2 critical · 128 to skim · 1 to act on
Most organizations are rightly nervous about employees adopting unapproved AI tools.
In early March, GitHub patched a critical remote code execution vulnerability ( CVE-2026-3854 ) that could have allowed attackers to access millions of private repositories.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability exploited in zero-day attacks.
Microsoft is working to resolve a known issue that prevents some Microsoft Teams Free users from chatting and calling others.
Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to permanently destroying larger files rather than encrypt them.
Hackers are targeting sensitive information stored in the LiteLLM open-source large-language model (LLM) gateway by exploiting a critical vulnerability tracked as CVE-2026-42208.
Vimeo has disclosed that data belonging to some of its customers and users has been accessed without authorization following the recent breach at the Anodot data anomaly detection company.
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era.
A 19-year-old dual United States and Estonian citizen arrested in Finland earlier this month faces federal charges in the U.S. alleging he was a prolific member of the notorious Scattered Spider hacking collective.
Join the webinar to explore a practical, multi-layered roadmap to transition from fragmented AI usage to a governed, scalable ecosystem.
Application security company Checkmarx has confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository.
Legitimate-looking emails coming from Robinhood systems lured recipients to phishing websites.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
A member of Silk Typhoon, Xu Zewei is accused of launching cyberattacks against universities in the US.
Microsoft says it will start blocking legacy TLS connections for POP and IMAP email clients in Exchange Online starting in July 2026.
When cybercrime operations are disrupted, the cause is typically not due to sophisticated detection, but rather basic operational mistakes such as identity reuse, weak infrastructure separation, or overlooked metadata.
Over 70 cloned Open VSX extensions are likely sleeper extensions designed to distribute malware.
Agentic AI can be expensive to use, causing further and unpredictable pressure on tight budgets.
Apr 23, 2026 ICS Advisory | ICSA-26-113-06 Intrado 911 Emergency Gateway (EGW)
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Vulnerabilities in Zero Motorcycles electric motorcycles and Yadea electric scooters can pose physical security and safety risks.
A fake RPC server can be used to listen for RPC requests and impersonate the target service to elevate privileges to System.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Federal prosecutors have been conducting a preliminary investigation since mid-February 2026 into alleged cyberattacks on Signal accounts.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Microsoft has confirmed a new issue causing newly introduced Windows security warnings to display incorrectly when opening Remote Desktop (.rdp) files.
After addressing a widespread outage that affected Outlook.com users worldwide on Monday, Microsoft has asked iPhone users to re-enter their credentials to regain access to their Outlook and Hotmail accounts via t
The threat detection startup will invest in accelerating its engineering and go-to-market efforts. Threat detection startup Spectrum Security has emerged from stealth mode with $19 million in seed funding.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
The ShinyHunters cybercrime group claimed to have stolen 9 million records containing personal information from Medtronic.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate emails, tricking users into believing their accounts had suspicious activity.
A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 "sleeper" extensions that turn malicious after an update.
Canadian authorities have arrested three men for operating an "SMS blaster" device that pretends to be a cellular tower to send phishing texts to nearby phones.
A Chinese national accused of carrying out cyberespionage operations for China's intelligence services has been extradited from Italy to the United States to face criminal charges.
The U.S. Federal Trade Commission (FTC) warned of a massive increase in losses from social media scams since 2020, exceeding $2.1 billion in 2025.
An attacker pushed a malicious version of the popular elementary-data package Python Package Index (PyPI) to steal sensitive developer data and cryptocurrency wallets. The dangerous release is 0.23.
The ShinyHunters extortion group stole the personal information of 5.5 million individuals after breaching the systems of home security giant ADT earlier this month, according to data breach notification service Have
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Medical device giant Medtronic disclosed last week that hackers breached its network and accessed data in “certain corporate IT systems.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
The initial vulnerability was exploited by Russia-linked APT28 in attacks against Ukraine and EU countries.
22-year-old Evan Tangeman of Newport Beach, California, was sentenced to 70 months in prison for laundering funds stolen in a massive $230 million cryptocurrency heist.
By Brian Long, CEO and Co-founder, Adaptive Security In March 2025, a finance director at a multinational firm in Singapore joined what appeared to be a routine Zoom call with her senior leadership t
A code reuse issue enabled comma characters in certificate principals to be interpreted as list separators.
