CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 17:30 16/04/2026 UTC
  • Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws Microsoft's multi-month Patch Tuesday campaign continues with the April 2026 release addressing 167 security vulnerabilities in Windows and related software, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Nearly 60% of the patched flaws are elevation-of-privilege bugs, marking the highest proportion in eight months, while eight Critical vulnerabilities were addressed, including unauthenticated remote code execution flaws in Windows IKE Service Extensions (CVE-2026-33824, CVSS 9.8) and secure tunneling components (CVE-2026-33827, CVSS 8.1). The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), changing build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). Windows 10 Enterprise LTSC and ESU participants received the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). Critical updates addressed CVE-2026-32201 (actively exploited SharePoint Server spoofing vulnerability enabling phishing and unauthorized data manipulation) and CVE-2026-33825 (publicly disclosed Microsoft Defender elevation-of-privilege flaw granting SYSTEM privileges). Additional critical risks included CVE-2026-33824 (Windows IKE Service Extensions unauthenticated RCE, CVSS 9.8) and CVE-2026-33827 (secure tunneling RCE, CVSS 8.1). Nearly 60% of patched flaws were elevation-of-privilege bugs, with 93 such vulnerabilities addressed. Read
  • Salesforce misconfiguration leads to non-sensitive data exposure at McGraw-Hill amid ShinyHunters extortion claims McGraw-Hill confirmed a data breach affecting 13.5 million user accounts after ShinyHunters exploited a Salesforce environment misconfiguration to steal and leak non-sensitive data, including names, addresses, phone numbers, and email addresses. The company stated the breach did not impact its core Salesforce accounts, customer databases, courseware, or internal systems, though ShinyHunters claimed possession of 45 million records with PII. The affected webpages were secured promptly, and McGraw-Hill is collaborating with Salesforce to remediate the issue. Have I Been Pwned verified the leak of over 100GB of data tied to 13.5 million accounts. Read
  • Rhysida ransomware leak impacts 337,000 patients at Tennessee hospital after failed extortion Cookeville Regional Medical Center (CRMC) in Tennessee confirmed that more than 337,917 patients were notified in April 2026 of a July 2025 ransomware attack conducted by the Rhysida group, a Russia-linked ransomware-as-a-service operation active since May 2023. The intrusion, detected internally in mid-July 2025, resulted in the theft of sensitive data including names, addresses, dates of birth, Social Security numbers, driver’s license numbers, financial account details, medical records, and health insurance information. Rhysida claimed responsibility on August 2, 2025, demanding 10 Bitcoin (~$1.15 million at the time) before publishing the dataset publicly after failing to secure a buyer. CRMC has begun mailing breach notifications and is offering 12 months of free identity theft protection through Experian. The incident ranks as the eighth-largest US healthcare ransomware breach of 2025 by records compromised, amid a broader wave of Rhysida attacks targeting healthcare providers nationwide. Read
  • Google Ads malvertising campaigns increasingly blocked by Gemini AI models Google has expanded the use of its Gemini AI models to detect and block malicious advertisements on its ad platforms, addressing a surge in sophisticated malvertising campaigns. In 2025, the company removed or blocked 8.3 billion ads and suspended 24.9 million advertiser accounts, including 602 million ads linked to scams. Threat actors are leveraging generative AI to scale deceptive advertising techniques, including cloaking, phishing, malware distribution, and cryptocurrency theft. These campaigns often impersonate legitimate services such as Google Authenticator and Homebrew, or pose as cryptocurrency platforms to drain wallets. Google’s AI-driven detection now analyzes advertiser behavior, campaign patterns, and intent in real time, enabling instant review and blocking of harmful content at submission. Read
  • Evasion via APK malformation observed across major Android malware families A widespread evasion technique involving deliberate APK malformation has been documented in more than 3,000 malicious Android samples spanning families such as Teabot, TrickMo, Godfather, and SpyNote. The technique manipulates APK structure (e.g., Local File Header vs Central Directory inconsistencies) to break static analysis pipelines while remaining installable and functional on Android devices. Static analysis tools including JADX crash or misinterpret malformed APKs, whereas the native Android installer tolerates inconsistencies, enabling malware to evade detection and complicate reverse engineering efforts. Read
  • Critical Cisco Identity and Webex services vulnerabilities patched; code execution and user impersonation risks resolved Cisco has released patches addressing four critical vulnerabilities (CVSS 9.8–9.9) in Identity Services Engine (ISE) and Webex Services. The flaws include improper certificate validation in Webex SSO integration (CVE-2026-20184) enabling unauthenticated remote attackers to impersonate any user and gain unauthorized access to Webex services, and insufficient input validation in ISE (CVE-2026-20147, CVE-2026-20180, CVE-2026-20186) allowing authenticated remote code execution and command injection with potential root access. CVE-2026-20184 requires customer action—uploading a new SAML certificate for the identity provider (IdP) to Control Hub—to avoid service interruption. Successful exploitation of ISE vulnerabilities could render single-node ISE deployments unavailable, causing a denial of service. As of publication, Cisco PSIRT has no evidence of active exploitation in attacks. Read
  • BitLocker recovery prompts triggered on Windows Server 2025 after KB5082063 update Microsoft has confirmed that the April 2026 KB5082063 security update for Windows Server 2025 is causing two distinct issues: BitLocker recovery prompts on first reboot for systems with PCR7-bound Group Policy configurations, and installation failures marked by 0x800F0983 errors on some devices. Both issues primarily impact enterprise-managed systems and require administrative intervention—either key entry for BitLocker recovery or troubleshooting update installation. Microsoft is investigating both problems and has provided temporary workarounds, including Known Issue Rollback (KIR) for BitLocker recovery and diagnostic reviews for update installation failures. Home users are unlikely to be affected by either issue. Read
Last updated: 15:00 16/04/2026 UTC
  • Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency A North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman via a two-week social engineering campaign and published malicious axios versions v1.14.1 and v0.30.4 containing the plain-crypto-js dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack’s blast radius has expanded beyond developer ecosystems after OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious axios library, prompting OpenAI to revoke its macOS app certificate as a precaution despite no evidence of compromise. This incident underscores the escalating risks of supply chain compromises, with Google warning that hundreds of thousands of stolen secrets from the axios and Trivy attacks could fuel further software supply chain attacks, SaaS compromises, ransomware, and cryptocurrency theft. The campaign reflects an industrialized social engineering model targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building and matured attacker tooling. Additional supply chain attacks in March 2026, such as the compromise of Trivy by TeamPCP (UNC6780), have compounded the threat landscape, exposing organizations like the European Commission and Mercor to downstream risks. Read
