4/30/2026 April 30, 2026April 30, 2026 ~ The Cyber Beat ~ Leave a comment Trump Signs Bill to Fund DHS After Lengthy Shutdown Over ICE OperationsTrump’s Cyber Ambassador Nominee Advances to Full Senate VoteFBI Cyber Boss: China’s Hacker-For-Hire Ecosystem ‘Out of Control’New Bluekit Phishing Service Includes an AI Assistant, 40 TemplatesBot Her Emails: Most Modern Phishing Campaigns Are AI-Enabled‘It Took Nine Seconds’: Claude AI Agent Deletes Company’s Entire Database, Then ApologisesOpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk AccountsHow Mythos Could Upend the Economics of HackingFBI Links Cybercriminals to Sharp Surge in Cargo Theft AttacksRomanian Leader of Online Swatting Ring Gets 4 Years in PrisonFrance Investigates 15-Year-Old Over Alleged Hack of National ID AgencyZambia Cancels Global Digital Freedoms Conference Days Before StartCongress Punts FISA Renewal to JuneKrebs: Anti-DDoS Firm Huge Networks Heaped Attacks on Brazilian ISPsMoldova’s Health Insurance Agency Reports Possible Data Leak After CyberattackStelia North America Hacked in Ransomware AttackDental Practice Software Maker Practice by Numbers Fixes Bug That Exposed Patients’ Medical RecordsSandhills (SC) Medical Data Breach May Have Exposed Info of 78,000+90,000 Screenshots of One Celebrity’s Phone Were Exposed OnlinePyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal CredentialsNew Python Backdoor Uses Tunneling Service to Steal Browser and Cloud CredentialsEtherRAT Distribution Spoofing Administrative Tools via GitHub FacadesCritical cPanel and WHM Bug Exploited as a Zero-Day, PoC Now AvailableNew Linux ‘Copy Fail’ Vulnerability Enables Root Access on Major DistributionsGoogle Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution
4/29/2026 April 30, 2026April 30, 2026 ~ The Cyber Beat ~ Leave a comment New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATsU.S., China Partner on Scam Center Takedown in DubaiSwiss Police Arrest 10 Suspected Members of Nigeria-Linked Crime Group Black AxeEuropean Police Dismantles €50 Million Crypto Investment Fraud RingEuropean Commission Accuses Meta of Breaching Child Safety RulesMicrosoft Says Backend Change Broke Teams Free Chat and CallsHouse Approves Spy Program on Second Attempt, Senate Fate Murky‘New Einstein’ Vows to Find ‘Source Code of Universe’ and Change Everything; Rejects Bezos Job OfferParsing Agentic Offensive Security’s Existential ThreatMedtronic Confirms Data Breach After ShinyHunters ClaimsPine Bluff Schools (AR) Lose $3.2M in Cyberattack ScamPopular WordPress Redirect Plugin Hid Dormant Backdoor for YearsHackers Exploit RCE Flaws in Qinglong Task Scheduler for CryptominingMalicious npm Dependency Linked to AI Assisted Commit Targets Crypto WalletsSAP-Related npm Packages Compromised in Credential-Stealing Supply Chain AttackCursor Extension Flaw Exposes Developer API KeysCritical cPanel Authentication Vulnerability Identified — Update Your Server ImmediatelyCISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
4/28/2026 April 29, 2026April 29, 2026 ~ The Cyber Beat ~ Leave a comment China-Linked Hackers Led Phishing Campaigns Targeting Journalists and Activists, Researchers SayNorth Korean BlueNoroff Hackers Target Crypto Firms with ClickFix and AI-Made Zoom LuresCyber Command, NSA Chief Warns Foreign Adversaries Likely to Target MidtermsThe Simple Security Flaws That Exposed Trump to Another GunmanAttack of the Killer Script KiddiesAfter Mythos, Nobody Is Safe From Cybersecurity ThreatsThe Race Is on to Keep AI Agents From Running Wild With Your Credit CardsEU Countries, Lawmakers Fail to Reach Deal on Watered-Down AI RulesWhy Sharing a Screenshot Can Get You Jailed in the UAEUkrainian Police Detain Hackers Suspected of Stealing Thousands of Roblox Accounts for ResaleU.S. Reportedly Charges Scattered Spider Hacker Arrested in FinlandRansomware Turf War as 0APT and KryBit Groups Trade BlowsVidar Rises to Top of Chaotic Infostealer MarketNo Metrics Are Better Than Bad Metrics in the SOC, Says NCSCElectricity Is a Growing Area of Cyber-RiskHave I Been Pwned Claims Pitney Bowes Hit by 8.2m Email Address LeakCheckmarx Confirms LAPSUS$ Hackers Leaked its Stolen GitHub DataVideo Service Vimeo Confirms Anodot Breach Exposed User DataAmeriprise Data Breach Hits 48,000 CustomersRobinhood Account Creation Flaw Abused to Send Phishing EmailsBrazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer CampaignVECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXiHackers are Exploiting a Critical LiteLLM Pre-Auth SQLi FlawCritical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCEResearchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git PushMicrosoft Confirms Active Exploitation of Windows Shell CVE-2026-32202Microsoft Patches Entra ID Role Flaw That Enabled Service Principal TakeoverMicrosoft to Deprecate Legacy TLS in Exchange Online Starting JulyMicrosoft: New Remote Desktop Warnings May Display Incorrectly
