<?xml version="1.0" encoding="utf-8"?><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:snf="http://www.smartnews.be/snf">
    <channel>
        <title>ScamAlert24</title>
        <link>https://www.scamalert24.co.za.bestpiecejob.co.za/</link>
        <description>ScamAlert24.co.za is South Africa’s dedicated platform for reporting, exposing, and educating the public about scams, fraud, and online deception. Whether it&apos;s fake job posts, investment fraud, phishing schemes, or social media scams, we help individuals and businesses stay informed and alert. Our community-driven portal empowers users to report suspicious activities, read verified scam reports, and get tips on how to protect their money and identity. Be part of the solution — report a scam, share your story, and help others stay safe.</description>
        <lastBuildDate>Fri, 17 Apr 2026 14:00:10 +0300</lastBuildDate>
        <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
                    <item>
                <title>Palo Alto’s Helmut Reisinger sees a cyber sea change ahead as AI advances</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/palo-alto-s-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances-3780.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Helmut Reisinger, Palo Alto&rsquo;s CEO for EMEA, reflects on the importance of Project Glasswing, the company&rsquo;s recent slate of acquisitions, and the evolution of cybersecurity in the AI era.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>In two decades,&nbsp;Palo Alto Networks&nbsp;has evolved from a next-generation niche player to one of the largest global cybersecurity giants today. Under its mantra of &ldquo;platformization,&rdquo; the company has catapulted its revenues over its closest competitors and boosted its stock valuation to over $130 billion.</p>



<p>No stranger to AI use in cybersecurity, Palo Alto recently announced its participation in&nbsp;<a href="https://www.csoonline.com/article/4155342/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery.html">Project Glasswing</a>, an AI-based vulnerability-discovery initiative led by Anthropic that many are viewing as a <a href="https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html">structural shift for the cyber industry</a>. The initiative, which includes 10 other major technology companies as coalition partners, including AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, and Microsoft, aims to leverage Anthropic&rsquo;s Claude Mythos to improve the security of the software that underpins much of the world&rsquo;s technical infrastructure.</p>



<p>It is in this context that Computerworld Spain spoke with&nbsp;Helmut Reisinger, CEO of Palo Alto Networks for EMEA, in Madrid at the company&rsquo;s Ignite event on April 14. The interview was conducted in Spanish, a language that the multilingual Austrian executive and PhD holder speaks fluently.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Following are excerpts from that interview, edited for length and clarity.</p>

		

			


<p><strong>Computerworld Spain: Let&rsquo;s start with the recent announcement of Palo Alto&rsquo;s participation in the exclusive Mythos project, which few companies have access to due to the power of this technology and the risk of it falling into the wrong hands. Or is this just a marketing strategy?</strong></p>



<p><strong>Helmut Reisinger:</strong> Indeed, this is a restricted release that only a few companies can access for vulnerability testing. We&rsquo;ve witnessed firsthand how this pioneering model represents a radical shift. With it, we&rsquo;ve detected zero-day vulnerabilities in an unprecedented number of operating systems and browsers. And it&rsquo;s capable of turning most of these vulnerabilities into working exploits, with all the risks that entails. For now, we can&rsquo;t say much more. We&rsquo;re currently working on providing more information through a&nbsp;blog. In any case, the important thing is the context in which this is happening.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>On the democratization of AI.</strong></p>



<p>Yes. At Palo Alto, we&rsquo;ve been using AI to improve cybersecurity for a long time. Back in 2014, we integrated&nbsp;machine learning&nbsp;technology into our systems, initially just&nbsp;firewalls. But we also develop cybersecurity solutions specifically for AI. The major challenge today is that, according to a Stanford University report, only 6% of AI deployments are implemented with appropriate cybersecurity. And this is happening in the age of agents, where for every human identity there are approximately 80 machine identities, and even more if we include agents. That&rsquo;s why, thanks to our acquisition of Protect AI, a company founded by Ian Swanson, formerly head of AI at Amazon, we&rsquo;ve launched a security solution for AI deployments, language models, and agents.</p>



<p><strong>This is just one of several purchases Palo Alto has made recently, correct?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Yes, we just <a href="https://www.csoonline.com/article/4131325/palo-alto-closes-privileged-access-gap-with-25b-cyberark-acquisition.html">closed the deal [in February] with&nbsp;CyberArk</a>, a leader in identity security. At Palo Alto, we&rsquo;re convinced that AI and identity are two worlds that must go hand in hand, especially now in the era of generative systems and agents.</p>



<p>Another acquisition we recently completed, in January, and which falls within this context of addressing the current AI landscape, <a href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-completes-chronosphere-acquisition--unifying-observability-and-security-for-the-ai-era">is that of&nbsp;Chronosphere</a>, a leader in observability. Chronosphere is capable of managing and protecting massive volumes of AI-generated data at a lower cost &mdash; half the price &mdash; of other market players. This is an important acquisition because observability is essential in cybersecurity.</p>



<p>And finally,&nbsp;<a href="https://www.csoonline.com/article/4148974/palo-alto-updates-security-platform-to-discover-ai-agents.html">we&rsquo;ve acquired Koi</a>, a deal I expect will close in a few days. Koi&rsquo;s technology focuses on agentic endpoint security &mdash; protecting businesses from the risks of using AI agents and autonomous development tools operating on users&rsquo; devices. Koi&rsquo;s technology will be integrated into our Cortex XDR platform to monitor what AI agents are doing on users&rsquo; computers and detect if they are being manipulated to execute malicious commands.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>I imagine effectively integrate all these companies presents significant challenges.</strong></p>



<p>That&rsquo;s right, because many IT companies, when they make acquisitions, focus more on contractual than technological integrations, but that&rsquo;s not our approach. Our strategy involves complete technological integrations, like Protect AI, which is now part of our network platform. This aligns with our commitment to platformization using a modular system.</p>



<p><strong>It&rsquo;s clear that &lsquo;platformization&rsquo; is the company&rsquo;s mantra and a way to simplify life for customers, but doesn&rsquo;t it also create greater dependencies, including vendor&nbsp;lock-in?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Yes, we sometimes hear clients say they don&rsquo;t want to put all their eggs in one basket. But that&rsquo;s precisely why our strategy is modular, so the client can decide. It&rsquo;s also true that all the clients who have experienced a massive data breach have opted for complete platformization. In fact, our founder [Nir Zuk] has always said that &ldquo;everyone will switch to platforms as soon as they suffer a mega-breach.&rdquo;</p>



<p>The speed of platform adoption, therefore, will be determined by the client themselves, their business, their use cases, their existing contracts, and so on. We are also making efforts to reduce costs to encourage clients to migrate and simplify their platformization process. Furthermore, we mustn&rsquo;t lose sight of the fact that the approach to cybersecurity must be comprehensive; it&rsquo;s a global chain.</p>



<p><strong>Regarding cost, Palo Alto has a reputation for having powerful but expensive technology. What&rsquo;s your opinion?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Compared to the level of protection we provide our customers, our technology isn&rsquo;t that expensive. On the other hand, the cost also reflects all the innovation included in our solutions.</p>



<p><strong>How do you see Palo Alto Networks&rsquo; major competitors, primarily Fortinet and CrowdStrike?</strong></p>



<p>The cybersecurity market is fragmented, but we lead it. That said, we have to win every single day.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>The current, highly turbulent geopolitical climate is having a significant impact on the cybersecurity field, as well as on customers&rsquo; IT purchasing decisions. Does being a US player in Europe affect Palo Alto? Are you seeing a shift among public sector clients toward more local options?</strong></p>



<p>CISOs with high levels of responsibility know very well that a wealth of telemetry data is essential for effective protection, and that&rsquo;s why we aren&rsquo;t seeing a decrease in demand. That&rsquo;s the primary reason. Furthermore, each region and country has its own legal frameworks and regulations, which we fully respect. In fact, we were among the first companies in the world to sign the&nbsp;European AI Act&nbsp;and ensured we also obtained the corresponding national certifications.</p>



<p>Our view on sovereignty is that we must find a balance between perfect sovereignty and zero sovereignty. When we talk about sovereignty, we can refer, for example, to hardware. Regarding this issue, we must accept the interdependence we have between different global markets; this happens, for example, in the field of chips. But if we talk about data sovereignty, this is something that can be easily achieved.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>We implement the Bring Your Own Key&nbsp;(BYOK) policy for many clients&nbsp;to ensure that the telemetry data sent by their devices is encrypted and protected. We are not interested in accessing the personal data our clients handle; we only use telemetry, application identity, user, and device data. It was precisely thanks to this type of analysis that we were able to discover the <a href="https://www.csoonline.com/article/570191/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">attempted intrusion using SolarWinds</a>, although, as it occurred years ago [2020], it was carried out using&nbsp;machine learning&nbsp;tools.</p>



<p><strong>How is the current war in Iran affecting the threat landscape?</strong></p>



<p>This has many implications. Our Unit42 team recently published&nbsp;<a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/" target="_blank" rel="noreferrer noopener">a report</a>&nbsp;outlining how the joint military offensive launched by the United States and Israel activated the Iranian-aligned cyber ecosystem, creating a scenario of digital confrontation that transcends the region and combines&nbsp;hacktivism, political messaging campaigns, and pressure on critical infrastructure.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>In this regard, I want to bring up the issue of sovereignty again because what can a company do if its infrastructure is, for example, bombed? In other words, what does the concept of sovereignty mean in an emergency situation? We already have clients in the Middle East who are rethinking their sovereignty strategy because of this situation. Furthermore, as we saw earlier, we are talking about telemetry data, not other types of data. Ultimately, all of this shows that the concept of sovereignty is fluid.</p>



<p><strong>Returning to Europe, in less than two months Palo Alto will be opening new offices in Spain and, in addition, a &lsquo;hub&rsquo;, correct?</strong></p>



<p>Yes, we want to establish a center of excellence here. In Europe, in addition to Madrid, Palo Alto has large offices in London, Amsterdam, Paris, and Munich. From Madrid,&nbsp;Jordi Botifoll&nbsp;has been leading the business for 87 countries &mdash; not only in Southern Europe, but also in the Middle East, Africa, etc. &mdash; for the past three years.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>And what are your expectations for the new center of excellence? Why have you chosen Spain?</strong></p>



<p>Cybersecurity requires a lot of technological expertise, and Spain has very good engineers who can help our clients in case of emergency, both through our incident response unit, Unit 42, and through our partners, such as Telef&oacute;nica Tech, Kyndryl, and Orange, because ours is a technology company, not a service company.</p>



<p><strong>How many employees do they have in Spain, and what will the number of employees be at the new center?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>I can&rsquo;t break down local numbers, but overall, across the entire company, once the 4,000 CyberArk professionals are integrated, we&rsquo;re already around 20,000 people worldwide. Our main development centers are in California and Israel, although we also have others in Poland and Lithuania.</p>



<p><strong>Looking ahead, significant challenges in information security are coming with the arrival of the post-quantum era.</strong></p>



<p>Yes, and we&rsquo;re already preparing. We&rsquo;ve <a href="https://www.csoonline.com/article/4123719/palo-alto-warns-of-quantum-risk-to-digital-security.html">launched Quantum Safe Security</a> to help organizations get ready for the post-quantum era. Because the big question scientists and experts are asking now is when &lsquo;Q Day&rsquo; will be, which might arrive sometime between 2029 and 2035. Furthermore, integrating CyberArk technology will help ensure that credentials used by machines cannot be compromised through quantum decryption.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The cybersecurity of the future must be real-time, highly automated, and simple for customers, or what we call modular &lsquo;platformization.&rsquo;</p>



<p><strong>Finally, what would you say is the biggest challenge for CISOs today?</strong></p>



<p><a href="https://www.csoonline.com/article/4143302/the-cisos-guide-to-responding-to-shadow-ai.html">Shadow AI</a>. We must prevent AI from suffering the same fate as other technologies in the past, creating what&rsquo;s known as&nbsp;shadow IT. AI deployments must be accompanied by robust cybersecurity. And AI and identity management must go hand in hand. Another concern is the fragmentation of solutions. I was recently speaking with an executive at a large European bank who told me they have 60 different solutions; the gaps between these systems are a clear invitation to attack.</p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[In two decades, Palo Alto Networks has evolved from a next-generation niche player to one of the largest global cybersecurity giants today. Under its mantra of “platformization,” the company has catapulted its revenues over its closest competitors and boosted its stock...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/palo-alto-s-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances-3780.html</guid>
                <pubDate>Fri, 17 Apr 2026 14:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159305-0-41494500-1776420293-helmut-PAN_e.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions-3779.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 17, 2026</span></span><span>Vulnerability Management</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrjR1nq2z66LZ-KZoSSgEdNs30l3Wv4kqz4R4acFd3CW2tqG0EDILlATrje1-tvZhdjnU9rSRO4cQNmlQGelsfBGGiMl_m9kxotVRlBDFyMISCJIFUPN78Aam2GAYPL0Nljz4aU5XrrWz2QuxBz-cZvY7vr2zSQJNdgrz3IWLldTPG_n_9tJx22A3TBQzZ/s1700-e365/nist-cve.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrjR1nq2z66LZ-KZoSSgEdNs30l3Wv4kqz4R4acFd3CW2tqG0EDILlATrje1-tvZhdjnU9rSRO4cQNmlQGelsfBGGiMl_m9kxotVRlBDFyMISCJIFUPN78Aam2GAYPL0Nljz4aU5XrrWz2QuxBz-cZvY7vr2zSQJNdgrz3IWLldTPG_n_9tJx22A3TBQzZ/s1700-e365/nist-cve.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>


<p>The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions.</p>
<p>"CVEs that do not meet those criteria will still be listed in the NVD but will not automatically be <a href="https://nvd.nist.gov/general/cve-process">enriched by NIST</a>," it <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">said</a>. "This change is driven by a surge in CVE submissions, which increased 263% between 2020 and 2025. We don&rsquo;t expect this trend to let up anytime soon."</p>
<p>The prioritization criteria outlined by NIST, which went into effect on April 15, 2026, are as follows -</p>
<ul>
<li>CVEs appearing in the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog.</li>
<li>CVEs for software used within the federal government.</li>
<li>CVEs for <a href="https://www.nist.gov/system/files/documents/2026/04/15/EO%2014028%20Critical%20FINAL.pdf">critical software</a> as defined by Executive Order 14028: this includes software that's designed to run with elevated privilege or managed privileges, has privileged access to networking or computing resources, controls access to data or operational technology, and operates outside of normal trust boundaries with elevated access.&nbsp;</li>
</ul>
<div><p><a href="https://thehackernews.uk/ai-agentic-guide-d-3" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00/s728-e100/nudge-d-3.jpg" width="729" height="91"></a></p></div>
<p>Any CVE submission that doesn't meet these thresholds will be marked as "Not Scheduled." The idea, NIST said, is to focus on CVEs that have the maximum potential for widespread impact.</p>
<p>"While CVEs that do not meet these criteria may have a significant impact on affected systems, they generally do not present the same level of systemic risk as those in the prioritized categories," it added.</p>
<p>NIST said the CVE submissions during the first three months of 2026 are nearly one-third higher than they were last year, and it's working faster than ever to enrich the submissions. It also said it enriched nearly 42,000 CVEs in 2025, which was 45% more than any prior year.</p>

<p>In cases where a high-impact CVE has been categorized as unscheduled, users have the option to request enrichment by sending an email to "nvd@nist[.]gov."NIST is expected to review those requests and schedule the CVEs for enrichment as applicable.</p>
<p>Changes have also been instituted for various other aspects of the NVD operations. These include -</p>
<ul>
<li>NIST will no longer routinely provide a separate severity score for a CVE where the CVE Numbering Authority has already provided a severity score.</li>
<li>A modified CVE will be reanalyzed only if it "materially impacts" the enrichment data. Users can request specific CVEs to be reanalyzed by sending an email to the same address listed above.</li>
<li>All unenriched CVEs currently in backlog with an NVD publish date earlier than March 1, 2026, will be moved into the "Not Scheduled" category. This does not apply to CVEs that are already in the KEV catalog.</li>
<li>NIST has updated the <a href="https://nvd.nist.gov/vuln/vulnerability-status">CVE status labels and descriptions</a>, as well as the <a href="https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a>, to accurately reflect the status of all CVEs and other statistics in real time.</li>
</ul>
<p>"The announcement from NIST doesn't come as a major surprise, given they've previously telegraphed intent to move to a 'risk-based' prioritization model for CVE enrichment," Caitlin Condon, vice president of security research at VulnCheck, said in a statement shared with The Hacker News.</p>
<p>"On the plus side, NIST is clearly and publicly setting expectations for the community amid a huge and escalating rise in new vulnerabilities. On the other hand, a significant portion of vulnerabilities now appear to have no clear path to enrichment for organizations relying on NIST as their authoritative (or only) source of CVE enrichment data."</p>
<p>Data from the cybersecurity company shows that there are still approximately 10,000 vulnerabilities from 2025 without a CVSS score. NIST is estimated to have enriched 14,000 'CVE-2025' vulnerabilities, accounting for about 32% of the 2025 CVE population.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>"This announcement underscores what we already know: We no longer live in a world where manual enrichment of new vulnerabilities is a feasible or effective strategy," Condon said.</p>
<p>"Even without AI-driven vulnerability discovery accelerating CVE volume and validation challenges, today's threat climate unequivocally demands distributed, machine-speed approaches to vulnerability identification and enrichment, along with a genuinely global perspective on risk that acknowledges the interconnected, interdependent nature of the worldwide software ecosystem &ndash; and the attackers who target it. After all, what we don't prioritize for ourselves, adversaries will prioritize for us."</p>
<p>David Lindner, chief information security officer of Contrast Security, said NIST's decision to only prioritize high-impact vulnerabilities marks the end of an era where defenders could leverage a single government-managed database to assess security risks, forcing organizations to pivot to a proactive approach to risk management that's driven by threat intelligence.</p>
<p>"Modern defenders must move beyond the noise of total CVE volume and instead focus their limited resources on the CISA KEV list and exploitability metrics," Lindner said.</p>
<p>"While this transition may disrupt legacy auditing workflows, it ultimately matures the industry by demanding that we prioritize actual exposure over theoretical severity. Relying on a curated subset of actionable data is far more effective for national resilience than maintaining a comprehensive but unmanageable archive of every minor bug."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions-3779.html</guid>
                <pubDate>Fri, 17 Apr 2026 11:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrjR1nq2z66LZ-KZoSSgEdNs30l3Wv4kqz4R4acFd3CW2tqG0EDILlATrje1-tvZhdjnU9rSRO4cQNmlQGelsfBGGiMl_m9kxotVRlBDFyMISCJIFUPN78Aam2GAYPL0Nljz4aU5XrrWz2QuxBz-cZvY7vr2zSQJNdgrz3IWLldTPG_n_9tJx22A3TBQzZ/s1700-e365/nist-cve.jpg"/>
            </item>
                    <item>
                <title>Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts-3778.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 17, 2026</span></span><span>DDoS / Cybercrime</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgePkLgywRZdW-d26RoQHpyVUy3nKssYfrZuFEdZ-fjRzJHTpESHBPlLvUII_vjjeLVTn4G_TB_oH76mfzh5t4PoKyz_ZhXWBOnCAkssRVXvb_lAMkEdhlK4G9YE6IWvxUUDQ9KDeZSzurWEPKDoQAVozBVjwrRYtSjy6pSbenOhhctqh3NxELjQXeF7H7S/s1700-e365/europol.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgePkLgywRZdW-d26RoQHpyVUy3nKssYfrZuFEdZ-fjRzJHTpESHBPlLvUII_vjjeLVTn4G_TB_oH76mfzh5t4PoKyz_ZhXWBOnCAkssRVXvb_lAMkEdhlK4G9YE6IWvxUUDQ9KDeZSzurWEPKDoQAVozBVjwrRYtSjy6pSbenOhhctqh3NxELjQXeF7H7S/s1700-e365/europol.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals.</p>
<p>The ongoing effort, dubbed <strong>Operation PowerOFF</strong>, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to databases containing over 3 million criminal user accounts. Authorities are also sending warning emails and letters to the identified criminal users, and 25 search warrants have been issued.</p>
<p>As many as 21 countries participated in the action: Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, the Netherlands, Poland, Portugal, Sweden, Thailand, the U.K., and the U.S.</p>
<p>"Booter services allow users to launch DDoS attacks against targeted websites, servers, or networks," Europol <a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-supported-global-operation-targets-over-75-000-users-engaged-in-ddos-attacks">said</a> in a statement. "Their infrastructure is made up of servers, databases, and other technical components that make DDoS-for-hire activities possible. By seizing these infrastructures, authorities were able to hinder these criminal operations and prevent further damage to victims."</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>The agency described <a href="https://thehackernews.com/2025/05/europol-shuts-down-six-ddos-for-hire.html">DDoS-for-hire</a> as one of the most prolific and easily accessible trends in cybercrime, as it allows even individuals with little to no technical knowledge to execute malicious attacks at scale and inflict significant damage to busin</p>
<p>Europol also noted that DDoS activity can originate from well-resourced and skilled threat actors, who could rely on such services to customize or optimize their illicit activities. DDoS attacks often tend to target various web-based services, with the motivations behind them as varied as they are broad.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9AhaexHlRhBSNMo1AHRJsChpcpW3e5Y1Q-WnVxrDYHuxoefzAqSnzrdGXP_tMOODB_f2eCNeKCZKSVqnwhCyjIA3PGfChC0PHvGkakue3K1-tug1bN-B1OPgb-dkO0yrvftem2hwAEsDTCy0bFeFf-b3sTj97bHMdL-ggqHs2lPi9LKAWUJIppzTNz_V0/s1700-e365/Poweroff.png"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9AhaexHlRhBSNMo1AHRJsChpcpW3e5Y1Q-WnVxrDYHuxoefzAqSnzrdGXP_tMOODB_f2eCNeKCZKSVqnwhCyjIA3PGfChC0PHvGkakue3K1-tug1bN-B1OPgb-dkO0yrvftem2hwAEsDTCy0bFeFf-b3sTj97bHMdL-ggqHs2lPi9LKAWUJIppzTNz_V0/s1700-e365/Poweroff.png" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="2192" data-original-width="3888"></a></p>
<p>This ranges from simple curiosity and financial gain through extortion to hacktivism driven by ideological reasons and disruption of competitors' services. Some operators of these services have been found to mask their true motives and escape law enforcement scrutiny by disguising them as stress-testing tools.</p>
<p>The development marks the latest step taken by authorities to dismantle criminal DDoS-for-hire infrastructures worldwide as part of PowerOFF. In August 2025, the U.S. government <a href="https://thehackernews.com/2025/08/doj-charges-22-year-old-for-running.html">announced</a> the takedown of a DDoS botnet called RapperBot that was used to conduct large-scale disruptive attacks targeting victims in over 80 countries since at least 2021.</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts-3778.html</guid>
                <pubDate>Fri, 17 Apr 2026 10:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgePkLgywRZdW-d26RoQHpyVUy3nKssYfrZuFEdZ-fjRzJHTpESHBPlLvUII_vjjeLVTn4G_TB_oH76mfzh5t4PoKyz_ZhXWBOnCAkssRVXvb_lAMkEdhlK4G9YE6IWvxUUDQ9KDeZSzurWEPKDoQAVozBVjwrRYtSjy6pSbenOhhctqh3NxELjQXeF7H7S/s1700-e365/europol.jpg"/>
            </item>
                    <item>
                <title>Supply chain dependencies: Have you checked your blind spot?</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/supply-chain-dependencies-have-you-checked-your-blind-spot-3777.html</link>
                                <content:encoded><![CDATA[<div>
    <p>Some cyber business risks only show up when you take a closer look. Supply chain blind spots are a perfect example. Behind these essential third-party connections, products and services can lurk unseen vulnerabilities that precipitate major cyber incidents &ndash; halting operations, triggering downstream chaos, and making headlines with their financial, reputational, and legal/compliance impacts.</p>
<p>As supply chains become increasingly digitized and complex, they provide cybercriminals a bigger &ldquo;risk surface&rdquo; to aim for. Organizations need to understand their supply chain dependencies in depth so they can map the risks and deploy effective resilience strategies to protect sensitive data and sustain business continuity. Yet according to the <a href="https://www.eset.com/us/about/newsroom/research/cyber-readiness-index-noram/" target="_blank" rel="noopener">latest research from ESET</a> and other sources, SMBs largely underestimate the potential risks they face from disruption caused by their supply chain, either from a malicious attack or operational outage.</p>
<h2>What is a supply chain and what risks does it pose?</h2>
<p>A supply chain is&nbsp;the total network of organizations, people, activities, information, and resources involved in moving a product or service from its origin to the final customer, encompassing sourcing, production, distribution, and delivery. Modern supply chains are often global and involve complex international logistics or connections.</p>
<p>Supply chain disruption gives rise to multiple, interrelated types of business risk. These include cybersecurity, operational, geopolitical, financial, reputational, compliance, environmental, and societal risks. In real-world scenarios the risks tend to blur. For example, data breaches linked to partners often have operational, financial, compliance, and/or reputational elements.</p>
<p>But perception does not always mirror reality when it comes to cybersecurity hazards. Perhaps reflecting the media&rsquo;s recent focus on AI-powered exploits and geopolitical cyber conflict, <a href="https://www.eset.com/us/about/newsroom/research/cyber-readiness-index-noram/" target="_blank" rel="noopener">ESET&rsquo;s 2026 SMB Cyber Readiness Index</a> released today found that 16% of Canadian and 17% of United States small businesses rate supply chain attacks among the threats they are most concerned about. Conversely, 34% Canadian and 32% United States SMBs identified AI-powered malware in their top threats.</p>
<p>This seems extremely low given the scale and frequency of supply chain incidents &ndash; and how broadly &lsquo;supply chain&rsquo; really stretches. The <a href="https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/" target="_blank" rel="noopener">3CX compromise</a> of 2023 &ndash; where bad actors trojanized a legitimate software update to the VOIP developer&rsquo;s product, potentially exposing its 600,000 customers &ndash; showed how an incident affecting a single compromised vendor can <a href="https://www.welivesecurity.com/en/cybersecurity/recovering-from-a-supply-chain-attack-what-are-the-lessons-to-learn-from-the-3cx-hack/" target="_blank" rel="noopener">cascade across industries</a>. Notably, 3CX itself was the downstream victim of another supply chain attack, courtesy of a compromised Trading Technologies X_TRADER installer. It was the first-ever documented instance of one supply chain attack seeding another, and a reminder of how deep these chains can run.</p>
<p>More recently, the CDK and Change Healthcare ransomware attacks in 2024 and the Jaguar Land Rover (JLR) ransomware attack of August 2025 illustrate how an incident at a vendor that sits at a critical node propagates across an entire sector. JLR belongs on the list for a second reason: the intrusion reached the automaker through one of its IT service providers, placing it squarely in classic supply chain territory.</p>
<p>The <a href="https://www.welivesecurity.com/en/cybersecurity/complexities-cybersecurity-update-processes/" target="_blank" rel="noopener">faulty CrowdStrike update</a> from July 2024 made the same point without an attacker involved, showing showed that supply chain risk isn&rsquo;t only about malice. A botched update release travels the same rails as a malware-laden one, and dependence on a single vendor can turn one point of failure into a global disruption.</p>
<p>Echoing ESET&rsquo;s findings, the World Economic Forum&rsquo;s <a href="https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf" target="_blank" rel="noopener">Global Cybersecurity Outlook 2026</a> asked business leaders across industries and regions to rank the cyber risks that concerned them most. CISOs rated supply chain disruption #2 for 2025 and #2 again for 2026, while CEOs rate supply chain disruption #3 for 2025. I find it surprising that supply chain disruption doesn&rsquo;t continue to rank in a CEO&rsquo;s top 3.</p>
<figure><img title=" World Economic Forum Global Cybersecurity Outlook 2026" src="https://web-assets.esetstatic.com/wls/2026/04-26/wef-global-cybersecurity-outlook.png" alt="wef-global-cybersecurity-outlook" width="" height="">
<em>Source: <a href="https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf" target="_blank" rel="noopener">World Economic Forum Global Cybersecurity Outlook 2026</a></em>
</figure>
<p>Overall, about 30% of data breaches involve a third party, a figure that doubled year-over-year, according to Verizon&rsquo;s <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">2025 Data Breach Investigations Report</a> (DBIR). The total economic <a href="https://cybersecurityventures.com/global-costs-of-software-supply-chain-attacks-on-the-rise/" target="_blank" rel="noopener">cost of software supply chain attacks skyrocketed</a> from $46 billion in 2023 to $60 billion in 2025, and is expected to reach $138 billion by 2031. Statistics like these should put cyber supply chain risk on every business leader&rsquo;s short list of concerns.</p>
<h2>What are the top cyber supply chain blind spots?</h2>
<p>Supply chain cybersecurity risk concerns all possible ways that attackers could infiltrate a company&rsquo;s networks or other IT infrastructure and steal its data by targeting vulnerabilities in the systems of third-party service providers, vendors, or partners. These attacks often exploit situations where communications are trusted by default, potentially compromising data, personal privacy, operational stability, or even national security.</p>
<p>Supply chain cyber vulnerabilities take various forms, such as:</p>
<ul>
<li>Compromising network-connected SMB suppliers with weaker security to create a backdoor into the target enterprise.</li>
<li>Injecting malicious code into software components (e.g., open-source libraries) or updates, potentially compromising many users.</li>
<li>Using phishing attacks and other social engineering ploys to steal privileged credentials or seed ransomware or other malware via a third-party such as an IT services company.</li>
<li>Hacking or vulnerabilities in physical assets like chipsets or IoT devices at the source.</li>
</ul>
<p>Some of the cyber supply chain blind spots that threaten many organizations include:</p>
<ul>
<li>Thinking your business is more resilient than it actually is (false sense of security) due to inadequate risk assessment.</li>
<li>Geopolitically motivated incidents (see below), where &ldquo;collateral damage&rdquo; can harm numerous organizations not directly related to a conflict.</li>
<li>Cyber vulnerabilities several levels deep in the supply chain where the end customer has no visibility (so-called fourth-party, nth-party, or indirect vendor risk).</li>
<li>&ldquo;Reverse&rdquo; supply chain disruptions impacting a company&rsquo;s customers.</li>
<li>Assuming new and unassessed vulnerabilities along with new supply chain partners that were onboarded quickly due to geopolitical events, natural disasters, or other chaotic scenarios.</li>
<li>Trusting communications with partners instead of leveraging zero trust principles to validate all connections.</li>
<li>&ldquo;Monoculture&rdquo; issues, such as wide-scale reliance among MSSPs or cyber insurance providers on one or a few popular cybersecurity solutions that, if compromised, would wreak instant havoc on a large scale.</li>
</ul>
<p>The sheer complexity of many modern supply chains makes identifying every single risk untenable. The question then becomes, where do you draw the line? How deep and detailed is your vendor risk assessment? And what level of supply chain cyber risk are you willing to accept as beyond your control?</p>
<h2>What have been the impacts from major supply chain attacks?</h2>
<p>Some of the most damaging incidents in recent memory hit organizations that sit at critical nodes in supply chains, and the resulting disruptions cascaded far beyond the original target.</p>
<p>A prime example of a cyberattack with an enormous blast radius is the JLR ransomware attack from August 2025. Attackers reached the automaker through an outsourced IT service provider, then disrupted production lines and IT services for over five weeks. The result was a global manufacturing shutdown that caused a 25% drop in vehicle production across the entire sector in the UK in September 2025. Parts demand crumpled overnight, forcing JLR&rsquo;s suppliers and related businesses to lay off hundreds of workers and driving the UK government to issue a &pound;1.5 billion emergency loan guarantee to forestall a national economic and workforce crisis. Deemed the costliest cyberattack in UK history, it resulted in over &pound;1.9 billion in total economic damage.</p>
<p>The Marks &amp; Spencer (M&amp;S) attack of April 2025 followed a similar pattern. The hackers successfully employed social engineering against an outsourced IT service provider, impersonating employees and <a href="https://www.welivesecurity.com/en/business-security/it-service-desks-security-blind-spot-business/" target="_blank" rel="noopener">convincing help desk staff</a> to reset critical system credentials. Contact details, birth dates, and order histories from millions of customers were apparently exfiltrated, and the company&rsquo;s online and app-based order processing were down for weeks. The lengthy outage cost on the order of &pound;300 million and inflicted lasting reputational damage.</p>
<p>Compromising commonly used open-source software libraries with malicious code is a similar and increasingly popular attack vector, with open-source malware <a href="https://www.darkreading.com/application-security/malicious-open-source-packages-spike" target="_blank" rel="noopener">proliferating 188% from 2024 to 2025</a>.</p>
<p>In a stark illustration of geopolitical blind spots within the software supply chain, a malicious backdoor placed into a legitimate update to the popular M.E.Doc accounting software in 2017 caused widespread distribution. Intended to target the Ukrainian economy, the attack spread <a href="https://www.welivesecurity.com/2017/06/30/telebots-back-supply-chain-attacks-against-ukraine/">NotPetya</a> wiper malware to organizations worldwide, sowing destruction estimated to cost $10 billion. The attack was later attributed to a Russia-aligned source. &nbsp;</p>
<p>Even hardware components like chips and circuit boards can potentially be exploited or weaponized, creating blind spots that are extremely difficult to detect or defend against. An ongoing example is the <a href="https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/">Kr00k</a> firmware supply chain vulnerability (<a href="https://nvd.nist.gov/vuln/detail/cve-2019-15126" target="_blank" rel="noopener">CVE-2019-15126</a>) discovered by ESET in 2019. Attackers can force affected devices, including millions of smartphones, laptops, and IoT devices, to encrypt Wi-Fi transmissions with an all-zero key that allows for easy decryption. It&rsquo;s likely that many affected devices still do not have firmware patches installed due to the mass scale of use.</p>
<p>And as an extreme example, the &ldquo;Operation Grim Beeper&rdquo; supply chain attack of September 2024 saw pagers and walkie-talkies used by Hezbollah members in Lebanon and Syria explode as part of an Israeli intelligence operation. Over 30 people were killed and 3,000 injured after equipment purchased by Hezbollah was systematically intercepted and weaponized for years. Talk about a supply chain blind spot&hellip;</p>
<h2>What are key considerations around geopolitical supply chain risk?</h2>
<p>With Iran launching <a href="https://www.welivesecurity.com/en/business-security/cyber-fallout-iran-war-what-have-radar/" target="_blank" rel="noopener">drone strikes against Amazon Web Services (AWS) data centers</a> in Bahrain and the UAE, geopolitical supply chain cyber risk is front-page news. Where kinetic and cyber warfare overlap, nation state actors and their proxies can exploit critical supply chain dependencies to perpetrate wide-scale economic sabotage for strategic ends that may include monetary theft. Collateral damage is part of the plan.</p>
<p>Some questions that organizations can ask to potentially reduce geopolitical supply chain risk include:</p>
<ul>
<li>Carefully audit all third-party hosting relationships, vendor access to your network, etc. Is your data moving through data centers in volatile regions &ndash; either directly or through service provider activities? Cloud service disruptions can propagate unpredictably through the supply chain.</li>
<li>Are you reliant on hardware or software that cyber combatants are currently targeting with specialized attacks, such as Israeli-made OT hardware?</li>
<li>Check whether your managed security solution provider(s) and other critical vendors have reviewed their own geopolitical cyber risk exposure. If a third party manages your incident detection and response (MDR) capability, for example, their solution becomes part of your attack surface.</li>
</ul>
<h2>How can organizations build supply chain cyber-resilience?</h2>
<div><p>General strategies for mitigating supply chain cyber risk include rigorously vetting suppliers&rsquo; cybersecurity postures, adopting emerging technology to enhance monitoring, leveraging zero trust principles to reduce attack impacts, and creating and testing incident response and business continuity plans to build resilience and better manage supply chain related incidents. Your entire supplier web needs to be part of the risk assessment.</p><p>To build and operationalize supply chain cyber resilience, I recommend a sequence of activities that collectively build resilience over a one-year period.</p></div>
<h3>First 3 months</h3>
<ul>
<li>Nominate business and IT owners for supply chain risk.</li>
<li>Identify all your third-party IT and business supply chain vendors and prioritize them by 1) Access to sensitive data, and 2) Criticality to the business.</li>
<li>Create a policy that defines your minimum acceptable cybersecurity posture or controls for vendors.</li>
<li>Check vendor compliance with your cyber requirements and replace them as needed.</li>
</ul>
<h3>First 6 months</h3>
<ul>
<li>Continue to monitor vendor compliance with your cyber requirements.</li>
<li>Describe key hardware and software supply chain risks (e.g., open-source dependencies) in business terms.</li>
<li>Incorporate your cyber requirements into procurement activities and contract negotiations. Negotiate the right to monitor and audit critical vendors.</li>
<li>Conduct a tabletop incident response exercise that includes strategic vendors.</li>
</ul>
<h3>First 12 months</h3>
<ul>
<li>Implement lessons learned from your tabletop exercise.</li>
<li>Audit vendors against contractual cyber requirements (e.g., average time to patch). Investigate supplier cyber incidents where relevant.</li>
<li>Build redundancy and fail-safes into IT systems wherever possible, while avoiding solution &ldquo;monoculture&rdquo; issues.</li>
<li>Review and update your cyber requirements policy.</li>
<li>Monitor and respond to global cyber regulatory/compliance changes that impact your business.</li>
</ul>
<h2>Resilience is imperative</h2>
<div><p>In a world of escalating threats and risky interdependencies, supply chain cyber resilience is a competitive differentiator at the survival level. Cybercriminals are keen to identify and target an organization&rsquo;s third-party linkages either upstream or downstream. It&rsquo;s possible that a chain of disrupted partners could face collective extortion pressure &ndash; effectively a &ldquo;crowdfunded&rdquo; ransomware scenario.</p><p>As a foundational resilience building block, firms must comprehensively map their critical third-party dependencies and vulnerabilities across digital and non-digital systems, including those that may not be obvious. Some ways to look beyond typical operational supply chain risk assessment include:</p></div>
<ul>
<li>AI-assisted continuous supply chain monitoring</li>
<li>Automated supply chain dependency mapping</li>
<li>Zero-trust supply chain architecture and connections</li>
<li>Application of threat intelligence to supply chain configurations</li>
<li>Extending resilience planning/considerations beyond internal systems to include the broader supply chain ecosystem</li>
<li>Possible input and assistance from your cyber liability insurer, which may have data-driven insights into vendors&rsquo; supply chain cyber performance</li>
</ul>
</div>
]]></content:encoded>
                                <description><![CDATA[Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/supply-chain-dependencies-have-you-checked-your-blind-spot-3777.html</guid>
                <pubDate>Fri, 17 Apr 2026 09:00:16 +0300</pubDate>
                <media:thumbnail url="https://web-assets.esetstatic.com/wls/2026/04-26/supply-chain-dependencies.jpg"/>
            </item>
                    <item>
                <title>Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation-3776.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 17, 2026</span></span><span>Vulnerability / Enterprise Security</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5/s1700-e365/apachemq.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5/s1700-e365/apachemq.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A recently disclosed high-severity security flaw in Apache ActiveMQ&nbsp;Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency&nbsp;(CISA).</p>
<p>To that end, the agency&nbsp;has <a href="https://www.cisa.gov/news-events/alerts/2026/04/16/cisa-adds-one-known-exploited-vulnerability-catalog">added</a> the vulnerability, tracked&nbsp;as <strong><a href="https://www.cve.org/CVERecord?id=CVE-2026-34197">CVE-2026-34197</a></strong> (CVSS score: 8.8), to its Known Exploited Vulnerabilities&nbsp;(<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">KEV</a>) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by April 30,&nbsp;2026.</p>
<p>CVE-2026-34197&nbsp;has been <a href="https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#chained-flaws-enable-stealth-rce">described</a> as a case of improper input validation that could lead to code injection, effectively allowing an attacker to execute arbitrary code on susceptible installations. According&nbsp;to Horizon3.ai's Naveen Sunkavally, CVE-2026-34197 has&nbsp;been&nbsp;"hiding in plain&nbsp;sight" for 13&nbsp;years.&nbsp;</p>
<div><p><a href="https://thehackernews.uk/ai-blindspot-d-2" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu/s728-e100/nudge-d-2.jpg" width="729" height="91"></a></p></div>
<p>"An attacker can invoke a management operation&nbsp;through ActiveMQ's Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS&nbsp;commands," Sunkavally&nbsp;added.</p>
<p>"The vulnerability requires credentials, but default credentials (admin:admin) are common in many environments. On some versions (6.0.0&ndash;6.1.1), no credentials are&nbsp;required at&nbsp;all due to another vulnerability, CVE-2024-32114, which inadvertently exposes the Jolokia API without authentication. In those versions, CVE-2026-34197 is effectively an unauthenticated&nbsp;RCE."</p>
<p>The vulnerability <a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt">impacts</a> the following versions&nbsp;-</p>
<ul>
<li>Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.4</li>
<li>Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0&nbsp;before 6.2.3</li>
<li>Apache ActiveMQ (org.apache.activemq:activemq-all) before 5.19.4</li>
<li>Apache ActiveMQ (org.apache.activemq:activemq-all) 6.0.0&nbsp;before 6.2.3</li>
</ul>
<p>Users are&nbsp;advised to upgrade to version 5.19.4&nbsp;or 6.2.3, which addresses the issue. There&nbsp;are currently no details on how CVE-2026-34197&nbsp;is being&nbsp;exploited in the&nbsp;wild, but&nbsp;SAFE Security, in a report published this week, revealed that threat actors are actively targeting exposed Jolokia management endpoints in Apache ActiveMQ Classic deployments.</p>
<p>The findings once again demonstrate that exploitation timelines continue to collapse as attackers pounce upon newly disclosed vulnerabilities at an alarmingly faster rate and breach systems&nbsp;before they can be&nbsp;patched.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>Apache ActiveMQ is&nbsp;a <a href="https://thehackernews.com/2021/02/new-cryptojacking-malware-targeting.html">popular&nbsp;target</a>&nbsp;for <a href="https://thehackernews.com/2023/11/kinsing-hackers-exploit-apache-activemq.html">attack</a>,&nbsp;with <a href="https://thehackernews.com/2024/01/apache-activemq-flaw-exploited-in-new.html">flaws</a> in the open-source message&nbsp;broker <a href="https://thehackernews.com/2024/09/ransomhub-ransomware-group-targets-210.html">repeatedly&nbsp;exploited</a> in various malware campaigns since 2021. In&nbsp;August 2025, a critical vulnerability in ActiveMQ (CVE-2023-46604, CVSS score:&nbsp;10.0) was <a href="https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html">weaponized</a> by unknown actors to drop a Linux malware called DripDropper.</p>
<p>"Given ActiveMQ&rsquo;s role in enterprise messaging and data pipelines, exposed management interfaces present a high-impact risk, potentially enabling data exfiltration, service disruption, or lateral&nbsp;movement," SAFE&nbsp;Security <a href="https://safe.security/resources/blog/threat-research/most-dangerous-new-cves-april-15-2026/">said</a>.&nbsp;"Organizations should audit all deployments for externally accessible Jolokia endpoints, restrict access to trusted networks, enforce strong authentication, and disable Jolokia where it is not&nbsp;required."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation-3776.html</guid>
                <pubDate>Fri, 17 Apr 2026 07:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5/s1700-e365/apachemq.jpg"/>
            </item>
                    <item>
                <title>Here&apos;s What Agentic AI Can Do With Have I Been Pwned&apos;s APIs</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/here-s-what-agentic-ai-can-do-with-have-i-been-pwned-s-apis-3775.html</link>
                                <content:encoded><![CDATA[
            <p>I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful and makes a meaningful difference. This blog post cuts straight to the good stuff, specifically how you can use AI with Have I Been Pwned to do some pretty cool things.  I'll be showing examples based on OpenClaw running on the Mac Mini in the hero shot, but they're applicable to other agents that turn HIBP's data into more insightful analysis.</p><p>So, let me talk about what you can do right now, what we're working on and what you'll be able to do in the future.</p><h2 id="model-context-protocol-mcp">Model Context Protocol (MCP)</h2><p>A quick MCP primer first: Anthropic came up with the idea of building a protocol that could connect systems to AI apps, and thus the <a href="https://modelcontextprotocol.io/?ref=troyhunt.com" rel="noreferrer">Model Context Protocol</a> was born:</p>Using MCP, AI applications like Claude or ChatGPT can connect to data sources (e.g. local files, databases), tools (e.g. search engines, calculators) and workflows (e.g. specialized prompts)&mdash;enabling them to access key information and perform tasks.<p>If I'm honest, I'm a bit on the fence as to how useful this really is (<a href="https://risky.biz/RBFEATURES7/?ref=troyhunt.com" rel="noreferrer">and I'm not alone</a>), but creating it was a no-brainer, so we now have an MCP server for HIBP:</p>