  • Six Android Malware Families Target Pix, Banking Apps, and Crypto Wallets Six Android malware families continue to target Pix payments, banking apps, and cryptocurrency wallets, with Mirax expanding its capabilities beyond financial theft. The Mirax trojan now integrates residential proxy functionality, enabling attackers to route malicious traffic through compromised devices and evade geographic restrictions. Mirax, previously identified as a banking trojan offered through a malware-as-a-service ecosystem, now operates under a restricted MaaS model targeting Spanish-speaking users with campaigns exceeding 200,000 accounts via social media advertisements. It provides full real-time device control, dynamic fake overlays fetched from C2 servers, and surveillance features including keylogging and lock screen detail collection. Distribution relies on social engineering via illegal streaming app promotions, with malware hosted on GitHub and device evasion techniques. Compromised devices are repurposed as residential proxies for broader cybercriminal activities, including account takeovers and anonymized network attacks. Read
  • North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies North Korean state actors continue to exploit fake employee schemes to infiltrate companies, particularly in blockchain and technology sectors, funneling stolen virtual currency and funds to North Korea's weapons program. The practice has escalated with remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has evolved into three distinct hacking groups: Labyrinth Chollima (cyber espionage targeting industrial, logistics, and defense), Golden Chollima (smaller-scale cryptocurrency theft), and Pressure Chollima (high-value heists). Each group uses distinct toolsets derived from the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. A joint investigation uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division, with researchers capturing live activity of Lazarus operators on sandboxed laptops. The scheme, tracked as Jasper Sleet, PurpleDelta, and Wagemole, involves stealing or borrowing identities, using AI tools for interviews, and funneling salaries to the DPRK. Thousands of North Korean IT workers have infiltrated companies over the past two years, exploiting hiring processes and remote work environments. The U.S. Treasury has sanctioned individuals and entities involved, while Japan, South Korea, and the U.S. collaborate to combat the threat. Five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes, and two additional U.S. nationals, Kejia Wang and Zhenxing Wang, have now been sentenced to prison for operating a 'laptop farm' that facilitated the infiltration of over 100 companies, generating $5 million in illicit revenue and causing $3 million in damages to victim companies. Read
  • Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws Microsoft's multi-month Patch Tuesday campaign continues with the April 2026 release addressing 167 security vulnerabilities in Windows and related software, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Nearly 60% of the patched flaws are elevation-of-privilege bugs, marking the highest proportion in eight months, while eight Critical vulnerabilities were addressed, including unauthenticated remote code execution flaws in Windows IKE Service Extensions (CVE-2026-33824, CVSS 9.8) and secure tunneling components (CVE-2026-33827, CVSS 8.1). The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), changing build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). Windows 10 Enterprise LTSC and ESU participants received the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). Critical updates addressed CVE-2026-32201 (actively exploited SharePoint Server spoofing vulnerability enabling phishing and unauthorized data manipulation) and CVE-2026-33825 (publicly disclosed Microsoft Defender elevation-of-privilege flaw granting SYSTEM privileges). Additional critical risks included CVE-2026-33824 (Windows IKE Service Extensions unauthenticated RCE, CVSS 9.8) and CVE-2026-33827 (secure tunneling RCE, CVSS 8.1). Nearly 60% of patched flaws were elevation-of-privilege bugs, with 93 such vulnerabilities addressed. Read
  • Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting As of April 10, 2026, Iranian state-sponsored and affiliated cyber threat actors continue to escalate attacks against U.S. critical infrastructure, with new data revealing that 3,891 internet-exposed Rockwell Automation/Allen-Bradley PLCs—74.6% of the global total—are vulnerable to ongoing Iranian APT campaigns. The FBI, CISA, and allied agencies confirm that these attacks have resulted in PLC project file exfiltration, HMI/SCADA data manipulation, and operational disruptions, marking a direct expansion of Iran’s cyber-kinetic doctrine into U.S. industrial control systems (ICS). The broader campaign remains defined by Iran’s integration of cyber and kinetic warfare, including the systematic exploitation of Hikvision/Dahua IP cameras for real-time battle damage assessment and the re-emergence of destructive ransomware groups like Pay2Key, which executed a three-hour encryption blitz against a U.S. healthcare provider in March 2026. Despite the April 8 ceasefire announcement by Handala—temporarily pausing U.S.-targeted attacks but continuing operations against Israel—low-level cyberactivity by groups like 313 Team and Conquerors Electronic Army persists, targeting Australian government systems, Israeli infrastructure, and U.S.-based platforms. Analysts warn that ceasefires historically inflame cyber operations, as actors exploit diplomatic pauses to pivot tactics or prepare for future escalations. Strategic trends highlight Iran’s use of false-flag operations, ransomware-as-a-smokescreen, and multi-actor obfuscation to stretch adversary defenses. The targeting of U.S. OT systems—mirroring prior CyberAv3ngers (IRGC) campaigns against Unitronics PLCs—signals a shift from regional surveillance to direct, disruptive operations, with risks of follow-on kinetic effects. Defenders are urged to segment OT networks, eliminate public PLC exposure, and monitor for Iranian VPN/VPS infrastructure (Mullvad, NordVPN, Surfshark) linked to ongoing campaigns. Read
  • GlassWorm malware targets OpenVSX, VS Code registries GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, with the latest iteration leveraging Solana dead drops for C2, a novel browser extension for surveillance, and a shift into the Model Context Protocol (MCP) ecosystem. The campaign now delivers a .NET binary that targets Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data, executes arbitrary code, and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline to perform session surveillance on cryptocurrency platforms like Bybit and harvest extensive browser data. Additionally, threat actors have begun distributing malicious payloads via npm packages impersonating the WaterCrawl MCP server, marking GlassWorm’s first confirmed incursion into the AI-assisted development ecosystem. Recent innovations in the GlassWorm campaign include the introduction of a Zig-compiled dropper embedded within an Open VSX extension named 'specstudio.code-wakatime-activity-tracker', which masquerades as WakaTime. This dropper installs platform-specific Node.js native addons compiled from Zig code that execute outside the JavaScript sandbox with full OS-level access, enabling the threat actor to stealthily infect all IDEs on a developer's machine—including VS Code, VSCodium, Positron, Cursor, and Windsurf. The dropper then downloads a malicious VS Code extension (.VSIX) named 'floktokbok.autoimport' from an attacker-controlled GitHub account, which impersonates a legitimate extension with over 5 million installs and installs silently across all detected IDEs. The second-stage extension avoids execution on Russian systems, communicates with the Solana blockchain for C2, exfiltrates data, and deploys an information-stealing RAT that ultimately installs a malicious Google Chrome extension. Users who installed the malicious extensions should assume compromise and rotate all secrets immediately. The GlassWorm campaign remains a persistent supply chain threat impacting multiple ecosystems including npm, PyPI, GitHub, and Open VSX. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. The Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers. A new large-scale social engineering campaign has emerged, using fake VS Code security alerts posted in GitHub Discussions to distribute malware. The campaign automates posts across thousands of repositories using low-activity accounts, triggering GitHub email notifications with fake vulnerability advisories containing realistic CVE references. Links in these posts redirect victims through a cookie-driven chain to drnatashachinn[.]com, where a JavaScript reconnaissance payload profiles targets before delivering additional malicious payloads. This operation represents a coordinated, large-scale effort targeting developers as part of the broader GlassWorm malware campaign. Read