4/27/2026 April 27, 2026April 27, 2026 ~ The Cyber Beat ~ Leave a comment Cole Allen Charged With Attempting to Assassinate TrumpAlleged Silk Typhoon Hacker Extradited to U.S. for CyberespionageMoney Launderer Linked to $230M Crypto Heist Gets 70 Months in PrisonFTC: Americans Lost Over $2.1 Billion to Social Media Scams in 2025Tennessee Becomes Second State to Ban Cryptocurrency ATMs Over Scam ConcernsMythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation SideMost Cybersecurity Professionals Feel Undervalued and Underpaid…Nearly Half of Cybersecurity Pros Want to Quit – Here’s WhyMedtronic Says Cyberattack on IT Network Has Not Disrupted OperationsHome Security Giant ADT Data Breach Affects 5.5 Million PeopleCheckmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 AttackPhantomCore Exploits TrueConf Vulnerabilities to Breach Russian NetworksFake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto FraudPyPi Package With 1.1m Monthly Downloads Hacked to Push InfostealerResearchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 MalwareDisinformation Campaign Targeted Tibetan Parliament-In-Exile Elections
4/24-26/2026 April 26, 2026April 26, 2026 ~ The Cyber Beat ~ Leave a comment Trump Faces Unprecedented Third Assassination Attempt…Officials Identify Suspect in White House Correspondents’ Dinner…Washington Hotel Shooting Raises Questions About Trump SecurityIran’s Cyber Threat May Be Less ‘Shock and Awe’ Than ‘Low and Slow,’ Officials SayNASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense SoftwareGerman Government Suspects Russia of Signal Attack Targeting PoliticiansRogue Ransomware Negotiator Rattles Trust in Outside Data-Breach RespondersToronto Police Arrest Three in Canada’s First Mobile Sms Blaster CaseNorway’s Prime Minister Proposes Ban on Social Media Access for Young TeensMicrosoft to Roll Out Entra Passkeys on Windows in Late AprilPentagon Grapples With Securing AI as It Moves Toward Autonomous WarfareAmerican Utility Firm Itron Discloses Breach of Internal IT NetworkShinyHunters Claim They Have Cruise Giant Carnival’s Booty as 7.5m Emails SurfaceADT Confirms Data Breach After ShinyHunters Leak ThreatNew BlackFile Extortion Group Linked to Surge of Vishing AttacksCity of Suffolk (VA) Victim of Cybersecurity AttackTropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering SoftwareOver 10,000 Zimbra Servers Vulnerable to Ongoing XSS AttacksNew ‘Pack2TheRoot’ Flaw Gives Hackers Root Linux AccessLMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of DisclosureCISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
4/23/2026 April 23, 2026April 23, 2026 ~ The Cyber Beat ~ Leave a comment CISA: U.S. Agency Breached Through Cisco Vulnerability, FIRESTARTER Backdoor Allowed Access Through MarchChina-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go BackdoorsUK Warns of Chinese Hackers Using Proxy Networks to Evade DetectionUNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW MalwareDev Targeted by Sophisticated Job Scam: ‘I Let My Guard Down, and Ran the Freaking Code’Anthropic’s Mythos Breach Was Humiliating‘Zealot’ Shows What AI’s Capable of in Staged Cloud AttackGoogle Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AIUK Regulator Closes Loophole That Allowed Rogue Companies to Track Phone Users’ LocationSurveillance Companies Exploiting Telecom System to Spy on Targets’ Locations, Research ShowsAge Checks Could Turn Internet Into an ID Checkpoint, Complains Proton CEOCosmetics Giant Rituals Discloses Data Breach Affecting CustomersMedical Data of 500,000 Britons Put Up for Sale on Chinese WebsiteVercel Finds More Compromised Accounts in Context.ai-Linked BreachBitwarden CLI Compromised in Ongoing Checkmarx Supply Chain CampaignTrigona Ransomware Attacks Use Custom Exfiltration Tool to Steal DataIn a First, Ransomware Family Kyber Is Confirmed to Be Quantum-SafeHackers Exploit File Upload Bug in Breeze Cache WordPress PluginCISA Orders Feds to Patch BlueHammer Flaw Exploited as Zero-DayTrump’s Pick for CISA Director Withdraws From ConsiderationU.S. Sanctions Cambodian Senator for Millions Earned Through Scam CompoundsHouse Republicans Unveil Data Privacy Law That Would Override State Protections