https://haveibeenpwned.com/mcp

<p>You can't just make an HTTP GET to the endpoint, but you can ask your favourite AI tool to explain what it does:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image.png" alt="" loading="lazy" width="788" height="630" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image.png 788w"></figure><p>In other words, all the stuff we describe in <a href="https://haveibeenpwned.com/API/v3?ref=troyhunt.com" rel="noreferrer">the API docs</a> &#128578; That's an overly simplistic statement, and there are many nuances MCP introduces beyond a computer reading docs intended for humans, but the point is that we've implemented MCP and it's there if you want it. Which means you can easily use the JSON below to, for example, <a href="https://docs.github.com/en/copilot/how-tos/provide-context/use-mcp-in-your-ide/extend-copilot-chat-with-mcp?ref=troyhunt.com" rel="noreferrer">extend GitHub Copilot</a>:</p>

"HIBP": {
  "url": "https://haveibeenpwned.com/mcp",
  "headers": {
    "hibp-api-key": "YOUR_STANDARD_HIBP_API_KEY"
  },
  "type": "http"
}

<p>Now let's do something useful with it.</p><h2 id="human-use-cases">Human Use Cases</h2><p>This is really the point of the whole thing - how can humans use it to do genuinely useful stuff? In particular, how can they use it to do stuff that was hard to do before, and how can "normies" (non-technical folks) use it to do stuff they previously needed developers for? I've been toying with these questions for a while now. Here's what I've come up with:</p><p>Firstly, I'm going to do all these demos on OpenClaw. I've been talking a lot about that on my weekly live streams over the past month, and the "agentic" nature of it (being able to act as an independent agent tying together multiple otherwise independent acts) is <em>enormously</em> powerful. Every company worth its AI salt is now focusing on building out agentic AI so whilst I'm using OpenClaw for these demos, you'll be able to do exactly the same thing in your platform of choice either now or in the very near future.</p><p>I'm using a Telegram bot as my interface into OpenClaw, let's kick it off:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-1.png" alt="" loading="lazy" width="488" height="515"></figure><p>Easy, right? &#128578; There's a different discussion around how secrets are stored and protected, but that's a story for another time (and is also obviously dependent on your agent). But the key is easily rotated on the HIBP dashboard anyway. If you don't have a key already, <a href="https://haveibeenpwned.com/Subscription?ref=troyhunt.com" rel="noreferrer">go and take out a subscription</a> (they start at a few bucks a month), and you'll be up and running in no time.</p><p>Now that I know I'm connected, let's learn about how I'm presently using the service:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-2.png" alt="" loading="lazy" width="635" height="366" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image-2.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-2.png 635w"></figure><p>Most of these are pretty obvious, but I've also included another here that I use to monitor how the service is behaving with a large organisation. It's a real domain with real data, so I'm going to obfuscate it to preserve privacy, but it's a great demonstration of how useful AI is. In fact, the inspiration of this blog post was when I received this notification last week:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-3.png" alt="" loading="lazy" width="623" height="852" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image-3.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-3.png 623w"></figure><p>One of the most asked questions after someone in a large org receives an email like this is "who are those 16 people in the breach"? Because we can't reliably filter large domains in the UI, I'd normally suggest they either download the CSV or JSON format in the dashboard, then search for "Hallmark" in there or use the API and write some code. But now, there's a much easier way:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-4.png" alt="" loading="lazy" width="485" height="474"></figure><p>Well that was easy &#128526; I like the additional context too, and now it has me curious: what have these people been up to?</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-5.png" alt="" loading="lazy" width="491" height="396"></figure><p>Because I'm on a Pro plan (or if you're still on the old Pwned 5 plan), I've also got access to stealer logs. Let's see what's going on there:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-6.png" alt="" loading="lazy" width="486" height="331"></figure><p>If you were running an online service, that first number would indicate compromised customers. But as OpenClaw has suggested here, the second number is the one that's interesting in terms of employees entering their data into other websites using the corporate email address. But they'd <em>never </em>reuse the same password as the work one, right? &#129300; Best check which services they're entering organisational assets into:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-15.png" alt="" loading="lazy" width="488" height="601"></figure><p>The first one makes sense and is extra worrying when you consider these are people infected with infostealers. That's not necessarily malware on a corporate asset; they could always be using an infected personal device to sign into a corporate asset... ok, that's also pretty bad! I was a bit surprised to see Steam in there TBH - who's using their corporate email address to sign into a gaming platform?! A quiet chat with them might be in order. And the bamboozled.net stuff is weird, I want to understand a bit more about that:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-10.png" alt="" loading="lazy" width="484" height="389"></figure><p>Now I'm losing interest in this blog post and am <em>really </em>curious as to what's actually in the data!</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-9.png" alt="" loading="lazy" width="491" height="433"></figure><p>Ok, so there's an entire rabbit hole over there! Let's park that, but think about how useful information like this is to infosec teams when you can pull it so easily. Or how useful info like this is to HR teams &#128556;</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-11.png" alt="" loading="lazy" width="490" height="744"></figure><p>Keep in mind, these are corporate addresses tied to the company and <a href="https://www.troyhunt.com/your-work-email-address-is-your-works-email-address/" rel="noreferrer">are the company's property</a>, so, yeah...</p><p>But remember the agentic nature of OpenClaw means we can ask it to go off and run tasks in the background, tasks like this:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-12.png" alt="" loading="lazy" width="489" height="145"></figure><p>This was just a little thought experiment I set up a few days ago and forgot about until yesterday, when I loaded a new breach:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-13.png" alt="" loading="lazy" width="441" height="434"></figure><p>I never asked it to look for "functional/system accounts"; it just decided that was relevant. And it is - this breach clearly had a lot of data in it related to purchases of services, which is an interesting aspect.</p><p>The idea of running stuff on a schedule opens up a whole raft of new opportunities. For example, monitoring your family's email addresses: "let me know when mum@example.com appears in a new breach". From here, your creativity is the only limit (and even that statement is debatable, given how much stuff AI agents come up with on their own). For example, creating visualisations of the data:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-14.png" alt="" loading="lazy" width="1937" height="881" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image-14.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w1000/2026/04/image-14.png 1000w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w1600/2026/04/image-14.png 1600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-14.png 1937w"></figure><p>I could go on and on (I started going down another rabbit hole of having it generate executive-level reports with all the data), but you get the idea.</p><h2 id="the-ai-pipeline">The AI Pipeline</h2><p>This is about what's in <em>our </em>pipeline, and the primary theme is putting tooling where it's more easily accessible to the masses. Creating a connector in Claude, an app in ChatGPT, and similar plumbing in the other big players' AI tools is an obvious next step. This will likely involve adding an OAuth layer to HIBP, allowing end users to configure the respective tools to query those HIBP APIs under their identity and achieve the same results as above, but built into the "traditional" AI tooling in a way people are familiar with.</p><h2 id="future">Future</h2><p>A big part of this is about AI enabling more human conversations to achieve technical outcomes. I spotted this from Cloudflare just yesterday, and it's a perfect example of just this:</p>

<div lang="en" dir="ltr"><p>Cloudflare dashboard can now complete tasks for you.</p><p>- "Create a Worker and bind a new R2 bucket to it"<br>- "Change my DNS records to 1.1.1.1"<br>- "How many errors have happened this week"</p><p>Not only do we tell you, but we show you with generative UI.</p><p>PROTIP: Use full-screen mode. <a href="https://t.co/Q1o1vyoOwk?ref=troyhunt.com">pic.twitter.com/Q1o1vyoOwk</a></p></div>&mdash; Brayden (@BraydenWilmoth) <a href="https://twitter.com/BraydenWilmoth/status/2044422996765352226?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">April 15, 2026</a> 

<p>I've been pretty blown away by both how easy this process has been and how much insight I've been able to draw from data I've been sitting on for ages. We'll be building out more tooling and easily reproducible demos in the future, and I'm sure a lot of that will do stuff we haven't even thought of yet. If you give this a go and find other awesome use cases, please leave a comment and tell me what you've done, especially if you've cut through the hyperbole and created some genuinely awesome stuff &#128526;</p>

            
                <a href="https://www.troyhunt.com/tag/have-i-been-pwned-3f/">Have I Been Pwned</a>
            
        
]]></content:encoded>
                                <description><![CDATA[I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/here-s-what-agentic-ai-can-do-with-have-i-been-pwned-s-apis-3775.html</guid>
                <pubDate>Fri, 17 Apr 2026 03:00:10 +0300</pubDate>
                <media:thumbnail url="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w1200/2026/04/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg"/>
            </item>
                    <item>
                <title>RCE by design: MCP architectural choice haunts AI agent ecosystem</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/rce-by-design-mcp-architectural-choice-haunts-ai-agent-ecosystem-3774.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Unsafe defaults in MCP configs open servers to possible remote code execution, as evidenced by several commercial services and open-source projects.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						
<div id="remove_no_follow">
<div>
					  <div>
						<div>




<p>AI agent building tools enable users to configure Model Context Protocol (MCP) servers may be exposing systems to remote code execution due to an architectural decision in Anthropic&rsquo;s reference implementation.</p>



<p>At issue are unsafe defaults in how MCP configuration works over the STDIO interface, with broad implications for the agent ecosystem, according to a new report.</p>



<p>&ldquo;The blast radius is massive,&rdquo; researchers from application security firm OX Security wrote in <a href="https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/">their report on the design issue</a>. &ldquo;This exploit allowed us to directly execute commands on six official services of real companies with real paying customers, and to take over thousands of public servers spanning over 200 popular open-source GitHub projects with hundreds of millions of downloads.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>According to Anthropic and other MCP adapter developers, the STDIO command execution behavior is by design and the responsibility of sanitizing MCP configurations falls with developers of client applications. While this might be true, in practice OX Security found that few developers have attempted to filter commands in MCP configs and even those who did failed to catch all potential bypasses.</p>

		

			


<h2 id="the-root-of-the-issue">The root of the issue</h2>



<p>MCP provides a standardized method for applications to expose data sources and tools to LLMs, improving their context and effectiveness in completing automated workflows. Originally developed by Anthropic, MCP has become a widely adopted technology in the agentic AI space.</p>



<p>Anthropic provides reference MCP implementations in the form of SDKs for a variety of programming languages, including TypeScript, Python, Java, Kotlin, C#, Go, PHP, Ruby, Rust, and Swift. Furthermore, other frameworks and functionality providers &mdash; such as FastMCP, LangChain&rsquo;s mcp-adapters, Microsoft&rsquo;s agent-framework, mcp-agent, browser-use, Amazon&rsquo;s run-model-context-protocol-servers-with-aws-lambda, and NVIDIA&rsquo;s NeMo-Agent-Toolkit &mdash; have Anthropic&rsquo;s modelcontextprotocol reference implementation as a dependency.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>MCP supports two transport interfaces between servers and clients: Streamable HTTP with Server-Sent Events (SSE), which is typically used for remote MCP servers and web services, and Standard Input/Output (STDIO), for MCP servers and applications that run locally on the same machine.</p>



<p>With STDIO, client applications can start MCP servers on demand as a subprocess and pass parameters to them. These parameters can include custom commands that get executed on the system with the permissions of the parent process. While in theory these commands are meant to tell the SDK&rsquo;s StdioServerParameters function how to start the MCP server, they can technically be anything if no filtering is in place.</p>



<p>The OX Security researchers consider this a design flaw that should be mitigated, but Anthropic disagrees, as do the creators of other frameworks that enable MCP functionality, such as LangChain and FastMCP. The argument is that the responsibility for making sure malicious user input doesn&rsquo;t reach the SDK&rsquo;s command execution function resides with the developers of the client applications that integrate these MCP frameworks.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The pattern of allowing user-supplied strings to flow directly into a shell execution environment is an anti-pattern that should be deprecated,&rdquo; the OX Security researchers said. Anthropic&rsquo;s SDKs should implement a command allowlist by default that blocks sh, bash, powershell, curl, rm, and other high-risk binaries, they added.</p>



<p>The core issue is that there&rsquo;s currently no check in place to verify that a STDIO command is intended to initialize an MCP server rather than perform a malicious task. Furthermore, the researchers observed that even if the sent command fails to start the server, the SDK returns an error after the command has already been executed.</p>



<p>All modern IDEs such as VS Code, Cursor, and Windsurf, as well as agentic coding CLIs like Claude Code, OpenAI Codex, and Gemini CLI, have built-in support for local MCP servers over STDIO. But so do countless other agentic AI frameworks and open-source tools and few of them implement STDIO command allow lists.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="rce-in-real-world-applications">RCE in real-world applications</h2>



<p>The OX Security researchers have spent the past few months testing MCP support in numerous tools, including live production services. <a href="https://www.ox.security/blog/mcp-supply-chain-advisory-rce-vulnerabilities-across-the-ai-ecosystem/">They found and reported more than 30 RCE issues</a> stemming from this STDIO design decision to multiple projects and 10 have received CVE IDs so far.</p>



<p>Depending on how a tool implements MCP support and how it accepts user input, there are multiple attack vectors that exploit the lack of STDIO command filtering.</p>



<p>For example, some services and tools have not disabled STDIO internally even though their user interfaces only allow configuring MCP servers with Streamable HTTP. This was the case for Letta AI and DocsGPT, two platforms that enable companies to create AI agents via both cloud services and local deployments.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;An attacker crafting a network request for an MCP server configuration, and changing the transport type in the configured JSON to contain an STDIO type instead of SSE or HTTP, also adding an arbitrary command to the request&rsquo;s payload, can achieve remote command execution,&rdquo; the researchers said.</p>



<p>Another attack vector is prompt injection leading to malicious MCP configurations. While all IDEs are technically vulnerable to this &mdash; websites may contain hidden instructions for LLM agents to modify local files &mdash; most IDEs prompt users before making modifications to MCP configuration files. The exception was Windsurf, which directly modified the MCP config by default, resulting in a zero-interaction command injection attack.</p>



<p>Many other tools don&rsquo;t apply filtering to MCP STDIO parameters, meaning any user with access to configure an MCP server gains code execution on the underlying server, including production servers in the case of SaaS deployments. Tools found vulnerable to this include LangFlow, GPT Researcher, LiteLLM, Agent Zero, LangBot, Fay Digital Human Framework, Bisheng, Jaaz, Langchain-Chatchat, and several others the researchers are not yet able to disclose.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Some developers were aware of the issue and did attempt to harden their implementations with command whitelisting. However, the hardening was insufficient, and the OX Security researchers found simple bypasses.</p>



<p>For example, Upsonic, an open-source framework for building AI agents, implements an allowlist that includes npx, which supports -c (&mdash;call), a flag that allows custom commands and shell scripts to be passed for npx to execute. The same bypass was observed in Flowise, another UI-based AI agent building framework that also restricts MCP configuration commands but allows npx.</p>



<p>Anthropic (modelcontextprotocol), LangChain (langchain-mcp-adapters), FastMCP, the browser-use project, AWS (run-model-context-protocol-servers-with-aws-lambda), NVIDIA (NeMo-Agent-Toolkit), OpenHands, PromptFoo, Firebase Studio, Gemini CLI, Claude Code, GitHub Copilot, and Cursor technically include the MCP STDIO code that allows for arbitrary command execution.</p>
</div>
							</div>
							</div>
							