Latest updates

Browse →

Pre-authenticated RCE in Marimo exploited within 10 hours of advisory

Updated: 16.04.2026 19:58 · First: 10.04.2026 10:37 · 📰 3 src / 3 articles

A pre-authenticated remote code execution (RCE) vulnerability in Marimo, tracked as CVE-2026-39987 (CVSS 9.3), was exploited in the wild within hours of public disclosure, enabling attackers to gain full PTY shells on exposed instances via the unauthenticated /terminal/ws WebSocket endpoint. The flaw, affecting Marimo versions prior to 0.23.0, initially led to rapid, human-driven exploitation campaigns focused on credential theft. Recent attacks have expanded to deploy a new NKAbuse malware variant hosted on Hugging Face Spaces, using typosquatted repositories to evade detection and establish persistent remote access. Additional exploitation activity includes sophisticated lateral movement, such as reverse-shell techniques and database enumeration, indicating a shift toward multi-stage attacks beyond initial credential harvesting. Threat actors validated the vulnerability within seconds, harvested credentials in under three minutes, and conducted reconnaissance from 125 IP addresses within the first 12 hours post-disclosure. GitHub assessed the flaw with a critical CVSS score of 9.3, and Marimo developers confirmed impact on instances deployed as editable notebooks or exposed via --host 0.0.0.0 in edit mode.