The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified.
Microsoft is investigating an ongoing Outlook.com outage that is causing intermittent signing issues and preventing customers from accessing their mailboxes.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Itron, which serves utilities and cities around the world, discovered unauthorized access to its systems on April 13.
The threat actor infected victims with the Snow malware family – Snowbelt, Snowglaze, and Snowbasin – for persistent access.
A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages.
US conducts sweeping crackdown on Southeast Asian cyberscam operations as part of what officials say is a “new theater of war”. U.S.
The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Utility technology company Itron, Inc. has disclosed that an unauthorized third party accessed some of its internal systems during a cyberattack.
Microsoft says it's rolling out a revamped Windows Insider Program experience as part of the broader plans to address reliability concerns in Windows 11.
A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named “Snow,” which includes a browser extension, a tunneler, and a backdoor.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Zscaler ThreatLabz 2026 VPN Risk Report with Cybersecurity Insiders. AI collapsed human response window and turned remote access into fastest path to breach.
Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is paid.
Cybersecurity agencies in the U.S. and U.K. are warning about a custom malware called Firestarter persisting on Cisco Firepower and Secure Firewall devices running Adaptive Security Appliance (ASA) or Firepower
Microsoft is rolling out Windows Update improvements that give users more control over how updates are installed while reducing disruption from frequent or poorly timed restarts.
A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026.
Microsoft will roll out passkey support for phishing-resistant passwordless authentication to Microsoft Entra‑protected resources from Windows devices starting late April.
A new vulnerability dubbed Pack2TheRoot could be exploited in the PackageKit daemon to allow local Linux users to install or remove system packages and gain root permissions.
Author: Eirik Salmi, System Analyst at Passwork When a threat actor walks into your network using a legitimate username and password, which control stops them?
Over 10,000 Zimbra Collaboration Suite (ZCS) instances exposed online are vulnerable to ongoing attacks exploiting a cross-site scripting (XSS) security flaw, according to nonprofit security organization Shadowserver.
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.
Microsoft says IT administrators can now uninstall the AI-powered Copilot digital assistant from enterprise devices using a new policy setting, which has become broadly available after the April 2026 Patch Tuesday.
Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading arbitrary files on the server without authentication.
Updated with further information from Bitwarden. The Bitwarden CLI was briefly compromised after attackers uploaded a malicious @bitwarden/cli package to npm containing a credential-stealing payload capable of s
Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently.
Hackers have compromised Docker images, VSCode and Open VSX extensions for the Checkmarx KICS analysis tool to harvest sensitive data from developer environments.
Dutch cosmetics giant Rituals disclosed a data breach after attackers stole the personal information of an undisclosed number of customers from its "My Rituals" membership database.
Research from Forrester estimates that every password reset costs around $70. As one of the most common helpdesk requests, many organizations have introduced self-service password reset (SSPR) tools to reduce the load.
Microsoft confirmed that a recent Microsoft Edge browser update introduced a bug that prevents Windows users from joining Teams meetings.
The United Kingdom's National Cyber Security Centre (NCSC-UK) and international partners warned that China-nexus hackers are increasingly using large-scale proxy networks of hijacked consumer devices to evade det
A previously undocumented state-backed threat actor named GopherWhisper is using a Go-based custom toolkit and legitimate services like Microsoft 365 Outlook, Slack, and Discord in attacks against government ent
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
Apr 23, 2026 ICS Advisory | ICSA-26-113-06 Intrado 911 Emergency Gateway (EGW)
Apr 23, 2026 ICS Advisory | ICSA-26-113-06 Intrado 911 Emergency Gateway (EGW)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.
The Cybersecurity and Infrastructure Security Agency (CISA) analyzed a sample of FIRESTARTER malware obtained from a forensic investigation.
Apr 23, 2026 ICS Advisory | ICSA-26-113-06 Intrado 911 Emergency Gateway (EGW)
Apr 23, 2026 ICS Advisory | ICSA-26-113-06 Intrado 911 Emergency Gateway (EGW)
Hangzhou Xiongmai Technology Co., Ltd XM530 IP Camera
Apr 23, 2026 ICS Advisory | ICSA-26-113-06 Intrado 911 Emergency Gateway (EGW)
CISA has given U.S. government agencies two weeks to secure their Windows systems against a Microsoft Defender privilege escalation vulnerability that has been exploited in zero-day attacks.