							
</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[AI agent building tools enable users to configure Model Context Protocol (MCP) servers may be exposing systems to remote code execution due to an architectural decision in Anthropic’s reference implementation. At issue are unsafe defaults in how MCP configuration...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/rce-by-design-mcp-architectural-choice-haunts-ai-agent-ecosystem-3774.html</guid>
                <pubDate>Fri, 17 Apr 2026 02:00:18 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159889-0-73230200-1776377874-alexas_fotos-halloween-1746354.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Cisco Systems issues three advisories for critical vulnerabilities in Webex, ISE</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/cisco-systems-issues-three-advisories-for-critical-vulnerabilities-in-webex-ise-3773.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				The cloud-based Webex service has already been patched, but admins must replace an identity provider certificate in Webex Control Hub to complete the fix.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Admins who use Cisco Webex Services configured to use trust anchors within the SSO integration with Control Hub must install a new identity provider certificate to close a critical vulnerability, or risk losing access control.</p>



<p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL" target="_blank" rel="noreferrer noopener">Cisco said in an advisory this week</a> that admins must upload a new identity provider (IdP) SAML certificate to Webex Control Hub, the web-based management portal where IT administrators can control all Cisco Webex services, including certificate management, meetings, messaging and calling. Failure to close this hole will allow an unauthenticated, remote attacker to impersonate any user within the service.</p>



<p>The vulnerability, CVE-2026-20184, carries a CVSS score of 9.8.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Because Webex is a cloud service, Cisco can, and has, patched its side of the application. But admins using single-sign on (SSO) still need to install the new certificate. There are no workarounds.</p>

		

			


<p><a href="https://help.webex.com/en-us/article/nstvmyo/Manage-single-sign-on-integration-in-Control-Hub#task_394598AFBCD3D73A488E6DBB99AD3214" target="_blank" rel="noreferrer noopener">A Webex support article on managing SSO integration</a> says that information about certificates is found in the Webex Control Hub Alerts center, where customers can view which ones are installed, and their status. The Control Hub also contains an SSO wizard to aid in updating certificates. The article contains step-by-step details on the process.</p>



<p>Asked for comment, and for more details about the vulnerability, a Cisco spokesperson didn&rsquo;t go beyond the advisory.&nbsp;&ldquo;Cisco published a security advisory disclosing a vulnerability in the integration of single sign-on with Control Hub in Cisco Webex Services,&rdquo; the spokesperson said. &ldquo;At the time of publication (April 15) Cisco had addressed the vulnerability, and was not aware of any malicious use of this vulnerability. Affected customers must update their SAML certificate to ensure uninterrupted services.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Gartner analyst <a href="https://www.gartner.com/en/experts/peter-firstbrook" target="_blank" rel="noreferrer noopener">Peter Firstbrook</a> noted in an email that, since Cisco has applied the patch to the cloud service, this is more of a configuration change.&nbsp;But that doesn&rsquo;t minimize the possible damage. &ldquo;While we are not aware of exploits using this vulnerability, users can lose SSO access to Webex without this change,&rdquo; he said.&nbsp;</p>



<p>&ldquo;This does illustrate a bigger trend that identity and access management is the corporate perimeter,&rdquo; he added, &ldquo;and the majority of attacks include an identity and access management component.&nbsp;CISOs must increase their focus on IAM hygiene, particularly as agentic computing is accelerating.&rdquo;&nbsp;</p>



<p><a href="https://www.csoonline.com/identity-and-access-management/" target="_blank">Identity and access management</a> is, of course, the keystone of cybersecurity. As Crowdstrike observed in its<a href="https://go.crowdstrike.com/2026-global-threat-report.html" target="_blank" rel="noreferrer noopener"> 2026 Global Threat Report</a>, abuse of valid accounts accounted for 35% of cloud incidents it investigated last year, &ldquo;reinforcing that identity has become central to intrusion.&rdquo; Single sign-on allows a user to authenticate to multiple applications through one set of credentials. It&rsquo;s efficient, and, of more importance to a CSO, strengthens security.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="additional-critical-fixes">Additional critical fixes</h2>



<p>The Webex flaw is one of three critical vulnerabilities Cisco identified and issued patches for this week. In addition, multiple vulnerabilities have to be patched in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC). </p>



<p>These holes (<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ" target="_blank" rel="noreferrer noopener">CVE-2026-20147 and CVE-2026-20148</a>, which carry CVSS scores of 9.9), could allow an authenticated, remote attacker to perform remote code execution or conduct path traversal attacks on an affected device. To exploit these vulnerabilities, the attacker must have valid administrative credentials, and send a crafted HTTP request to an affected device. There are no workarounds.</p>



<p>Separately, two more vulnerabilities were found in ISE that could lead to remote code execution on the underlying operating system of an affected device. To exploit these vulnerabilities (<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv" target="_blank" rel="noreferrer noopener">CVE-2026-20180 and CVE-2026-20186</a>), the attacker would only need Read Only Admin credentials.</p>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Admins who use Cisco Webex Services configured to use trust anchors within the SSO integration with Control Hub must install a new identity provider certificate to close a critical vulnerability, or risk losing access control. Cisco said in an...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/cisco-systems-issues-three-advisories-for-critical-vulnerabilities-in-webex-ise-3773.html</guid>
                <pubDate>Fri, 17 Apr 2026 02:00:18 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159827-0-76612000-1776378601-shutterstock_180216653.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>NIST cuts down CVE analysis amid vulnerability overload</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/nist-cuts-down-cve-analysis-amid-vulnerability-overload-3772.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				The agency will only add enrichment details to CVEs in limited cases going forward, prioritizing known exploited flaws and vaguely defined &lsquo;critical software.&rsquo;			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Overwhelmed by an escalating volume of security flaws, the National Institute of Standards and Technology (NIST) has announced significant changes to how it handles cybersecurity vulnerabilities and exposures (CVEs).</p>



<p>Rather than commit to providing enrichment for all entries in its National Vulnerability Database (NVD), the agency will <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">focus on just the most critical CVEs</a>, which will &ldquo;allow us to stabilize the program while we develop the automated systems and workflow enhancements required for long-term sustainability.&rdquo;</p>



<p>Starting immediately, NIST will focus on CVEs appearing in <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA&rsquo;s Known Exploited Vulnerabilities (KEV) catalog</a>. &ldquo;Our goal is to enrich these within one business day of receipt,&rdquo; the agency said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Other high-priority CVEs will also include those for software used in the federal government and <a href="https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/critical-software-definition-explanatory">for other critical software</a>.</p>

		

			


<p>All the other CVEs will still be added to the NVD, but will be categorized as &ldquo;not scheduled,&rdquo; meaning that NIST will no longer prioritize their enrichment.</p>



<h2 id="broken-by-backlog">Broken by backlog</h2>



<p>According to NIST, a backlog of CVEs <a href="https://www.csoonline.com/article/2106228/backlogs-at-national-vulnerability-database-prompt-action-from-nist-and-cisa.html">started to accumulate in early 2024</a>, and the agency has been unable to clear it due to increasing submissions.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Submissions grew by 263% between 2020 and 2025, according to the agency, with nearly one-third more vulnerabilities reported in Q1 2026 than the same time last year.</p>



<p>The agency, which enriched nearly 42,000 CVEs in 2025, 45% more than any previous year, now faces a total backlog of more than 30,000 CVEs, said Harold Booth, a technical and program lead at NIST, at <a href="https://www.first.org/resources/papers/vulncon26/TLPCLEAR-NIST-s-National-Vulnerability-Database-Update-and-the-Vulnerability-Enrichment-Ecosystem/index">this week&rsquo;s VulnCon cybersecurity conference</a>.</p>


<div><figure><img decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2026/04/Total-CVEs-Published.png?w=1024" alt="Total CVE records published" width="1024" height="641" sizes=" 1024px) 100vw, 1024px" loading="lazy"><p>SOURCE: https://www.cve.org/about/Metrics</p>
</figure><p>CSO</p></div>



<p>As a result, NIST will now forego enrichment for all but the most critical of vulnerabilities.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Backlogged CVEs received prior to March 1 will also be labeled &ldquo;not scheduled.&rdquo; None of those are critical vulnerabilities, NIST said, because those have always been handled first.</p>



<p>&ldquo;They&rsquo;ve just come out and publicly stated, &lsquo;We are never going to get through this backlog,&rsquo;&ldquo; Dustin Childs, head of threat awareness at Trend Micro&rsquo;s Zero Day Initiative, told CSO.</p>



<p>In addition, NIST will no longer calculate severity scores for CVEs submitted with scores provided by the reporting organization.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Security leaders reliant on NIST enrichment will need to take stock of their technology inventories to see whether they fall under NIST&rsquo;s priority list, Childs said. That&rsquo;s not easy.</p>



<p>&ldquo;Discovery is one of the most difficult problems we&rsquo;re dealing with,&rdquo; he noted, adding that it&rsquo;s also not clear what software actually falls into the priority category. &ldquo;Software used by the federal government is a very vague statement.&rdquo;</p>



<h2 id="mounting-cve-counts-with-ai-flaw-discovery-on-the-rise">Mounting CVE counts &mdash; with AI flaw discovery on the rise</h2>



<p>Childs is not surprised that CVEs numbers have been going up, citing AI as part of the reason why.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;We&rsquo;re already seeing more garbage CVEs &mdash; and more real CVEs &mdash; related to AIs,&rdquo; he says.</p>



<p>Dealing with these CVEs is going to be a massive problem for companies. &ldquo;People still don&rsquo;t patch,&rdquo; he says. &ldquo;And we&rsquo;re going to quadruple the number of patches they&rsquo;re going to have to deploy. How do we build our defenses across the entire enterprise? I don&rsquo;t know if we&rsquo;ll get there before the bad guys do.&rdquo;</p>



<p>According to the Forum of Incident Response and Security Teams (FIRST), 59,427 CVEs are expected to be submitted this year, up from a little over 48,000 in 2025. That makes 2026 the first year that CVEs will pass the 50,000 milestone.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The sheer velocity of vulnerability discovery and exploitation is unlike anything we&rsquo;ve seen before,&rdquo; FIRST CEO Chris Gibson told CSO.</p>



<p>FIRST has also modeled &ldquo;realistic scenarios&rdquo; in which the <a href="https://www.first.org/blog/20260211-vulnerability-forecast-2026">total number of CVEs cracks 100,000 for 2026</a> &mdash; but <a href="https://www.csoonline.com/article/4130453/cisos-must-separate-signal-from-noise-as-cve-volume-soars.html">that was in February</a>, before Anthropic announced Mythos, its vulnerability-finding AI model many foresee as a <a href="https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html">structural shift for the cybersecurity industry</a>.</p>



<p>&ldquo;And if it&rsquo;s not Mythos, or whatever else is coming out now, something is going to come out next week,&rdquo; said Empirical Security founder Jay Jacobs, who also leads the Exploit Prediction Scoring System special interest group at FIRST.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Still, Jacobs is optimistic that turning to technology will help NIST deal with rising CVE volumes.</p>



<p>&ldquo;Harold Booth has a lot of experience and skill working with AI over the last few years,&rdquo; Jacobs told CSO. &ldquo;So I&rsquo;m expecting him to bring some expertise and I hope we do see some AI news there.&rdquo;</p>



<p>Both large language models and AI agents are on the agency&rsquo;s to-do list, as is old-fashioned robotic process automation (RPA), Booth said in his presentation at VulnCon, which Jacobs chairs. NIST also plans to delegate some of the work to CVE Numbering Authorities (CNAs), which includes security vendors and researchers.</p>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Overwhelmed by an escalating volume of security flaws, the National Institute of Standards and Technology (NIST) has announced significant changes to how it handles cybersecurity vulnerabilities and exposures (CVEs). Rather than commit to providing enrichment for all entries in...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/nist-cuts-down-cve-analysis-amid-vulnerability-overload-3772.html</guid>
                <pubDate>Fri, 17 Apr 2026 01:00:33 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159882-0-23374500-1776376704-shutterstock_2443662393.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>North Korea Uses ClickFix to Target macOS Users&apos; Data</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/north-korea-uses-clickfix-to-target-macos-users-data-3771.html</link>
                                <content:encoded><![CDATA[Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.]]></content:encoded>
                                <description><![CDATA[Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/north-korea-uses-clickfix-to-target-macos-users-data-3771.html</guid>
                <pubDate>Fri, 17 Apr 2026 00:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5cc61f368315b744/69e10ffdc8863fd06c049539/Mac_Mouse_Click_Edwin_Remsberg_Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>&apos;Harmless&apos; Global Adware Transforms Into an AV Killer</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/harmless-global-adware-transforms-into-an-av-killer-3770.html</link>
                                <content:encoded><![CDATA[A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.]]></content:encoded>
                                <description><![CDATA[A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/harmless-global-adware-transforms-into-an-av-killer-3770.html</guid>
                <pubDate>Thu, 16 Apr 2026 23:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltcc23cf58a0283b13/69e0fbb3eb41a9b573b1d155/Adware-Artem_Medvediev-Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic-3769.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Botnet / Cryptomining</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1/s1700-e365/powmix.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1/s1700-e365/powmix.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet&nbsp;dubbed <strong>PowMix</strong> since at least December&nbsp;2025.</p>
<p>"PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos researcher Chetan Raghuprasad <a href="https://blog.talosintelligence.com/powmix-botnet-targets-czech-workforce/">said</a> in a report published&nbsp;today.</p>
<p>"PowMix embeds the encrypted heartbeat data along with unique identifiers of the victim machine into the C2 URL paths, mimicking legitimate REST API URLs.&nbsp;PowMix has the capability&nbsp;to remotely update the new C2 domain to the botnet configuration file dynamically."</p>
<p>The attack chain begins with a malicious ZIP file, likely delivered via a phishing email, to activate a multi-stage infection chain that drops PowMix. Specifically, it involves a Windows Shortcut (LNK) that's used to launch a PowerShell loader, which then extracts the malware embedded within the archive, decrypts it, and runs it in&nbsp;memory.</p>
<div><p><a href="https://thehackernews.uk/ai-agentic-guide-d-3" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00/s728-e100/nudge-d-3.jpg" width="729" height="91"></a></p></div>
<p>The never-before-seen botnet is designed to facilitate remote access, reconnaissance, and remote code execution, while establishing persistence by means of a scheduled task. At&nbsp;the same time, it verifies the process tree to ensure that another instance of the same malware is not running on the compromised&nbsp;host.</p>
<p>PowMix's remote management logic allows it to process two different kinds of commands sent from the C2 server. Any&nbsp;non #-prefixed response causes PowMix to shift to arbitrary execution mode, and decrypt and run the obtained&nbsp;payload.&nbsp;</p>
<ul>
<li>#KILL, to initiate a self-deletion routine and wipe traces of all malicious artifacts</li>
<li>#HOST, to enable C2 migration to a new server URL.</li>
</ul>

<p>In parallel, it also opens a decoy document with compliance-themed lures as a distraction mechanism. The&nbsp;lure documents reference legitimate brands like Edeka and include compensation data and valid legislative references, potentially in an effort to enhance their credibility and trick recipients, like job aspirants.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX/s1700-e365/attack.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX/s1700-e365/attack.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="555" data-original-width="1000"></a></p>
<p>Talos said the campaign shares some level of tactical overlap with a campaign&nbsp;dubbed <a href="https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html">ZipLine</a> that was disclosed by Check Point in late August 2025 as targeting supply chain-critical manufacturing companies with an in-memory malware called&nbsp;MixShell.</p>
<p>This includes the use of the same ZIP-based payload delivery, scheduled task persistence, and the abuse of Heroku for C2. That&nbsp;said, no final payloads have been observed beyond the botnet malware itself, leaving questions about its exact motives unanswered.</p>
<p>"PowMix avoids persistent connections to the C2 server," Talos said. "Instead, it implements a jitter via the Get-Random PowerShell command to vary the beaconing intervals initially between 0 and 261 seconds, and subsequently between 1,075 and 1,450 seconds. This&nbsp;technique attempts to prevent detection of C2 traffic through predictable network signatures."</p>
<p>The disclosure comes as Bitsight sheds light on the infection chain associated with&nbsp;the <a href="https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html">RondoDox</a> botnet, highlighting the malware's evolving capabilities to illicitly mine cryptocurrency on infected systems using XMRig on top of the existing distributed denial-of-service (DDoS) attack functionality.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>The findings paint the picture of an actively maintained malware that offers improved evasion, better resilience, aggressive competition removal, and an expanded feature&nbsp;set.</p>
<p>RondoDox is capable of exploiting over 170 known vulnerabilities in various internet-facing applications to obtain initial access and drop a shell script that performs basic anti-analysis and removes competing malware before dropping the appropriate botnet binary for the architecture.</p>
<p>The malware "does multiple checks and implements techniques to hinder analysis, which include the usage of nanomites, renaming/removing files, killing processes, and actively checking for debuggers during execution," Bitsight Principal Research Scientist Jo&atilde;o&nbsp;Godinho <a href="https://www.bitsight.com/blog/rondodox-botnet-malware-analysis">said</a>.</p>
<p>"The&nbsp;bot is able&nbsp;to run DoS&nbsp;attacks at the internet,&nbsp;transport and application layer, depending on the command and arguments issued by the&nbsp;C2."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic-3769.html</guid>
                <pubDate>Thu, 16 Apr 2026 22:00:09 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1/s1700-e365/powmix.jpg"/>
            </item>
                    <item>
                <title>APK Malformation Found in Thousands of Android Malware Samples</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/apk-malformation-found-in-thousands-of-android-malware-samples-3768.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-46a9adc8-6455-43bb-8cc8-2437d288c0ea" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Android Package (APK) malformation has emerged as a standard Android malware evasion tactic, with the technique identified in more than 3000 malicious samples across families including Teabot, TrickMo,<a href="https://www.infosecurity-magazine.com/news/godfather-upgraded-hijack-mobile/" target="_blank"> Godfather</a> and SpyNote.</p>

<p>According to new<a href="https://www.cleafy.com/cleafy-labs/malformed-apks-as-an-anti-analysis-technique-malfixer-tool" target="_blank"> research</a> from Cleafy's Threat Intelligence and Incident Response team, the APK malformation involves the deliberate creation of broken or non-standard APK&nbsp;structures that still install and run on devices but cause static analysis tools to crash or misinterpret the file.</p>

<p>The researchers said attackers are exploiting the leniency of an Android installer that tolerates inconsistencies strict parsers cannot, allowing malicious apps to function normally while frustrating reverse engineering efforts.</p>

<h2><strong>How APK Malformation Bypasses Static Analysis</strong></h2>

<p>An APK is essentially a ZIP archive containing the code, resources and manifest required to run an Android app.</p>

<p>Each file inside the archive sits behind a Local File Header, and a Central Directory near the end of the package acts as a table of contents. Attackers introduce conflicts between those two structures. Tools such as JADX crash on the inconsistency, while the Android installer quietly proceeds with the app.</p>

<p>In their analysis, the researchers cataloged several techniques currently in active use:</p>

<ul>
	<li>
	<p>Directory-file name collisions that confuse parsers about which entry to load</p>
	</li>
	<li>
	<p>Unsupported compression methods that Android safely treats as uncompressed, but cause analysis tools to fail</p>
	</li>
	<li>
	<p>False password protection flags placed inconsistently across headers</p>
	</li>
	<li>
	<p>Mismatched checksums, file sizes and offset references between header structures</p>
	</li>
	<li>
	<p>AndroidManifest.xml corruption through magic header changes, string pool manipulation and malicious offset injection</p>
	</li>
</ul>

<p><em><a href="https://www.infosecurity-magazine.com/news/android-malware-uses-net-maui/" target="_blank">Read more on Android malware evasion: New Android Malware Uses .NET MAUI to Evade Detection</a></em></p>

<p>Another method abuses the assets/directory by storing payloads under filenames containing non-ASCII or control characters, triggering path traversal errors during decompilation. Researchers said the technique forces analysts to manually extract and inspect archive contents.</p>

<h2><strong>Defenders Push Back With Open-Source Tooling</strong></h2>

<p>In response, the Cleafy team has released Malfixer, a Python utility that detects and repairs malformed APKs and rebuilds them into a form conventional reverse engineering tools can parse.</p>

<p>The project,<a href="https://github.com/Cleafy/Malfixer" target="_blank"> published on GitHub</a>, was developed after the analysis of more than 70 malformed samples drawn primarily from the TrickMo, Teabot, Godfather and SpyNote families.</p>

<p>The release reflects a wider arms race between Android malware developers and analysts. Cleafy noted that earlier incidents had failed to classify samples later linked to TrickMo precisely because malformation techniques prevented standard static analysis from processing the file.</p>

<p>"As defenders, we must evolve our tools and techniques to counter these evasive tactics," the researchers wrote, urging the community to contribute new samples and malformation methods as they emerge in the wild.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[APK malformation tactic now appears in over 3000 Android malware samples evading static analysis]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/apk-malformation-found-in-thousands-of-android-malware-samples-3768.html</guid>
                <pubDate>Thu, 16 Apr 2026 20:00:13 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/75249b38-75a3-4ad4-9c03-dc8b80cb13c0.jpg"/>
            </item>
                    <item>
                <title>US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/us-nationals-jailed-for-operating-fake-remote-worker-laptop-farms-for-north-korea-3767.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-2b0eacd4-88de-4f11-86a7-79047d6333e2" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Two US nationals have been imprisoned for their role in helping to facilitate laptop farms for North Korean remote IT worker scams on behalf of Pyongyang.</p>

<p>On April 15, the US Justice Department, announced that Kejia Wang, 42, and Zhenxing Wang, 39, had been sentenced for their part in a scheme which, over several years, deceived more than one hundred American companies into <a href="https://www.infosecurity-magazine.com/interviews/nk-it-worker-scam-sophos-ciso/">employing North Korean workers posing as US residents</a>.</p>

<p>The scheme used the stolen identities of at least 80 American citizens to generate more than $5m in illicit revenue for the government of the Democratic People&rsquo;s Republic of Korea (DPRK). The activity also allowed the perpetrators to access and steal sensitive data and source code from firms including from military contractors and AI companies.</p>

<p>Kejia Wang, of Edison, New Jersey, was sentenced to 108 months in prison, while Zhenxing Wang, of New Brunswick, New Jersey, was sentenced to 92 months in prison. Both had pleaded guilty to charges of conspiracy to commit wire fraud and conspiracy to commit money laundering. Zhenxing Wang&nbsp;also pleaded guilty to conspiracy to commit identity theft.</p>

<h2><strong>Fortune 500 Companies Fell Victim</strong></h2>

<p>According to the released court documents, the stolen identities were used to apply for and obtain remote IT worker roles at more than 100 organizations, including several Fortune 500 companies.</p>

<p>Keija Wang is said to have acted as manager of the scheme within the US, supervising at least five individuals involved in working in fake roles.</p>

<p>Both Kejia Wang and Zhenxing Wang used their home addresses to receive laptops which were intended for use by who the companies believed were the legitimate remote workers they had hired</p>

<p>In addition, both individuals provided overseas IT workers in North Korea remote access to the laptops.</p>

<p><a href="https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/how-to-protect-business-from-north-korean-it-workers.html"><em>Read more: </em><em>How to Protect Your Business From North Korean IT Worker Scams</em></a></p>







<p>To hide the scheme, shell companies with corresponding financial accounts were created. This helped to make it appear as though the overseas IT workers were affiliated with legitimate US businesses.</p>

<p>This allowed Kejia Wang and Zhenxing Wang to receive hundreds of millions of dollars from legitimate US businesses who believed they were transferring the salaries of remote workers. Much of this money was laundered and sent to North Korea.</p>

<p>&ldquo;Today&rsquo;s announcement sends a clear message: US nationals who facilitate DPRK IT worker schemes and funnel revenue to North Korea will face FBI investigation and potential prison time,&rdquo; said Assistant Director Brett Leatherman of the FBI&rsquo;s Cyber Division.</p>

<p>&ldquo;Working closely with our partners, the FBI will pursue their co-conspirators and hold accountable those who seek to empower the DPRK by defrauding American companies and stealing the identities of private citizens.&rdquo;</p>

<p>Eight other individuals who have been indicated for their part in the scheme remain at large and wanted by the FBI.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/us-nationals-jailed-for-operating-fake-remote-worker-laptop-farms-for-north-korea-3767.html</guid>
                <pubDate>Thu, 16 Apr 2026 20:00:13 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/d0efbe60-5ffb-4798-afe7-e7b8d0c0fd29.jpg"/>
            </item>
                    <item>
                <title>Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/cookeville-medical-center-notifies-patients-after-july-2025-ransomware-attack-3766.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-b3f148b5-1188-4d14-9aad-6d28c6701c3b" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>More than 337,000 patients of Cookeville Regional Medical Center (CRMC) in Tennessee have been notified that their personal and medical data was compromised in a July 2025 ransomware attack, the hospital confirmed this week.</p>

<p>The 309-bed facility began mailing breach notification letters on April 14, 2026, roughly nine months after the intrusion was detected.</p>

<p>Files were accessed or acquired by an unathorized party between July 11 and July 14, 2025, according to a<a href="https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/fb04ea66-92bb-4a15-b02c-8d1a9f783461.html" target="_blank"> filing</a> with the Maine Attorney General's Office. A total of&nbsp;337,917 individuals have been affected.&nbsp;</p>

<h2><strong>Inside the Rhysida Attack on CRMC</strong></h2>

<p>Rhysida, a ransomware-as-a-service operation linked to Russia and<a href="https://www.infosecurity-magazine.com/news/rhysida-vice-society-connection/" target="_blank"> active since May 2023</a>, claimed responsibility on August 2, 2025. The gang demanded a ransom of 10 Bitcoin, worth roughly $1.15m at the time, and posted sample files on its dark web leak site. It is unclear whether any ransom was paid.</p>

<p>Information accessed may include names, addresses, dates of birth, Social Security numbers, driver's license numbers, financial account details, medical record numbers, treatment information and health insurance data.</p>

<p>CRMC, which serves around 250,000 patients annually across 14 counties in the Upper Cumberland region, is offering 12 months of free identity theft protection through Experian.</p>

<p><em><a href="https://www.infosecurity-magazine.com/news/rhysida-vice-society-connection/" target="_blank">Read more on Rhysida's healthcare targeting: Rhysida Ransomware Analysis Reveals Vice Society Connection</a></em></p>

<h2><strong>A Year of Pressure on US Healthcare</strong></h2>

<p>The CRMC incident ranks as the eighth-largest US healthcare ransomware breach of 2025 by records compromised, according to<a href="https://www.comparitech.com/news/cookeville-regional-medical-center-warns-338000-people-of-data-breach/" target="_blank"> Comparitech</a>, which logged 134 confirmed attacks on US healthcare providers last year, exposing 11.7 million records.</p>

<p>Rhysida alone claimed 91 attacks across all sectors in 2025, with 23 confirmed and an average demand of $1.2m.</p>

<p>Other recent Rhysida healthcare victims include:</p>

<ul>
	<li>Florida Lung, Asthma &amp; Sleep Specialists (FL), May 2025, $639,000 demand</li>
	<li>MedStar Health (MD), September 2025, $3.09m demand</li>
	<li>Spindletop Center (TX), September 2025, $1.65m demand</li>
	<li>MACT Health Board (CA), November 2025, $662,000 demand</li>
	<li>Heart South Cardiovascular Group (AL), November 2025, $630,000 demand</li>
</ul>

<p>Rebecca Moody, head of data research at Comparitech, said the lengthy investigation timeline reflects the scale of forensic work required after a hospital ransomware hit.</p>

<p>"It can take a considerable amount of time for organizations to investigate what data has been impacted in these breaches," Moody explained.</p>

<p>"While some organizations avoid using the word 'ransomware' and don't issue any form of data breach notification for months," she added, "this lack of clarity and confirmation can leave those affected open to identity theft and phishing campaigns."</p>

<p>Ransomware incidents at US hospitals routinely<a href="https://www.infosecurity-magazine.com/news/university-mississippi-medical/" target="_blank"> force extended downtime</a>,<a href="https://www.infosecurity-magazine.com/news/london-ransomware1500-cancelled/" target="_blank"> canceled appointments</a> and<a href="https://www.infosecurity-magazine.com/news/ransomware-forces-umc-divert/" target="_blank"> patient diversions</a> even where clinical systems hold up. CRMC said it has put additional security measures in place since the attack.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/cookeville-medical-center-notifies-patients-after-july-2025-ransomware-attack-3766.html</guid>
                <pubDate>Thu, 16 Apr 2026 19:00:18 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/46006bb6-86c0-4c55-bdb2-a6eac22f3646.jpg"/>
            </item>
                    <item>
                <title>Two-Factor Authentication Breaks Free from the Desktop</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/two-factor-authentication-breaks-free-from-the-desktop-3764.html</link>
                                <content:encoded><![CDATA[Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.]]></content:encoded>
                                <description><![CDATA[Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/two-factor-authentication-breaks-free-from-the-desktop-3764.html</guid>
                <pubDate>Thu, 16 Apr 2026 19:00:07 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltda93213c910e1221/69dfbf29f06161c424ab3b28/R5PNG0.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Microsoft&apos;s Original Windows Secure Boot Certificate Is Expiring</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/microsoft-s-original-windows-secure-boot-certificate-is-expiring-3765.html</link>
                                <content:encoded><![CDATA[The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.]]></content:encoded>
                                <description><![CDATA[The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/microsoft-s-original-windows-secure-boot-certificate-is-expiring-3765.html</guid>
                <pubDate>Thu, 16 Apr 2026 19:00:07 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltcf80cca68990f44f/67db1175b6f1566998db1a71/laptop_windows_desktop_Wachiwit_Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories-3763.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Hacking News / Cybersecurity News</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1700-e365/bull-main.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1700-e365/bull-main.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>

<p>You&nbsp;know that feeling when you open your feed on a Thursday morning and it's just... a&nbsp;lot? Yeah. This&nbsp;week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow still ruining people's days, and enough supply chain drama to fill a season of television nobody asked&nbsp;for.</p>
<p>Not&nbsp;all bad though. Some&nbsp;threat actors got exposed with receipts, a few platforms finally tightened things up, and there's research in here that's genuinely worth your time. Grab&nbsp;your coffee and keep scrolling.</p>