North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies

Updated: 16.04.2026 19:00 · First: 21.08.2025 00:39 · 📰 14 src / 22 articles

North Korean state actors continue to exploit fake employee schemes to infiltrate companies, particularly in blockchain and technology sectors, funneling stolen virtual currency and funds to North Korea's weapons program. The practice has escalated with remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has evolved into three distinct hacking groups: Labyrinth Chollima (cyber espionage targeting industrial, logistics, and defense), Golden Chollima (smaller-scale cryptocurrency theft), and Pressure Chollima (high-value heists). Each group uses distinct toolsets derived from the same malware framework used by Labyrinth Chollima in the 2000s and 2011s. A joint investigation uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division, with researchers capturing live activity of Lazarus operators on sandboxed laptops. The scheme, tracked as Jasper Sleet, PurpleDelta, and Wagemole, involves stealing or borrowing identities, using AI tools for interviews, and funneling salaries to the DPRK. Thousands of North Korean IT workers have infiltrated companies over the past two years, exploiting hiring processes and remote work environments. The U.S. Treasury has sanctioned individuals and entities involved, while Japan, South Korea, and the U.S. collaborate to combat the threat. Five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes, and two additional U.S. nationals, Kejia Wang and Zhenxing Wang, have now been sentenced to prison for operating a 'laptop farm' that facilitated the infiltration of over 100 companies, generating $5 million in illicit revenue and causing $3 million in damages to victim companies.

Evasion via APK malformation observed across major Android malware families

Updated: · First: 16.04.2026 18:45 · 📰 1 src / 1 articles

A widespread evasion technique involving deliberate APK malformation has been documented in more than 3,000 malicious Android samples spanning families such as Teabot, TrickMo, Godfather, and SpyNote. The technique manipulates APK structure (e.g., Local File Header vs Central Directory inconsistencies) to break static analysis pipelines while remaining installable and functional on Android devices. Static analysis tools including JADX crash or misinterpret malformed APKs, whereas the native Android installer tolerates inconsistencies, enabling malware to evade detection and complicate reverse engineering efforts.

Google Ads malvertising campaigns increasingly blocked by Gemini AI models

Updated: · First: 16.04.2026 18:24 · 📰 1 src / 1 articles

Google has expanded the use of its Gemini AI models to detect and block malicious advertisements on its ad platforms, addressing a surge in sophisticated malvertising campaigns. In 2025, the company removed or blocked 8.3 billion ads and suspended 24.9 million advertiser accounts, including 602 million ads linked to scams. Threat actors are leveraging generative AI to scale deceptive advertising techniques, including cloaking, phishing, malware distribution, and cryptocurrency theft. These campaigns often impersonate legitimate services such as Google Authenticator and Homebrew, or pose as cryptocurrency platforms to drain wallets. Google’s AI-driven detection now analyzes advertiser behavior, campaign patterns, and intent in real time, enabling instant review and blocking of harmful content at submission.

Rhysida ransomware leak impacts 337,000 patients at Tennessee hospital after failed extortion

Updated: 16.04.2026 18:01 · First: 16.04.2026 15:40 · 📰 2 src / 2 articles

Cookeville Regional Medical Center (CRMC) in Tennessee confirmed that more than 337,917 patients were notified in April 2026 of a July 2025 ransomware attack conducted by the Rhysida group, a Russia-linked ransomware-as-a-service operation active since May 2023. The intrusion, detected internally in mid-July 2025, resulted in the theft of sensitive data including names, addresses, dates of birth, Social Security numbers, driver’s license numbers, financial account details, medical records, and health insurance information. Rhysida claimed responsibility on August 2, 2025, demanding 10 Bitcoin (~$1.15 million at the time) before publishing the dataset publicly after failing to secure a buyer. CRMC has begun mailing breach notifications and is offering 12 months of free identity theft protection through Experian. The incident ranks as the eighth-largest US healthcare ransomware breach of 2025 by records compromised, amid a broader wave of Rhysida attacks targeting healthcare providers nationwide.

Automated AI-driven voice phishing platform ATHR enables end-to-end credential harvesting via integrated email and vishing workflows

Updated: · First: 16.04.2026 17:09 · 📰 1 src / 1 articles

A cybercrime platform named ATHR is being sold on underground forums for $4,000 plus a 10% profit commission to conduct fully automated telephone-oriented attack delivery (TOAD) campaigns that combine email lures with AI voice agents to harvest credentials for Google, Microsoft, Coinbase, Binance, Gemini, Crypto.com, Yahoo, and AOL accounts. The platform automates the entire attack chain from targeted email delivery through social engineering to credential theft, routing victims via Asterisk and WebRTC to AI agents that mimic support staff during fraudulent account recovery workflows designed to extract six-digit verification codes. Attackers can optionally escalate calls to human operators, but the AI agent capability enables low-skill threat actors to execute sophisticated vishing campaigns without specialized infrastructure or large teams, significantly lowering the barrier to entry for large-scale credential harvesting operations.