4/22/2026 April 22, 2026April 26, 2026 ~ The Cyber Beat ~ Leave a comment Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles…China’s Cyber Capabilities Now Equal to the U.S., Warns Dutch IntelligenceAI Tools Are Helping Mediocre North Korean Hackers Steal Millions…North Korean Hackers Siphon More Than $12 Million From Crypto Users in Sprawling CampaignAnthropic’s Mythos Rollout Has Missed America’s Cybersecurity AgencyAnthropic’s Most Dangerous AI Model Just Fell Into the Wrong HandsAnthropic’s Super-Scary Bug Hunting Model Mythos Is Shaping up to Be a NothingburgerMicrosoft to Integrate Anthropic’s Mythos Into Its Security Development ProgramUK Financial Sector Prepared for Mythos and Others, Says BOE Co-Chaired GroupUK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC WarnsUK Government Says 100 Countries Have Spyware That Can Hack People’s PhonesScotland Yard Can Keep Using Live Facial Recognition on People in London, Say JudgesGoogle Unleashes Even More AI Security Agents to Fight the BaddiesSpain Dismantles Major $4.7m Manga Piracy Platform, Arrests FourHarvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph APIMalicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply ChainSurge in Silent Subject Phishing Attacks Targets VIP UsersMacOS Native Tools Enable Stealthy Enterprise AttacksKyber Ransomware Gang Toys With Post-Quantum Encryption on WindowsNew GoGra Malware for Linux Uses Microsoft Graph API for CommsSelf-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens…New Npm Supply-Chain Attack Self-Spreads to Steal Auth TokensNew Mirai Campaign Exploits RCE Flaw in EoL D-Link RoutersCohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container EscapeOver 1,300 Microsoft Sharepoint Servers Vulnerable to Spoofing AttacksMicrosoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation BugApple Fixes iOS Bug That Retained Deleted Notification DataNew Defense Department Cyber Strategy Imminent, Official SaysFrench Police Arrest Suspected Hacker Behind Dozens of Data Breaches
4/21/2026 April 22, 2026April 22, 2026 ~ The Cyber Beat ~ Leave a comment Nation-States Want to Cause Harm, Not Just Steal Cash – Stop Handing Your Cyber Defenses to the Cheapest ContractorUkraine Busts ‘Bot Farm’ Supplying Thousands of Fake Telegram Accounts to Russian SpiesEU Targets Two Russian Propaganda Networks With New SanctionsThey Built a Legendary Privacy Tool. Now They’re Sworn EnemiesUK Probes Telegram, Teen Chat Sites Over CSAM Sharing ConcernsMeta Is Sued Over Scam Ads on Facebook and InstagramMurder, She Wrote: Ex-FBI Chief Wants Some Ransomware Crims Charged With HomicideRansomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023Krebs: ‘Scattered Spider’ Member ‘Tylerb’ Pleads GuiltyFrench Gov’t Agency Confirms Breach as Hacker Offers to Sell DataNew Lotus Data Wiper Used Against Venezuelan Energy, Utility FirmsNGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINsActively Exploited Apache ActiveMQ Flaw Impacts 6,400 ServersSurge in Bomgar RMM Exploitation Demonstrates Supply Chain RiskCISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal DeadlinesGoogle Patches Antigravity IDE Flaw Enabling Prompt Injection Code ExecutionMozilla Used Anthropic’s Mythos to Find and Fix 271 Bugs in FirefoxAI Hacking Tools Like Mythos Can Be ‘Net Positive’ Says Top Cyber Official
4/20/2026 April 20, 2026April 20, 2026 ~ The Cyber Beat ~ Leave a comment The Weird, Twisting Tale of How China Spied on Alysa Liu and Her DadApple Hardware Executive John Ternus to Succeed Tim Cook as CEOBanking Industry Scrambles for Anthropic’s Mythos as Global Regulators Review RisksClaude Desktop Changes App Access Settings for Browsers You Don’t Even Have Installed YetScot Becomes Second Scattered Spider-Linked Crook to Plead Guilty in U.S.Italian Regulator Fines National Postal Service Orgs $15 Million for Data Privacy ViolationsElon Musk Fails to Appear for Questioning by French Police Over Sexualized AI Images on XBluesky Blames App Outage on ‘Sophisticated’ DDoS AttackMastodon Says Its Flagship Server Was Hit by a DDoS AttackKelpDAO Suffers $290 Million Heist Tied to Lazarus HackersCyberattack at French Identity Document Agency May Have Exposed Personal DataSeiko USA Website Defaced as Hacker Claims Customer Data TheftChina’s Apple App Store Infiltrated by Crypto-Stealing Wallet AppsMicrosoft: Teams Increasingly Abused in Helpdesk Impersonation AttacksFormbook Malware Campaign Uses Multiple Obfuscation Techniques to Avoid DetectionThe Gentlemen Ransomware Now Uses SystemBC for Bot-Powered AttacksSGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model FilesAnthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
