *Adapting Zero Trust Principles to Operational Technology*, to accelerate Zero Trust adoption in operational technology (OT) environments. The guide provides practical steps for securing OT systems while meeting stringent safety and uptime requirements, emphasizing that traditional IT-centric approaches cannot be directly applied due to legacy systems and operational constraints. It highlights the expanded attack surface from IT/OT convergence and the need to address vulnerabilities such as weak segmentation, compromised credentials, and supply chain risks. The document outlines a layered Zero Trust approach tailored for OT, including asset inventories via passive monitoring, microsegmentation, identity controls adapted to legacy systems, and secure remote access with MFA. It also underscores the real-world consequences of OT cyber incidents, such as service disruption and safety hazards, and advises aligning incident response with safety procedures. Incorporating insights from observed threats like Volt Typhoon, CrashOverride, and BlackEnergy, the guidance positions Zero Trust as essential for preventing adversary access to critical physical processes.

SMS Blaster Phishing Takedown and Supply Chain Attacks Highlight Rising Abuse of Legitimate Tools

Updated: · First: 30.04.2026 16:55 · 📰 1 src / 1 articles

A coordinated law enforcement operation in Canada dismantled an SMS blaster phishing ring that impersonated cellular towers to deliver fraudulent SMS messages to tens of thousands of devices, harvesting sensitive credentials. In parallel, multiple software supply chain attacks exploited npm and PyPI ecosystems: a malicious npm package impersonating TanStack exfiltrated developer environment variables during installation, and a compromised PyPI package (elementary-data) leveraged a GitHub Actions script-injection vulnerability to deploy a credential stealer. Additional campaigns weaponized legitimate remote-control tools such as the Komari agent for SYSTEM-level backdoors and introduced next-generation phishing kits (Saiga 2FA, Phoenix System) integrating advanced post-compromise capabilities and telemetry for targeted attacks.

Sustained 63% annual increase in cyber-attacks against global education sector over 2023–2025

Updated: 30.04.2026 16:30 · First: 23.04.2026 13:30 · 📰 2 src / 2 articles

Between November 2023 and October 2025, cyber-attacks on schools and universities worldwide rose 63% year-over-year, driven by geopolitical tensions, ransomware, and hacktivism. Data breaches increased 73%, hacktivist activity 75%, and ransomware incidents 21% across 67 countries. Research-intensive institutions face targeted theft of AI, quantum, and advanced materials data, while hacktivist campaigns—including Iranian-affiliated actors—conduct DDoS, defacement, and data-leak operations. New data from the UK Cyber Security Breaches Survey 2025/2026 reveals a dramatic surge in cyber breaches among British educational institutions. In 2025/2026, 98% of higher education institutions reported breaches (up from 91%), 88% of further education colleges (up 3%), 73% of secondary schools (up 13%), and 4% of primary schools. The survey highlights phishing as the most prevalent threat, with severe consequences such as revenue loss reported by 5% of businesses. Amid stable national threat levels, small businesses regressed in cyber hygiene, and Cyber Essentials adoption stalled at 5%.

Authentication bypass vulnerability in cPanel and WHM exploited as zero-day prior to patch

Updated: · First: 30.04.2026 14:40 · 📰 1 src / 1 articles

A critical authentication bypass vulnerability (CVE-2026-41940) in cPanel, WHM, and WP Squared was exploited as a zero-day in the wild with observed activity dating back to February 23, 2026. The flaw, a Carriage Return Line Feed (CRLF) injection in login and session loading processes, allowed attackers to gain full control over cPanel hosts, their configurations, databases, and managed websites without valid credentials. Exploitation attempts were detected before a fix was released, prompting emergency measures such as port blocking by Namecheap and rapid vendor patching on April 28, 2026. The vulnerability impacts cPanel versions 11.40 and later, with approximately 1.5 million exposed instances identified via Shodan scans. Immediate patching and service restarts are recommended, with emergency mitigations available for unpatched systems.

Global disruption of pig-butchering cryptocurrency scam networks with 276 arrests

Updated: · First: 30.04.2026 14:21 · 📰 1 src / 1 articles

A coordinated international law enforcement operation dismantled nine cryptocurrency investment fraud centers across Dubai and Southeast Asia, arresting 276 suspects linked to pig-butchering (romance baiting) schemes that defrauded victims through fake investment platforms. Scammers cultivated trust with targets via fabricated relationships before redirecting victims to counterfeit cryptocurrency investment portals where deposited funds were immediately siphoned and laundered through layered crypto accounts. Victims were coerced into borrowing money and taking loans to increase investments, exacerbating financial losses. The operation targeted operations including Ko Thet Company, Sanduo Group, and Giant Company, with fugitives still at large.