AI-Driven SOC Automation Expands Beyond Alert Triage to End-to-End Incident Lifecycle

Updated: · First: 16.04.2026 17:02 · 📰 1 src / 1 articles

Security operations centers (SOCs) increasingly adopt AI systems marketed as "AI SOCs" but most implementations primarily accelerate alert triage rather than automate end-to-end incident handling. Production deployments reveal that while AI enhances alert summarization, enrichment, and next-step suggestions, it does not address the core operational challenges of fragmented workflows, manual coordination across tools, and the need for consistent execution across identity, endpoint, and cloud systems. Teams achieving measurable impact integrate AI into automated end-to-end workflows that gather cross-tool context, apply consistent logic, trigger actions across systems, and involve humans only for judgment-based decisions, shifting focus from reactive triage to proactive security outcomes.

NIST Reconfigures NVD Enrichment Prioritization and Pre-March 2026 Data Handling

Updated: · First: 16.04.2026 15:43 · 📰 1 src / 1 articles

NIST’s National Vulnerability Database (NVD) will implement a risk-based triage model for CVE enrichment due to unsustainable growth in vulnerability disclosures, marking a strategic shift in how prioritization and processing are conducted. Effective immediately, NVD analysts will deprioritize enrichment for vulnerabilities reported prior to March 1, 2026, while focusing on vulnerabilities impacting U.S. federal government software, critical software per Executive Order 14028, and entries listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog. All submitted CVEs will still be cataloged but labeled as “Not Scheduled” if they do not meet enrichment criteria. The decision follows a 263% increase in CVE submissions from 2020 to 2025 and continued acceleration in 2026, with forecasts projecting up to 70,135 CVEs by year-end. This operational pivot aims to focus limited resources on vulnerabilities most likely to pose immediate risk to critical infrastructure and federal systems.

Critical Cisco Identity and Webex services vulnerabilities patched; code execution and user impersonation risks resolved

Updated: 16.04.2026 15:01 · First: 16.04.2026 14:27 · 📰 2 src / 2 articles

Cisco has released patches addressing four critical vulnerabilities (CVSS 9.8–9.9) in Identity Services Engine (ISE) and Webex Services. The flaws include improper certificate validation in Webex SSO integration (CVE-2026-20184) enabling unauthenticated remote attackers to impersonate any user and gain unauthorized access to Webex services, and insufficient input validation in ISE (CVE-2026-20147, CVE-2026-20180, CVE-2026-20186) allowing authenticated remote code execution and command injection with potential root access. CVE-2026-20184 requires customer action—uploading a new SAML certificate for the identity provider (IdP) to Control Hub—to avoid service interruption. Successful exploitation of ISE vulnerabilities could render single-node ISE deployments unavailable, causing a denial of service. As of publication, Cisco PSIRT has no evidence of active exploitation in attacks.

Salesforce misconfiguration leads to non-sensitive data exposure at McGraw-Hill amid ShinyHunters extortion claims

Updated: 16.04.2026 13:35 · First: 14.04.2026 21:07 · 📰 2 src / 2 articles

McGraw-Hill confirmed a data breach affecting 13.5 million user accounts after ShinyHunters exploited a Salesforce environment misconfiguration to steal and leak non-sensitive data, including names, addresses, phone numbers, and email addresses. The company stated the breach did not impact its core Salesforce accounts, customer databases, courseware, or internal systems, though ShinyHunters claimed possession of 45 million records with PII. The affected webpages were secured promptly, and McGraw-Hill is collaborating with Salesforce to remediate the issue. Have I Been Pwned verified the leak of over 100GB of data tied to 13.5 million accounts.

Undisclosed Redirect Chain Enables Cross-Origin Tracking via Taboola-to-Temu Pixel on Authenticated Banking Pages

Updated: · First: 16.04.2026 13:30 · 📰 1 src / 1 articles

A tracked redirect chain from Taboola’s sync endpoint to Temu’s tracking infrastructure was observed executing on logged-in banking pages across a European financial platform in February 2026. The chain leveraged a 302 redirect and CORS credentials header to enable cross-origin cookie access, allowing Temu to associate authenticated session behavior with tracking identifiers without explicit user consent or bank knowledge. Conventional security controls including WAFs, static analyzers, and CSP allow-lists failed to detect the outbound runtime behavior due to reliance on declared origins rather than terminal destinations.

Arbitrary Command Execution Flaw in Anthropic’s Model Context Protocol (MCP) SDKs Impacts 150M+ Downloads

Updated: · First: 16.04.2026 12:40 · 📰 1 src / 1 articles

A critical architectural vulnerability in Anthropic’s Model Context Protocol (MCP) SDKs enables arbitrary command execution across systems using the protocol, exposing sensitive data, internal databases, API keys, and chat histories. The flaw stems from unchecked command execution in MCP’s STDIO interface, where commands execute regardless of process success, and affects all supported SDK languages (Python, TypeScript, Java, Rust). Over 200 open source projects, 150 million downloads, 7,000+ publicly accessible MCP servers, and up to 200,000 vulnerable instances are potentially impacted. Anthropic has declined to patch the flaw, asserting it is expected behavior and shifting responsibility to developers for sanitization. The vulnerability allows complete system takeover, creating significant risks across the AI supply chain.