4/17-19/2026 April 19, 2026April 19, 2026 ~ The Cyber Beat ~ Leave a comment Ukraine Confirms Suspected APT28 Campaign Targeting Prosecutors, Anti-Corruption AgenciesNSA Using Anthropic’s Mythos Despite BlacklistThe Shocking Secrets of Madison Square Garden’s Surveillance MachineRepublican Mutiny Sinks Trump’s Push to Extend Warrantless SurveillanceIt Takes 2 Minutes to Hack the EU’s New Age-Verification AppRansomware Attack Continues to Disrupt Healthcare in London Nearly Two Years LaterGrinex Exchange Blames “Western Intelligence” for $13.7M Crypto HackMan Gets 30 Months for Selling Thousands of Hacked DraftKings AccountsGoogle Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy OverhaulJust Like Phishing for Gullible Humans, Prompt Injecting Ais Is Here to StayCloud Development Platform Vercel Was HackedCity of Tallahassee (FL) Technology Systems Hit by Cyberattack Friday, Officials Report No Operational ImpactsApple Account Change Alerts Abused to Send Phishing EmailsPayouts King Ransomware Uses QEMU VMs to Bypass Endpoint SecurityMirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS BotnetApache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active ExploitationThree Microsoft Defender Zero-Days Actively Exploited; Two Still UnpatchedCritical Flaw in Protobuf Library Enables JavaScript Code ExecutionNIST to Stop Rating Non-Priority Flaws Due to Volume IncreaseTime for Government, Business Leaders to Figure Out AI Cybersecurity Regulation
4/16/2026 April 17, 2026April 17, 2026 ~ The Cyber Beat ~ Leave a comment ZionSiphon Malware Designed to Sabotage Water Treatment SystemsNorth Korean APT38 Targets macOS Users in Latest HeistWhite House Works to Give U.S. Agencies Anthropic Mythos AIAnthropic Rolls Out Claude Opus 4.7, an AI Model That Is Less Risky Than MythosOpenAI Launches AI Model GPT-Rosalind for Life Sciences ResearchGoogle Expands Gemini AI Use to Fight Malicious Ads on Its PlatformEntry-Level Cyber Workers Are Losing Out to AINew ATHR Vishing Platform Uses AI Voice Agents for Automated AttacksEurope’s Online Age Verification App Is HereEuropean Police Email 75,000 People Asking Them to Stop DDoS AttacksU.S. Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North KoreaRussia-Linked Grinex Crypto Exchange Suspends Operations After HackCargo Thieving Hackers Running Sophisticated Remote Access Campaigns, Researchers FindCookeville Medical Center (TN) Notifies Patients After July 2025 Ransomware AttackFashion Retailer Express Left Customers’ Personal Data and Order Details Exposed to the InternetData Breach at Edtech Giant McGraw Hill Affects 13.5 Million AccountsNewly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 TrafficOperation PowerOFF Identifies 75k DDoS Users, Takes Down 53 DomainsObsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto AttacksAPK Malformation Found in Thousands of Android Malware SamplesCisco Patches Four Critical Identity Services, Webex Flaws Enabling Code ExecutionNew Microsoft Defender “RedSun” Zero-Day PoC Grants SYSTEM PrivilegesNIST Drops NVD Enrichment for Pre-March 2026 VulnerabilitiesMicrosoft’s Original Windows Secure Boot Certificate Is Expiring
4/15/2026 April 15, 2026April 15, 2026 ~ The Cyber Beat ~ Leave a comment Russia-Linked Hackers Compromised Scores of Ukrainian Prosecutors’ Email AccountsSweden Blames Russian Hackers for Attempting ‘Destructive’ Cyberattack on Thermal PlantResearchers Spot Surge in Brute-Force Attacks from Middle EastTrump Backs Government AI Safeguards in Banking System, Acknowledges RisksECB to Quiz Bankers About Risks of Anthropic’s New AI ModelAI Companies to Play Bigger Role in CVE Program, Says CISAOpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AIThe Deepfake Nudes Crisis in Schools Is Much Worse Than You ThoughtTeen Arrested in Northern Ireland Over Cyberattack