<div>

<ol role="list">

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Targeted wallet breach</span></p>
    <p>
      Cryptocurrency wallet service Zerion has <a href="https://x.com/zerion/status/2044167535231414727">disclosed</a> that one of its team member's devices was compromised, resulting in the theft of approximately $100K in stolen funds from internal company hot wallets. The company noted that user funds, Zerion apps, or infrastructure were not impacted by the breach. The team member is said to have been the target of an artificial intelligence (AI)-enabled social engineering attack carried by a North Korean threat actor tracked as <a href="https://thehackernews.com/2026/04/n-korean-hackers-spread-1700-malicious.html">UNC1069</a>. The hacking group was recently attributed to the poisoning of the popular Axios npm package. "This allowed the attacker to gain access to some of the team members' logged-in sessions and credentials as well as private keys to company hot wallets used for testing and internal purposes," Zerion said. "This was not an opportunistic attack. The actor is clearly sophisticated and well-resourced. They planned the attack thoroughly."
    </p>
  </div>
</li>
  
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Anonymous age checks</span></p>
    <p>
      The European Union has announced that it will soon roll out a new online age verification app to allow users to prove their age when accessing online platforms. Users can set it up by downloading the app on their Android or iOS device using a passport or ID card. The Commission has emphasized that the app will respect users' privacy. "Users will prove their age without revealing any other personal information," President of the European Commission, Ursula von der Leyen, <a href="https://ec.europa.eu/commission/presscorner/detail/en/statement_26_817">said</a>. "Put simply, it is completely anonymous: users cannot be tracked. Third, the app works on any device &ndash; phone, tablet, computer, you name it. And, finally, it is fully open source &ndash; everyone can check the code." The development comes as countries around the world are undertaking various stages of regulatory action to keep cyberspace a safer place for children and minors and protect them from serious harm.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>New Defender zero-day</span></p>
    <p>
      A researcher using the alias "Chaotic Eclipse" released a zero-day exploit called <a href="https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html">BlueHammer</a> earlier this month following Microsoft's handling of the vulnerability disclosure process. Although the issue appears to have been fixed as of this month's Patch Tuesday release (CVE-2026-33825), the researcher has since <a href="https://x.com/ChaoticEclipse0/status/2044550275692642782">disclosed</a> a new unpatched <a href="https://deadeclipse666.blogspot.com/2026/04/public-disclosure-response-for-cve-2026.html">Microsoft Defender privilege escalation vulnerability</a>. The exploit has been codenamed <a href="https://github.com/Nightmare-Eclipse/RedSun">RedSun</a>. "This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled," security researcher Will Dormann <a href="https://infosec.exchange/@wdormann/116412019416916182">said</a>.
    </p>
  </div>
</li>
<a name="more"></a>
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Legacy Excel RCE active</span></p>
    <p>
      The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has <a href="https://www.cisa.gov/news-events/alerts/2026/04/14/cisa-adds-two-known-exploited-vulnerabilities-catalog">added</a> an old remote code execution vulnerability impacting Microsoft Office to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the shortcoming by April 28, 2026. The vulnerability in question is CVE-2009-0238, which has a CVSS score of 8.8. "Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object," CISA <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">said</a>.
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>sudo now requires password</span></p>
    <p>
      Raspberry Pi has released version 6.2 of its Raspberry Pi OS, which introduces one significant change: it disables passwordless sudo by default. As a result, users who run a sudo command for administrator-level access will be prompted to enter the current user's password. The change affects only new installations; existing setups are untouched. "Given the ever-increasing threat of cybercrime, we continually review the security of Raspberry Pi OS to ensure it is sufficiently robust to withstand potential attacks," Raspberry Pi <a href="https://www.raspberrypi.com/news/a-security-update-for-raspberry-pi-os/">said</a>. "This is always a tricky balance, as anything that makes the operating system more secure will invariably inconvenience legitimate users to some extent, so we try to keep such changes to a minimum. This particular security update is one that many users may not even notice, but it will affect some."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Stealth C2 frameworks uncovered</span></p>
    <p>
      A previously undocumented command-and-control (C2) framework dubbed ObsidianStrike has been deployed on infrastructure belonging to a Brazilian law firm. "Only two instances of ObsidianStrike exist on the entire internet," Breakglass Intelligence <a href="https://intel.breakglass.tech/post/obsidianstrike-c2-compromised-brazilian-law-firm-9-months">said</a>. "The framework has zero presence on GitHub, zero samples on VirusTotal or MalwareBazaar, and near-zero vendor detection. This is a fully private, Portuguese-language C2 built for targeted Windows operations, hidden behind a victim organization's domain." Also discovered by the security vendor is <a href="https://intel.breakglass.tech/post/archangelc2-innocreed-screenconnect-fraud">ArchangelC2</a>, a C2 panel behind an industrial-scale ScreenConnect remote-access fraud campaign that has been operational since November 2024.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Fake app drains $9.5M</span></p>
    <p>
      A fake Ledger app <a href="https://www.coindesk.com/business/2026/04/14/a-fake-ledger-app-on-the-apple-app-store-just-drained-usd9-5-million-in-crypto">managed</a> to slip onto the Apple App Store, <a href="https://t.me/investigations/313">draining $9.5 million in cryptocurrency</a> from more than 50 victims between April 7 and April 13, 2026. The app, named <a href="https://archive.ph/4RVLf">Ledger Live</a>, was released by a developer, "SAS Software Company," and published under "Leva Heal Limited." Users who downloaded the fraudulent app were tricked into entering their seed phrases, giving attackers full access to their wallets and allowing them to send digital assets to external addresses under their control. While Apple has since removed the macOS app from the store, questions remain as to how it managed to pass the company's review process. In more Apple-related news, the company has also <a href="https://techcrunch.com/2026/04/14/how-the-rewards-app-freecash-scammed-its-way-to-the-top-of-the-app-stores/">removed</a> a data harvesting app called Freecash from its App Store after it was <a href="https://www.wired.com/story/no-the-freecash-app-wont-pay-you-to-scroll-tiktok/">deceptively</a><a href="https://www.malwarebytes.com/blog/news/2026/01/get-paid-to-scroll-tiktok-the-data-trade-behind-freecash-ads">advertised</a> as a way to "make money just by scrolling TikTok," while collecting sensitive information from users. This included details about a user's race, religion, sex life, sexual orientation, health, and other biometrics. Once installed, however, instead of the promised functionality, users were routed to a roster of mobile games where they are offered cash rewards for completing time-limited in-game challenges. The app continues to be available on the Google Play Store.
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Localized ransomware campaign</span></p>
    <p>
      Cybercriminals are using a new ransomware strain called JanaWare to target people in Turkey, according to Acronis. The attack leverages phishing emails containing a Google Drive link that paves the way for the download and subsequent execution of a malicious JAR file via javaw.exe. The payload is a customized <a href="https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html">Adwind</a> (aka AlienSpy, jRAT, or Sockrat) variant with polymorphic characteristics that's used to deliver the ransomware module. The malware implements geofencing and environment filtering to ensure that the compromised systems match the Turkish language and region. While none of these tricks are particularly novel or advanced, they continue to work against unprotected small targets. It's unclear how many people or businesses might have fallen prey to the scheme. The low-stakes, localized approach has allowed the campaign to persist since at least 2020 without any major disruption. "Victimology appears to primarily include home users and small to medium-sized businesses. Initial access is assessed to occur via phishing emails delivering malicious Java archives," the company <a href="https://www.acronis.com/en/tru/posts/new-janaware-ransomware-targets-turkey-via-adwind-rat/">said</a>. "Ransom demands observed in analyzed samples range from $200&ndash;$400, consistent with a low-value, high-volume monetization approach."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Crackdown on navigation abuse</span></p>
    <p>
      Google said it's introducing a new spam policy for "back button hijacking," which occurs when a site interferes with a user's browser navigation and prevents them from using their back button to immediately get back to the page they came from. Instead, the hijack could redirect users to sketchy sites or other pages they have never visited before. "Back button hijacking interferes with the browser's functionality, breaks the expected user journey, and results in user frustration," Google <a href="https://developers.google.com/search/blog/2026/04/back-button-hijacking">said</a>. "Pages that are engaging in back button hijacking may be subject to manual spam actions or automated demotions, which can impact the site's performance in Google Search results. To give site owners time to make any needed changes, we're publishing this policy two months in advance of enforcement on June 15, 2026."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Stealth cloud credential theft</span></p>
    <p>
      The China-linked hacking group known as <a href="https://thehackernews.com/2025/09/china-linked-apt41-hackers-target-us.html">APT41</a> has been attributed to an undetectable, purpose-built ELF backdoor targeting Linux cloud workloads across Amazon Web Services (AWS), Google Cloud, Microsoft Azure, and Alibaba Cloud environments. "The implant uses SMTP port 25 as a covert command-and-control channel, harvests cloud provider credentials and metadata, and phones home to three Alibaba-themed typosquat domains hosted on Alibaba Cloud infrastructure in Singapore," Breakglass Intelligence <a href="https://intel.breakglass.tech/post/apt41-winnti-elf-cloud-credential-harvester-alibaba-typosquat">said</a>. "A selective C2 handshake validation mechanism renders the server invisible to conventional scanning tools like Shodan and Censys."
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>RDP phishing hardening</span></p>
    <p>
      Starting with the April 2026 security update (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151">CVE-2026-26151</a>), Microsoft has introduced new Windows protections to defend against phishing attacks that abuse Remote Desktop connection (RDP) files, adding security warnings and turning off redirections by default. "Malicious actors misuse this capability by sending RDP files through phishing emails," Microsoft <a href="https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/remotepc/understanding-security-warnings">said</a>. "When a victim opens the file, their device silently connects to a server controlled by the attacker and shares local resources, giving the attacker access to files, credentials, and more." Russian hacking groups like APT29 have <a href="https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html">weaponized</a> RDP configuration files to target Ukrainian government agencies, enterprises, and military entities in the past.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Plugin supply chain breach</span></p>
    <p>
      Unknown threat actors have staged a supply chain attack on a WordPress plug-in maker called Essential Plugin (formerly WP Online Support) after acquiring it in early 2025 from the original developers in a six-figure deal to plant a backdoor in August and subsequently weaponize it early this month to distribute malicious payloads to any website with the plug-ins installed. WordPress has since permanently closed all the plugins. "The plugin's wpos-analytics module had phoned home to analytics.essentialplugin.com, downloaded a backdoor file called wp-comments-posts.php (designed to look like the core file wp-comments-post.php), and used it to inject a massive block of PHP into wp-config.php," Anchor Hosting <a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">said</a>. "The injected code was sophisticated. It fetched spam links, redirects, and fake pages from a command-and-control server. It only showed the spam to Googlebot, making it invisible to site owners." In addition, it resolved the command-and-control (C2) domain through an Ethereum smart contract to make it resilient to takedown efforts. Prior to their removal, the plugins collectively had more than 180,000 installs. "This is a classical case of supply chain compromise that happened because the original vendor sold their plugins to a third-party, which turned out to be a malicious threat actor," Patchstack <a href="https://patchstack.com/articles/critical-supply-chain-compromise-on-20-plugins-by-essentialplugin/">said</a>.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Sanctioned crypto market persists</span></p>
    <p>
      Telegram has continued to host Xinbi Guarantee, an illicit marketplace that has <a href="https://thehackernews.com/2026/02/weekly-recap-ai-skill-malware-31tbps.html#:~:text=Xinbi%20Marketplace%20Accounts%20for%20%2417%2E9B%20in%20Total%20Volume">processed</a> over $21 billion in total transaction volume, despite sanctions <a href="https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=U%2EK%2E%20Sanctions%20Xinbi">issued</a> by the U.K. last month. The development has raised questions about the platform's willingness to police its own ecosystem and suspend bad actors. The Chinese-language bazaar is <a href="https://thehackernews.com/2025/05/xinbi-telegram-market-tied-to-84b-in.html">known to offer</a> money laundering solutions to cryptocurrency scammers, harassment services, and products like electrified batons and tasers that cater to investment scams operating out of Southeast Asia. "Xinbi is still going strong," Elliptic's cofounder and chief scientist, Tom Robinson, <a href="https://www.wired.com/story/telegram-is-still-hosting-a-sanctioned-21-billion-crypto-scammer-black-market/">told</a> WIRED. "They're on track to become the largest market of this kind that has ever existed."
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Malvertising leads to ransomware</span></p>
    <p>
      Orange Cyberdefense has <a href="https://www.orangecyberdefense.com/global/blog/cert-news/smoking-out-an-affiliate-smokedham-qilin-a-few-google-ads-and-some-bossware">revealed</a> that threat actors used malvertising in three separate incidents observed between early February and early April 2026 to deliver the SmokedHam (aka Parcel RAT, SharpRhino, and WorkersDevBackdoor) backdoor by masquerading it as installers for RVTools or Remote Desktop Manager (RDM). The malware is assessed to be a modified version of the open-source trojan known as ThunderShell. In at least one case, the attack led to the deployment of Qilin ransomware, but not before dropping employee monitoring and remote desktop solutions like Controlio, TeraMind, and Zoho Assist for persistent access, exfiltrating KeePass password databases, and conducting discovery and lateral movement. The adoption of <a href="https://censys.com/blog/netsupport-manager-tracking-dual-use-remote-administration-infrastructure/">legitimate dual-use tools</a> is a concerning trend as it allows attackers to blend their actions into legitimate activity and reduce the risk of detection. The activity has been attributed with medium confidence to <a href="https://thehackernews.com/2021/05/colonial-pipeline-paid-nearly-5-million.html">UNC2465</a>, an affiliate of DarkSide, LockBit, and Hunters International. It also overlaps with a campaign detailed by <a href="https://www.synacktiv.com/en/publications/case-study-how-hunters-international-and-friends-target-your-hypervisors">Synacktiv</a> and <a href="https://thehackernews.com/2025/04/cryptocurrency-miner-and-clipper.html">Field Effect</a> in early 2025.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>APT lineage link uncovered</span></p>
    <p>
      New research has discovered that the threat actor known as <a href="https://thehackernews.com/2024/02/darkme-malware-targets-traders-using.html">Water Hydra</a> (aka DarkCasino) is still active in 2026, with new evidence uncovering a previously unreported connection between evilgrou-tech, a commodity operator, and the hacking group. "The handle 'evilgrou' is assessed with moderate confidence to be a deliberate reference to <a href="https://thehackernews.com/2023/08/winrar-security-flaw-exploited-in-zero.html">EvilNum</a> (Evil + [num -&gt; grou]p), the predecessor APT group from which WaterHydra/DarkCasino splintered in late 2022," Breakglass Intelligence <a href="https://intel.breakglass.tech/post/multi-rat-operation-dismantled-waterhydra-apt-nexus-five-aes-keys-recovered-and-live-c2-infrastructure-mapped-across-three-continents">said</a>. The strongest attribution indicator is a shared developer workspace path embedded in binaries associated with EvilNum and Water Hydra: "C:\Users\Administrator\Desktop\vaeeva\shellrundll.tlb." These two artifacts are separated by two years, one in July 2022 and the other in January 2024.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Scientific software RCE risk</span></p>
    <p>
      Cybersecurity researchers have <a href="https://www.threatleap.com/publications/Finding-Critical-Security-Vulnerabilities-In-Widely-Used-Research-And-Scientific-Software-For-Fun-Not-Profit-HDF5-Story">disclosed</a> security flaws in HDF5 software, a file format to manage, process, and store heterogeneous data, that could be exploited to compromise a vulnerable system. "The discovered vulnerabilities, based on a stack buffer overflow, could allow threat actors to overwrite memory and compromise target systems for stealing highly classified research data, industrial espionage, or a foothold into the internal network," ThreatLeap's co-founder, Leon Juranic, said. "In practice, this means the vulnerability could be exploited by a single specially crafted malicious input file and, as a result, an entire system could get compromised." The issues were addressed in October 2025 following responsible disclosure.
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Brute-force surge on edge devices</span></p>
    <p>
      Security researchers have detected a "sharp rise" in brute-force attempts to hijack SonicWall and FortiGate devices between January and March 2026, with the vast majority (88%) appearing to originate from the Middle East. Most attempts were unsuccessful, either blocked outright by security tools or directed at invalid usernames. "Attackers are aggressively scanning and testing perimeter devices for weak or exposed credentials," Barracuda Networks <a href="https://blog.barracuda.com/2026/04/14/soc-threat-radar-april-2026">said</a>. "Even when attacks fail, persistent probing raises the risk that a single weak password or misconfiguration could lead to compromise."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Fraud network evades sanctions</span></p>
    <p>
      Triad Nexus, a sprawling cybercrime ecosystem acting as the backbone of scams, money laundering, and illicit gambling operations since at least 2020, has been observed using geographic fencing and laundering its infrastructure through "clean" front companies to acquire accounts at major enterprise cloud providers (Amazon, Cloudflare, Google, and Microsoft) and <a href="https://thehackernews.com/2025/05/us-sanctions-funnull-for-200m-romance.html">avoid sanctions</a>. Besides engaging in fraud, the group specializes in high-fidelity brand impersonation, weaponizing the digital identities of Global 2000 companies to dupe victims. "The network has industrialized brand theft on a global scale; its catalog includes 'pixel-perfect' clones of everything from high-end luxury goods to public services," Silent Push <a href="https://www.silentpush.com/blog/triad-nexus-funnull-2026/">said</a>. "Despite federal sanctions in 2025, the group has reinstated its global fraud engine, shifting its focus toward emerging markets while maintaining a persistent threat to Western enterprise assets." Triad Nexus is estimated to be responsible for over $200 million in reported losses, primarily fueled by pig butchering and virtual currency scams.
    </p>
  </div>
</li>
  
</ol>

</div>

  
<p>That's a wrap for this week. If&nbsp;anything here made you pause, good. Go&nbsp;check your patches, side-eye your dependencies, and maybe don't trust that app just because it's sitting in an official store. The&nbsp;basics still matter more than most people want to&nbsp;admit.</p>
<p>We'll be back next Thursday with whatever fresh chaos the internet cooks up. Until&nbsp;then, stay sharp and keep your logs close. See&nbsp;you on the other&nbsp;side.</p>





<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories-3763.html</guid>
                <pubDate>Thu, 16 Apr 2026 17:00:10 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1700-e365/bull-main.jpg"/>
            </item>
                    <item>
                <title>NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/nist-drops-nvd-enrichment-for-pre-march-2026-vulnerabilities-3762.html</link>
                                <content:encoded><![CDATA[<div id="layout-70c12307-76d1-40ae-b181-36a097f3ea27" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>The team behind the US National Vulnerability Database (NVD) can&rsquo;t keep up with the explosion of new reported vulnerabilities, said a top official of the US National Institute of Standards and Technology (NIST), which hosts the database.</p>

<p>Speaking at VulnCon26's in Scottsdale, Arizona, on April 15, Harold Booth, a NIST computer scientist, said the NVD had to make operational adjustments in how its data analyst enrich vulnerabilities to address the &ldquo;record growth&rdquo; of reported common vulnerabilities and exposures (CVEs).</p>

<p>&ldquo;CVE reporting keeps increasing &ndash; and trust me, at the NVD, we see them all &ndash; and our ability to keep up is just not there, so <a href="https://www.infosecurity-magazine.com/news/nvd-revamps-operations-cve-surge/" target="_blank">our backlog</a> keeps increasing too,&rdquo; Booth said.</p>

<p>The data analyst will thus shift to a risk-based approach that will guide how they prioritize which CVE to process and enrich first.</p>

<p>This new approach implies bold moves, including the NVD dropping enrichment for all vulnerabilities reported before March 1, 2026.</p>

<p>Additionally, the NVD will prioritize enriching vulnerabilities found in software used by the US federal government or in critical software as defined by the Executive Order 14028, published in 2021.</p>

<p>The NVD will also give precedence to vulnerabilities included in the US Cybersecurity and Infrastructure Agency&rsquo;s (CISA) Known Exploited Vulnerabilities (KEV) list.</p>

<p>&ldquo;All submitted CVEs will still be added to the NVD. However, those that do not meet the criteria above will be categorized as &lsquo;Not Scheduled,&rsquo;&rdquo; said Booth.</p>

<p>&ldquo;Vulnerabilities are a way for an attacker to gain access to a system that they should not and we want to close those holes as quickly, efficiently and effectively as possible. We want to focus on the ones that are important, not the ones that are unimportant,&rdquo; he added.</p>

<p>Users can request enrichment of any unscheduled CVEs by emailing the NVD at nvd@nist.gov.</p>

<h2><strong>The CVE Surge Threatens NVD Capacity</strong></h2>

<p>This change is driven by a surge in CVE submissions, which has increased by 263% between 2020 and 2025, according to a <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth" target="_blank">NIST statement</a> published on April 15.</p>

<p>Booth said the NVD is &ldquo;working faster than ever&rdquo; and enriched nearly 42,000 CVEs in 2025, 45% more than any prior year. However, they cannot catch up with the speed at which CVE&rsquo;s get reported.</p>

<p>&ldquo;Submissions during the first three months of 2026 are nearly one-third higher than the same period last year. We&rsquo;ve been trying to develop new tools to help with this, but with our current methods, I will admit this is just something we can&rsquo;t keep up with,&rdquo; Booth said during VulnCon.</p>
</div><div id="layout-d6c26385-b996-4cde-90d3-6bf5207666ac" data-layout-id="2" data-edit-folder-name="text" data-index="2"><p>This is trend is likely to accelerate. In February 2026, the Forum of Incident Response and Security Teams (FIRST) <a href="https://www.infosecurity-magazine.com/news/first-forecasts-record-50000-cve/" target="_blank">forecast a record-breaking 50,000 additional CVEs to be reported in 2026</a>.</p>

<p>Jerry Gamblin, principal engineer at Cisco Threat Detection &amp; Response, expects an even bigger growth, with a forecast of<a href="https://cveforecast.org/" target="_blank">&nbsp;70,135 CVEs by the end of this year</a>. This&nbsp;would reflect a 45.6% growth rate compared to 48,171 in 2025.</p>

<p>These forecasts do not consider recent announcements by Anthropic and OpenAI of new generative AI models &ndash; namely <a href="https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/" target="_blank">Claude Mythos</a> and <a href="https://www.infosecurity-magazine.com/news/openai-unveils-gpt-54-cyber-defense/" target="_blank">GPT-5.4-Cyber</a> &ndash; that promise to autonomously find and fix cybersecurity vulnerabilities at scale.</p>

<p>Booth acknowledged that his team also faced a growth in the number of Common Platform Enumeration (CPE) identifiers largely due to new vulnerability discovery tools based on large language models (LLMs).</p>

<p>CPE is a standardized naming scheme used to uniquely identify hardware, operating systems and software applications.</p>

<h2><strong>New Rules for CVE Scoring and Analysis</strong></h2>

<p>Booth also revealed other changes in how the NVD will now enrich CVEs, following the same risk-based approach.</p>

<p>The NVD will no longer provide its own severity scores (CVSS) for CVEs already scored by the submitting authority, unless they deem the score doesn&rsquo;t align with the vulnerability.</p>

<p>Additionally, the NVD will only reanalyze modified CVEs if changes materially impact enrichment data.</p>

<p>Users can request a score change or a new CVE analysis by contacting the NVD, which will review the submission and decide how to process on a case-by-case basis.</p>

<p>Finally, Booth also announced updated status labels for CVEs to &ldquo;make them clearer.&rdquo; For instance, the NVD will drop the previous &lsquo;Deferred&rsquo; status and replace it with &lsquo;Not scheduled&rsquo; to indicate the NVD will not enrich the corresponding CVE.</p>

<p>The NVD has published <a href="https://nvd.nist.gov/vuln/vulnerability-status" target="_blank">a document explaining CVE and NVD status labels</a>, what they mean and how they compare.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/nist-drops-nvd-enrichment-for-pre-march-2026-vulnerabilities-3762.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:18 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/e694a494-7a34-42e1-b690-a1c03c8ee7e3.jpg"/>
            </item>
                    <item>
                <title>Microsoft’s Windows Recall still allows silent data extraction</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/microsoft-s-windows-recall-still-allows-silent-data-extraction-3761.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				A cybersecurity researcher says Recall&rsquo;s redesigned security model does not stop same-user malware from accessing plaintext screenshots and extracted text, without admin rights or exploits.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Microsoft&rsquo;s Windows Recall feature remains vulnerable to complete data extraction despite a major security overhaul, according to a cybersecurity researcher who says malware running in a user&rsquo;s context can quietly siphon off everything Recall has captured, without administrator privileges, kernel exploits, or breaking encryption.</p>



<p>Alexander Hagenah, executive director at Z&uuml;rich-based financial infrastructure operator SIX Group, made the claim in a LinkedIn post, where he also published a proof-of-concept tool called TotalRecall Reloaded to demonstrate the issue.</p>



<p>Hagenah first exposed Recall&rsquo;s security flaws in 2024, forcing Microsoft to <a href="https://www.computerworld.com/article/2140187/microsoft-makes-windows-recall-opt-in-after-privacy-security-backlash.html" target="_blank">pull the feature from preview</a> and rebuild it. Microsoft relaunched Recall in April 2025, saying the new architecture would restrict &ldquo;attempts by latent malware trying to &lsquo;ride along&rsquo; with a user authentication to steal data.&rdquo; Hagenah said it does not.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;When you use Recall normally, TotalRecall Reloaded silently holds the door open behind you and then extracts what Recall has ever captured. That is precisely the scenario Microsoft&rsquo;s architecture is supposed to restrict,&rdquo; he <a href="https://www.linkedin.com/posts/alexhagenah_breaking-%F0%9D%90%96%F0%9D%90%A2%F0%9D%90%A7%F0%9D%90%9D%F0%9D%90%A8%F0%9D%90%B0%F0%9D%90%AC-%F0%9D%90%91%F0%9D%90%9E%F0%9D%90%9C%F0%9D%90%9A%F0%9D%90%A5%F0%9D%90%A5-again-activity-7447864305460547585-P72P/" target="_blank" rel="noreferrer noopener">wrote in the post</a>.</p>

		

			


<p>Hagenah wrote in the post that he disclosed the research to Microsoft&rsquo;s Security Response Center on March 6, submitting full source code and reproduction steps. Microsoft reviewed the case for a month and closed it on April 3, telling him the behavior &ldquo;does not represent a bypass of a security boundary or unauthorized access to data.&rdquo;</p>



<p>&ldquo;Microsoft says this is by design,&rdquo; Hagenah wrote. &ldquo;That worries me.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Hagenah&rsquo;s research does not challenge Microsoft&rsquo;s encryption, which he said is sound. The gap, he told CSO, is in how decrypted data is handled once it leaves the enclave.</p>



<p>&ldquo;Plaintext screenshots and extracted text end up in an unprotected process for display,&rdquo; he told CSO. &ldquo;As long as decrypted content crosses into a process that same-user code can access, someone will find a way in.&rdquo;</p>



<h2 id="what-a-fix-would-require">What a fix would require</h2>



<p>A fix is technically feasible, Hagenah said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The short-term fix is fairly straightforward. Microsoft could add stronger code integrity and process protections to AIXHost.exe, the process that renders the Recall timeline. Right now, it has none, which makes the injection path possible. That would block the specific technique I demonstrated and materially raise the bar,&rdquo; he said.</p>



<p>The longer-term problem runs deeper, he said. &ldquo;Microsoft should rethink how decrypted data is handled after it leaves the enclave. The cryptography and enclave design are genuinely well done, and I want to be clear about that. The problem is that plaintext screenshots and extracted text end up in an unprotected process for display. As long as decrypted content crosses into a process that same-user code can access, someone will find a way in,&rdquo; he said.</p>



<p>&ldquo;A durable fix would mean either rendering inside a protected process or adopting a compositing model where raw data never leaves the trust boundary. That is a bigger effort, but it is the only way to close this class of issue properly,&rdquo; he said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="exploitation-risk">Exploitation risk</h2>



<p>The barrier to weaponizing this technique is lower than Microsoft&rsquo;s security messaging would suggest, Hagenah said.</p>



<p>&ldquo;They only need code running in the user&rsquo;s context and a way to reuse the authorized Recall session,&rdquo; he said. &ldquo;That is a much lower bar than many people would assume from Microsoft&rsquo;s security messaging.&rdquo;</p>



<p>While Recall&rsquo;s limitation to Copilot+ PCs and its opt-in status reduce the scale of exposure, targeted abuse is a realistic near-term risk, he said. &ldquo;For targeted abuse, surveillance, or high-value user collection, this is absolutely realistic,&rdquo; he said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Hagenah said he published the source code deliberately so defenders, EDR vendors, and security teams could build detections before threat actors operationalize the technique independently. &ldquo;In my view, that gives the defensive side a valuable head start,&rdquo; he said.</p>



<p>Independent security researcher Kevin Beaumont reached a similar conclusion after separately testing the current Recall implementation. &ldquo;Yep, you can just read the database as a user process,&rdquo; Beaumont <a href="https://cyberplace.social/@GossiTheDog/116211359321826804" target="_blank" rel="noreferrer noopener">wrote on Mastodon on March 11</a>. &ldquo;The database also contains all manner of fields that aren&rsquo;t publicly disclosed for tracking the user&rsquo;s activity. No AV or EDR alerts triggered,&rdquo; he wrote.</p>



<p>Microsoft did not immediately respond to a request for comment.</p>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Microsoft’s Windows Recall feature remains vulnerable to complete data extraction despite a major security overhaul, according to a cybersecurity researcher who says malware running in a user’s context can quietly siphon off everything Recall has captured, without administrator privileges,...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/microsoft-s-windows-recall-still-allows-silent-data-extraction-3761.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:11 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159643-0-51209200-1776341906-Man-working-on-a-Windows-11-laptop-clearly-on-screen.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment-3760.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>The Hacker News</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Artificial Intelligence / Enterprise Security</span></p></div><div id="articlebody"><p><a href="https://thehacker.news/ghost-in-the-machine?source=article"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6vJpO9kksCQDpSksNkqDFNUCbXD70dMGYqI6P9S_XPMY5d8BR8PVdrsVQP1ZJO_-nzL6eQShM3Cap9heQ5kAglsPjfxwIcXPSsf_cfgUVnGQ2XzIWVOuo7JhxMjnHYDN6r9KlQ6LqZJisRZkjatnWChuzUkSlXRa1hFseUPq28PZ5gjGR7L2WzTFdZ3fM/s1700-e365/ghost.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not&nbsp;phishing. Not&nbsp;weak passwords. Unmanaged non-human identities that nobody was&nbsp;watching.</p>
<p>For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections,&nbsp;andOAuth grants. When&nbsp;projects end or employees leave, most of these stay active. Fully&nbsp;privileged. Completely unmonitored.</p>
<p>Attackers don't need to break in. They&nbsp;just pick up the keys you left&nbsp;out.</p>
<p><a href="https://thehacker.news/ghost-in-the-machine?source=article" target="_blank">Join our upcoming webinar</a> where we&rsquo;ll show you how to find and eliminate these "Ghost Identities" before they become a back door for&nbsp;hackers.</p>
<p>AI agents and automated workflows are multiplying these credentials at a pace security teams can't manually track. Many&nbsp;carry admin-level access they never needed. One&nbsp;compromised token can give an attacker lateral movement across your entire environment, and the average dwell time for these intrusions is over 200&nbsp;days.</p>
<p>Traditional IAM wasn't built for this. It&nbsp;manages people. It&nbsp;ignores&nbsp;machines.</p>
<p><a href="https://thehacker.news/ghost-in-the-machine?source=article"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEindtCyTTR5rYFNMOx6rmlkqElz7M20B-k6bUXLIvFGIO9OjuhjcqloQtBqT1ormi8Lf5TxyKs0D4ZRJPbtTTQLj64IPZEQLe6UHNkjOWN-NAO5SgjlC2-Y5cPeq_HrkhW899AHXh9IWyE33_j5k52WdgukCfSIffwBmFYGXUi0H0Sy2fldvJmX9hpivc00/s1700-e365/bi.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="400" data-original-width="770"></a></p>
<p><strong>What we'll walk you through in this&nbsp;session:</strong></p>
<ul>
<li>How to run a full discovery scan of every non-human identity in your environment</li>
<li>A framework for right-sizing permissions across service accounts and AI integrations</li>
<li>An automated lifecycle policy so dead credentials get revoked before attackers find them</li>
<li>A ready-to-use Identity Cleanup Checklist you'll get during the live session</li>
</ul>
<p>This isn't a product demo. It's a working playbook you can take back to your team the same&nbsp;week.</p>
<p>Don't let hidden keys compromise your data. We&rsquo;re hosting a live session to walk you through securing these non-human identities step-by-step.</p>

&#128197; <strong>Save Your Spot Today:</strong> <a href="https://thehacker.news/ghost-in-the-machine?source=article" rel="noopener" target="_blank">Register for the Webinar Here</a>.