Article updated with statement from Signal thanking Apple for addressing the vulnerability .
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.
A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant implementing Kyber1024 post-quantum encryption.
The Spanish police have dismantled what they claim is the largest Spanish-language manga piracy platform, operating since 2014 and serving millions of monthly users worldwide.
Fraudulent phone calls have become a daily reality for millions of people worldwide.
A new supply chain attack targeting the Node Package Manager (npm) ecosystem is stealing developer credentials and attempting to spread through packages published from compromised accounts.
Microsoft is preparing to roll out a new Efficiency Mode for Microsoft Teams for systems with limited CPU and memory resources to improve app responsiveness.
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.
Microsoft says that an ongoing Universal Print sharing issue that prevents users from creating some printer shares is due to a Microsoft Graph API code change.
A Linux variant of the GoGra backdoor uses legitimate Microsoft infrastructure, relying on an Outlook inbox for stealthy payload delivery.
Microsoft has released out-of-band (OOB) security updates to patch a critical ASP.NET Core privilege escalation vulnerability. The security flaw (tracked as CVE-2026-40372 ) was found in the ASP.
Over 1,300 Microsoft SharePoint servers exposed online remain unpatched against a spoofing vulnerability that was exploited as a zero-day and is still being abused in ongoing attacks.
France Titres, the government agency in France for issuing and managince administrative documents has disclosed a data breach after a threat actor claimed the attack and stealing citizen data.
A previously undocumented data-wiping malware dubbed Lotus was used last year in targeted attacks against energy and utilities organizations in Venezuela.
A 24-year-old British national and senior member of the cybercrime group “ Scattered Spider ” has pleaded guilty to wire fraud conspiracy and aggravated identity theft.
Fraud prevention and user experience have long been treated as opposing forces: tighten security, and you risk alienating legitimate customers; loosen it, and you open the door to account takeovers, synt
Ofcom, the United Kingdom's independent communications regulator, has launched an investigation into Telegram based on evidence suggesting it's being used to share child sexual abuse material (CSAM).
CISA has given U.S. government agencies four days to secure their systems against another Catalyst SD-WAN Manager vulnerability it flagged as actively exploited in attacks.
Apr 21, 2026 ICS Advisory | ICSA-26-111-04 Siemens Analytics Toolkit
Apr 21, 2026 ICS Advisory | ICSA-26-111-04 Siemens Analytics Toolkit
Apr 21, 2026 ICS Advisory | ICSA-26-111-05 Hardy Barth Salia EV Charge Controller
Apr 21, 2026 ICS Advisory | ICSA-26-111-04 Siemens Analytics Toolkit
Apr 21, 2026 ICS Advisory | ICSA-26-111-05 Hardy Barth Salia EV Charge Controller
Apr 21, 2026 ICS Advisory | ICSA-26-111-05 Hardy Barth Salia EV Charge Controller
Apr 21, 2026 ICS Advisory | ICSA-26-111-04 Siemens Analytics Toolkit
Apr 21, 2026 ICS Advisory | ICSA-26-111-05 Hardy Barth Salia EV Charge Controller
Apr 21, 2026 ICS Advisory | ICSA-26-111-04 Siemens Analytics Toolkit
Apr 21, 2026 ICS Advisory | ICSA-26-111-04 Siemens Analytics Toolkit
Nonprofit security organization Shadowserver found that over 6,400 Apache ActiveMQ servers exposed online are vulnerable to ongoing attacks exploiting a high-severity code injection vulnerability.
41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023.
A new variant of the NGate malware that steals NFC payment data is targeting Android users by hiding in a trojanized version of HandyPay, a legitimate mobile payments processing tool.
State-sponsored North Korean hackers are likely behind the $290 million crypto-heist that impacted the KelpDAO DeFi project on Saturday.
A set of 26 malicious apps on Apple App Store impersonate popular wallets, such as Metamask, Coinbase, Trust Wallet, and OneKey, to steal recovery or seed phrases and drain them of cryptocurrency assets.
A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate.
The Seiko USA website was defaced over the weekend, displaying a message from attackers claiming they stole its Shopify customer database and threatening to leak it unless a ransom is paid.
