The Containment Era is here. →Explore

Showing 12 / 3320 threat reports
Impact (MEDIUM)
CISA Directs Immediate Patching of Exploited Windows Zero-Day Vulnerability
In April 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) mandated federal agencies to patch a critical Windows vulnerability, CVE-2026-32202, exploited in zero-day attacks. This flaw, stemming from an incomplete fix of a previous vulnerability (CVE-2026-21510), allows attackers to steal NTLM hashes without user interaction, facilitating unauthorized access and lateral movement within networks. The Russian state-sponsored group APT28 (Fancy Bear) has been linked to exploiting this vulnerability in attacks targeting Ukraine and EU countries in December 2025. The urgency of this directive underscores the persistent threat posed by state-sponsored cyber actors and the critical need for timely and comprehensive patching. Organizations must remain vigilant, ensuring that security updates are applied promptly to mitigate risks associated with such vulnerabilities.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Vercel Breach 2026: Lessons in Third-Party AI Tool Security
In April 2026, Vercel, a cloud development platform, experienced a security breach originating from a compromised third-party AI tool, Context.ai. An attacker exploited this tool to access a Vercel employee's Google Workspace account, subsequently infiltrating Vercel's internal systems. This led to unauthorized access to non-sensitive environment variables, including API keys and database credentials. The breach was traced back to the Lumma Stealer malware, which had infected a Context.ai employee's workstation in February 2026. The malware harvested credentials, enabling the attacker to pivot into Vercel's infrastructure. Vercel has since notified affected customers and recommended immediate credential rotation and enhanced security measures. This incident underscores the escalating risks associated with third-party integrations and the necessity for stringent access controls and continuous monitoring of OAuth permissions. Organizations are urged to reassess their security postures concerning third-party tools to mitigate potential supply chain vulnerabilities.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
GitHub's Swift Response to CVE-2026-3854: Securing Millions of Repositories
In March 2026, GitHub addressed a critical remote code execution vulnerability, identified as CVE-2026-3854, which affected GitHub.com and GitHub Enterprise Server. The flaw allowed attackers with push access to a repository to execute arbitrary code on the server by exploiting improperly sanitized user-supplied push options during git push operations. This vulnerability posed a significant risk, potentially exposing millions of private repositories to unauthorized access. GitHub promptly patched the issue within hours of its discovery, and no evidence of exploitation prior to the fix was found. The rapid identification and remediation of CVE-2026-3854 underscore the importance of proactive vulnerability management in safeguarding critical code repositories. This incident highlights the necessity for organizations to maintain vigilant security practices and promptly apply patches to mitigate emerging threats.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (CRITICAL)
Critical cPanel & WHM Authentication Bypass Vulnerability (CVE-2026-41940) Discovered
In April 2026, a critical authentication bypass vulnerability, identified as CVE-2026-41940, was discovered in cPanel and WebHost Manager (WHM) software. This flaw allowed unauthenticated remote attackers to gain administrative access to affected systems by exploiting a weakness in the login flow. The vulnerability impacted all supported versions of cPanel and WHM prior to the patched releases. cPanel promptly released security updates to address the issue, urging administrators to apply the patches immediately to prevent unauthorized access. ([support.cpanel.net](https://support.cpanel.net/hc/en-us/articles/40073787579671-Critical-Vulnerability-with-cPanel-WHM-Login-Authentication?utm_source=openai)) The incident underscores the importance of timely software updates and vigilant monitoring of web hosting environments. With the widespread use of cPanel and WHM in managing web servers, such vulnerabilities pose significant risks to data integrity and system security. Organizations are reminded to maintain up-to-date systems and implement robust security practices to mitigate potential threats.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (MEDIUM)
Qinglong Task Scheduler Vulnerabilities Lead to Cryptomining Attacks
In early February 2026, attackers began exploiting two authentication bypass vulnerabilities, CVE-2026-3965 and CVE-2026-4047, in the Qinglong open-source task scheduling tool. These flaws allowed unauthenticated access to protected admin endpoints, enabling remote code execution. Threat actors leveraged this access to deploy cryptomining malware on developers' servers, leading to significant CPU resource consumption and operational disruptions. The vulnerabilities were publicly disclosed at the end of February, with initial patches proving insufficient. A comprehensive fix was implemented in early March 2026. This incident underscores the critical importance of promptly addressing security vulnerabilities in widely-used open-source tools. The exploitation of Qinglong's flaws highlights the persistent threat posed by cryptomining attacks and the necessity for developers to maintain up-to-date software and implement robust security measures to protect their systems.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
European Authorities Dismantle €50 Million Crypto Fraud Network
In April 2026, Austrian and Albanian authorities, supported by Europol and Eurojust, dismantled a sophisticated cryptocurrency investment fraud operation that defrauded victims worldwide of over €50 million. The criminal network operated multiple call centers in Tirana, Albania, employing up to 450 individuals across various departments. Victims were lured through online advertisements to fake investment platforms, where 'retention agents' posing as professional brokers used psychological manipulation and remote access software to extract funds, which were then laundered through international channels. This incident underscores the growing trend of cybercriminals leveraging professional business structures and advanced social engineering tactics to perpetrate large-scale financial fraud. The dismantling of this network highlights the critical need for enhanced vigilance and regulatory measures to combat increasingly sophisticated cryptocurrency scams.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
LiteLLM CVE-2026-42208: Rapid Exploitation of Critical SQL Injection Vulnerability
In April 2026, a critical SQL injection vulnerability (CVE-2026-42208) was discovered in BerriAI's LiteLLM Python package, a widely used AI gateway. This flaw allowed unauthenticated attackers to execute arbitrary SQL commands against the proxy's database, potentially leading to unauthorized access and modification of sensitive data. The vulnerability affected versions >=1.81.16 and <1.83.7. Despite a patch being released on April 19, 2026, exploitation attempts were observed within 36 hours of public disclosure, indicating rapid weaponization by threat actors. ([thehackernews.com](https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html?utm_source=openai)) This incident underscores the increasing speed at which cyber adversaries exploit newly disclosed vulnerabilities, particularly in widely adopted open-source software. Organizations relying on such tools must prioritize timely patching and implement robust monitoring to detect and mitigate exploitation attempts promptly.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Massive Roblox Account Hijacking Scheme Disrupted by Ukrainian Authorities
In April 2026, Ukrainian authorities arrested three individuals aged 19, 21, and 22 for compromising over 610,000 Roblox accounts between October 2025 and January 2026. The group distributed malware disguised as game-enhancing tools to steal login credentials, targeting high-value accounts with substantial in-game assets and currency. These accounts were then sold on Russian websites and closed online communities, generating approximately $225,000 in illicit profits. The suspects face charges under articles 185 and 361 of the Ukrainian Criminal Code, with potential sentences of up to 15 years in prison. This incident underscores the growing trend of cybercriminals targeting gaming platforms due to the real-world value of virtual assets. It highlights the importance of robust cybersecurity measures and user education to prevent such breaches, as well as the need for international cooperation in combating cybercrime.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (MEDIUM)
Massive WordPress Plugin Backdoor Exposes Thousands of Sites in 2026
In April 2026, a significant supply chain attack compromised over 30 WordPress plugins, collectively known as the 'Essential Plugin' portfolio. An individual operating under the alias 'Kris' purchased these plugins in early 2025 and injected a PHP deserialization backdoor during subsequent updates. This backdoor remained dormant for eight months before activation, allowing the attacker to inject spam content and potentially execute arbitrary code on over 20,000 active WordPress sites. The attack underscores the vulnerabilities inherent in plugin ecosystems, where ownership changes can introduce malicious code without immediate detection. This incident highlights a growing trend in supply chain attacks targeting widely used software components. The strategy of purchasing and compromising trusted plugins poses a significant threat to website security, emphasizing the need for rigorous vetting processes and continuous monitoring of third-party software integrations.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
SAP npm Packages Compromised in 'Mini Shai-Hulud' Supply Chain Attack
On April 29, 2026, a sophisticated supply chain attack targeted SAP's JavaScript and cloud application development ecosystem by compromising several npm packages, including mbt@1.2.48, @cap-js/db-service@2.10.1, @cap-js/postgres@2.2.2, and @cap-js/sqlite@2.2.2. The attackers introduced a preinstall script that downloaded and executed a malicious payload via the Bun JavaScript runtime, enabling the theft of developer credentials, GitHub and npm tokens, and cloud service secrets. The stolen data was exfiltrated to public GitHub repositories created on the victims' accounts, labeled with the description 'A Mini Shai-Hulud has Appeared.' ([thehackernews.com](https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html?utm_source=openai)) This incident underscores the escalating threat of supply chain attacks targeting development environments, particularly within widely-used frameworks like SAP's CAP model. The attack's sophistication, including its ability to propagate through developer workflows and exploit AI coding agent configurations, highlights the need for enhanced security measures in software development pipelines. ([thehackernews.com](https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html?utm_source=openai))