Global survey identifies cyber-related workforce literacy and skills as dominant operational risks for 2026

Updated: · First: 30.04.2026 12:10 · 📰 1 src / 1 articles

A 2026 global survey of over 4,500 HR and risk professionals across 26 markets ranked cyber-related workforce risks as the top people-centered challenges organizations face. Cyber-threat literacy emerged as the foremost concern, followed closely by tech skills shortages—including cybersecurity and AI—and mindset barriers to AI adoption. Organizations reported increased exposure to cyber-attacks, operational disruption, and reputational damage due to low workforce cyber awareness and inadequate preparation for technology failures. Experts emphasize that the material impact increasingly stems from business interruption and systems failures rather than traditional cyber-attacks alone, driving broader economic and contractual consequences.

Malicious self-update mechanism in Quick Page/Post Redirect plugin exposed dormant backdoor in WordPress environments

Updated: · First: 30.04.2026 01:13 · 📰 1 src / 1 articles

A dormant backdoor mechanism was discovered in the Quick Page/Post Redirect WordPress plugin, installed on over 70,000 websites. The backdoor, introduced via compromised plugin versions (5.2.1 and 5.2.2) released between 2020 and 2021, included a hidden self-update system that fetched arbitrary code from a third-party domain (anadnet[.]com). This allowed silent code injection into sites, primarily for SEO spam targeting logged-out users. The backdoor activation mechanism remains dormant on impacted sites due to the command-and-control domain's current lack of resolution, but the self-update capability could enable further exploitation. WordPress.org has temporarily removed the plugin pending review, and users are advised to uninstall the plugin and replace it with a clean version once available.

Ukrainian law enforcement disrupts Roblox account hijacking ring with 610,000 compromised accounts

Updated: · First: 29.04.2026 21:32 · 📰 1 src / 1 articles

Ukrainian cyber police arrested three individuals alleged to have hijacked 610,000 Roblox accounts between October 2025 and January 2026, generating approximately $225,000 in illicit revenue. The threat actors used info-stealing malware disguised as game-enhancer tools to harvest credentials, then categorized and sold high-value accounts via Russian websites and closed online communities. Authorities executed ten search warrants in Lviv, seizing $35,000 in cash, 37 mobile phones, 11 desktops, seven laptops, five tablets, and four USB drives. The group targeted at least 357 "elite" accounts, which often contain rare virtual items, financial balances, and years of progress, making them attractive targets for monetization.

Automated credential management deployment at Oracle Red Bull Racing accelerates incident recovery and design workflows

Updated: · First: 29.04.2026 21:02 · 📰 1 src / 1 articles

Oracle Red Bull Racing deployed 1Password’s automated credential management tools across engineering and IT environments to secure sensitive F1 design systems and streamline incident response. The initiative aimed to secure over 100 service accounts, thousands of servers, and cloud workloads while enabling rapid recovery from technical issues in aerodynamics wind tunnel systems—critical infrastructure with tight time budgets. Implementation spanned a phased rollout from February 2025, focused on centralizing secrets, enforcing least privilege, and integrating SaaS governance to reduce manual overhead and avoid credential leaks or unauthorized access. Measurable outcomes include reducing wind tunnel recovery time from approximately one hour to two minutes and significantly decreasing unscheduled 3 a.m. incident calls.

Emergency patch issued for critical authentication bypass in cPanel and WHM control panels

Updated: · First: 29.04.2026 18:51 · 📰 1 src / 1 articles

A critical authentication bypass vulnerability in cPanel and WebHost Manager (WHM) allowed unauthenticated access to control panels across multiple versions, exposing servers to complete compromise. The flaw affected all supported cPanel/WHM versions prior to specific patched releases, enabling attackers to gain administrative control over websites, databases, emails, and entire server environments without credentials. The vendor released emergency updates via manual command execution to address the issue, while a major hosting provider temporarily blocked access to WHM/cPanel ports as a precaution.

VECT 2.0 Ransomware Operation Degrades to Irreversible Data Destruction Due to Critical Encryption Flaw

Updated: 29.04.2026 18:23 · First: 28.04.2026 17:01 · 📰 4 src / 4 articles

VECT 2.0 ransomware has been confirmed as an irreversible data wiper due to a critical nonce-handling flaw that discards decryption metadata for 75% of affected files, ensuring recovery is impossible regardless of ransom payment. This flaw, inherent to the ChaCha20-IETF encryption scheme, encrypts four independent chunks per large file but only stores the final 12-byte nonce on disk, discarding the first three nonces required for decryption. The operation, structured as a ransomware-as-a-service scheme with a $250 Monero affiliate fee (waived for Commonwealth of Independent States actors), originated on a Russian-language cybercrime forum in December 2025 before being detected by security researchers in early January 2026. VECT 2.0 rapidly expanded through partnerships with BreachForums and TeamPCP, the latter of which provides access to victims compromised in recent supply-chain attacks. Analysts emphasize that negotiating with actors offers no path to file recovery and that the malware's threshold of 128KB ensures nearly all enterprise and user files are targeted. Additional analysis revealed multiple implementation flaws beyond the encryption flaw, including faulty obfuscation, unreachable anti-analysis code, and performance-degrading scheduler bugs. Organizations are advised to prioritize prevention through employee training, EDR monitoring, offline immutable backups, and strict access controls, particularly for ESXi environments.