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts,...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment-3760.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:10 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6vJpO9kksCQDpSksNkqDFNUCbXD70dMGYqI6P9S_XPMY5d8BR8PVdrsVQP1ZJO_-nzL6eQShM3Cap9heQ5kAglsPjfxwIcXPSsf_cfgUVnGQ2XzIWVOuo7JhxMjnHYDN6r9KlQ6LqZJisRZkjatnWChuzUkSlXRa1hFseUPq28PZ5gjGR7L2WzTFdZ3fM/s1700-e365/ghost.jpg"/>
            </item>
                    <item>
                <title>2026-2175 - Responsable RH International H/F</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/2026-2175-responsable-rh-international-h-f-3759.html</link>
                                <content:encoded><![CDATA[<div id="contenu-ficheoffre" data-class="ts-offer-details-content">&#13;
&#13;
        &#13;
&#13;
            <h2>&#13;
                Informations g&eacute;n&eacute;rales&#13;
            </h2>&#13;
&#13;
            <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_entityBlock">&#13;
                &#13;
                <p><img id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_Logo" title="Entité légale (HRRO) - Clé Oracle (logo)" src="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183" alt="Entité légale (HRRO) - Clé Oracle (logo)">&#13;
                </p>&#13;
&#13;
                <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_divEntityDesc">&#13;
                    <h3>&#13;
                        Entit&eacute; de rattachement&#13;
                    </h3><p>&#13;
                    Parmi les leaders du march&eacute; des services maritimes &agrave; l'offshore, BOURBON propose aux producteurs d'&eacute;nergie en mer les plus exigeants une vaste gamme de services maritimes de surface et sous-marins, sur les champs p&eacute;troliers, gaziers et &eacute;oliens. Cette offre de services repose sur une flotte moderne et standardis&eacute;e de 223 navires et sur plus de 5 842 professionnels hautement qualifi&eacute;s. En recherche permanente d'excellence op&eacute;rationnelle, le groupe offre &agrave; ses clients un service de proximit&eacute; dans ses 37 pays d'intervention, en garantissant les plus hauts standards de qualit&eacute; et de s&eacute;curit&eacute;. En 2024, BOURBON a r&eacute;alis&eacute; un chiffre d'affaires ajust&eacute; de plus de 733 M&euro;.&nbsp;&nbsp;&#13;
                </p></div>&#13;
&#13;
                &#13;
        &#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
            </div><h3>&#13;
	Type d'offre (personnel s&eacute;dentaire/navigant)&#13;
</h3><p id="fldoffer_customcodetablevalue1">Personnel s&eacute;dentaire</p><h2>Description du poste</h2><h3>&#13;
	Intitul&eacute; du poste&#13;
</h3><p id="fldjobdescription_jobtitle">Responsable RH International H/F</p><h3>&#13;
	Contrat&#13;
</h3><p id="fldjobdescription_contract">CDI</p><h3>&#13;
	R&ocirc;les et responsabilit&eacute;s&#13;
</h3><div id="fldjobdescription_description1">&#13;
	<p>BOURBON recrute une(e)</p><p><span><strong>Responsable RH International H/F</strong></span></p><p>En tant que Responsable RH (ROW), vous pilotez la strat&eacute;gie RH des pays hors si&egrave;ge, avec une forte composante de mobilit&eacute; internationale. Vous intervenez sur l&rsquo;ensemble du cycle RH, de la planification des effectifs jusqu&rsquo;&agrave; l&rsquo;accompagnement des expatriations.</p><p><span><strong>VOS MISSIONS ET RESPONSABILITES&nbsp;:</strong></span></p><p><strong>Pilotage RH international (ROW)</strong></p><p>Vous accompagnez la croissance des &eacute;quipes et structurez les pratiques RH &agrave; l&rsquo;international :</p><p>&bull;&nbsp; Planification des effectifs en lien avec la strat&eacute;gie business / anticipation des projections d&rsquo;effectifs</p><p>&bull;&nbsp; Pilotage et suivi de la masse salariale (labour cost planning)</p><p>&bull;&nbsp; Pilotage des recrutements &agrave; l&rsquo;international</p><p>&bull;&nbsp; D&eacute;ploiement et gestion de la politique de r&eacute;mun&eacute;ration</p><p>&bull;&nbsp; Mise en place des processus RH, incluant la gestion de la campagne annuelle de performance</p><p><strong>Mobilit&eacute; internationale &amp; expatriation</strong></p><p>En parall&egrave;le, vous pilotez l&rsquo;ensemble de la politique de mobilit&eacute; internationale du groupe :</p><p>&bull; D&eacute;ployer et faire &eacute;voluer la politique de mobilit&eacute; internationale</p><p>&bull; N&eacute;gocier/ optimiser les packages et contrats d&rsquo;expatriation</p><p>&bull; Assurer le suivi de l&rsquo;ex&eacute;cution des contrats</p><p>&bull; Superviser l&rsquo;administration des expatri&eacute;s (paie, avantages, conformit&eacute;)</p>&#13;
</div><h3>&#13;
	Profil&#13;
</h3><div id="fldjobdescription_description2">&#13;
	<p><span><strong>VOTRE PROFIL</strong></span></p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez un bac + 3/4 en Ressources Humaines et justifiez d&eacute;j&agrave; d&rsquo;une exp&eacute;rience r&eacute;ussie de 7 &agrave; 10 ann&eacute;es &agrave; un poste RH &eacute;quivalent.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous justifiez d&eacute;j&agrave; d&rsquo;une solide exp&eacute;rience en HR Business Partner ou HR Manager multi-pays</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez d&eacute;j&agrave; au moins une premi&egrave;re exp&eacute;rience en mobilit&eacute; internationale / expatriation valid&eacute;e&nbsp;; vous avez par ailleurs une excellente capacit&eacute; &agrave; mettre en place des processus.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dot&eacute; d&rsquo;une forte autonomie, vous avez un tr&egrave;s bon sens du business et un esprit collaboratif.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Rigoureux, vous avez de solides connaissances des principes et des bonnes pratiques en mati&egrave;re de ressources humaines ainsi que des r&egrave;gles et des bonnes pratiques en mati&egrave;re de mobilit&eacute; internationale.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez un bel esprit d&rsquo;&eacute;quipe et faites preuve d&rsquo;un fort engagement&nbsp;et d&rsquo;excellentes qualit&eacute;s relationnelles&nbsp;; vous &ecirc;tes un tr&egrave;s bon communiquant (oral et &eacute;crit) et vous savez animer des r&eacute;unions avec aisance.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; En contexte international, vous avez une excellente maitrise du fran&ccedil;ais et de l&rsquo;anglais (lu, &eacute;crit et oral), ainsi que des outils informatiques (Outlook, EXCEL, BI, PowerPoint&hellip;)</p><p>Poste en CDI bas&eacute; &agrave; Marseille, &agrave; pourvoir d&egrave;s que possible.</p><p>Dans le cadre de notre politique d&rsquo;emploi, ce poste est ouvert aux personnes en situation de handicap.</p>&#13;
</div><h2>Localisation du poste</h2><h3>&#13;
	Localisation du poste&#13;
</h3><p id="fldlocation_location_geographicalareacollection">Europe, France, Marseille Joliette</p><h2>Crit&egrave;res candidat</h2><h3>&#13;
	Niveau d'&eacute;tudes min. requis&#13;
</h3><p id="fldapplicantcriteria_educationlevel">4. Niveau Bac + 4/5</p><h3>&#13;
	Niveau d'exp&eacute;rience min. requis&#13;
</h3><p id="fldapplicantcriteria_experiencelevel">6-10 ans</p><h3>&#13;
	Langues&#13;
</h3><ul><li>French (Native)</li><li>English (Advanced +++)</li></ul>&#13;
&#13;
        &#13;
    </div>
]]></content:encoded>
                                <description><![CDATA[Contract type : Permanent Contract Position description : BOURBON recrute une(e) Responsable RH International H/F En tant que Responsable RH (ROW), vous pilotez la stratégie RH des pays hors siège, avec une forte composante de mobilité internationale. Vous intervenez...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/2026-2175-responsable-rh-international-h-f-3759.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:09 +0300</pubDate>
                <media:thumbnail url="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183"/>
            </item>
                    <item>
                <title>Behind the Mythos hype, Glasswing has just one confirmed CVE</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/behind-the-mythos-hype-glasswing-has-just-one-confirmed-cve-3758.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				As hype builds around Anthropic&rsquo;s offensive AI model, VulnCheck&rsquo;s analysis finds just one confirmed CVE tied directly to Project Glasswing, raising questions about how Mythos&rsquo; real-world impact should be measured.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Efforts to cut through the buzz surrounding Anthropic&rsquo;s Mythos are emerging. As OpenAI moves to counter the hype around it with its own cybersecurity model, VulnCheck is reporting that the model&rsquo;s publicly attributable output amounts to just one confirmed CVE.</p>



<p>While <a href="https://www.csoonline.com/article/4155342/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery.html" target="_blank">Project Glasswing</a>, the controlled access program for Mythos, promises a powerful offensive capability, gated behind vetted organizations, VulnCheck&rsquo;s recent findings reveal what those capabilities actually represent in practice.</p>



<p>&ldquo;Anthropic&rsquo;s Project Glasswing has generated significant attention&mdash;but very little concrete data,&rdquo; said Patrick Garrity, researcher at VulnCheck, in a blog <a href="https://www.vulncheck.com/blog/anthropic-glasswing-cves#key-takeaways" target="_blank" rel="noreferrer noopener">post</a>. &ldquo;While Anthropic researchers are actively contributing to vulnerability discovery and appear to be promising, the publicly attributable impact of Glasswing itself remains limited so far.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Anthropic did not immediately respond to CSO&rsquo;s request for comments.</p>

		

			


<h2 id="only-one-cve-is-attributable-to-glasswing">Only one CVE is attributable to Glasswing</h2>



<p>VulnCheck&rsquo;s analysis of Project Glasswing drills into the numbers behind the claims by looking into public CVE attribution. &ldquo;I started by re-reading the <a href="https://www.anthropic.com/glasswing" target="_blank" rel="noreferrer noopener">Glasswing report</a> and the advisories published at <a href="https://red.anthropic.com/" target="_blank" rel="noreferrer noopener">red.anthropic.com</a>,&rdquo; Garrity said. &ldquo;Neither source provides a comprehensive CVE list of vulnerabilities discovered by Anthropic. So I decided to search the full CVE record database, and searched every CVE record containing the term &ldquo;anthropic&rdquo; and reviewed each one.&rdquo;</p>



<p>Garrity identified 75 CVE records that mention Anthropic. But only 40 of those were actually credited to Anthropic researchers, with the rest tied to affected products or unrelated references. Of those 40, 10 originated from external collaboration programs, such as <a href="http://calif.io" target="_blank" rel="noreferrer noopener">Calif.io&rsquo;s</a> MADBugs initiatives.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The 40 CVEs attributed to Anthropic researchers span multiple products, including 28 affecting Firefox, nine tied to wolfSSL, and one each impacting NGINX Plus, FreeBSD, and OpenSSL.</p>



<p>When narrowed down further, the number that mattered the most showed up. Only one CVE is explicitly attributed to Project Glasswing itself, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4747" target="_blank" rel="noreferrer noopener">CVE-2026-4747</a>. This is a FreeBSD NFS remote code execution (RCE) flaw described as autonomously identified and exploited.</p>



<p>Garrity did not include the three vulnerabilities without CVE numbers mentioned on the Glasswing page. These include a 27-year-old OpenBSD flaw, a 16-year-old FFmpeg bug, and Linux kernel privilege escalation chains, all under embargo pending patches.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2><a></a>Why is Glasswing still a big deal</h2>



<p>VulnCheck&rsquo;s findings reframe Glasswing&rsquo;s capabilities. The limited number of directly attributable CVEs is just one way of measuring its impact. Industry observers are interpreting <a href="https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html">Mythos</a> much differently.</p>



<p>Melissa Bischoping, a SANS Technology Institute board member and senior Director of security and product research at Tanium, thinks Mythos potential lies elsewhere. According to a breakdown of the Claude Mythos Preview <a href="https://www-cdn.anthropic.com/08ab9158070959f88f296514c21b7facce6f52bc.pdf" target="_blank" rel="noreferrer noopener">System Card</a>, which Bischoping and her colleagues at Tanium reviewed, the model achieved an unseen exploit success rate. &ldquo;Jumping from near-zero success to ~72% on the same class of targets suggests exploit development is no longer a high-skill, high-effort bottleneck,&ldquo; she said, adding that it&rsquo;s only a matter of time before every other model catches up.</p>



<p>While Mythos is being regulated under Glasswing, it has already shown the world what is possible. &ldquo;The gap between frontier models and open-weight models has compressed from more than a year to a matter of weeks, which means this level of capability is poised to spread rapidly, likely without the same safety guardrails,&rdquo; Bischoping noted.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Bischoping is also concerned about whether organizations can act on what Mythos finds before Mythos is out in the wild. &ldquo;Agentic patch workflows are possible and can match pace with adversarial AI in a lot of cases, but org politics and change control don&rsquo;t run at the speed of AI today.&rdquo;</p>



<p>The full picture about the model&rsquo;s true capability won&rsquo;t be known before July 2026, when Anthropic will make a full public accounting of what Glasswing found and fixed, Garrity said.</p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Efforts to cut through the buzz surrounding Anthropic’s Mythos are emerging. As OpenAI moves to counter the hype around it with its own cybersecurity model, VulnCheck is reporting that the model’s publicly attributable output amounts to just one confirmed...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/behind-the-mythos-hype-glasswing-has-just-one-confirmed-cve-3758.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159617-0-65128100-1776340487-AI-security-spending-primary-shutterstock_2690527813.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution-3755.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Vulnerability / Network Security</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdjDVphpsoBIBjhimILabg28ZsD4p-xNzJol1uD3SSIRBvkp-juko45B2sjKpQmJi-h2tHZf2yWAvuCOZRs3m3q4w5sj7x-MyXWosuKglLblipF_94T8f8OQ8_peVgqZTrnjxF8dPRLfv63K8zrbQYqh898b31p_2C37UO0DNAuR8cESZeo4XTFlsDs0C/s1700-e365/cisco-flaws.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdjDVphpsoBIBjhimILabg28ZsD4p-xNzJol1uD3SSIRBvkp-juko45B2sjKpQmJi-h2tHZf2yWAvuCOZRs3m3q4w5sj7x-MyXWosuKglLblipF_94T8f8OQ8_peVgqZTrnjxF8dPRLfv63K8zrbQYqh898b31p_2C37UO0DNAuR8cESZeo4XTFlsDs0C/s1700-e365/cisco-flaws.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the&nbsp;service.</p>
<p>The details of the vulnerabilities are below&nbsp;-</p>
<ul>
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL">CVE-2026-20184</a></strong> (CVSS score: 9.8) - An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services.</li>
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ">CVE-2026-20147</a></strong> (CVSS score: 9.9) - An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests.</li>
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv">CVE-2026-20180 and CVE-2026-20186</a></strong> (CVSS scores: 9.9) - Multiple insufficient validation of user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker in possession of read only admin credentials to execute arbitrary commands on the underlying operating system of an affected device by sending crafted HTTP requests.</li>
</ul>

<p>"A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root," Cisco said in an advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.</p>
<div><p><a href="https://thehackernews.uk/ai-agentic-guide-d-3" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00/s728-e100/nudge-d-3.jpg" width="729" height="91"></a></p></div>
<p>"In single-node ISE deployments, successful exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In&nbsp;that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored."</p>
<p>CVE-2026-20184 requires no customer action as it's cloud-based. However, customers who are using SSO&nbsp;are <a href="https://help.webex.com/en-us/article/nstvmyo/Manage-single-sign-on-integration-in-Control-Hub#task_394598AFBCD3D73A488E6DBB99AD3214">advised</a> to upload a new identity provider (IdP) SAML certificate to Control Hub. The&nbsp;remaining vulnerabilities have been addressed in the following versions&nbsp;-</p>
<ul>
<li><strong>CVE-2026-20147</strong>
<ul>
<li>Cisco ISE or ISE-PIC Release earlier than 3.1&nbsp;(Migrate to a fixed release)</li>
<li>Cisco ISE Release 3.1&nbsp;(3.1&nbsp;Patch 11)</li>
<li>Cisco ISE Release 3.2&nbsp;(3.2&nbsp;Patch 10)</li>
<li>Cisco ISE Release 3.3&nbsp;(3.3&nbsp;Patch 11)</li>
<li>Cisco ISE Release 3.4&nbsp;(3.4&nbsp;Patch 6)</li>
<li>Cisco ISE Release 3.5&nbsp;(3.5&nbsp;Patch 3)</li>
</ul>
</li>
<li><strong>CVE-2026-20180 and CVE-2026-20186</strong>
<ul>
<li>Cisco ISE Release earlier than 3.2&nbsp;(Migrate to a fixed release)</li>
<li>Cisco ISE Release 3.2&nbsp;(3.2&nbsp;Patch 8)</li>
<li>Cisco ISE Release 3.3&nbsp;(3.3&nbsp;Patch 8)</li>
<li>Cisco ISE Release 3.4&nbsp;(3.4&nbsp;Patch 4)</li>
<li>Cisco ISE Release 3.5&nbsp;(Not Vulnerable)</li>
</ul>
</li>
</ul>
<p>While Cisco noted that it is not aware of any of these shortcomings being exploited in the&nbsp;wild, it's essential that users&nbsp;update their instances to the latest version for optimal protection.</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution-3755.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdjDVphpsoBIBjhimILabg28ZsD4p-xNzJol1uD3SSIRBvkp-juko45B2sjKpQmJi-h2tHZf2yWAvuCOZRs3m3q4w5sj7x-MyXWosuKglLblipF_94T8f8OQ8_peVgqZTrnjxF8dPRLfv63K8zrbQYqh898b31p_2C37UO0DNAuR8cESZeo4XTFlsDs0C/s1700-e365/cisco-flaws.jpg"/>
            </item>
                    <item>
                <title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks-3756.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Application Security / Threat Intelligence</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNoBvtFhZbLfNE2AsVSzuOt5V9YMzAumIA2M9c7QVbp_i-xMwDIgVtDgCIi2bCYgH_PviS8P-Ap1k-8aVmHABqLzNGE9g014MM1gnfJEJPKbKczoCjPoI6PxZ77bNlz2dSlv8XqoVFyZZqQ6SWBue3rpRegb_k62HJkfMl39GHTBIIzZOGrv_iKbxOYV8E/s1700-e365/el.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNoBvtFhZbLfNE2AsVSzuOt5V9YMzAumIA2M9c7QVbp_i-xMwDIgVtDgCIi2bCYgH_PviS8P-Ap1k-8aVmHABqLzNGE9g014MM1gnfJEJPKbKczoCjPoI6PxZ77bNlz2dSlv8XqoVFyZZqQ6SWBue3rpRegb_k62HJkfMl39GHTBIIzZOGrv_iKbxOYV8E/s1700-e365/el.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency&nbsp;sectors.</p>
<p>Dubbed <a href="https://www.elastic.co/security-labs/phantom-in-the-vault"><strong>REF6598</strong></a> by Elastic Security Labs, the activity has been found to leverage elaborate social engineering tactics through LinkedIn and Telegram to breach both Windows and macOS systems, approaching prospective individuals under the guise of a venture capital firm and then moving the conversation to a Telegram group where several purported partners are&nbsp;present.</p>
<p>The Telegram group chat is engineered to lend the operation a smidgen of credibility, with the members discussing topics related to financial services and cryptocurrency liquidity solutions. The&nbsp;target is then instructed to use Obsidian to access what appears to be a shared dashboard by connecting to&nbsp;a <a href="https://obsidian.md/help/vault">cloud-hosted&nbsp;vault</a> using the credentials provided to&nbsp;them.</p>
<div><p><a href="https://thehackernews.uk/ai-blindspot-d-2" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu/s728-e100/nudge-d-2.jpg" width="729" height="91"></a></p></div>
<p>It's this vault that triggers the infection sequence. As&nbsp;soon as the vault is opened in the note-taking application, the target is asked to enable "Installed community plugins" sync, effectively causing malicious code to be&nbsp;executed.</p>
<p>"The threat actors abuse Obsidian's legitimate community plugin ecosystem, specifically&nbsp;the <a href="https://github.com/Taitava/obsidian-shellcommands">Shell&nbsp;Commands</a>&nbsp;and <a href="https://github.com/kepano/obsidian-hider">Hider</a> plugins, to silently execute code when a victim opens a shared cloud vault," researchers Salim Bitam, Samir Bousseaden, and Daniel Stepanic said in a technical breakdown of the&nbsp;campaign.</p>
<p>Given that the option is disabled by default and cannot be remotely turned on, the attacker must convince the target to manually toggle the community plugin sync on their device so that the malicious vault configuration can trigger the execution of commands through the Shell Commands plugin. Also&nbsp;used in conjunction with Shell Commands is another plugin named Hider to hide certain user interface elements of Obsidian, such as status bar, scrollbar, tooltips, and&nbsp;others.</p>
<p>"While this attack requires social engineering to cross the community plugin sync boundary, the technique remains notable: it abuses a legitimate application feature as a persistence and command execution channel, the payload lives entirely within JSON configuration files that are unlikely to trigger traditional AV [antivirus] signatures, and execution is handed off by a signed, trusted Electron application, making parent-process-based detection the critical layer," the researchers&nbsp;said.</p>
<p>Dedicated execution paths are activated depending on the operating system. On&nbsp;Windows, the commands are used to invoke a PowerShell script to drop an intermediate loader codenamed PHANTOMPULL that decrypts and launches PHANTOMPULSE in&nbsp;memory.</p>
<p>PHANTOMPULSE is an artificial intelligence (AI)-generated backdoor that uses the Ethereum blockchain for resolving its command-and-control (C2) server by fetching&nbsp;the <a href="https://etherscan.io/tx/0x4ad9923ede3ba2dab91cd37a733c01a08d91caaa4a867b77a3597acb28d40c31">latest transaction</a> associated with&nbsp;a <a href="https://etherscan.io/address/0xc117688c530b660e15085bF3A2B664117d8672aA">hard-coded wallet&nbsp;address</a>. Upon&nbsp;obtaining the C2 address, the malware uses WinHTTP for communications, allowing it to send system telemetry data, fetch commands and transmit the execution results, upload files or screenshots, and capture keystrokes.</p>
<p>The supported commands are designed to facilitate comprehensive remote access&nbsp;-</p>
<ul>
<li><strong>inject</strong>, to inject shellcode/DLL/EXE into target process</li>
<li><strong>drop</strong>, to drop a file to disk and execute it</li>
<li><strong>screenshot</strong>, to capture and upload a screenshot&nbsp;</li>
<li><strong>keylog</strong>, to start/stop a keylogger</li>
<li><strong>uninstall</strong>, to initiate removal of persistence and perform cleanup</li>
<li><strong>elevate</strong>, to escalate privileges to SYSTEM via the <a href="https://learn.microsoft.com/en-us/windows/win32/com/the-com-elevation-moniker">COM elevation moniker</a></li>
<li><strong>downgrade</strong>, to transition from SYSTEM to elevated admin</li>
</ul>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>On macOS, the Shell Commands plugin delivers an obfuscated AppleScript dropper that iterates over a hard-coded domain list, while employing Telegram as a dead drop resolver for fallback C2 resolution. This&nbsp;approach also offers added flexibility as it makes it possible to easily rotate C2 infrastructure, rendering domain-based blocking insufficient.</p>
<p>In the final step, the dropper script contacts the C2 domain to download and execute a second-stage payload via osascript. The&nbsp;exact nature of this payload remains unknown given that the C2 servers are currently offline. The&nbsp;intrusion was ultimately unsuccessful, as the attack was detected and blocked before the adversary could accomplish their goals on the infected&nbsp;machine.</p>
<p>"REF6598 demonstrates how threat actors continue to find creative initial access vectors by abusing trusted applications and employing targeted social engineering," Elastic said. "By abusing Obsidian's community plugin ecosystem rather than exploiting a software vulnerability, the attackers bypass traditional security controls entirely, relying on the application's intended functionality to execute arbitrary&nbsp;code."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors....]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks-3756.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNoBvtFhZbLfNE2AsVSzuOt5V9YMzAumIA2M9c7QVbp_i-xMwDIgVtDgCIi2bCYgH_PviS8P-Ap1k-8aVmHABqLzNGE9g014MM1gnfJEJPKbKczoCjPoI6PxZ77bNlz2dSlv8XqoVFyZZqQ6SWBue3rpRegb_k62HJkfMl39GHTBIIzZOGrv_iKbxOYV8E/s1700-e365/el.jpg"/>
            </item>
                    <item>
                <title>Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu-3757.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>The Hacker News</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Data Privacy / Compliance</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSzIRGweO7UJkqOLQTUDsqPy53XtIWCzyLklGJLfFxhneZiFpxg8zJRXukUqEsT4TbdFwUZbvTfwuexfGuiYjcDQ-iZDjqwZ2lDlCIhgopZWevBpdi4rr6GxgXpU6MmFnzdMpq_WGdA9PRfaNw_7eDAOugAV1tccfmREgbXveM1N15G2_L9lFxCq1Pv0/s1700-e365/reflectiz.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSzIRGweO7UJkqOLQTUDsqPy53XtIWCzyLklGJLfFxhneZiFpxg8zJRXukUqEsT4TbdFwUZbvTfwuexfGuiYjcDQ-iZDjqwZ2lDlCIhgopZWevBpdi4rr6GxgXpU6MmFnzdMpq_WGdA9PRfaNw_7eDAOugAV1tccfmREgbXveM1N15G2_L9lFxCq1Pv0/s1700-e365/reflectiz.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A&nbsp;bank approved a Taboola pixel. That&nbsp;pixel quietly redirected logged-in users to a Temu tracking endpoint. This&nbsp;occurred without the bank&rsquo;s knowledge, without user consent, and without a single security control registering a violation.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9pKdAzKjL5V6CEuPbA7CD5xFjBpkOqL-XxkYEvvSv9XSHemsGnzmRwSEJJW8RPM0SGUDDo1T-aoBkjLSoE7WV8nO0qL-GESYQhpLOjkdzDycq9wL-ito6RIvHdc7JTyoP8cswyTsgr6B83ZcvmKPYYaQxmrUHDeuS0pauvY58Rv7d6ui91uCI8w3VtdA/s1700-e365/11.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9pKdAzKjL5V6CEuPbA7CD5xFjBpkOqL-XxkYEvvSv9XSHemsGnzmRwSEJJW8RPM0SGUDDo1T-aoBkjLSoE7WV8nO0qL-GESYQhpLOjkdzDycq9wL-ito6RIvHdc7JTyoP8cswyTsgr6B83ZcvmKPYYaQxmrUHDeuS0pauvY58Rv7d6ui91uCI8w3VtdA/s1700-e365/11.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="426" data-original-width="1200"></a></p>
<h3><strong>Read the full technical breakdown in the Security Intelligence&nbsp;Brief.&nbsp;<a href="https://www.reflectiz.com/learning-hub/taboola-temu-redirect-report/">Download now&nbsp;&rarr;</a><a href="https://www.reflectiz.com/learning-hub/taboola-temu-redirect-report/"></a></strong></h3>
<h2><strong>The "First-Hop Bias" Blind&nbsp;Spot</strong></h2>
<p>Most&nbsp;security stacks, including WAFs, static analyzers, and standard CSPs, share a common failure mode: they evaluate&nbsp;the <strong>declared&nbsp;origin</strong> of a script, not&nbsp;the <strong>runtime destination</strong> of its request&nbsp;chain.</p>
<p>If&nbsp;sync.taboola.com&nbsp;is in your Content Security Policy (CSP) allow-list, the browser considers the request legitimate. However, it does not re-validate against the terminal destination of&nbsp;a <strong>302&nbsp;redirect</strong>. By&nbsp;the time the browser reaches temu.com, it has inherited the trust granted to&nbsp;Taboola.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0QbtOoK8MI7htCehD5WBa4SBQnzWJK2E6JMG9Smn7sYrBan5GgjPfSewxt_4lw2D8jDB7SD-IWOdidlzZZP5y2GLbQpeKuuVNyqmT26KvQaA8vTJuq1ln31UhlIzAP62P5joyBfbe5PTcRSL1gPHt9cnYpLTFC1KPrCpSgHUW3aAdDDDZFIuVLwamyWo/s1700-e365/2.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0QbtOoK8MI7htCehD5WBa4SBQnzWJK2E6JMG9Smn7sYrBan5GgjPfSewxt_4lw2D8jDB7SD-IWOdidlzZZP5y2GLbQpeKuuVNyqmT26KvQaA8vTJuq1ln31UhlIzAP62P5joyBfbe5PTcRSL1gPHt9cnYpLTFC1KPrCpSgHUW3aAdDDDZFIuVLwamyWo/s1700-e365/2.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="565" data-original-width="1200"></a></p>
<h2><strong>The Forensic&nbsp;Trace</strong></h2>
<p>During&nbsp;a February 2026 audit of a European financial platform, Reflectiz identified the following redirect chain executing on logged-in account&nbsp;pages:</p>
<ol>
<li><strong>Initial Request:</strong> A GET request to https://sync.taboola.com/sg/temurtbnative-network/1/rtb/.</li>
<li><strong>The Redirect:</strong> The server responded with a <strong>302 Found</strong>, redirecting the browser to https://www.temu.com/api/adx/cm/pixel-taboola?....</li>
<li><strong>The Payload:</strong> The redirect included the critical header Access-Control-Allow-Credentials: true.</li>
</ol>
<p>This&nbsp;header specifically instructs the browser to include cookies in the cross-origin request to Temu&rsquo;s domain. This&nbsp;is the mechanism by which Temu can read or write tracking identifiers against a&nbsp;browser it now knows visited an authenticated banking&nbsp;session.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzs0lr9XSw76U9Nq7NYo7jXlgjd5XFWzvYdKnInNQBIS4igd8IisDchWo7BaVmKZN8Kf56B8JLMxpOZucb1gjeQto-4Uyf3k6piBd73Y9bf_q49-K497hPi6yelC8ZmPFktUQqmRUGI7-M44-RRwUMV9G9w5v48Hgsids5rEF7dnsnuNzuL385iCVklTI/s1700-e365/for.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzs0lr9XSw76U9Nq7NYo7jXlgjd5XFWzvYdKnInNQBIS4igd8IisDchWo7BaVmKZN8Kf56B8JLMxpOZucb1gjeQto-4Uyf3k6piBd73Y9bf_q49-K497hPi6yelC8ZmPFktUQqmRUGI7-M44-RRwUMV9G9w5v48Hgsids5rEF7dnsnuNzuL385iCVklTI/s1700-e365/for.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="533" data-original-width="1200"></a></p>
<h3><strong>Why Conventional Tools Missed&nbsp;It</strong></h3><p>

```html
</p><table readabilitydatatable="0">
  <tbody>
    <tr>
      <td>Tool</td>
      <td>Why it Fails</td>
    </tr>
    <tr>
      <td>WAF</td>
      <td>Inspects inbound traffic only; misses outbound browser-side redirects.</td>
    </tr>
    <tr>
      <td>Static Analysis</td>
      <td>Sees the Taboola code in the source but cannot predict runtime 302 destinations.</td>
    </tr>
    <tr>
      <td>CSP Allow-lists</td>
      <td>Trust is transitive; the browser follows the redirect chain automatically once the first hop is approved.</td>
    </tr>
  </tbody>
</table><p>
```