Microsoft has issued a warning that threat actors are increasingly using Microsoft Teams to impersonate IT helpdesk staff, tricking employees into granting access to enterprise networks. Attackers leverage legitimate tools for access and lateral movement, making detection difficult. Developers and enterprise users should be cautious of unsolicited Teams messages requesting credentials or remote access, and organizations should review their external Teams communication policies.
This article challenges the common misconception that having backups alone is sufficient for business continuity. It highlights that while backups protect data, they do not ensure operational continuity during ransomware attacks or outages, which can result in costly downtime. Developers and businesses should consider implementing full Business Continuity and Disaster Recovery (BCDR) strategies rather than relying solely on backups.
A weekly security roundup covers multiple active threats including a Vercel-related hack, push notification fraud, QEMU being abused as an attack vector, and new Android remote access trojans (RATs) emerging in the wild. The attacks share a common theme of abusing trusted pathways—third-party tools, browser extensions, update channels, and legitimate software—to gain internal access rather than breaking systems directly. Developers should care because supply chain trust assumptions are being systematically exploited across multiple platforms and tooling ecosystems.
A British national believed to be a leader of the Scattered Spider cybercrime group has pleaded guilty in the US to wire fraud and aggravated identity theft charges related to cryptocurrency theft. Scattered Spider is known for sophisticated social engineering attacks, SIM swapping, and targeting tech companies and their employees. Developers and security teams should be aware of this group's tactics, which often involve impersonating IT staff to gain access to corporate systems and credentials.
Microsoft is testing performance and speed improvements for File Explorer in Windows 11, currently available to Insider program participants. These changes focus on faster launch times and overall performance enhancements. This is not a security issue but rather a UX/performance update relevant to Windows developers and power users.
<div class="OutlineElement Ltr SCXW232133708 BCX8"> <p>The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this alert to provide guidance in response to the software supply chain compromise of the Axios node package manager (npm).
<div class="OutlineElement Ltr SCXW178812853 BCX8"> <p>CISA has added eight new vulnerabilities to its <a href="https://www.cisa.
This article discusses operational challenges in AI deployment, focusing on why AI tools that perform well in demos often fail in real-world production environments. It is not a security incident or vulnerability report, but rather an analysis of AI adoption friction. Developers should be aware that scaling AI beyond proof-of-concept requires careful operational planning.
Researchers discovered a design-level vulnerability in the Model Context Protocol (MCP), a framework used to connect AI models with external tools and data sources. The flaw allows attackers to achieve remote code execution on any system running a vulnerable MCP implementation, potentially compromising the broader AI supply chain. Developers building AI-powered applications with MCP integrations should audit their implementations immediately, as this is an architectural issue rather than a simple patch-and-fix bug.
Microsoft rolled back a faulty service update that was causing the Teams desktop client to fail on launch for some users. Developers and organizations relying on Teams for communication and collaboration were temporarily impacted. While not a security vulnerability, the incident highlights the risk of service disruptions from cloud-side updates outside users' control.
Microsoft released emergency out-of-band updates to address problems introduced by the April 2026 security patches for Windows Server. Organizations running Windows Server that applied the April 2026 updates may be experiencing system issues and should apply the new OOB fixes promptly. Developers and sysadmins managing Windows Server infrastructure should prioritize installing these corrective updates to restore stability.
Researchers at Darktrace have identified a new malware called ZionSiphon specifically designed to target Israeli water treatment and desalination facilities. The malware establishes persistence, tampers with configuration files, and scans for operational technology (OT) services on local networks, posing a significant threat to critical water infrastructure. Developers working on OT/ICS systems or critical infrastructure software should be aware of targeted malware capable of bridging IT and OT environments.
Vercel suffered a security breach after a third-party AI tool, Context.ai, was compromised, allowing attackers to take over an employee's Google Workspace account and gain unauthorized access to certain internal Vercel systems. A limited number of customer credentials were exposed as a result. Developers using Vercel should monitor for any suspicious activity and consider rotating credentials, as supply chain attacks through third-party tools remain a significant and growing threat vector.
Cloud development platform Vercel has disclosed a security incident after threat actors claimed to have breached its systems and are attempting to sell stolen data.
A webinar focused on the growing security risk of unmanaged non-human identities such as service accounts, API tokens, and OAuth grants, which were cited as responsible for 68% of cloud breaches in 2024. Organizations typically have 40-50 automated credentials per employee, many of which become orphaned when projects end or staff leave. Developers should care because these 'ghost identities' represent a significant and often overlooked attack surface in cloud environments.