Cursor AI Extension Vulnerability Enables Unauthorized Credential Access via Local Storage Flaw

Updated: · First: 29.04.2026 18:00 · 📰 1 src / 1 articles

A high-severity vulnerability in the Cursor AI development environment allows installed extensions to directly access locally stored API keys, session tokens, and configuration data without user interaction or permission prompts. The flaw stems from Cursor's use of an unprotected SQLite database for credential storage, enabling any extension—regardless of its requested permissions—to query and exfiltrate sensitive authentication materials. Exploitation risks unauthorized access to third-party services such as OpenAI, Anthropic, or Google, leading to potential financial loss, data exposure, and service misuse. Cursor has not yet patched the issue as of April 28, 2026, and places responsibility on users to define trust boundaries.

Multinational law enforcement operation dismantles cryptocurrency investment fraud ring linked to €50 million losses

Updated: · First: 29.04.2026 17:27 · 📰 1 src / 1 articles

Austria and Albania, with support from Europol and Eurojust, dismantled a large-scale cryptocurrency investment fraud ring that allegedly defrauded victims worldwide of over €50 million. The operation, initiated in June 2023, culminated in the arrest of 10 suspects and coordinated searches on April 17, 2024, across three call centers and nine private residences. Seizures included €891,735 in cash, 443 computers, 238 mobile phones, 6 laptops, and multiple data storage devices. Victims were primarily targeted through fraudulent cryptocurrency investment platforms advertised on search engines and social media, with funds siphoned into international money-laundering schemes.

Self-propagating North Korean job-scam malware spreads via compromised developer projects in software supply chain

Updated: 29.04.2026 17:00 · First: 22.04.2026 17:48 · 📰 2 src / 2 articles

A North Korean state-aligned actor has transformed fake job recruitment scams into a self-propagating supply-chain attack dubbed "Contagious Interview" that infects developer workstations and propagates via compromised repositories. Void Dokkaebi (aka Famous Chollima) abuses legitimate development workflows by luring developers with fake interviews, then delivering malware via malicious VS Code tasks or hidden payloads in fonts/images. Once committed to Git repositories, the infection spreads to downstream contributors, creating a worm-like chain reaction. Developers’ credentials, crypto wallets, CI/CD pipelines, and production infrastructure are primary targets. Newly identified activity connected to the same actor’s PromptMink campaign targets cryptocurrency developers via malicious npm packages, including @validate-sdk/v2, co-authored by an AI coding assistant. The layered package strategy uses legitimate-looking tools to hide malicious payloads, with payloads evolving from credential theft to broader data exfiltration, persistence mechanisms, and cross-platform binaries. Over 60 packages and 300+ versions have been identified across seven months, with evidence of LLM integration in malware development.

Compromise of Third-Party AI Tool via Infostealer Leads to Vercel Breach and OAuth Token Theft Chain

Updated: 29.04.2026 16:05 · First: 21.04.2026 00:01 · 📰 3 src / 3 articles

Vercel remains under assessment following a sophisticated attack chain that began with the compromise of third-party AI tool vendor Context.ai via an infostealer. The breach was enabled by an OAuth token tied to a Vercel employee’s Google Workspace account, granting access to non-sensitive environment variables and internal systems. Context.ai acknowledged the theft of OAuth tokens, including those used in consumer-facing integrations. Vercel, collaborating with Mandiant, has notified affected customers and issued advisories emphasizing MFA enforcement, credential rotation, and review of non-sensitive environment variables. A threat actor allegedly linked to ShinyHunters attempted to extort Vercel for $2 million. The incident highlights systemic risks from shadow AI integrations and OAuth sprawl. Context.ai’s breach originated from an infostealer infection on an employee’s system after searching for gaming cheats, leading to the theft of OAuth tokens. The compromised Vercel employee account had broad permissions, including access to internal dashboards, API keys, and GitHub tokens. Broader industry trends show attackers increasingly exploiting OAuth connections at scale, with campaigns like Scattered Lapsus$ Hunters targeting major enterprises via OAuth-driven supply chain attacks and phishing. Security experts recommend default-deny policies for OAuth integrations and routine audits to mitigate these risks.