on School NetworkFrench Cops Free Mother and Son After 20-Hour Crypto Kidnap OrdealNew AgingFly Malware Used in Attacks on Ukraine Gov’t, HospitalsSigned Adware Operation Disables Antivirus Across 23,000 HostsWordPress Plugin Suite Hacked to Push Malware to Thousands of SitesCISA Flags Windows Task Host Vulnerability as Exploited in AttacksCritical Nginx-ui MCP Flaw Actively Exploited in the Wildn8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing EmailsApril Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and MoreMicrosoft Pays $2.3M for Cloud and AI Flaws at Zero Day QuestNIST to Limit Work on CVE Entries as Submissions SurgeBig Tech Fails to Opt-Out Users Requesting Not to Be Tracked Much of the Time, New Research Says
4/14/2026 April 14, 2026April 14, 2026 ~ The Cyber Beat ~ Leave a comment Russia Appears to Block Social Media Platform Bluesky Amid Wider Internet RestrictionsIn the Wake of Anthropic’s Mythos, OpenAI Has a New Cybersecurity Model—And StrategyUK Gov’s Mythos AI Tests Help Separate Cybersecurity Threat From HypeNo Honor Among Thieves as 0APT Threatens Rival Ransomware Gang KrybitFake Ledger Live App on Apple’s App Store Stole $9.5m in CryptoTelegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black MarketTeen Hacker Sentenced to Federal Prison After Major PowerSchool Data Breach Exposes Student RecordsVirginia Enacts Ban on Precise Geolocation Data Sales as Momentum for Similar Prohibitions BuildsCISOs Urged to Innovate with Talent Retention as Job Satisfaction DeclinesWhy Orgs Need to Test Networks to Withstand DDoS Attacks During Peak LoadsMcGraw-Hill Confirms Data Breach Following Extortion ThreatCrypto-Exchange Kraken Extorted by Hackers After Insider BreachTriad Nexus Expands Global Fraud Operations Despite U.S. SanctionsNew ‘JanaWare’ Ransomware Targeting Turkish Citizens as Cybercriminal Ecosystem FragmentsMalicious Chrome Extensions Campaign Exposes User DataCISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe SoftwareShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched ServersNew PHP Composer Flaws Enable Arbitrary Command Execution — Patches ReleasedKrebs: Patch Tuesday, April 2026 EditionMicrosoft Adds Windows Protections for Malicious Remote Desktop FilesGoogle Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security
4/13/2026 April 14, 2026April 14, 2026 ~ The Cyber Beat ~ Leave a comment North Korea’s APT37 Uses Facebook Social Engineering to Deliver RokRAT MalwareIran-Linked Group Handala Claims to Have Breached Three Major Uae OrganizationsAnthropic Talking to the Trump Administration About Its Next AI Model‘It Reads Like a Spy Novel’: $280 Million Theft From Drift Involved North Korean Fake Companies, CutoutsThe Dumbest Hack of the Year Exposed a Very Real ProblemMeta Is Warned That Facial Recognition Glasses Will Arm Sexual PredatorsFBI Takedown of W3LL Phishing Service Leads to Developer ArrestMajority of Australian Youth Still Use Social Media Despite Ban, Researchers FindOpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain IncidentBooking.com Warns Reservation Data May Have Checked Out With IntrudersGym Giant Basic-Fit Confirms Data on a Million Members Stolen in CyberattackStolen Rockstar Games Analytics Data Leaked by Extortion GangJanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025Fake Linux Leader Using Slack to Con Devs Into Giving up Their SecretsMirax Android Trojan Turns Devices Into Residential Proxy NodeThe Silent “Storm”: New Infostealer Hijacks Sessions, Decrypts Server-SideMailbox Rule Abuse Emerges as Stealthy Post-Compromise ThreatCritical Flaw in wolfSSL Library Enables Forged Certificate UseCSA: CISOs Should Prepare for Post-Mythos Exploit Storm
4/10-12/2026 April 13, 2026April 13, 2026 ~ The Cyber Beat ~ Leave a comment Nearly 4,000 U.S. Industrial Devices Exposed to Iranian CyberattacksHungarian Government Creds Left in the Safe Hands of ‘FrankLampard’Vance, Bessent Questioned Tech Giants on AI Security Before Anthropic’s Mythos ReleaseYour Push Notifications Aren’t Safe From the FBIHow the Internet Broke Everyone’s Bullshit DetectorsOver 20,000 Crypto Fraud Victims Identified in International CrackdownUK Government Threatens Tech Bosses With Jail Time if They Do Not Adequately Fight Nudification ToolsSenator Grassley Launches Inquiry Into 8 Tech Giants for Failures to Adequately Report CSAMCommvault Explores Sale After Takeover Interest, Sources