Surge in ransomware targeting automotive sector with 44% share of incidents in 2025

Updated: · First: 16.04.2026 11:35 · 📰 1 src / 1 articles

Ransomware now represents 44% of all cyberattacks against global automotive manufacturers in 2025, more than doubling compared to previous years, driven by the sector’s rapid adoption of connected technologies, cloud services, and interconnected third-party supply chains. The industry’s low tolerance for operational downtime and reliance on privileged supplier access have elevated attack opportunities, with incidents spanning OEMs, suppliers, and connected vehicle platforms. High-profile impacts include a five-week production outage at Jaguar Land Rover (JLR) in 2024, costing approximately £108 million per week and generating £1.9 billion in macroeconomic losses. Attackers increasingly exploit expanded corporate attack surfaces including connected vehicle systems, OTA update mechanisms, and cloud environments, while targeting smaller suppliers with weaker security postures that often have privileged access to OEM networks.

BitLocker recovery prompts triggered on Windows Server 2025 after KB5082063 update

Updated: 16.04.2026 10:37 · First: 15.04.2026 14:41 · 📰 2 src / 2 articles

Microsoft has confirmed that the April 2026 KB5082063 security update for Windows Server 2025 is causing two distinct issues: BitLocker recovery prompts on first reboot for systems with PCR7-bound Group Policy configurations, and installation failures marked by 0x800F0983 errors on some devices. Both issues primarily impact enterprise-managed systems and require administrative intervention—either key entry for BitLocker recovery or troubleshooting update installation. Microsoft is investigating both problems and has provided temporary workarounds, including Known Issue Rollback (KIR) for BitLocker recovery and diagnostic reviews for update installation failures. Home users are unlikely to be affected by either issue.

Long-running low-value ransomware campaign against Turkish SMBs and consumers uncovered

Updated: · First: 16.04.2026 09:00 · 📰 1 src / 1 articles

A sustained ransomware campaign operating since at least 2020 has targeted Turkish individuals and small-to-medium businesses (SMBs) with low-dollar demands between $200 and $400 per victim. The operation uses a phishing email leading to a cloud-hosted Java archive containing a modified Adwind RAT variant, which establishes persistence, disables defenses, and drops a ransomware module named JanaWare. Geofencing ensures execution only on systems with Turkish language settings, minimizing collateral exposure. The campaign’s high-volume, low-value approach exploits weaker defenses in SMBs and individuals, enabling steady revenue while evading broader detection and response efforts.

Authentication bypass in nginx-ui via MCP-enabled API leading to remote server compromise

Updated: 16.04.2026 01:35 · First: 15.04.2026 16:00 · 📰 3 src / 3 articles

CVE-2026-33032 in nginx-ui (CVSS 9.8) remains a critical, actively exploited authentication bypass flaw affecting over 2,600 internet-accessible instances and 430,000 Docker pulls. Researchers disclosed the flaw to nginx-ui developers in March 2026, with a patch released in version 2.3.4 within one day. The vulnerability stems from the unprotected MCP-enabled '/mcp_message' endpoint, enabling unauthenticated attackers to execute privileged MCP tools and fully compromise nginx servers. Exploitation requires establishing an SSE connection, opening an MCP session, and using the returned sessionID to send unauthenticated requests. Recorded Future's CVE Landscape report confirms active exploitation, while geographic analysis shows vulnerable instances predominantly located in China, the United States, Indonesia, Germany, and Hong Kong. Technical details and proof-of-concept exploits are publicly available, exacerbating the risk of widespread abuse.

Backdoor in EssentialPlugin WordPress suite leads to infected wp-config.php via malicious updates

Updated: · First: 15.04.2026 23:33 · 📰 1 src / 1 articles

A backdoor implanted in over 30 WordPress plugins distributed as part of the EssentialPlugin suite allowed attackers to push malware to websites running affected plugins. The compromise originated from a malicious code injection introduced after the project’s acquisition in August 2025, which remained dormant until recently activated via updates. The malware injected malicious code into wp-config.php and generated spam pages or redirects visible only to search engine crawlers such as Googlebot. The attack leveraged a command-and-control (C2) server using Ethereum-based address resolution for evasion. WordPress.org responded by forcibly removing the plugins and issuing updates to neutralize the backdoor’s communication channels.

Antivirus termination via signed PUP update chain enabled by unregistered domains

Updated: · First: 15.04.2026 20:59 · 📰 1 src / 1 articles

A signed adware ecosystem leveraging Dragon Boss Solutions' browsers deployed SYSTEM-level antivirus-killing scripts across at least 23,500 hosts in 124 countries, including high-value targets in education, utilities, government, healthcare, and critical infrastructure. The campaign abuses Advanced Installer’s update mechanism to silently deliver MSI and PowerShell payloads, including the ClockRemoval.ps1 script that disables multiple AV products by terminating services, deleting files, uninstalling software, and blocking vendor domains via hosts file modifications. The primary update domain remained unregistered until researchers sinkholed it, exposing a latent risk where arbitrary payloads could have been delivered to already compromised systems lacking AV protections.

Microsoft awards $2.3M for cloud and AI vulnerabilities identified during Zero Day Quest 2026

Updated: · First: 15.04.2026 19:20 · 📰 1 src / 1 articles

Microsoft awarded $2.3 million to security researchers following the 2026 Zero Day Quest hacking contest, where over 80 high-impact cloud and AI security vulnerabilities were identified. The event, held at Microsoft’s Redmond campus, engaged researchers from 20+ countries, including students and academics, who tested within authorized environments to identify critical flaws such as credential exposure, SSRF chains, and cross-tenant access risks. No customer data or tenant systems were accessed during testing. The total payout marks a significant investment in Microsoft’s Secure Future Initiative (SFI), aimed at improving Cloud and AI security by integrating findings across its engineering practices.