</p><h2><strong>The Regulatory&nbsp;Fallout</strong></h2>

<p>For&nbsp;regulated entities, the absence of direct credential theft does not limit the compliance exposure. Users&nbsp;were never informed their banking session behavior would be associated with a tracking profile held by PDD Holdings &mdash; a transparency failure under GDPR Art. 13. The&nbsp;routing itself involves infrastructure in a non-adequate country, and without Standard Contractual Clauses covering this specific fourth-party relationship, the transfer is unsupported under GDPR Chapter V. "We didn't know the pixel did that" is not a defense available to a data controller under Art.&nbsp;24.</p>
<p>The&nbsp;PCI DSS exposure compounds this. A&nbsp;redirect chain terminating at an unanticipated fourth-party domain falls outside the scope of any review that evaluated only the primary vendor &mdash; which is precisely&nbsp;what <a href="https://www.reflectiz.com/blog/pci-6-4-3/">Req.&nbsp;6.4.3</a> was written to&nbsp;close.</p>
<h2><strong>Inspect Runtime, Not Just Declarations</strong></h2>
<p>Right&nbsp;now, the same Taboola pixel configuration runs on thousands of websites. The&nbsp;question isn't whether redirect chains like this are happening. They&nbsp;are. The&nbsp;question is whether your security stack can see past the first hop &mdash; or whether it stops at the domain you approved and calls it&nbsp;done.</p>
<p><strong>For security&nbsp;teams:</strong> inspect runtime behavior, not just declared vendor&nbsp;lists.&nbsp;</p>
<p><strong>For legal and privacy&nbsp;teams:</strong> browser-level tracking chains on authenticated pages warrant the same rigor as backend integrations.</p>
<p><strong>The threat entered through the front door. Your&nbsp;CSP let it&nbsp;in.</strong></p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJhTv9HGat1e2aZraBNEqPJQHwXEKBeaQgbLREvE2RMChvPSgHns8vBaYiuM385B5FoBqQ03bRUduV1WwVsXhp0-uvW_oTdAp5J_ueagyDYyrdKWpgwZYUXZBG6otrtNLIwFS8nDDTLNqGAUo-gqMKhWuZYxp8hjlxUDyKF_EosAyBpWgCBkch8Fbem-o/s1700-e365/3.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJhTv9HGat1e2aZraBNEqPJQHwXEKBeaQgbLREvE2RMChvPSgHns8vBaYiuM385B5FoBqQ03bRUduV1WwVsXhp0-uvW_oTdAp5J_ueagyDYyrdKWpgwZYUXZBG6otrtNLIwFS8nDDTLNqGAUo-gqMKhWuZYxp8hjlxUDyKF_EosAyBpWgCBkch8Fbem-o/s1700-e365/3.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="879" data-original-width="1200"></a></p>
<h3><strong><a href="https://www.reflectiz.com/learning-hub/taboola-temu-redirect-report/">The full technical evidence log is in the Security Intelligence Brief. Download it here&nbsp;&rarr;</a></strong></h3>

<p>Found this article interesting? <span class="">This article is a contributed piece from one of our valued partners.</span> Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without a single security control registering a violation. Read the full technical breakdown in the...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu-3757.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSzIRGweO7UJkqOLQTUDsqPy53XtIWCzyLklGJLfFxhneZiFpxg8zJRXukUqEsT4TbdFwUZbvTfwuexfGuiYjcDQ-iZDjqwZ2lDlCIhgopZWevBpdi4rr6GxgXpU6MmFnzdMpq_WGdA9PRfaNw_7eDAOugAV1tccfmREgbXveM1N15G2_L9lFxCq1Pv0/s1700-e365/reflectiz.jpg"/>
            </item>
                    <item>
                <title>Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/systemic-flaw-in-mcp-protocol-could-expose-150-million-downloads-3754.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-69526c10-486b-460c-a915-31e880b8b4e9" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Security researchers have warned of a &ldquo;critical, systemic&rdquo; vulnerability in the model context protocol (MCP) which could have a significant impact on the AI supply chain.</p>

<p>MCP is a popular open source standard created by <a href="https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/" target="_self">Anthropic</a> which allows AI models to connect to external data and systems.</p>

<p>However,&nbsp;<a href="https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/?_gl=1*4551xv*_up*MQ..*_ga*MzcwNjU4OTgwLjE3NzYzMzM3NTc.*_ga_BEXTPVWPX8*czE3NzYzMzM3NTUkbzEkZzAkdDE3NzYzMzM3NTUkajYwJGwwJGgw" target="_self">in a&nbsp;report published on April 15</a>, researchers at Ox Security claimed that a flaw in the protocol could enable arbitrary command execution on any vulnerable system, handing attackers access to sensitive user data, internal databases, API keys, and chat histories.</p>

<p>&ldquo;This is not a traditional coding error,&rdquo; warned the vendor.</p>

<p>&ldquo;It is an architectural design decision baked into Anthropic&rsquo;s official MCP SDKs across every supported programming language, including Python, TypeScript, Java, and Rust. Any developer building on the Anthropic MCP foundation unknowingly inherits this exposure.&rdquo;</p>

<p>It said that over 200 open source projects, 150 million downloads, 7000+ publicly accessible servers and up to 200,000 vulnerable instances in total could be exposed by the vulnerability.</p>

<p><a href="https://www.infosecurity-magazine.com/news/mcp-servers-risk-rce-data-leaks/" target="_blank"><em>Read more on MCP: Hundreds of MCP Servers at Risk of RCE and Data Leaks.</em></a></p>

<p>According to Ox Security, the exploit mechanism is fairly straightforward.</p>

<p>&ldquo;MCP&rsquo;s STDIO interface was designed to launch a local server process. But the command is executed regardless of whether the process starts successfully,&rdquo; it explained. &ldquo;Pass in a malicious command, receive an error &ndash; and the command still runs. No sanitization warnings. No red flags in the developer toolchain. Nothing.&rdquo;</p>

<p>In effect, this could result in complete takeover of a target&rsquo;s system.</p>

<h2><strong>Who&rsquo;s to Blame?</strong></h2>

<p>Ox Security said it has repeatedly tried to persuade Anthropic to patch the vulnerability. However, according to the report,&nbsp;the AI giant said that this was &ldquo;expected behavior.&rdquo;</p>

<p>&ldquo;Anthropic confirmed the behavior is by design and declined to modify the protocol, stating the STDIO execution model represents a secure default and that sanitization is the developer&rsquo;s responsibility,&rdquo; Ox Security said.</p>

<p>The company argued that pushing responsibility onto developers for securing their code, instead of securing the infrastructure it runs on, is dangerous given the community&rsquo;s track record on security.</p>

<p>In the meantime, Ox Security has issued over 30 responsible disclosures and discovered over 10 high or critical-severity CVEs, to help patch individual open source projects.</p>

<p><a href="https://www.infosecurity-magazine.com/profile/kevin-curran/" target="_self">Kevin Curran</a>,&nbsp;IEEE&nbsp;senior member and professor of cybersecurity at Ulster University, said the research exposed &ldquo;a shocking gap in the&nbsp;security&nbsp;of foundational AI infrastructure&rdquo; and that the researchers did the right thing.</p>

<p>&ldquo;We are trusting these systems with increasingly sensitive data and real-world actions. If the very protocol meant to connect AI agents is this fragile and its creators will not fix it then every company and developer building on top of it needs to treat this as an immediate wake-up call,&rdquo; he added.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/systemic-flaw-in-mcp-protocol-could-expose-150-million-downloads-3754.html</guid>
                <pubDate>Thu, 16 Apr 2026 14:00:14 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/39d74ef9-10ab-43a2-9887-96ca48a1d701.jpg"/>
            </item>
                    <item>
                <title>Insurance carriers quietly back away from covering AI outputs</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/insurance-carriers-quietly-back-away-from-covering-ai-outputs-3753.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Many insurers have begun to exempt AI workloads from cybersecurity and errors and omissions coverage, saying their outputs are too unpredictable to write policies around.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Several major insurance carriers have begun to back away from providing cybersecurity and other insurance to companies using AI to run internal processes, insiders say.</p>



<p>While there&rsquo;s no standard response to customer use of AI in the insurance market, many carriers are now quietly declining to write policies for claims related to AI-generated outputs in <a href="https://www.cio.com/article/4148261/are-nations-ready-to-be-the-cybersecurity-insurers-of-last-resort.html?utm=hybrid_search">cybersecurity</a> and <a href="https://www.investopedia.com/terms/e/errors-omissions-insurance.asp">errors and omissions</a> (E&amp;O) coverage, these observers say. Other insurance carriers are jacking up prices to cover AI-related claims, they say.</p>



<p>Dozens of insurance carriers appear to be rethinking coverage for mistakes related to AI, says <a href="https://www.linkedin.com/in/connordeeks/">Connor Deeks</a>, CEO of Codestrap, an AI development and consulting firm that works with insurance firms.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Many insurance companies aren&rsquo;t comfortable with covering AI outputs because they can&rsquo;t track the reasoning path the AI took to come up with a result, he says.</p>

		

			


<p>&ldquo;That&rsquo;s playing out downstream with insurance companies basically carving out coverage, whether that&rsquo;s across cybersecurity or E&amp;O,&rdquo; he says. &ldquo;All of these vibe-coded solutions and these AI systems that people have constructed have inherent risk baked into the cake now, and you can&rsquo;t actually see the full process.&rdquo;</p>



<p>The insurance carrier concerns about AI workloads first surfaced in November 2025, when <a href="https://www.ft.com/content/abfe9741-f438-4ed6-a673-075ec177dc62?syn-25a6b1a6=1">Financial Times reported</a> that three major carriers, AIG, Great American, and W.R. Berkley, filed requests with US regulators to offer insurance policies that exclude liabilities tied to AI tools such as chatbots and agents. At the time, those requests appeared to be preemptive moves to be allowed to exclude AI mistakes sometime in the future.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>But now, many carriers seem to be moving forward with plans to exclude <a href="https://www.cio.com/article/190888/5-famous-analytics-and-ai-disasters.html">AI mistakes</a> from policies, Deeks says. Several carriers he&rsquo;s been in contact with are moving to limit or end coverage for AI-related business disruptions and liabilities, he adds. The irony is that many insurance carriers are <a href="https://www.cio.com/article/3812588/3-key-areas-where-ai-is-transforming-insurance-today.html">embracing AI</a> for their own internal purposes.</p>



<p>Deeks&rsquo; company has a vested interest in AI insurance coverage &mdash; Codestrap markets its AI coding platform as traceable and therefore insurable &mdash; but other industry insiders have also seen similar carrier decisions.</p>



<h2 id="carriers-find-exclusions">Carriers find exclusions</h2>



<p>It&rsquo;s still unclear how many carriers will refuse to insure AI workloads, but several carriers are now writing insurance policies that exempt coverage for AI-related business chaos, says <a href="https://nsigroup.org/about-us/leadership/team-member/jason-bishara/">Jason Bishara</a>, financial practice leader at global carrier NSI Insurance Group.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The risk appetite is changing among the carriers, and it&rsquo;s always constantly evolving,&rdquo; he says. &ldquo;With regard to AI, there are carriers that are just removing it from their risk appetite and declining to quote altogether.&rdquo;</p>



<p>While some carriers have declined to cover AI outputs, others are building in rate hikes to cover the increased risk, Bishara says. While he doesn&rsquo;t have numbers on the extent of the rate hikes, they are significant, he adds.</p>



<p>&ldquo;Every business has insurance, and every business now is using AI to some extent,&rdquo; he adds. &ldquo;Are you seeing those liabilities and exclusions within these policies and an aversion to it from the carriers? The answer is yes.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Carriers are also treating AI vendors differently than AI users, he says. In many cases, carriers are declining to cover AI vendors altogether, while they carve out exceptions in policies against covering AI at companies using the technology.</p>



<p>&ldquo;If you&rsquo;re an AI-related company or specifically an AI company, there&rsquo;s a good chance that you&rsquo;ll get a declination at this point,&rdquo; he adds.</p>



<p>In recent months, many carriers have been asking detailed questions about how customers are using AI to better understand the risk of insuring potential mishaps, he says. Ultimately, this increased scrutiny will make it more difficult for companies to buy insurance for AI workloads.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;For everybody leveraging AI right now, you&rsquo;re seeing questions like, &lsquo;What are your AI policies? What are your procedures? How are you leveraging AI within your business?&rsquo;&rdquo; Bishara adds. &ldquo;We&rsquo;re getting a lot of questions from the underwriters on, &lsquo;How do you leverage AI within your business?&rsquo;&rdquo;</p>



<h2 id="coverage-in-flux">Coverage in flux</h2>



<p><a href="https://www.linkedin.com/in/philkarecki/">Phil Karecki</a>, CTO for the insurance sector at managed services provider Ensono, also sees some carriers backing away from covering AI outputs, although he&rsquo;s not sure whether it&rsquo;s a major trend. Insurance carriers continuously experiment with how to provide coverage, he notes.</p>



<p>Carriers have tried to separate tightly governed AI deployments from more experimental projects when determining whether to provide coverage, he says.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;You&rsquo;ve got this bifurcation of AI, the governed generative and the autonomous pieces,&rdquo; he says. &ldquo;It&rsquo;s no longer, &lsquo;Are you using AI?&rsquo; It&rsquo;s asking, &lsquo;Are you using governed AI? How are you governing it? How are you keeping it safe and secure?&rsquo;&rdquo;</p>



<p>Carriers have been trying to determine whether covering AI workloads can be profitable for them, Karecki adds. Governed AI tools operating in a bounded decision-making process will be more insurable, while experimental AI systems with no monitoring and no easy rollback will be difficult to cover, he notes.</p>



<p>&ldquo;There&rsquo;s a repositioning versus a pullback, and that&rsquo;s very common to the industry, and they will at times open up coverage just to see if it&rsquo;s this type of insurance that will sell,&rdquo; he says. &ldquo;They will assess the results and what needs to change so they can decide whether to re-enter this marketplace or abandon it completely.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>In some cases, whether an AI system is insurable may come down to circumstances at individual insurance customers. Carriers in general don&rsquo;t want to get out of the business of providing insurance, Karecki says.</p>



<p>&ldquo;What they&rsquo;re working for right now is, &lsquo;How do I make this profitable, and is this sector insurable?&rsquo;&rdquo; he says. &ldquo;They make those decisions on every application regardless, but now, depending upon what they&rsquo;re being asked to insure, the questions will follow. &lsquo;What are you using AI for? How are you governing it? What risks does that introduce?&rsquo;&rdquo;</p>



<p>It makes sense that some carriers have begun to question whether to cover AI outputs, given the current level of unreliability of most AI systems, says <a href="https://www.linkedin.com/in/dorian-smiley-97a72a14/">Dorian Smiley</a>, CTO at Codestrap.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The math says these models should be deterministic, like given the same input, you should get the same output,&rdquo; he says. &ldquo;But you can get very different output from the same input, and they can&rsquo;t know if the answer that they&rsquo;re giving you is actually correct.&rdquo;</p>



<p>In most cases, AI models lack inductive reason and can&rsquo;t review their own work, but many organizations are talking about deploying hundreds of <a href="https://www.cio.com/article/4152601/without-controls-an-ai-agent-can-cost-more-than-an-employee.html">autonomous agents</a> and treating them like digital employees, he notes.</p>



<p>&ldquo;The idea that these agents are going to become employees, autonomous people working in your organization, is insane,&rdquo; he says. &ldquo;You would never hire a person that can&rsquo;t learn new information, can&rsquo;t reliably retrieve information, or check their own work.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>NSI&rsquo;s Bishara has advice for IT and business leaders looking for insurance coverage for their AI workloads: Be honest about how they&rsquo;re using AI. If they try to hide their AI risks, they risk having their claims rejected when something goes wrong, he says.</p>



<p>&ldquo;If you don&rsquo;t fully disclose these things appropriately in the way in which you&rsquo;re functioning and operating, it could be utilized as an excuse to deny a claim at a later date,&rdquo; he says. &ldquo;You don&rsquo;t want a carrier to come back and say, &lsquo;We didn&rsquo;t underwrite to that risk. We asked these questions, and you didn&rsquo;t disclose it.&rsquo;&rdquo;</p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Several major insurance carriers have begun to back away from providing cybersecurity and other insurance to companies using AI to run internal processes, insiders say. While there’s no standard response to customer use of AI in the insurance market,...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/insurance-carriers-quietly-back-away-from-covering-ai-outputs-3753.html</guid>
                <pubDate>Thu, 16 Apr 2026 14:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159292-0-25050800-1776333897-ai-misfires-no-roi-shutterstock_2633982077.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Automotive Ransomware Attacks Double in a Year</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/automotive-ransomware-attacks-double-in-a-year-3752.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-a69ecda0-c683-41e3-88b0-a0ef0edae9e9" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Ransomware is now the fastest growing and most disruptive cyber threat facing the automotive sector, accounting for 44% of attacks on carmakers in 2025, according to Halcyon.</p>

<p>The security vendor crunched data from multiple sources to compile a new report on the industry. It claimed that ransomware attacks on carmakers more than doubled in 2025.</p>

<p>&ldquo;The surge in attacks reflects a calculated shift by cybercriminals who increasingly view the automotive industry as a lucrative target, driven by its rapid adoption of connected technology, growing reliance on cloud services, and a sprawling network of third-party suppliers that broadens criminals' opportunities to strike,&rdquo; the report noted.</p>

<p>It pointed to connected vehicle platforms, over-the-air (OTA) update mechanisms and cloud-based environments as having expanded the typical corporate attack surface in the sector.</p>

<p>Smaller suppliers with potentially poor security posture often have privileged access to OEMs&rsquo; IT systems, the report added.</p>

<p><a href="https://www.infosecurity-magazine.com/news/jlr-posts-639m-q2-losses/" target="_blank"><em>Read more on ransomware in the automotive sector: Cyber-Attack Costs Carmaker JLR $258m in Q2</em></a></p>

<p>The report also noted that carmakers are an increasingly popular target for attack due to their low tolerance for downtime.</p>

<p>That was highlighted last year when Jaguar Land Rover (JLR) suffered a ransomware-related production outage that stretched to five weeks, costing the firm an estimated &pound;108m per week in fixed costs and lost profit.</p>

<p><a href="https://www.infosecurity-magazine.com/news/jlr-hack-uk-costliest-ever-19bn/" target="_blank">That attack was branded</a> the most expensive in history, hitting the UK economy to the tune of &pound;1.9bn thanks to the significant knock-on effect among smaller supply chain partners that were forced to halt their production lines.</p>

<h2><strong>Halcyon&rsquo;s Mitigation Advice for the Sector</strong></h2>

<p>Halcyon urged automotive sector IT teams to get ahead of the ransomware threat by:</p>

<ul>
	<li>Patching perimeter and edge devices and assets, such as VPNs, RDP endpoints and ERP systems</li>
	<li>Deploying phishing-resistant multi-factor authentication (MFA) with a focus on on VPNs, remote access, and privileged accounts. And auditing third-party access and removing/rotating legacy credentials</li>
	<li>Hardening endpoint detection and response (EDR) tools against tampering and disabling</li>
	<li>Maintaining immutable, offline backups isolated from domain-joined systems, and testing restoration regularly</li>
	<li>Establishing baseline security requirements for supply chain partners, including software providers, and actively monitoring for breaches in third-party tools</li>
	<li>Deploying an anti-ransomware solution that can detect tell-tale behavioral patterns and stop threats before encryption</li>
</ul>

<p>Ransomware incidents over the past year or two have struck all parts of the value chain, from manufacturers and major suppliers to connected vehicle systems, the report said.</p>

<p>&ldquo;Given these escalating threats, companies across the automotive supply chain should prioritize understanding their exposure, strengthening their defenses, and ensuring they are prepared to respond when an attack occurs,&rdquo; Halcyon added.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/automotive-ransomware-attacks-double-in-a-year-3752.html</guid>
                <pubDate>Thu, 16 Apr 2026 13:00:14 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/e40165e0-2e1c-41f4-a0f0-58f62e458291.jpg"/>
            </item>
                    <item>
                <title>The endless CISO reporting line debate — and what it says about cybersecurity leadership</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/the-endless-ciso-reporting-line-debate-and-what-it-says-about-cybersecurity-leadership-3751.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				It&rsquo;s 2026 and we&rsquo;re still arguing about who the CISO reports to. The truth? The chart matters less than whether the CISO has the actual authority to influence the entire business.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>It is difficult to understand why, in 2026, we are still debating the reporting line of the chief information security officer (CISO).</p>



<p>It is one of the first topics I wrote about in <a href="https://corixpartners.com/information-security-the-reporting-line-of-the-ciso-is-key-to-success-blog/">2015</a>, and after more than two decades of high-profile cyber incidents, sustained regulatory pressure, massive technology investments and the steady elevation of cybersecurity to boardroom agendas, one might reasonably expect that this issue would have been settled long ago.</p>



<p>Yet the question persists. And articles like this <a href="https://www.csoonline.com/article/4136293/its-time-to-rethink-ciso-reporting-lines.html">It&rsquo;s time to rethink CISO reporting lines</a> show that the debate is still raw.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The fact that the debate continues tells us something important. It reveals that many organizations still struggle with a more fundamental question: What exactly is the role of the CISO within the enterprise?</p>

		

			


<h2 id="the-reporting-line-matters-but-it-was-never-the-real-question">The reporting line matters &mdash; but it was never the real question</h2>



<p>Let me be clear. The reporting line matters. It matters because it defines the authority, visibility and influence of the security function across the organization. It signals internally how seriously cybersecurity is taken and determines how effectively the CISO can engage with the executive leadership team.</p>



<p>But the reporting line was never the real question.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The real question is whether the CISO has the organizational standing necessary to influence decisions across multiple silos: IT, operations, legal, compliance, HR, procurement, third-party suppliers and increasingly a complex ecosystem of partners and digital platforms.</p>



<p>Cybersecurity is one of the very few corporate functions that touch virtually every part of the enterprise. It is therefore inherently cross-functional. Without sufficient authority and visibility, the CISO cannot hope to influence behaviour across the organization, let alone drive meaningful change.</p>



<p>If we are still debating the reporting line in 2026, it is largely because many organizations still treat cybersecurity as a technical issue rather than a leadership issue.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="the-governance-gap-behind-the-debate">The governance gap behind the debate</h2>



<p>The persistence of this debate reflects a broader governance gap.</p>



<p>Historically, information security emerged as a technical discipline embedded within IT departments. Early security teams focused primarily on protecting infrastructure: Firewalls, access controls, network monitoring and vulnerability management. In that environment, it was natural for the security function to sit within the IT organization.</p>



<p>But the nature of cyber risk has evolved dramatically.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Cybersecurity today is not merely about protecting technology infrastructure. It is about protecting digital business models, customer trust, intellectual property, operational resilience and in some sectors even national security interests.</p>



<p>In other words, cybersecurity has become a strategic business issue.</p>



<p>And yet, in many organizations, the governance structures surrounding cybersecurity have not evolved at the same pace.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The continuing debate about the CISO reporting line is therefore less about organizational design and more about whether companies have fully internalised the strategic nature of cyber risk.</p>



<h2 id="there-is-no-universal-reporting-line">There is no universal reporting line</h2>



<p>Another recurring misconception is the search for a universal answer.</p>



<p>Every year, surveys attempt to determine the &ldquo;correct&rdquo; reporting line for the CISO. Some conclude that the CISO should report to the CEO. Others recommend the CRO or the COO. Some insist that independence from IT is essential.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>In reality, there is no universal model. The reporting line remains a means to an end.</p>



<p>Organizations differ widely in their structure, culture, maturity and regulatory environment. What works in one organization may not work in another.</p>



<p>In many organizations, the CIO remains the most natural reporting line for the CISO, particularly where technology transformation and digital innovation are core strategic priorities. In others, the COO or the CEO may be better placed to support the operational changes required to embed security across business processes.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>What matters is not the job title of the executive above the CISO.</p>



<p>What matters is whether that individual has the authority, credibility, organizational reach and personal willingness to support the security agenda.</p>



<h2>Authority matters &mdash; and quite a lot of that is forged in the <a href="https://www.amazon.com/dp/B0G1BLTC2L">first 100 days</a></h2>



<p>When a new CISO joins an organization, their immediate priority is rarely technical. Instead, it is organizational: Understanding the business, mapping stakeholders, assessing governance structures and identifying the cultural barriers that may hinder security improvements.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>During those first months, the CISO must build credibility quickly across multiple constituencies. They must engage with senior executives, operational leaders, technology teams and sometimes regulators or external partners.</p>



<p>None of this can be done effectively if the CISO lacks organizational authority.</p>



<p>A reporting line that leaves the CISO buried several layers below executive leadership severely limits their ability to build the relationships required to succeed. Conversely, a reporting line that provides direct access to senior decision-makers can dramatically accelerate the process.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The reporting line, therefore, matters not because it determines technical decisions, but because it determines access, influence and credibility.</p>



<h2 id="the-illusion-of-structural-solutions">The illusion of structural solutions</h2>



<p>At the same time, we should be careful not to overstate the importance of organizational charts.</p>



<p>A common mistake is to assume that moving the CISO reporting line will automatically solve cybersecurity challenges.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>It will not.</p>



<p>Cybersecurity failures rarely occur because the organizational chart was incorrect. They occur because of poor governance, weak leadership, unclear accountability or cultural resistance to change.</p>



<p>The most effective CISOs succeed not because of perfect reporting structures but because they build trust, credibility and influence across the organization.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Which brings us to perhaps the most important factor of all: The relationship between the CISO and their direct superior.</p>



<h2 id="trust-matters-more-than-structure">Trust matters more than structure</h2>



<p>In practice, the success of the CISO depends heavily on the quality of the relationship with the executive to whom they report.</p>



<p>That relationship must be built on trust, alignment and shared understanding of the organization&rsquo;s risk appetite and strategic priorities.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>If the executive above the CISO understands the importance of cybersecurity and is willing to champion the security agenda at the board level and across the firm, the reporting structure can work extremely well.</p>



<p>If that support is absent because the business at large does not see the strategic importance of cybersecurity, no reporting line will magically solve the problem.</p>



<h2 id="the-myth-of-the-cio-ciso-conflict">The myth of the CIO&ndash;CISO conflict</h2>



<p>One final argument frequently raised in these discussions is the supposed &ldquo;conflict of interest&rdquo; between the CIO and the CISO.</p>