SayFlorida Investigates OpenAI for Role ChatGPT May Have Played in Deadly ShootingGoogle Rolls Out Gmail End-To-End Encryption on Mobile DevicesOpenAI Identifies Security Issue Involving Third-Party Tool, Says User Data Was Not AccessedHackers Give Rockstar Games Until April 14 to Pay for Stolen Data…Rockstar Games Says Hack Will Have ‘No Impact’Spring Lake Park Schools (MN) Closed Monday Due to Suspected Ransomware IncidentCPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor DownloadsMicrosoft: Canadian Employees Targeted in Payroll Pirate AttacksGlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEsBackdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend ServersMarimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of DisclosureAdobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
4/9/2026 April 9, 2026April 9, 2026 ~ The Cyber Beat ~ Leave a comment UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns3 Russian Submarines Detected Near Britain Were Spying, UK. SaysRussia Accuses Former Radio Free Europe Journalist of Aiding Cyberattacks for UkraineDo Ceasefires Slow Cyberattacks? History Suggests NotPoliticians Are Spending More Money on Security as They Increasingly Become TargetsCrypto? Huh. Good Gosh Y’all, What Is It Good For? $45M in This CaseMicrosoft Suspends Dev Accounts for High-Profile Open Source ProjectsGoogle API Keys Quietly Gain Access to Gemini on Android DevicesU.S. Software Stocks Slump on Renewed AI Disruption JittersBitcoin Depot Reports $3.6m Crypto Theft After System BreachEngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto WalletsTreasury Department Announces Crypto Industry Cyber Threat Sharing InitiativeCybercriminals Target Accountants to Drain Russian Firms’ Bank AccountsSTX RAT Targets Finance Sector With Advanced Stealth TacticsHackers Use Pixel-Large SVG Trick to Hide Credit Card StealerSmart Slider Updates Hijacked to Push Malicious WordPress, Joomla VersionsAdobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025Google Chrome Adds Infostealer Protection Against Session Cookie Theft
4/8/2026 April 8, 2026April 8, 2026 ~ The Cyber Beat ~ Leave a comment APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO AlliesN. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust‘We Were Not Ready for This’: Lebanon’s Emergency System Is Hanging by a ThreadTwo Prominent Egyptian Journalists Targeted With Elaborate Spearphishing CampaignHack-For-Hire Group Caught Targeting Android Devices and iCloud BackupsWho Is Satoshi Nakamoto? My Quest to Unmask Bitcoin’s Creator…British Cryptographer Adam Back Denies NYT Report That He Is Bitcoin Creator Satoshi NakamotoMen Are Buying Hacking Tools to Use Against Their Wives and FriendsCriminal Wannabes Even More Dangerous Than the Pros, Says Ex-FBI Cyber ChiefAI Is Forcing a Rethink in CybersecurityAI-Led Remediation Crisis Prompts HackerOne to Pause Bug BountiesCIA Director Quietly Elevated Agency’s Cyber Espionage DivisionTikTok Removes Covert Networks Ahead of Hungary Vote as Disinformation Concerns GrowTrove of Sensitive LAPD Records Leaked in Data Hack of City Attorney’s OfficeMinnesota Governor Sends National Guard to Winona County After CyberattackDutch Healthcare Software Vendor ChipSoft Goes Dark After Ransomware AttackNHS Scotland-Linked Domains Caught Serving Porn and Dodgy Sports StreamsPassport Numbers for More Than 300,000 Leaked During December Eurail Data BreachMasjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT DevicesGoogle: New UNC6783 Hackers Steal Corporate Zendesk Support TicketsNew macOS Stealer Campaign Uses Script Editor in ClickFix AttackNew Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS ProxyCISA Orders Feds to Patch Exploited Ivanti EPMM Flaw by SundayHackers Exploit Critical Flaw in Ninja Forms WordPress PluginAnthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems…Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years