ENISA advancement to top-level CVE Numbering Authority status under review

Updated: · First: 15.04.2026 18:31 · 📰 1 src / 1 articles

The European Union Agency for Cybersecurity (ENISA) is undergoing onboarding to achieve top-level root Common Vulnerabilities and Exposures (CVE) Numbering Authority (TL-Root CNA) status, as announced by Nuno Rodrigues Carvalho, Head of Sector for Incidents and Vulnerability Services at ENISA, during VulnCon26 in Scottsdale, Arizona on April 14, 2026. If granted, ENISA will join CISA and MITRE as the third TL-Root CNA, enabling it to manage the CVE Program alongside them, including global policy setting, consistency enforcement across Root CNAs and CNAs, and representation in the program’s Board. ENISA aims to achieve this status by 2026 or early 2027.

Windows Task Host privilege escalation flaw (CVE-2025-60710) added to CISA's Known Exploited Vulnerabilities catalog

Updated: · First: 15.04.2026 17:51 · 📰 1 src / 1 articles

A Windows Task Host privilege escalation vulnerability (CVE-2025-60710) is being actively exploited by attackers to gain SYSTEM privileges on Windows 11 and Windows Server 2025 systems. The vulnerability, stemming from a link following weakness in the Host Process for Windows Tasks, allows local attackers with basic user permissions to escalate privileges through low-complexity attacks. Microsoft patched the flaw in November 2025, but exploitation has now been confirmed in the wild. CISA has mandated Federal Civilian Executive Branch agencies to remediate within two weeks under BOD 22-01.

Dragon Boss signed adware disables security products on 23,000+ hosts via WMI persistence and scheduled tasks

Updated: · First: 15.04.2026 17:40 · 📰 1 src / 1 articles

A signed adware operation attributed to Dragon Boss Solutions LLC disabled antivirus and endpoint security products on more than 23,000 hosts across 124 countries by deploying a PowerShell-based payload (ClockRemoval.ps1) that terminated processes, uninstalled security tools, and blocked reinstallation. The campaign abused a legitimate code-signing certificate and an update mechanism to deliver MSI-based payloads, leveraging SYSTEM privileges, WMI event subscriptions, and scheduled tasks to maintain persistence and evade detection. High-value targets included 221 universities, 41 operational technology networks, 35 government entities, and three healthcare organizations.

Cyber-Enabled Cargo Theft Leveraging GPS Spoofing and Fraudulent Broker Impersonation in North American Transportation Sector

Updated: · First: 15.04.2026 17:00 · 📰 1 src / 1 articles

North American transportation logistics faces escalating cyber-enabled cargo theft targeting high-value freight, with attackers exploiting GPS spoofing, fraudulent broker identities, and stolen credentials to divert shipments. Large trucking fleets operate as interconnected networks with vulnerable telematics, onboard systems, and enterprise infrastructure, creating multiple attack surfaces. Cybercriminals weaponize operational and cybersecurity weaknesses to impersonate legitimate brokers, manipulate GPS tracking, and coerce unwitting drivers into facilitating theft. The financial impact of cargo crime exceeds $725 million in reported losses for 2025 alone, with high-value goods such as specialty alcohol targeted for diversion and resale on black markets or counterfeit retail platforms.

CISA Advocates for AI Company Integration into CVE Program Amid Record Vulnerability Growth

Updated: · First: 15.04.2026 13:30 · 📰 1 src / 1 articles

CISA’s Chief of the Vulnerability Response & Coordination (VRC) Branch, Lindsey Cerkovnik, emphasized the need for AI companies such as OpenAI and Anthropic to play a more formal role in the Common Vulnerabilities and Exposures (CVE) program during VulnCon26. The call follows rapid growth in vulnerability disclosures, with 2026 projections ranging from 50,000 to 70,135 CVEs—a 45.6% increase from 2025—driven in part by AI-driven discovery tools. New AI models like Anthropic’s Claude Mythos Preview and OpenAI’s GPT-5.4-Cyber have demonstrated capabilities to autonomously identify critical zero-day vulnerabilities, including a 27-year-old flaw in OpenBSD and a 16-year-old flaw in FFmpeg, as well as chains of vulnerabilities in the Linux kernel enabling privilege escalation. CISA’s push aligns with a broader diversification strategy for the CVE program, including the establishment of new working groups and a goal to expand the roster of CVE Numbering Authorities (CNAs).

Renewal of FISA Section 702 surveillance authority under debate amid privacy and civil liberties concerns

Updated: · First: 15.04.2026 13:25 · 📰 1 src / 1 articles

The U.S. Congress is preparing to reauthorize Section 702 of the Foreign Intelligence Surveillance Act (FISA), a warrantless surveillance program that allows intelligence agencies to collect and analyze communications of non-U.S. persons abroad, with incidental collection of Americans' communications. The program’s authority expires on Monday, prompting bipartisan debate over warrant requirements for accessing Americans’ data, limitations on government use of commercial data brokers, and broader civil liberties implications. President Donald Trump has endorsed an 18-month extension despite past criticism of the program and its potential misuse for political surveillance, citing national security benefits in recent operations in Venezuela and Iran. Critics argue the program constitutes a persistent infringement on privacy rights and civil liberties, particularly due to the incidental capture of Americans’ communications without warrants. Supporters emphasize its critical role in preventing terrorist attacks and protecting national security, though questions persist about transparency, oversight, and the adequacy of recent reforms.