<p>According to this theory, the CISO should not report to the CIO because the CIO is responsible for delivering technology projects and operational performance, while the CISO is responsible for enforcing security controls that may slow things down.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>This argument may have had some relevance 20 years ago, when security functions were primarily responsible for auditing IT operations.</p>



<p>But today, it increasingly reflects an outdated understanding of both roles.</p>



<p>Modern cybersecurity is deeply intertwined with technology architecture, cloud platforms, DevOps pipelines, digital transformation programs and operational resilience initiatives. Security cannot be treated as an external oversight function policing IT from a distance.</p>



<p>It must be embedded within technology strategy itself. Any modern CIO should see it that way.</p>



<p>In that environment, close collaboration between the CIO and the CISO is not only desirable &mdash; it is essential.</p>



<p>Framing the relationship as a structural budgetary conflict and a source of friction is counterproductive and outdated. The real objective should not be to avoid friction but to engineer alignment: Ensuring that technology leadership and security leadership work together to support the organization&rsquo;s strategic goals.</p>



<h2 id="moving-beyond-the-debate">Moving beyond the debate</h2>



<p>Ultimately, the continuing debate about the CISO reporting line distracts the security industry from more important questions.</p>



<p>What matters far more is whether cybersecurity is integrated into corporate governance, supported by executive leadership and aligned with business strategy.</p>



<p>If organizations are still arguing about where the CISO should sit in 2026, it may simply indicate that they have not yet fully accepted the strategic nature of cyber risk.</p>



<p>And until that changes, the debate will likely continue.</p>



<p>Not because the answer is difficult &mdash; but because the underlying governance challenge remains unresolved.</p>



<p><strong>This article is published as part of the Foundry Expert Contributor Network.</strong><br><strong><a href="https://www.csoonline.com/expert-contributor-network/">Want to join?</a></strong></p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[It is difficult to understand why, in 2026, we are still debating the reporting line of the chief information security officer (CISO). It is one of the first topics I wrote about in 2015, and after more than two...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/the-endless-ciso-reporting-line-debate-and-what-it-says-about-cybersecurity-leadership-3751.html</guid>
                <pubDate>Thu, 16 Apr 2026 13:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4158505-0-21120100-1776330190-vitaly-gariev-y7xUr3aDLXc-unsplash.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>2026-2174 - Responsale Supply Chain locale / Head of Local Supply Chain H/F</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/2026-2174-responsale-supply-chain-locale-head-of-local-supply-chain-h-f-3750.html</link>
                                <content:encoded><![CDATA[<div id="contenu-ficheoffre" data-class="ts-offer-details-content">&#13;
&#13;
        &#13;
&#13;
            <h2>&#13;
                Informations g&eacute;n&eacute;rales&#13;
            </h2>&#13;
&#13;
            <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_entityBlock">&#13;
                &#13;
                <p><img id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_Logo" title="Entité légale (HRRO) - Clé Oracle (logo)" src="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183" alt="Entité légale (HRRO) - Clé Oracle (logo)">&#13;
                </p>&#13;
&#13;
                <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_divEntityDesc">&#13;
                    <h3>&#13;
                        Entit&eacute; de rattachement&#13;
                    </h3><p>&#13;
                    Parmi les leaders du march&eacute; des services maritimes &agrave; l'offshore, BOURBON propose aux producteurs d'&eacute;nergie en mer les plus exigeants une vaste gamme de services maritimes de surface et sous-marins, sur les champs p&eacute;troliers, gaziers et &eacute;oliens. Cette offre de services repose sur une flotte moderne et standardis&eacute;e de 223 navires et sur plus de 5 842 professionnels hautement qualifi&eacute;s. En recherche permanente d'excellence op&eacute;rationnelle, le groupe offre &agrave; ses clients un service de proximit&eacute; dans ses 37 pays d'intervention, en garantissant les plus hauts standards de qualit&eacute; et de s&eacute;curit&eacute;. En 2024, BOURBON a r&eacute;alis&eacute; un chiffre d'affaires ajust&eacute; de plus de 733 M&euro;.&nbsp;&nbsp;&#13;
                </p></div>&#13;
&#13;
                &#13;
        &#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
            </div><h3>&#13;
	Type d'offre (personnel s&eacute;dentaire/navigant)&#13;
</h3><p id="fldoffer_customcodetablevalue1">Personnel s&eacute;dentaire</p><h2>Description du poste</h2><h3>&#13;
	Intitul&eacute; du poste&#13;
</h3><p id="fldjobdescription_jobtitle">Responsale Supply Chain locale / Head of Local Supply Chain H/F</p><h3>&#13;
	Contrat&#13;
</h3><p id="fldjobdescription_contract">CDI</p><h3>&#13;
	R&ocirc;les et responsabilit&eacute;s&#13;
</h3><div id="fldjobdescription_description1">&#13;
	<p>BOURBON recrute un(e)</p><p><span><strong>Responsable Supply Chain locale / Head of Local Supply Chain H/F</strong></span></p><p>Rattach&eacute; au Chief Supply Chain Officer &middot; International vous &ecirc;tes garant de la performance op&eacute;rationnelle de la Supply Chain dans les filiales et agences du Groupe &agrave; l'international, vous assurez l'alignement entre la strat&eacute;gie Groupe et l'ex&eacute;cution terrain, en garantissant excellence op&eacute;rationnelle, fiabilit&eacute; et continuit&eacute; de bout en bout.</p><p><span><strong>VOS MISSIONS ET RESPONSABILITES&nbsp;:</strong></span></p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous pilotez la performance E2E des filiales : procurement, logistique, douanes, stock et last-mile</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous managez hi&eacute;rarchiquement les SCM locaux et d&eacute;veloppez leur maturit&eacute; op&eacute;rationnelle</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous d&eacute;finissez et challengez les KPI, animez les revues op&eacute;rationnelles et pilotez les plans d'actions correctifs</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous coordonnez en &eacute;troite collaboration avec les fonctions Groupe : Procurement, Logistique, Douanes, Digitalisation</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous assurez la couverture des agences sans &eacute;quipe SCM d&eacute;di&eacute;e via des mod&egrave;les adapt&eacute;s (mutualis&eacute;s, 3PL, gouvernance &agrave; distance)</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous contribuez activement &agrave; l'am&eacute;lioration continue, &agrave; l'harmonisation des processus et &agrave; la transformation digitale</p>&#13;
</div><h3>&#13;
	Profil&#13;
</h3><div id="fldjobdescription_description2">&#13;
	<p><span><strong>VOTRE PROFIL</strong></span></p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous &ecirc;tes titulaire d'un Bac+5 en Business, Ing&eacute;nierie, Supply Chain ou &eacute;quivalent</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous justifiez d'au moins 10 ans d'exp&eacute;rience en logistique internationale multi-pays</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez une exp&eacute;rience terrain en Afrique obligatoire, dont Afrique de l'Ouest</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous ma&icirc;trisez les environnements logistiques complexes, les proc&eacute;dures douani&egrave;res et les contraintes last-mile</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous exercez un leadership pragmatique, exigeant et orient&eacute; excellence op&eacute;rationnelle</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dans un environnement fortement international, vous avez une excellente maitrise du fran&ccedil;ais et de l&rsquo;anglais.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez un bel esprit d&rsquo;&eacute;quipe, f&eacute;d&eacute;rateur vous faites preuve d&rsquo;un fort engagement&nbsp;et d&rsquo;excellentes qualit&eacute;s relationnelles&nbsp;; vous &ecirc;tes un tr&egrave;s bon communiquant (oral et &eacute;crit) et vous savez animer des r&eacute;unions avec aisance.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; En contexte international, vous avez une parfaite maitrise du fran&ccedil;ais et de l&rsquo;anglais (lu, &eacute;crit et oral), ainsi que des outils informatiques (Outlook, EXCEL, BI, PowerPoint&hellip;).</p><p>Poste en CDI bas&eacute; &agrave; Marseille, &agrave; pourvoir d&egrave;s que possible.</p><p>Dans le cadre de notre politique d&rsquo;emploi, ce poste est ouvert aux personnes en situation de handicap.</p>&#13;
</div><h3>&#13;
	Pourquoi choisir Bourbon ?&#13;
</h3><p id="fldjobdescription_longtext1">Parmi les leaders du march&eacute;, Bourbon propose aux soci&eacute;t&eacute;s p&eacute;troli&egrave;res et gazi&egrave;res les plus exigeantes, une large gamme de services maritimes, de surface et sous-marins, pour les champs offshores et les parcs &eacute;oliens ; en s'appuyant sur une flotte innovante et performante de navires de nouvelle g&eacute;n&eacute;ration ainsi que sur l'expertise de plus de 8 400 employ&eacute;s qualifi&eacute;s.</p><h2>Localisation du poste</h2><h3>&#13;
	Localisation du poste&#13;
</h3><p id="fldlocation_location_geographicalareacollection">Europe, France, Marseille Joliette</p><h2>Crit&egrave;res candidat</h2><h3>&#13;
	Niveau d'&eacute;tudes min. requis&#13;
</h3><p id="fldapplicantcriteria_educationlevel">4. Niveau Bac + 4/5</p><h3>&#13;
	Niveau d'exp&eacute;rience min. requis&#13;
</h3><p id="fldapplicantcriteria_experiencelevel">6-10 ans</p><h3>&#13;
	Langues&#13;
</h3><ul><li>French (Advanced +++)</li><li>English (Advanced +++)</li></ul>&#13;
&#13;
        &#13;
    </div>
]]></content:encoded>
                                <description><![CDATA[Contract type : Permanent Contract Position description : BOURBON recrute un(e) Responsable Supply Chain locale / Head of Local Supply Chain H/F Rattaché au Chief Supply Chain Officer · International vous êtes garant de la performance opérationnelle de la...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/2026-2174-responsale-supply-chain-locale-head-of-local-supply-chain-h-f-3750.html</guid>
                <pubDate>Thu, 16 Apr 2026 12:00:11 +0300</pubDate>
                <media:thumbnail url="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183"/>
            </item>
                    <item>
                <title>UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign-3749.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Malware / Threat Intelligence</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH3uHu3ez1qUhePM8e1rCVaEUwBzhu09tblZcAl6jlOEYHN1Zq2-rm-dyEOArGNUm63UjM-_Qs8XwFKUa46UxOwufTn4BmRlfv1xiwlxkk3XboMQu8d4fHpy5Vb5y_0zcpXw5Alg-V_Ud85gINtfz6pfOZWWcco9Dy0jkeRCPCF-ssY2zJjRge1d3PJf_c/s1700-e365/uk.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH3uHu3ez1qUhePM8e1rCVaEUwBzhu09tblZcAl6jlOEYHN1Zq2-rm-dyEOArGNUm63UjM-_Qs8XwFKUa46UxOwufTn4BmRlfv1xiwlxkk3XboMQu8d4fHpy5Vb5y_0zcpXw5Alg-V_Ud85gINtfz6pfOZWWcco9Dy0jkeRCPCF-ssY2zJjRge1d3PJf_c/s1700-e365/uk.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>The Computer Emergencies Response Team of Ukraine (CERT-UA)&nbsp;has <a href="https://cert.gov.ua/article/6288271">disclosed</a> details of a new&nbsp;campaign that has&nbsp;targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and&nbsp;WhatsApp.</p>
<p>The activity,&nbsp;which was&nbsp;observed between March and April 2026, has been attributed to a threat cluster&nbsp;dubbed <strong>UAC-0247</strong>. The&nbsp;origins of the campaign are presently&nbsp;unknown.</p>
<p>According to CERT-UA, the starting point of the attack chain is an email message claiming to be a humanitarian aid proposal, urging recipients to click on a link that redirects to either a legitimate website compromised via a cross-site scripting (XSS) vulnerability or a bogus site created with help from artificial intelligence (AI)&nbsp;tools.</p>
<p>Regardless&nbsp;of what the&nbsp;site is, the goal is to download and run a Windows Shortcut (LNK) file, which then executes a remote HTML Application (HTA) using the native Windows&nbsp;utility, "mshta.exe."The HTA file, for its part, displays a decoy form to divert the victim's&nbsp;attention, while simultaneously fetching a&nbsp;binary responsible for&nbsp;injecting shellcode into a legitimate process (e.g., "runtimeBroker.exe").</p>
<p>"At the same time, recent campaigns have recorded the use of a two-stage loader, the second stage of&nbsp;which is implemented using a proprietary executable file format (with full support for code and data sections, import of functions from dynamic libraries, and relocation), and the final payload is additionally compressed and encrypted," CERT-UA&nbsp;said.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>One of the stagers is a tool called TCP reverse shell or its equivalent, tracked as RAVENSHELL, which establishes a TCP connection with a management server to receive&nbsp;commands for&nbsp;execution on the host using "cmd.exe."</p>
<p>Also downloaded to the infected machine is a malware family dubbed AGINGFLY and a PowerShell script referred to as SILENTLOOP that comes with several functions to execute commands, auto-update configuration, and obtain the current IP address of the management server from a Telegram channel, and fall back to alternative mechanisms for determining the command-and-control (C2)&nbsp;address.</p>
<p>Developed using C#,&nbsp;AGINGFLY is engineered to provide remote control of the affected systems. It&nbsp;communicates with a C2 server using WebSockets to fetch commands that allow it to run commands, launch a keylogger, download files, and run additional&nbsp;payloads.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_AHxWvDP44pLmXPdXa6YmuE1wb3CQljkIyHsvoDvvrqtUqEWpVdPYIwuug_YS18uDgDZfmuRi7Tam4qe1fGip8uwznKiv2JBtGxvGwgUugwJga-tCkmZVHmc-OcBjbmaVeDP3kohvXHjm82n0UcP7BEngOpkSksnp05M0FVjtbxsbrd86os2-pyfHCamQ/s1700-e365/ua-2.png"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_AHxWvDP44pLmXPdXa6YmuE1wb3CQljkIyHsvoDvvrqtUqEWpVdPYIwuug_YS18uDgDZfmuRi7Tam4qe1fGip8uwznKiv2JBtGxvGwgUugwJga-tCkmZVHmc-OcBjbmaVeDP3kohvXHjm82n0UcP7BEngOpkSksnp05M0FVjtbxsbrd86os2-pyfHCamQ/s1700-e365/ua-2.png" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="1792" data-original-width="3194"></a></p>
<p>An investigation of about a dozen incidents has revealed that these attacks facilitate reconnaissance, lateral movement, and the theft of credentials and other sensitive data from WhatsApp and Chromium-based&nbsp;browsers. Thisis accomplished by deploying various open-source tools, such as those listed below&nbsp;-</p>
<ul>
<li><a href="https://thehackernews.com/2026/03/hackers-use-fake-resumes-to-steal.html">ChromElevator</a>, a program designed to bypass Chromium's app-bound encryption (ABE) protections and harvest cookies and saved passwords</li>
<li><a href="https://github.com/kraftdenker/ZAPiXDESK">ZAPiXDESK</a>, a forensic extraction tool to decrypt local databases for WhatsApp Web</li>
<li><a href="https://github.com/bee-san/RustScan">RustScan</a>, a network scanner</li>
<li><a href="https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html">Ligolo-Ng</a>, a lightweight utility to establish tunnels from reverse TCP/TLS connections</li>
<li><a href="https://github.com/jpillora/chisel">Chisel</a>, a tool for tunneling network traffic over TCP/UDP</li>
<li>XMRig, a cryptocurrency miner&nbsp;</li>
</ul>
<p>The agency said there is evidence suggesting that representatives of the Defense Forces of Ukraine may also&nbsp;have been&nbsp;targeted as part of the&nbsp;campaign. Thisis&nbsp;based on the distribution of malicious ZIP archives via Signal&nbsp;that are&nbsp;designed to drop AGINGFLY using the DLL side-loading technique.</p>
<p>To mitigate the risk associated with the threat and minimize the attack&nbsp;surface, it's recommended to restrict the execution of LNK, HTA, and JS&nbsp;files, along&nbsp;with legitimate utilities such as "mshta.exe," "powershell.exe," and "wscript.exe."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign-3749.html</guid>
                <pubDate>Thu, 16 Apr 2026 10:00:11 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH3uHu3ez1qUhePM8e1rCVaEUwBzhu09tblZcAl6jlOEYHN1Zq2-rm-dyEOArGNUm63UjM-_Qs8XwFKUa46UxOwufTn4BmRlfv1xiwlxkk3XboMQu8d4fHpy5Vb5y_0zcpXw5Alg-V_Ud85gINtfz6pfOZWWcco9Dy0jkeRCPCF-ssY2zJjRge1d3PJf_c/s1700-e365/uk.jpg"/>
            </item>
                    <item>
                <title>6-Year Ransomware Campaign Targets Turkish Homes &amp;amp; SMBs</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/6-year-ransomware-campaign-targets-turkish-homes-amp-smbs-3748.html</link>
                                <content:encoded><![CDATA[While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.]]></content:encoded>
                                <description><![CDATA[While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/6-year-ransomware-campaign-targets-turkish-homes-amp-smbs-3748.html</guid>
                <pubDate>Thu, 16 Apr 2026 10:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7f40f3c081eecf91/69dd9708c01884640b682358/Turkey-Ivan_Tsyrkunovich-Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Retirement Checks After Death</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/retirement-checks-after-death-3747.html</link>
                                <content:encoded><![CDATA[<div data-id="220c0bbe" type="widget" data-e-type="widget" type="theme-post-content.default">
				<div>
					
<p>A Michigan resident has been sentenced for defrauding a public pension system by unlawfully collecting retirement benefits after the death of a family member, prosecutors announced. According to the Michigan Attorney General&rsquo;s Office, the defendant concealed the pension recipient&rsquo;s death for years, allowing monthly benefit payments to continue long after eligibility had ended.</p>



<p>Authorities say the pensioner passed away more than a decade ago, but the death was never reported to the municipal pension system. Instead, the defendant continued receiving benefit payments through a jointly held bank account, using the funds for personal expenses including housing costs, utilities, and travel. Over time, the scheme resulted in more than $400,000 in improper payments.</p>



<p>The fraud persisted because of gaps in how eligibility status was verified. Pension payments continued automatically, with no periodic confirmation of the recipient&rsquo;s life status and no immediate cross-check against state death records. The deception only came to light years later during a routine data match between pension enrollment files and statewide vital records.</p>



<p>That review revealed a pension recipient listed as living well beyond expected lifespan thresholds, with uninterrupted payments and no corresponding termination or survivor benefit paperwork on file. Investigators confirmed the death through official records and determined that the pension system had not been notified.</p>



<p>&ldquo;This was not an administrative oversight&mdash;it was an intentional effort to exploit system blind spots,&rdquo; said Michigan Attorney General Dana Nessel. &ldquo;Public pension funds exist to support workers in retirement, and every dollar taken through fraud erodes the integrity of those systems.&rdquo;</p>



<p>Following the case, the pension administrator implemented additional safeguards, including more frequent death-record matching, enhanced account monitoring, and mandatory periodic eligibility certifications. Officials noted that as pension systems increasingly rely on automated payments, continuous data validation is essential to prevent long-running fraud.</p>



<p>The defendant pleaded guilty to fraud-related charges and was ordered to repay the misappropriated funds.</p>



<p><strong>Today&rsquo;s Fraud of the Day is based on reporting from the Michigan Attorney General&rsquo;s Office and regional news coverage regarding pension fraud in Michigan.</strong></p>
				</div>
				</div>
]]></content:encoded>
                                <description><![CDATA[A Michigan resident has been sentenced for defrauding a public pension system by unlawfully collecting retirement benefits after the death of a family member, prosecutors announced. According to the Michigan Attorney General’s Office, the defendant concealed the pension recipient’s...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/retirement-checks-after-death-3747.html</guid>
                <pubDate>Thu, 16 Apr 2026 09:00:07 +0300</pubDate>
                <media:thumbnail url="https://fraudoftheday.com/wp-content/uploads/2019/02/Twenty-Two-Million-Dollars_1000x800.jpg"/>
            </item>
                    <item>
                <title>Was bei der Cloud-Konfiguration schiefläuft – und wie es besser geht</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/was-bei-der-cloud-konfiguration-schieflauft-und-wie-es-besser-geht-3746.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Fehlerhafte Cloud-Konfigurationen gef&auml;hrden weiterhin die Sicherheit vieler Unternehmen. Warum das so ist und wie man es besser macht, haben wir Experten gefragt.			</h2>
			
		</div>
										</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>



<div><figure><img fetchpriority="high" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2025/12/DC-Studio_shutterstock_2491367559_16z9.jpg?quality=50&amp;strip=all&amp;w=1024" alt="Laptop Work Close 16z9" width="1024" height="576" sizes=" 1024px) 100vw, 1024px" loading="lazy">Fehlerhaft konfigurierte Cloud-Dienste sorgen regelm&auml;&szlig;ig f&uuml;r Datenlecks &ndash; und schlimmeres.</figure><p>DC Studio | shutterstock.com</p></div>



<p>Konfigurationsfehler in der Cloud, die Unternehmensdaten gef&auml;hrden, sind nicht unbedingt etwas Neues &ndash; eher <a href="https://www.csoonline.com/article/564399/cloud-security-configuration-errors-put-data-at-risk-new-tools-can-help.html" target="_blank">im Gegenteil</a>. Umso schlimmer, dass Unternehmen ihre Cloud-Ressourcen immer noch nicht durchg&auml;ngig absichern. Zumindest legt das ein aktueller <a href="https://blog.qualys.com/vulnerabilities-threat-research/2025/04/03/the-state-of-cloud-saas-security-essential-statistics-and-insights" target="_blank" rel="noreferrer noopener">Report</a> nahe. Daf&uuml;r hat der Cloud-Sicherheitsanbieter Qualys 101 Cybersecurity- und IT-Profis befragt, zu deren Aufgaben es geh&ouml;rt, Cloud-Umgebungen abzusichern. Demnach:</p>



<ul>
<li>haben <strong>28 Prozent</strong> der Befragten im vergangenen Jahr einen Breach in Zusammenhang mit der Cloud oder SaaS-Applikationen verzeichnet.</li>



<li>sehen <strong>24 Prozent</strong> falsch konfigurierte Services als das gr&ouml;&szlig;te Risiko f&uuml;r ihre Cloud-Umgebung an.</li>
</ul>



<p>Qualys nahm f&uuml;r seine Studie au&szlig;erdem rund 44 Millionen virtuelle Maschinen (<a href="https://www.computerwoche.de/article/2814705/was-sind-virtual-machines.html" target="_blank">VMs</a>) unter die Lupe, die in Public Clouds gehostet werden. Dabei stellten die Experten fest, dass <strong>45 Prozent</strong> der AWS-VMs, <strong>63 Prozent</strong> der GCP-VMs und <strong>70 Prozent</strong> der Azure-VMs &uuml;ber falsch konfigurierte Ressourcen verf&uuml;gten.</p>



<h2 id="die-haeufigsten-cloud-konfigurationsfehler">Die h&auml;ufigsten Cloud-Konfigurationsfehler</h2>



<p>Laut <a href="https://www.linkedin.com/in/royayan" target="_blank" rel="noreferrer noopener">Ayan Roy</a>, Leiter des Bereichs Cybersicherheit bei EY Americas, aktivieren Unternehmen zwar durchaus bestimmte Cloud-Security-Funktionen, allerdings nicht alle. So blieben Logging, Monitoring und Multi-Faktor-Authentifizierung (<a href="https://www.csoonline.com/article/3494878/zugriffe-sicher-verwaltenmfa-bietet-trugerische-sicherheit.html" target="_blank">MFA</a>) in vielen F&auml;llen unbeachtet: &ldquo;Unternehmen wollen schnell vorankommen, und die Time-to-Value ist absolut entscheidend. Wenn Cybersicherheitsteams jedoch nicht in diese Entscheidungen eingebunden werden, beginnen die Probleme. So k&ouml;nnen die Sicherheitsprofis oft nur nachtr&auml;glich Ma&szlig;nahmen ergreifen.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Einen weiteren blinden Fleck in Sachen Cloud Security sieht Roy w&auml;hrend <a href="https://www.csoonline.com/article/3492925/5-mergers-acquisitions-strategien-so-managen-sie-security-risiken-bei-ubernahmen.html" target="_blank">Fusionen und &Uuml;bernahmen</a>. Er mahnt Unternehmen dazu, in solchen F&auml;llen proaktiv vorzugehen: &ldquo;F&uuml;hren Sie eine Due Diligence durch, ber&uuml;cksichtigen Sie diese auch und stellen Sie sicher, dass Sie den richtigen Cybersecurity-Investitionsplan haben.&rdquo;</p>

		

			


<p>Laut <a href="https://www.linkedin.com/in/dscottwheeler" target="_blank" rel="noreferrer noopener">Scott Wheeler</a>, Cloud Practice Lead bei Asperitas, treten mit steigender Unternehmensgr&ouml;&szlig;e auch weniger Cloud-Konfigurationsfehler auf. Das liegt laut dem Cloud-Experten vor allem an der Aufsicht durch Regulierungsbeh&ouml;rden. Kleine Firmen h&auml;tten hingegen enorme Probleme, da sie weder &uuml;ber das Personal noch die n&ouml;tigen Tools verf&uuml;gten, um Risiken im Zusammenhang mit der Cloud-Konfiguration zu managen &ndash; etwa exponierte Speicher-Buckets oder Web Services. &nbsp;</p>



<p>&ldquo;Das gesamte Konzept von <a href="https://www.csoonline.com/article/4050543/zero-trust-bereitet-cisos-probleme.html" target="_blank">Zero Trust</a> basiert auf der Tatsache, dass man den Zugriff auf das ben&ouml;tigte Minimum beschr&auml;nken kann. Aber das ist in der Praxis schwer zu bewerkstelligen&rdquo;, erkl&auml;rt Wheeler. Oftmals w&uuml;rden w&auml;hrend der Entwicklung Berechtigungen erweitert und nach der Inbetriebnahme nicht wieder zur&uuml;ckgesetzt, wie er beispielhaft anf&uuml;hrt. Der regelm&auml;&szlig;ig gr&ouml;&szlig;te Fehler, den Wheeler beobachtet, sind jedoch Datenbanken oder andere Cloud-Assets, die &uuml;ber nicht sichere, private Netzwerke kommunizieren. &ldquo;Viele dieser Services unterst&uuml;tzen das nicht &lsquo;out of the box&rsquo;. Es erfordert einiges an Arbeit, sie so zu konfigurieren, dass ausschlie&szlig;lich privater Netzwerkverkehr in private Cloud- oder lokale Umgebungen flie&szlig;t. Das ist ein gro&szlig;es Problem, das oft von kriminellen Hackern ausgenutzt wird.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Und auch wenn viele Anbieter versprechen, dass KI auch Cloud Security einfacher, kosteng&uuml;nstiger und effektiver gestalten wird: Sie sollten nicht damit rechnen, dass Cloud-Konfigurationsprobleme schon morgen der Vergangenheit angeh&ouml;ren. Bis <a href="https://www.csoonline.com/article/4082575/agentic-ai-die-besten-security-anwendungsfalle.html" target="_blank">KI-Agenten</a> soweit sind, dass sie das zuverl&auml;ssig &uuml;bernehmen k&ouml;nnen, wird noch ein bisschen Zeit ins Land ziehen.</p>



<h2 id="9-tipps-fuer-sicherere-cloud-konfigurationen">9 Tipps f&uuml;r sicherere Cloud-Konfigurationen</h2>



<p>Tun k&ouml;nnen Sie dennoch etwas gegen fehlerhafte Cloud-Konfigurationen. Zum Beispiel: </p>



<p><strong>1. Multi-Faktor-Authentifizierung implementieren</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>MFA sollte f&uuml;r jede Form von Cloud-Zugriff zur Anwendung kommen, nicht nur f&uuml;r bestimmte Benutzer.</p>



<p><strong>2. Private Netzwerke f&uuml;r alle Services nutzen</strong></p>



<p>Konfigurieren Sie Datenbanken und Cloud-Dienste so, dass sie nur &uuml;ber private Netzwerke und nicht &uuml;ber das &ouml;ffentliche Internet kommunizieren.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>3. Daten verschl&uuml;sseln</strong></p>



<p>Datenverschl&uuml;sselung sollte f&uuml;r alle neuen und bestehenden Ressourcen standardm&auml;&szlig;ig aktiviert sein. Angesichts des nahenden Quanten-Zeitalters empfiehlt es sich f&uuml;r Unternehmen bereits jetzt auf quantensichere Verschl&uuml;sselungsalgorithmen zu setzen, um sich gegen sogenannte &ldquo;Harvest now, decrypt later&rdquo;-Angriffe zu sch&uuml;tzen.</p>



<p><strong>4. Least-Privilege-Zugriffskontrollen anwenden</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Benutzern und Systemen Zugriff auf m&ouml;glichst wenige Ressourcen zu gew&auml;hren, ist ein Grundpfeiler moderner Zero-Trust-Sicherheitsprinzipien. Konten mit &uuml;berm&auml;&szlig;igen Berechtigungen k&ouml;nnen schnell zu Datenverlust f&uuml;hren, wenn sie missbraucht werden.</p>



<p><strong>5. Infrastructure as Code verwenden</strong></p>



<p>Wenn Administratoren oder Benutzer &Auml;nderungen an Cloud-Konfigurationen in den Cloud-Management-Konsolen vornehmen, ist es oft schwierig, diese nachzuvollziehen &ndash; und r&uuml;ckg&auml;ngig zu machen, wenn etwas schiefgeht. Das Prinzip von <a href="https://www.computerwoche.de/article/2808916/was-ist-infrastructure-as-code.html" target="_blank">Infrastructure as Code</a> hilft an dieser Stelle: Verwenden Sie entsprechende Konfigurationsmanagement-Tools, um s&auml;mtliche &Auml;nderungen anhand von Richtlinien zu &uuml;berpr&uuml;fen, nachzuverfolgen und auditieren zu k&ouml;nnen.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>6. Kontinuierlich scannen</strong></p>