Multiple Anviz biometric access control products (CX2 Lite, CX7 firmware, and CrossChex Standard software) contain numerous critical vulnerabilities including missing authentication, command injection, and improper authorization flaws. All firmware versions are affected, with CVSS scores reaching 9.8, meaning attackers could gain full root-level control, execute arbitrary code, capture sensitive data, and compromise credentials on these physical security devices. Developers and security teams integrating or managing Anviz hardware should treat these devices as untrusted until patches are available and isolate them from sensitive network segments.
software contains a missing authorization vulnerability (CVE-2026-5387) with a CVSS v3 score of 9.1, allowing unauthenticated attackers to escalate privileges and perform administrator-level actions. Exploiting this flaw could enable modification of simulation parameters, training configurations, and training records in pipeline simulation systems used in critical manufacturing infrastructure worldwide. Developers and operators using AVEVA Pipeline Simulation should apply patches or mitigations immediately, as the high CVSS score and lack of authentication requirement make this a serious risk.
CISA has added a new Apache ActiveMQ vulnerability (CVE-2026-34197) involving improper input validation to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild. Organizations running Apache ActiveMQ are at risk, as this type of vulnerability is a common attack vector for malicious actors. Developers and administrators using ActiveMQ should prioritize patching immediately, as federal agencies are required to remediate and all organizations are strongly urged to do the same.
Horner Automation's Cscape engineering software and XL4/XL7 PLCs used in critical manufacturing have a weak password requirements vulnerability (CVE-2026-6284, CVSS 9.1) that allows network-accessible attackers to brute force credentials with no rate limiting or complexity enforcement. Affected versions include Cscape v10.0, XL7 PLC v15.60, and XL4 PLC v16.32.0. Developers and engineers integrating or managing industrial control systems should apply patches or mitigations immediately, as successful exploitation could grant unauthorized access to operational technology environments.
version 7.2.0.0 contains a stack-based buffer overflow vulnerability (CVE-2026-5726) that can be triggered when parsing malformed .par files, potentially allowing attackers to execute arbitrary code. The flaw affects industrial automation software used in critical manufacturing sectors worldwide. Delta Electronics has released a patch in version 7.2.6.0, and users should upgrade immediately to mitigate the risk.
Microsoft's April 2026 Patch Tuesday addresses 167 security vulnerabilities, including an actively exploited SharePoint Server zero-day and a publicly disclosed Windows Defender flaw called 'BlueHammer'. Google Chrome patched its fourth zero-day of 2026, and Adobe Reader received an emergency fix for an actively exploited remote code execution vulnerability. Developers should prioritize updating all affected systems immediately, especially those running SharePoint Server, Chrome, and Adobe Reader, as active exploitation is confirmed.
CISA has added two vulnerabilities to its Known Exploited Vulnerabilities catalog based on evidence of active exploitation: a Microsoft Office Remote Code Execution flaw (CVE-2009-0238) and a Microsoft SharePoint Server Improper Input Validation vulnerability (CVE-2026-32201). Federal agencies are required to patch these by a set deadline, and all organizations are strongly urged to remediate them promptly. Developers and admins running Microsoft Office or SharePoint should prioritize applying available patches immediately given confirmed active exploitation.
<p>CISA has added seven new vulnerabilities to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabi
<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-099-02.
Russian military intelligence hackers exploited known vulnerabilities in older routers to silently harvest Microsoft Office authentication tokens across more than 18,000 networks. The attack required no malware deployment, making it difficult to detect through traditional security tools. Developers should care because this demonstrates how infrastructure-level compromises can bypass application-layer security, putting any organization using Microsoft Office at risk of credential theft without any user interaction.
German authorities have publicly identified 31-year-old Russian national Daniil Maksimovich Shchukin as 'UNKN', the leader behind the notorious REvil and GandCrab ransomware-as-a-service (RaaS) operations. He is accused of conducting at least 130 ransomware attacks against victims in Germany between 2019 and 2021. Developers and organizations should be aware that law enforcement continues to make progress in attributing major ransomware operations, and the REvil/GandCrab infrastructure and tactics remain a reference point for understanding modern ransomware threats.