Microsoft resolves Windows Server upgrade bug enabling unintended 2025 upgrades

Updated: · First: 15.04.2026 13:24 · 📰 1 src / 1 articles

Microsoft has resolved a previously reported bug that caused systems running Windows Server 2019 and 2022 to automatically upgrade to Windows Server 2025 without explicit user action or licensing. The issue, first acknowledged in September 2024, led to unexpected overnight upgrades across multiple enterprise environments, prompting investigations into the root cause and mitigation steps. Microsoft attributed the problem to misconfigured third-party update management tools, though affected vendors disputed this and cited procedural errors on Microsoft’s side. The bug’s resolution restores the intended upgrade workflow via Windows Update settings, allowing administrators to control upgrade eligibility and timing. The fix follows a prolonged period of disruption and reactive out-of-band patches addressing related installation failures and authentication issues.

Surge in brute-force attacks targeting SonicWall and Fortinet devices originating from Middle East infrastructure

Updated: · First: 15.04.2026 12:30 · 📰 1 src / 1 articles

A significant increase in brute-force attacks aimed at SonicWall and Fortinet internet-facing VPN and firewall appliances has been observed, with 88% of detected attempts originating from infrastructure in the Middle East. The majority of these attacks were unsuccessful due to blocking by security tools or targeting invalid usernames, though persistent probing heightens the risk of eventual compromise through weak credentials or misconfigurations. Timing suggests possible correlation with regional geopolitical tensions, including US and Israeli actions against Iran.

Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws

Updated: 15.04.2026 12:10 · First: 10.03.2026 19:49 · 📰 11 src / 12 articles

Microsoft's multi-month Patch Tuesday campaign continues with the April 2026 release addressing 167 security vulnerabilities in Windows and related software, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Nearly 60% of the patched flaws are elevation-of-privilege bugs, marking the highest proportion in eight months, while eight Critical vulnerabilities were addressed, including unauthenticated remote code execution flaws in Windows IKE Service Extensions (CVE-2026-33824, CVSS 9.8) and secure tunneling components (CVE-2026-33827, CVSS 8.1). The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), changing build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). Windows 10 Enterprise LTSC and ESU participants received the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). Critical updates addressed CVE-2026-32201 (actively exploited SharePoint Server spoofing vulnerability enabling phishing and unauthorized data manipulation) and CVE-2026-33825 (publicly disclosed Microsoft Defender elevation-of-privilege flaw granting SYSTEM privileges). Additional critical risks included CVE-2026-33824 (Windows IKE Service Extensions unauthenticated RCE, CVSS 9.8) and CVE-2026-33827 (secure tunneling RCE, CVSS 8.1). Nearly 60% of patched flaws were elevation-of-privilege bugs, with 93 such vulnerabilities addressed.

Kraken cryptocurrency exchange targeted in insider-facilitated extortion attempt

Updated: · First: 15.04.2026 00:58 · 📰 1 src / 1 articles

A cybercrime group attempted to extort Kraken, a major U.S.-based cryptocurrency exchange, by threatening to release videos of internal systems containing client data if demands were not met. The threat actor leveraged an insider threat, recruiting two support employees to improperly access limited customer data. Kraken confirmed no client funds were at risk and stated it will not negotiate with the extortionists. The incidents, first detected via a tip in February 2025 and later confirmed in a second video, affected approximately 2,000 accounts (0.02% of the user base), with exposure limited to client support data. Kraken has revoked unauthorized access, notified affected users, and is collaborating with law enforcement to pursue legal action against the involved individuals.

Compromised Chrome Extensions Campaign Targeting Google and Telegram Accounts

Updated: 14.04.2026 23:33 · First: 14.04.2026 11:35 · 📰 3 src / 3 articles

A coordinated campaign of 108 malicious Chrome extensions has been identified, targeting approximately 20,000 users to steal Google and Telegram session data via a shared command-and-control (C2) infrastructure. The extensions exfiltrate sensitive credentials, inject arbitrary scripts, and strip security headers while masquerading as legitimate utilities under five publisher identities. At least 54 extensions steal Google account identities via OAuth2, 45 contain universal backdoors opening arbitrary URLs on startup, and some target Telegram Web sessions every 15 seconds. The campaign was first reported on April 14, 2026, with security researchers at Socket uncovering coordinated backend systems and shared operational patterns across all extensions. The operation functions as a Malware-as-a-Service (MaaS) model, allowing third parties to access stolen data and active sessions. All 108 extensions remained available at discovery, prompting takedown requests. Additional details confirm the use of a central backend hosted on a Contabo VPS with subdomains for session hijacking, identity collection, command execution, and monetization, and that the campaign is attributed to Russian-speaking actors based on code comments.