Exponential growth in compromised credential collections driven by infostealers and macOS targeting in 2025

Updated: · First: 29.04.2026 16:00 · 📰 1 src / 1 articles

Global compromised credential collections surged to nearly 2.9 billion in 2025, driven by widespread infostealer activity and a 7,000% increase in macOS infostealer infections. The data spans usernames, passwords, session tokens, cookies, breached email repositories, and cybercrime marketplaces. At least 347 million credentials originated from infostealers operating across 3.9 million infected systems. The scale reflects persistent and evolving credential harvesting threats targeting both traditional and Apple ecosystems. Ransomware victims rose 45% to 7,549 across 147 groups, including 80 new entities. CISA’s Known Exploited Vulnerabilities (KEV) Catalog expanded by 29% to 238 entries, with markets favoring weaponized exploits over proof-of-concept code. Hacktivist groups increased by 250, while DDoS attacks surged 400% to 3,500 incidents amid rising geopolitical tensions. AI integration in attack chains has shifted from supportive tools to core components, enabling autonomous workflows, malware deployment, and prompt injection attacks across compromised identities.

GitHub CVE-2026-3854 remote code execution flaw via crafted git push

Updated: 29.04.2026 15:41 · First: 28.04.2026 21:19 · 📰 2 src / 2 articles

GitHub disclosed CVE-2026-3854, a critical command injection vulnerability in GitHub.com and GitHub Enterprise Server allowing authenticated users with push access to achieve remote code execution via a single "git push" command. The flaw stemmed from inadequate sanitization of user-supplied push option values, which enabled injection of crafted metadata into internal headers during git push operations. Exploitation involved bypassing sandboxing protections, redirecting hook execution, and executing arbitrary commands as the git user, potentially exposing millions of private repositories. GitHub confirmed the vulnerability was reported by Wiz on March 4, 2026, and patched on GitHub.com within two hours, with no evidence of exploitation in the wild prior to disclosure. However, approximately 88% of GitHub Enterprise Server instances remained vulnerable at the time of public disclosure, prompting urgent patches for all supported releases.

Shift to Autonomous Exposure Validation Against AI-Driven Attack Agents

Updated: · First: 29.04.2026 15:02 · 📰 1 src / 1 articles

The cybersecurity community has documented the first recorded use of custom AI agents by threat actors to autonomously execute attacks within enterprise networks, specifically targeting Active Directory and escalating privileges to Domain Admin. These AI-driven attacks reduce time-to-compromise to minutes while traditional defensive workflows—characterized by siloed CTI, Red, and Blue teams—remain manual and sluggish, creating a critical speed asymmetry. A new defensive paradigm, Autonomous Exposure Validation, is being introduced to counter these AI adversaries by integrating automated threat simulation, exposure validation, and coordinated remediation into a unified operational loop.

Evaluating exposure management platform architectures for effective risk reduction

Updated: · First: 29.04.2026 14:30 · 📰 1 src / 1 articles

Exposure management platforms are increasingly adopted to bridge the gap between remediation efforts and actual risk reduction, addressing a critical shortcoming in traditional vulnerability management approaches. Security teams often struggle to quantify whether their patching efforts translate to meaningful improvements in security posture due to limited context provided by patch counts and CVSS scores alone. The market offers four dominant platform architectures—stitched portfolios, data aggregation platforms, single-domain specialists, and integrated platforms—each with distinct technical capabilities and limitations that directly impact an organization’s ability to assess and mitigate real-world attack paths. Selecting an exposure management platform with the wrong architecture can result in persistent blind spots, inefficient remediation efforts, and misaligned prioritization, leaving critical assets exposed despite high volumes of closed vulnerabilities.

CISA mandates patching of Windows zero-click authentication coercion flaw (CVE-2026-32202) exploited in APT28 campaigns

Updated: · First: 29.04.2026 13:29 · 📰 1 src / 1 articles

CISA has issued a directive under BOD 22-01 requiring U.S. federal agencies to patch the Windows authentication coercion vulnerability CVE-2026-32202 by May 12, 2026, following evidence of active exploitation in low-complexity, zero-click credential theft attacks. The flaw represents an incompletely remediated gap left after Microsoft’s February 2026 patch for CVE-2026-21510, a remote code execution issue exploited by Russian state-sponsored APT28 (Fancy Bear) in December 2025 across Ukraine and EU targets. Akamai researchers identified the residual vulnerability as enabling auto-parsed LNK file-based attacks that bypass user interaction, leveraging trust verification bypasses in path resolution. Microsoft confirmed active exploitation on April 27, 2026, prompting the urgency reflected in the KEV entry and CISA’s binding directive.