4/7/2026 April 7, 2026April 7, 2026 ~ The Cyber Beat ~ Leave a comment Iran-Linked Hackers Are Sabotaging U.S. Energy and Water InfrastructureKrebs: Russian Group APT28 Hacked Routers to Steal Microsoft Office TokensHundreds of Orgs Compromised Daily in Microsoft Device Code Phishing AttacksNational Security Veterans Warn Against Delays in FISA 702 ReauthorizationFBI: Americans Lost a Record $21 Billion to Cybercrime Last YearThe College Student—and His Cat Meme—Who Hunted the World’s Biggest CyberweaponAnthropic Limits Mythos AI Rollout Over Fears Hackers Could Use Model for Cyberattacks…Anthropic Teams up With Its Rivals to Keep AI From Hacking EverythingCyberattack on Telecom Giant Rostelecom Disrupts Internet Services Across RussiaCyberattack Hits Northern Ireland’s Centralized School Network, Disrupting Access for ThousandsMassachusetts Hospital Turning Ambulances Away After CyberattackSnowflake Customers Hit in Data Theft Attacks After SaaS Integrator BreachGrafanaGhost Exploit Bypasses AI Guardrails for Silent Data ExfiltrationOver 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet CampaignDocker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host AccessMax Severity Flowise RCE Vulnerability Now Exploited in Attacks
4/6/2026 April 6, 2026April 6, 2026 ~ The Cyber Beat ~ Leave a comment Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 OrganizationsDPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South KoreaKrebs: Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrabSuspect in Hacking of Climate Activists Is Extradited to New YorkFirst Stalkerware Maker Prosecuted Since 2014 Receives No Jail TimeDrift $280M Crypto Theft Linked to 6-Month In-Person OperationFBI: Cyber Fraud Surges to $17.6 Billion in Losses as Scams, Crypto Theft SoarEmbattled Startup Delve Has ‘Parted Ways’ With Y CombinatorA.I. Is on Its Way to Upending CybersecurityMajor Outage Hits Russian Banking Apps, Metro Payments Across RegionsHackers Threaten to Leak Data After Cyberattack on German Party Die LinkeQilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR ToolsNew GPUBreach Attack Enables System Takeover via GPU RowhammerMicrosoft Links Medusa Ransomware Affiliate to Zero-Day AttacksCISA Orders Feds to Patch Exploited Fortinet EMS Flaw by FridayDisgruntled Researcher Leaks “BlueHammer” Windows Zero-Day ExploitBig Tech Vows to Continue Csam Scanning in Europe Despite Expiration of Law Allowing It
4/3-5/2026 April 5, 2026April 5, 2026 ~ The Cyber Beat ~ Leave a comment CERT-EU: European Commission Hack Exposes Data of 30 EU Entities…EU Cyber Agency Attributes Major Data Breach to TeamPCP Hacking GroupChina-Linked TA416 Targets European Governments with PlugX and OAuth-Based PhishingChinese Firms Market Iran War Intelligence ‘Exposing’ U.S. ForcesTrump Officials Try to Fight Foreign Disinformation They Once DismissedUNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain AttackThe Hack That Exposed Syria’s Sweeping Security FailuresLinkedIn Secretly Scans for 6,000+ Chrome Extensions, Collects DataMan Admits to Locking Thousands of Windows Devices in Extortion PlotResearchers Didn’t Want to Glamorize Cybercrims. So They Roasted ThemUkraine Warns Russian Hackers Are Revisiting Past Breaches to Prepare New AttacksAct-of-War Clauses Cloud Cyber Insurance CoverageWhite House Says Trump Orders Back Pay From Shutdown to All Homeland Security EmployeesTrump Wants to Take a Battle Axe to CISA Again and Slash $707M From BudgetMassachusetts Emergency Communications System Impacted by CyberattackMeta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at RiskAnyone With a Link Can View Your Granola Notes by DefaultDie Linke German Political Party Confirms Data Stolen by Qilin RansomwareCyberattack Targeted Italy’s Uffizi but Nothing Stolen, Museum SaysHims & Hers Warns of Data Breach After Zendesk Support Ticket BreachVenom: New Phishing Platform Used in Credential Theft Campaigns Against C-Suite ExecsTraffic Violation Scams Switch to QR Codes in New Phishing TextsNew SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase ImagesDevice Code Phishing Attacks Surge 37X as New Kits Spread Online36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent ImplantsHackers Exploit React2Shell in Automated Credential Theft CampaignFortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMSFCC Proposes $4.5 Million Fine for Voice Service Provider Hosting ‘Suspicious’ Foreign Call Traffic