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
In April 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: CVE-2024-1708, a path traversal flaw in ConnectWise ScreenConnect, and CVE-2026-32202, a protection mechanism failure in Microsoft Windows Shell. CVE-2024-1708 allows remote code execution or unauthorized access to sensitive data, while CVE-2026-32202 enables network-based spoofing attacks. Both vulnerabilities have been actively exploited by threat actors, including the China-based group Storm-1175 deploying Medusa ransomware and the Russian APT28 targeting Ukraine and EU countries. Federal agencies are mandated to remediate these vulnerabilities by May 12, 2026. ([thehackernews.com](https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html?utm_source=openai)) The inclusion of these vulnerabilities in the KEV catalog underscores the persistent threat posed by state-sponsored actors exploiting known flaws. Organizations must prioritize patching and enhance monitoring to mitigate risks associated with these and similar vulnerabilities.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Credential-Stealing Malware Found in Official SAP npm Packages
In April 2026, a sophisticated supply chain attack targeted SAP's Cloud Application Programming Model (CAP) by compromising four official npm packages: @cap-js/sqlite v2.2.2, @cap-js/postgres v2.2.2, @cap-js/db-service v2.10.1, and mbt v1.2.48. The attackers, identified as TeamPCP, injected malicious 'preinstall' scripts into these packages, which, upon installation, executed a multi-stage payload designed to steal a wide array of credentials from developers' systems and CI/CD environments. The stolen data included npm and GitHub authentication tokens, SSH keys, and cloud credentials for AWS, Azure, and Google Cloud. The malware also attempted to extract secrets directly from the CI runner's memory, bypassing standard log masking mechanisms. The exfiltrated data was encrypted and uploaded to public GitHub repositories under the victim's account, with descriptions indicating the presence of 'A Mini Shai-Hulud.' This incident underscores the escalating threat of supply chain attacks targeting widely-used development tools and the necessity for robust security measures in software development pipelines.

13 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I