4/2/2026 April 2, 2026April 2, 2026 ~ The Cyber Beat ~ Leave a comment Drift Crypto Platform Confirms $280 Million Stolen in Hack as Researchers Point Finger at North KoreaIran Says It Hit Oracle Facilities in UAEAdversaries Exploit Vacant Homes to Intercept Mail in Hybrid CybercrimeThe Company’s Biggest Security Hole Lived in the BreakroomThey Thought They Were Downloading Claude Code Source. They Got a Nasty Dose of Malware InsteadWhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces ActionResidential Proxies Evaded IP Reputation Checks in 78% of 4B SessionsFate of DHS Funding Uncertain as U.S. Congress Republicans Decide Next Steps…Trump Says He’ll Sign Order to Pay All DHS Employees as Shutdown ContinuesFrench Senate Passes Bill That Would Ban Children Under 15 From Social MediaBoards Are Falling Short on CybersecurityRSAC 2026: AI Dominates, But Community Remains Key to SecurityMedtech Giant Stryker Fully Operational After Data-Wiping AttackMoney Transfer App Duc Exposed Thousands of Driver’s Licenses and Passports to the Open WebOklahoma Tax Commission Data Breach Raises ConcernsResearchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto MinersNew ‘Storm’ Infostealer Remotely Decrypts Stolen CredentialsNew CrystalRAT Malware Adds RAT, Stealer and Prankware FeaturesResearchers Observe Sub-One-Hour Ransomware AttacksGitHub Used as Covert Channel in Multi-Stage Malware CampaignNew Progress ShareFile Flaws Can be Chained in Pre-Auth RCE AttacksOver 14,000 F5 BIG-IP APM Instances Still Exposed to RCE AttacksHackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal CredentialsCritical Cisco IMC Auth Bypass Gives Attackers Admin AccessApple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
4/1/2026 April 1, 2026April 1, 2026 ~ The Cyber Beat ~ Leave a comment Chinese Hackers TA416 Target European Governments in Espionage CampaignsFBI Warns Against Using Chinese Mobile Apps Due to Privacy RisksCambodia Extradites Alleged Cyber Scam Linchpin to China as Crackdown IntensifiesRomania Under Daily Barrage of Cyberattacks, Defense Minister SaysCyberattacks Intensify Pressure on Latin American GovernmentsGoogle Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069…The Axios Hack: What to KnowGoogle Drive Ransomware Detection Now on by Default for Paying UsersApple Will Push Out Rare ‘Backported’ Patches to Protect iOS 18 Users From DarkSword Hacking ToolThe Forgotten Endpoint: Security Risks of Dormant DevicesAre We Training AI Too Late?Hasbro Says It Was Hacked, and May Take ‘Several Weeks’ to RecoverNissan Says Stolen Data Came From Third-Party Vendor After Hacking Group Claims BreachMercor Confirms Security Incident Tied to LiteLLM Supply Chain AttackCrypto Platform Drift Suspends Services After Millions Stolen in Security IncidentCERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million EmailsCasbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF LuresNew EvilTokens Service Fuels Microsoft Device Code Phishing Attacks‘NoVoice’ Android Malware on Google Play Infected 2.3 Million DevicesNew Venom Stealer MaaS Platform Automates Continuous Data TheftNew Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
3/31/2026 April 1, 2026April 1, 2026 ~ The Cyber Beat ~ Leave a comment Iran’s Revolutionary Guard Threatens to Strike U.S. Companies in Mideast…Iran Threatens to Start Attacking Major U.S. Tech Firms on April 1Iran’s Hackers Are on the Offensive Against the U.S. and IsraelIran Targets M365 Accounts With Password-Spraying AttacksNorth Korea-Linked Hack Hits Largely Invisible Software That Powers Online Services…Critical Compromise: Axios NPM Library With 100M Weekly Downloads Is Delivering MalwareSilver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake DomainsTrueConf Zero-Day Exploited in Attacks on Southeast Asian Government NetworksPro-Russian Hackers Pose as Ukraine’s Cyber Agency to Target Government, BusinessesEmployee Data Breaches Surge to Seven-Year HighCybercriminals Exploit Tax Season With New Phishing TacticsHacker Charged With Stealing $53 Million From Uranium Crypto ExchangeClaude Code Leak Exposes a Tamagotchi-Style ‘Pet’ and an Always-on Agent…Claude Code Source Code Accidentally Leaked in NPM PackageCisco Source Code Stolen in Trivy-Linked Dev Environment BreachHackers Hit Minot Water Treatment Plant (ND) Server in Ransomware Case, FBI InvestigatingDutch Finance Ministry Takes Treasury Banking Portal Offline After BreachDon’t Open That WhatsApp Message, Microsoft WarnsLeak Bazaar: New Criminal Service Plans to Monetize Data Stolen by Ransomware GangsCISA Orders Feds to Patch Actively Exploited Citrix Flaw by ThursdayGIGABYTE Control Center Vulnerable to Arbitrary File Write FlawClaude AI Finds Vim, Emacs RCE Bugs that Trigger on File OpenAndroid Developer Verification Rollout Begins Ahead of September EnforcementGoogle’s Vertex AI Has an Over-Privileged Problem