<p>Einmal bei der Ersteinrichtung der Cloud-Ressourcen zu &uuml;berpr&uuml;fen, ob die Konfigurationen aktuell sind, reicht nicht aus. Unternehmen m&uuml;ssen sicherstellen, dass sich nichts ver&auml;ndert. Zu diesem Zweck haben einige Cloud-Anbieter native Tools im Angebot. L&ouml;sungen aus dem Bereich Cloud Security Posture Management (<a href="https://www.csoonline.com/article/3495818/cloud-risiken-verwalten-so-wahlen-sie-das-passende-cspm-tool-aus.html" target="_blank">CSPM</a>) k&ouml;nnen au&szlig;erdem dabei unterst&uuml;tzen, L&uuml;cken zu schlie&szlig;en oder Multi-Cloud-Umgebungen zu &uuml;berwachen.</p>



<p><strong>7. Speicher-Buckets sperren</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Unsichere Amazon-S3-Buckets waren vor einigen Jahren bei Cyberkriminellen sehr popul&auml;r &ndash; und sind nach wie vor ein g&auml;ngiges Problem f&uuml;r Unternehmen. Um sicherzustellen, dass der Storage standardm&auml;&szlig;ig privat ist, empfehlen sich Bucket Policies und -Zugriffskontrollen.</p>



<p><strong>8. Logging und Monitoring einziehen</strong></p>



<p>Viele Unternehmen &uuml;berwachen essenzielle Cloud Services, dabei bleibt <a href="https://www.csoonline.com/article/3494462/schatten-ki-gefahrdet-unternehmensdaten.html" target="_blank">Schatten-IT</a> jedoch oft au&szlig;en vor. Das ist weniger ein technologisches, als vielmehr ein Management-Problem und l&auml;sst sich durch bessere Kommunikation mit den Gesch&auml;ftsbereichen und einen disziplinierteren Ansatz bei der Bereitstellung von Technologien l&ouml;sen.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>9. Security by Design verinnerlichen</strong></p>



<p>Integrieren Sie Sicherheit von Anfang an in Ihre Cloud-Architektur &ndash; es ist immer deutlich schwieriger, nachtr&auml;glich aufzur&uuml;sten. (fm)</p>
</div></div></div><p><img src="https://ssl-idgbusiness.met.vgwort.de/na/%5Bf7d8ba1191694205ac6f0c930a3f55de%5D" width="1" height="1" alt="vgwort"></p></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				ABONNIERE UNSEREN NEWSLETTER			</p>
							<h3>
				Von unseren Redakteuren direkt in Ihren Posteingang			</h3>
							<p>
				Beginnen Sie, indem Sie unten Ihre E-Mail-Adresse eingeben.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Fehlerhaft konfigurierte Cloud-Dienste sorgen regelmäßig für Datenlecks – und schlimmeres.DC Studio | shutterstock.com Konfigurationsfehler in der Cloud, die Unternehmensdaten gefährden, sind nicht unbedingt etwas Neues – eher im Gegenteil. Umso schlimmer, dass Unternehmen ihre Cloud-Ressourcen immer noch nicht durchgängig...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/was-bei-der-cloud-konfiguration-schieflauft-und-wie-es-besser-geht-3746.html</guid>
                <pubDate>Thu, 16 Apr 2026 08:00:17 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4107149-0-59915200-1776312119-DC-Studio_shutterstock_2491367559_16z9.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Smashing Security podcast #463: This AI company leaked its own code. It’s also built something terrifying</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/smashing-security-podcast-463-this-ai-company-leaked-its-own-code-it-s-also-built-something-terrifying-3745.html</link>
                                <content:encoded><![CDATA[<div>
                
                                <div data-start="3.462">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I had my data stolen once, Graham, from a governmental organization I worked at.</p>
                </div>
                                
                                <div data-start="8.608">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And they were selling it online for the bitcoin equivalent of $50 Canadian. And that made me feel very humiliated.</p>
                </div>
                                <div data-start="17.423">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Were you like, please, please sell it for more?</p>
                </div>
                                <div data-start="20.132">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I know, I was like, aren't we worth more than that?</p>
                </div>
                                <div data-start="31.899">
                    <p><span>Unknown</span>
                        
                    </p>
                    <p>463. This AI company leaked its own code. It's also built something terrifying. With Graham Cluley and special guest Tanya Janca. Hello, hello, and welcome to Smashing Security episode 463. My name's Graham Cluley.</p>
                </div>
                                <div data-start="47.487">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And I'm Tanya Janca.</p>
                </div>
                                <div data-start="47.744">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Tanya Janca, first time on Smashing Security. Hello. How the flip are you?</p>
                </div>
                                <div data-start="56.478">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I am wonderful, Graham. How are you?</p>
                </div>
                                <div data-start="58.886">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>I'm gorgeous. Now, you are dialing in today from the beautiful Canadia. Thank you very much for doing that. Now, you are a famous name, right? You're a pretty big deal in the world of cybersecurity. So if people haven't heard of you, how can you describe what you do and what you're all about?</p>
                </div>
                                <div data-start="77.6">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So I am a software developer turned application security expert who really likes to write. And now has written a bunch of books and tons of blogs. I really like to speak, so I speak at conferences, and right now I'm giving secure coding training to large organizations and then kind of just doing contracts here and there, helping people change their application security program so it's more AI aware.</p>
                </div>
                                <div data-start="101.411">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Okay, so you are going into organizations and you're helping those developers code more securely, which is a pretty good idea, I think, because we don't want software which is full of security holes like Swiss cheese.</p>
                </div>
                                <div data-start="113.215">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Well, we have a lot of that right now all over the internet. Right now, that is a giant problem, and especially not on the internet, embedded devices. You know, you go into an emergency room, a hospital, all of those places, the security is usually much worse than it is on the internet, and it's not great on the internet.</p>
                </div>
                                <div data-start="130.876">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Now, a little birdie tells me, Tanya, that you have recently set up a rival podcast to Smashing Security, and you are basically I'm thinking that you can come in here and tell everyone about your podcast. Is that correct?</p>
                </div>
                                <div data-start="145.474">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>It's 100% correct, Graham. Right, right. My completely different topic podcast is called DevSecStation, and it's 5 to 10 minute mini lessons for software developers about security. So, this month I'm covering the supply chain and how to secure the supply chain and how software developers they're a target now. Malicious actors are actually targeting the actual developer, the human, and they need to know.</p>
                </div>
                                <div data-start="174.197">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>That's interesting actually, isn't it? Because of course, it's easy to imagine how hackers could target people who work in the finance department, for instance.</p>
                </div>
                                
                                <div data-start="181.893">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>But if they're targeting the developers themselves, the idea, I presume, is to try to implant code within the code which these developers are writing, because eventually it will roll out to many, many organizations and could cause absolute mayhem.</p>
                </div>
                                <div data-start="196.87">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Absolutely. So, often, the past couple years, people will say, oh, there was a software supply chain breach. But if we look at maybe half of those, it was actually the software developer that was compromised. And then as a result, multiple parts of the supply chain was breached because they have superpowers, because they can control the CI, and they control their IDE, and they control the repo, and they can go to prod, and, and, and. And so, you get the developer's credentials and suddenly you have everything. And then on top of that, what some of the malicious actors have been doing, Graham, is then they rob the developer as well.</p>
                </div>
                                
                                <div data-start="233.057">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So they go and they try to empty their crypto wallets because why don't we just kick people while we're down?</p>
                </div>
                                <div data-start="238.587">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Developers are the kind of people who quite often would have crypto wallets, wouldn't they?</p>
                </div>
                                
                                <div data-start="242.594">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>And so they understand the technology and so they may have a few thousand dollars or perhaps more.</p>
                </div>
                                <div data-start="247.788">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>They'd be significantly more likely to have a crypto wallet than the average person.</p>
                </div>
                                <div data-start="252.072">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>And I'm also thinking that, I mean, my background is I used to be a developer many years ago, used to write antivirus software. And I remember from way back then that the programmers are also the kind of people who would demand to have admin privileges on their computers because they feel they have godlike capabilities anyway. And so they would be arguing with the IT team, well, I need all of these rights. And that could be a security threat in itself, couldn't it?</p>
                </div>
                                <div data-start="278.103">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Oh yeah, for sure, Graham. And I was a software developer longer than I've worked in security. I was that person for sure. And on top of having admin rights and being the lord of their workstation, I think a lot of people, when we think of the CI/CD, we think of it as a thing that publishes code and we don't think about how it's a thing that talks to the outside, does downloads, tells us if everything's okay or not, decides to log or not log certain security things. And very few organizations are currently logging or alerting, for instance, if a new admin gets added or if a new workflow gets added. I worked at a place, I was contracting there, and we're playing around with their CI because I'm going to add some stuff and&mdash;</p>
                </div>
                                <div data-start="322.826">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Time, time, time, Tanya. Look, you've been developing code more recently than me, and I recognize that there's a lot of listeners who may not work in the programming world. You're giving me some acronyms here. No, no, no, it's all right. But what is that? What is that that you are talking about?</p>
                </div>
                                <div data-start="337.853">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So a CI/CD, continuous integration, continuous delivery pipeline. It's a piece of software that the software developers will put their code into, and then it will run lots of tests. It will go and get things off the internet for them. It'll add some updates, it can log things, it can send alerts, and then it will put a copy of whatever the thing is they're building onto maybe a development server so they can play with it and look at it and do more tests. And then if all those tests pass, it's, hmm, that seemed pretty good. Let's put it on another server and let another team see it. And it goes from environment to environment automatically, automagically even. And then by the end, assuming it passes all the tests and the humans it, it goes out into production, which is where you and I and most of us humans live. So, if you're a customer and you're using software, you don't know, but that's called production. That's the place where the magic happens, where the users are. But there's all these other environments below that where we're playing around with things of making sure things are okay and making sure they're safe. And so this system is usually the most powerful software system in an organization. It can go to the internet and download things. It can install things. It can delete things. It can decide this code's not good enough and it's not going anywhere on my watch. And it does most of this quite automatically without human intervention. And now imagine a malicious actor takes that over. They could literally put code in that's bad and put it out into your product and release it to all your customers without you knowing. And it's happened a bunch of times and we're not protecting these systems very well. And so, I'm talking about it.</p>
                </div>
                                <div data-start="383.425">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>If you're there for a month, Graham, you could have 50 cappuccinos.</p>
                </div>
                                <div data-start="433.632">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I think new software is having security added significantly more often. However, we couldn't have a podcast episode without talking about AI. So everyone right now is using Cloud, which we're going to talk about in a bit, and Copilot, et cetera, to write code for them. And the quality of code coming out of those is not very good right now. And I am seeing it improve, but not the speed that I dream of. Graham, it sounds weird, but I want to be put out of a job, right? Like, I would like to not need to teach secure coding anymore because we've got this. That's what I want. And the AI is not doing it for us. So what's happening now is that we have developers with varying levels of how to create secure software and varying level of prioritization on that. And then now they're being told develop software at 10 times the speed or we're going to fire you and hire someone else. So, they're using the AI, the AI is changing tons and tons of things they don't fully understand. They don't have time to review it. They're just pressing the commit button. And that is my fear for new software. For old software, it's, it's that, oh, it's always worked. Why would we update it? We'd have to re-architect it to fix that. We don't have money for that. We'll just leave it. A lot of legacy is in a bad shape. And by legacy, I mean software that's already out in production that's been out one or more years.</p>
                </div>
                                <div data-start="492.968">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Well, you know what? I think more people need to tune into DevSecStation, the brand new podcast, something of a competitor to Smashing Security, to learn more about this. Anyway, great to have you here, Tanya. Before we kick off, let's thank this week's wonderful sponsors: Meta, CoreView, and Vanta. We'll be hearing more about them later on in the podcast. This week on Smashing Security, we won't be talking about how hackers have breached travel site Booking.com, stealing names, addresses, phone numbers, and information shared with hotels. You'll hear no discussion of how Rockstar Games, the makers of Grand Theft Auto, have been hacked for the second time in 3 years. And we won't even mention how Meta is blocking lawyers from running ads on Facebook and Instagram to recruit clients who say that they've been harmed by social media. So, Tanya, what are you going to be talking about this week?</p>
                </div>
                                <div data-start="510.201">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I am going to talk about how Anthropic accidentally leaked their code for Claude Code CLI. And then I'm also going to talk about Mythos, the new model that is terrifying. Yeah.</p>
                </div>
                                <div data-start="527.899">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yeah. And I'm going to be talking about how Venetians are getting themselves in a world about hackers. All this and much more coming up on this episode of Smashing Security. Well, we've got time now to talk about one of today's sponsors, Vanta. Joe, what keeps you up at 2 o'clock in the morning?</p>
                </div>
                                <div data-start="546.035">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>The dog next door, mostly.</p>
                </div>
                                <div data-start="558.879">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>So you are not even All right, well, yeah, but I'm getting the web traffic is talking professionally, what keeps you up? the truth, right?</p>
                </div>
                                <div data-start="588.895">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>Oh, whether we've got the right security controls in place, whether our vendors are secure, how to escape the nightmare of outdated tools and endless manual processes.</p>
                </div>
                                <div data-start="614.644">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Exactly, which is where today's sponsor comes in. It's Vanta.</p>
                </div>
                                <div data-start="627.003">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>It's a little bit like when H.D. Moore released Metasploit so many years ago. So Metasploit is a tool that you can point at a web app or a piece of online infrastructure. So it needs to be webby. And it will go and try to exploit a list of known CVEs, so Common Vulnerability Enumerators. So vulnerabilities that are publicly known in software that you can buy. So not custom software, but, you know, I have version XYZ of Apache web server and it's known to have that vulnerability. And so you point Metasploit at it, and if it has that vulnerability, it'll go and it'll open up a hole there and exploit it. And in the wrong hands, you can use that to hurt people just the same as if you give a scalpel to someone, they can cut themselves, they can cut someone else. But this tool, it's kind of handing someone an atomic bomb.</p>
                </div>
                                <div data-start="636.453">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>Fanta, the fizzy orange drink.</p>
                </div>
                                <div data-start="642.003">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And so I feel, you know, for instance, let's say a big company Microsoft or Netflix or whatever, some big software company, they get a license to use it internally. They find all their own bugs. They have time because they're not publicly exposing, you know, no one else knows but them and they're fixing it. It would be the ultimate pen test, right? That could be great, except for what if one of those employees then sells those vulnerabilities to a malicious actor?</p>
                </div>
                                <div data-start="646.594">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>How can this possibly be true?</p>
                </div>
                                <div data-start="649.503">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>You know what I mean? Or they take it and then they point it at something they're not supposed to, right? Because it's so powerful and it's so fast and it's finding apparently very novel, unique things that humans haven't been able to see before. It's quite disconcerting, or I think so.</p>
                </div>
                                <div data-start="656.735">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>No, no, Joe, it's a Vanta with a V. It's a trust management platform. It's not a drink full of sugar. It automates all of that tedious manual compliance work so you can stop drowning in spreadsheets, chasing audit evidence, and filling out questionnaire after questionnaire.</p>
                </div>
                                <div data-start="670.879">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>Lush. I hate questionnaires.</p>
                </div>
                                <div data-start="695.097">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Well, who doesn't? Vanta continuously monitors your systems. It centralizes your security data. It keeps your program audit ready all of the time. It also uses AI to streamline evidence collection and flag risks. It automates compliance for SOC 2, ISO 27001, HIPAA, GDPR, and more.</p>
                </div>
                                
                                <div data-start="712.87">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>So basically it handles the boring stuff so we can focus on the interesting stuff.</p>
                </div>
                                <div data-start="732.336">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Exactly. Precisely that. And for a limited time, new customers can get $1,000 off. $1,000? Yep, $1,000. Head to vanta.com/smashing. That's vanta.com/smashing and get started today. Which is this. Maybe this will give you a little bit of comfort.</p>
                </div>
                                <div data-start="753.23">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>And maybe get a decent night's sleep for once. Oh, and unlike fizzy drinks, Fanta isn't bad for you.</p>
                </div>
                                <div data-start="754.53">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Do you get any comfort at all from the thought that the people building these tools are still fundamentally human and therefore fundamentally fallible? Thank goodness it's not the AI, right?</p>
                </div>
                                <div data-start="760.573">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>That was a fruit twist.</p>
                </div>
                                <div data-start="762.03">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>It's human error. Hey, yes, us humans, haven't we done great? Now, chums, I want you to picture this. You are a tourist in Venice. It's a warm, Spring morning, you've just paid &euro;12 for a cappuccino, and you're standing in Piazza San Marco watching the pigeons do their thing. Because we've really cocked up on this occasion by leaking the source code. I think we should feel good about that rather than it being an AI which screwed up, which surely is only a short way away. And what you don't realise is, while you're there in that beautiful setting, that somewhere on a dark Telegram channel, a hacking group is claiming that they could, at the press of a button, send water flooding across the very stones that you are standing on. Which would of course solve the pigeon problem in Venice, at least temporarily. Now, Tanya, have you ever been to Venice? Does this make you want to go?</p>
                </div>
                                <div data-start="788.182">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So I haven't been to Venice, and I still want to go. Wet feet are okay with me.</p>
                </div>
                                <div data-start="801.565">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Right? Wet feet are alright. Pack your flippers. Well, a hacking group called the Infrastructure Destruction Squad, they announced in early April that they had broken into the hydraulic pump system that protects Piazza San Marco, in Venice from the notorious high tides of Venice. They said that they accessed the system's control interface on the 26th of March. They spent about 10 days quietly poking around, having a little rummage, and then on the 7th of April, they began what they called the disclosure phase. And the disclosure phase, that's hacker speak for bragging about it on Telegram. Right?</p>
                </div>
                                
                                <div data-start="834.864">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Because you can't be a hacker these days without a bit of bragging. They were sharing screenshots of control panels and valve states and system layouts, and then they offered to sell full root access to one of Italy's most iconic pieces of critical infrastructure.</p>
                </div>
                                <div data-start="845.198">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So they should go to shehackspurple.ca. And if you sign up for my newsletter, which is free, you'll get invites to everywhere I speak. That's scary. You'll see all my new content every month. You'll get the episode of the podcast and you'll get at least one meme. And memes are important, Graham.</p>
                </div>
                                <div data-start="866.768">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>How much do you think they could charge?</p>
                </div>
                                <div data-start="883.283">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>A million dollars?</p>
                </div>
                                <div data-start="898.826">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>I mean, that is plausible, isn't it? They could try that. How about $600? Oh my gosh, Graham. Not $6 million. Not $6,000. $600. Which is about the price of a mid-range Android phone. Or if you're in Venice, round about 50 cappuccinos.</p>
                </div>
                                <div data-start="916.413">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Yeah, 50 cappuccinos. That sounds nice though. 50 cappuccinos sounds nice.</p>
                </div>
                                <div data-start="931.832">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>You'd be high as anything, Tanya. You can't drink 50 cappuccinos.</p>
                </div>
                                <div data-start="968.458">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>I suppose over a month you could. I was thinking it would all be consumed in one day, in which case you'd be desperate for the loo, wouldn't you?</p>
                </div>
                                <div data-start="985.5">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Yeah, that'd be awful.</p>
                </div>
                                <div data-start="1000.438">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Now, you live in the world of application security, Tanya. It's all about software code, web apps, all that CI/CD nonsense. When you hear $600 to access flood defense infrastructure, is that a surprising number to you, or is it just depressingly familiar for critical systems security? What's your feeling?</p>
                </div>
                                <div data-start="1014.085">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So my first thought is that it's very low. However, I had my data stolen once, Graham, from a governmental organization I worked at.</p>
                </div>
                                
                                <div data-start="1046.693">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And they were selling it online for the bitcoin equivalent of $50 Canadian. And that made me feel very humiliated.</p>
                </div>
                                <div data-start="1062.819">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Were you like, please, please sell it for more?</p>
                </div>
                                <div data-start="1076.082">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I know. I was like, aren't we worth more than that?</p>
                </div>
                                <div data-start="1091.864">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>It's such a slap in the face, isn't it?</p>
                </div>
                                <div data-start="1103.806">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Right, right. But you could just scrape the stuff off our website. None of it was private. It was publicly available data. So I was like, well, I mean, maybe what they're paying for is the convenience of it being in an Excel spreadsheet instead of having to scrape it. But I feel like $600 seems like they don't actually have access and they're just a kid in a basement being like, whoa, &euro;600, that would be amazing. We could have 50 cappuccinos.</p>
                </div>
                                <div data-start="1118.795">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>It's a strange old thing, isn't it? So they were posting up on Telegram this thing saying, you know, you can have access to this too as well for such a small amount of money. And their Telegram post, which was written in Chinese&mdash; I don't speak Chinese, I don't read Chinese, but thankfully the internet can do all that for me. This is what it was saying in English. It said, yes, you conducted new checks after the attack in late March. Yes, equipment tests came back positive after Easter. In other words, they were tracking the remediation efforts being made by the organisation trying to clean up afterwards. They were doing this in real time while Telegram posts were being written about it. And they continued, but what you haven't understood is that we have refused to completely shut down the flood defense system. So they're trying to make Venice basically say, oh, thank you very much. That's very good of you. We're very grateful. They said, we are not here to destroy you. We are simply here to deliver a message. We can do it and we are still inside your network. 'No tests conducted by your security teams can drive us away. No system updates can expel us. We've been here for months and will remain here for months to come.' Which is fairly aggressive, kind of spooky talk, isn't it?</p>
                </div>
                                <div data-start="1134.506">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>It is. It makes me wonder if they have persistence on the network, where that is, right?</p>
                </div>
                                <div data-start="1152.151">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yeah. I wonder how they're managing it. It'd be interesting to know, wouldn't it? And they carried on. They had a message for the press as well. They said, 'Any newspaper that disseminates this news without understanding the truth, prepare for a devastating attack. I mean, to be honest, at this point, I'm beginning to think this is most likely a 14-year-old. Yeah, there's a lot of bravado going on here, isn't there? But to recap, these hackers broke in, refusing to leave, threatening journalists, but they're only charging $600 for the privilege of having access yourself. So you could imagine if someone had a problem with Venice. I don't know, maybe you were in charge of IT at a rival European tourist destination. Maybe if you thought, "Oh, Venice has beaten us once again with all of their gondoliers and cornettos. If only we could access their flood defence system, and basically when that next high tide comes, we could ensure that they get flooded."</p>
                </div>
                                <div data-start="1167.054">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I don't know. I don't want to cause destruction. Maybe I'm weird.</p>
                </div>
                                <div data-start="1181.007">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>You're Canadian. Of course you're not destructive. You know, you're just unbelievably pleasant all the time, aren't you? But I mean, but there are&mdash; now, this may come as a shock to you as a Canadian, but there are countries&mdash; I'm not going to name any countries, particularly to you, a Canadian&mdash; but there are countries which are perhaps a little bit more interested sometimes, some elements of them, in destruction. I'm just saying it's possible. But of course, lots of hacktivist groups may be interested. And look, a lot of the early malware which we saw was purely destructive. It would wipe drives or delete files. You know, there was no point to it. There was no financial incentive. It was about just being mindless, really, in a way.</p>
                </div>
                                <div data-start="1195.344">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I feel like there's a certain, I need to prove that I'm cool sort of thing, especially when we are coming of age, like teenagers, like I need my peers to see I'm cool. I need people to think I'm powerful. And then hopefully that sort of just wears off when we mature and we're like, actually, I could just achieve things and be awesome and I could prove I'm amazing by actually doing positive, good contributions to the world rather than negative ones. But I feel like sometimes people get lost, and maybe they don't see that there are good things that they could do to prove how awesome they are rather than bad things.</p>
                </div>
                                <div data-start="1210.136">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Do you think it's a bit of low self-esteem? Do you think, is it that they simply don't have girlfriends, boyfriends, or whatever it is that they're after? Maybe there's something missing in their lives.</p>
                </div>
                                <div data-start="1229.941">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Yeah, I often joke they just need to go get a life and maybe they need a dog. Think about it though, they're not finding this purpose in their life, this thing that brings them joy, and they're angry. And so they're taking it out on people. And I feel like if we could find a way&mdash; when we do the Pick of the Week, we're gonna talk a little bit about maybe this, but I feel like you're really onto something there, Graham. I've said things like this before where I'm just like, you know, why are people doing this? Maybe we need to find a focus to give them where they could show their brilliance, show their determination and be successful, but in a positive way.</p>
                </div>
                                <div data-start="1244.381">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yeah, absolutely. So this claim they make about still being on the network, that's interesting to me. And this, no updates can expel us. In your world, when someone says they've got that kind of persistent access, do you take that seriously? Is that a technical claim, do you think, or is that just bravado?</p>
                </div>
                                <div data-start="1257.776">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So I do software and that's definitely an infrastructure network thing, but yeah, absolutely. Potentially still have access. There was an incident a few years ago where I remember the malicious actor was posting images of the Slack channel that the incident responders and security team was using. So they could actually see the Slack channel and the discussions of the security incident, and then they were posting it to Twitter, mocking them, which made me feel so bad for that team. And this is why we need to have a way to talk to each other that's I call it out of bound, a different separate way. So maybe there's a Signal chat where you talk or Telegram if that's your jam and you have this separate space where you can discuss things and where you can double-check things.</p>
                </div>
                                <div data-start="1274.651">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>You've given the example of that Slack channel. It reminded me of a story from, oh my goodness, years and years ago, there was a hacking group in the UK. I think it was the LulzSec hacking gang. The police in the States, the police in the UK, Smashing Security set up a conference call to discuss this particular hacking group. And one of the participants in that call, a British police officer, was accessing the call from his private email account, or he had forwarded the login details because he had to connect late in the evening. What he didn't know was that a member of that particular hacking group had hacked his personal email, and they were actually able to tune in to the conference call and hear the police discussing the investigation into them. So, these things can really badly backfire.</p>
                </div>
                                <div data-start="1290.688">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Yeah. The comms are really important during an incident. When I teach software developers, I have this little section about what a security incident is, what it looks like, how you should call the security team, and what not to do. Because I've had so many software developers attempt to help me, and always from a good place, just to be clear, then ruining the chain of custody, effing up all my evidence. You know, "Don't worry, I erased it." I was like, oh my God. Yeah, I feel like the security team needs to communicate better to the entire rest of the organization, the processes that they should follow so that if there is an emergency, everyone knows what to do because a helpful person can sometimes completely ruin everything.</p>
                </div>
                                <div data-start="1307.872">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yeah. Well, this is at its heart what we call an OT attack, operational technology. So it's not your email server. It's not a web application necessarily. It's not a customer database. This is all about the physical world of pumps and valves and sensors. This means that when it goes wrong, it's not your data that's being leaked. It could mean water's going everywhere. I know your world is very much the software side of things, Tanya, but OT security and application security, they are converging in some ways, aren't they?</p>
                </div>
                                <div data-start="1321.708">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Software runs everything. You can't have OT without any software. And I would say in this case, it sounds like it's critical infrastructure because at first when you were describing it, you're like, oh, you'll get your feet wet. And I was like, whatever, I'm British Columbian, we're always wet. It would actually flood, people could be harmed and stuff. It becomes critical infrastructure, if that makes sense. And so software runs literally everything.</p>
                </div>
                                <div data-start="1337.421">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>That's true. And the problem is that OT systems, these operational technology systems, they were built for longevity and reliability and uptime. You know, the important thing was that they need to always work. And this was long before people were thinking about connecting them to anything. But once they were networked for convenience, maybe, or remote maintenance, suddenly this decades-old infrastructure is perhaps accessible via the public internet and may have very weak security.</p>
                </div>
                                <div data-start="1357.493">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I find, Graham, quite frankly, that a lot of the security industry focuses on the internet and web, but that's the tip of the iceberg of all the software that we have. In December I was working with this company that does embedded medical devices and then they do operating systems and emergency room systems, all of the devices that are in there, they write the software for that. And obviously, the security is pretty important. Safety and security and privacy, pretty darn important, right? And we worked together, and it was a really cool project. But I feel like a lot of organizations, they're like, oh, well, we're not on the internet, so it's not that important. So when we did a threat model of all the things that could happen and how easy it would be, they're really shocked. And hospitals get hit with ransomware all the time, but if you&mdash; it'd be so easy to hit a hospital physically.</p>
                </div>
                                <div data-start="1372.096">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yeah, it's a big problem. And we're living in this world of web apps. People build them, they work, and then they think, oh, maybe we should add security later. If you're lucky, they have that part of the conversation. But do you think the software world is actually learning that lesson to integrate security earlier on in the process? Well, whether you believe every word that Infrastructure Destruction Squad has said about Venice or not doesn't really matter, because the next group that finds their way into a system like that, they might not be interested in writing threatening Telegram posts or asking for the mighty sum of $600. They might just want to open the valves and cause mayhem that way.</p>
                </div>
                                <div data-start="1416.103">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Yeah, it's true.</p>
                </div>
                                <div data-start="1433.818">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Well, time now to talk about one of our sponsors, Meta. Joe, have you ever had to set up a network for a new office?</p>
                </div>
                                <div data-start="1445.851">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>Once. I've since sought therapy.</p>
                </div>
                                <div data-start="1460.688">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Ah, right. Well, Meta exists to make all of that someone else's problem. They are a network as a service company, but a proper end-to-end one. You hand them a physical address, a floor plan, they handle everything. They sort out the ISP, they design and deploy the network, they turn up on the site, they rack their own hardware. Kits that they've actually designed themselves, not just rebranded someone else's gubbins.</p>
                </div>
                                <div data-start="1473.016">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>So I don't have to spend 45 minutes on hold with the telecoms company only to be told they've misspelled our company name on the contract.</p>
                </div>
                                <div data-start="1484.413">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Right, right. Yeah. Not a single minute of that. And once you're up and running, you get one dashboard for monitoring, security, VLANs, firewall, DNS security, the whole works. Full control without any of the soul-destroying groundwork.</p>
                </div>
                                <div data-start="1500.375">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>This begs the question, what's the catch?</p>
                </div>
                                <div data-start="1518.375">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Genuinely, no catch. It's a straightforward subscription model. They even have a hardware buyback program if you've already blown the budget on equipment from another vendor.</p>
                </div>
                                <div data-start="1536.055">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>So they'll take away the evidence of my previous terrible decisions.</p>
                </div>
                                <div data-start="1552.217">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Right, basically, yes. So find out more at meter.com/smashing. That's meter.com/smashing. Smashingsecurity.com/smashing, and thanks to Meta for supporting the show. Tanya, what story have you got for us this week?</p>
                </div>
                                <div data-start="1571.184">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Okay, so I wanted to talk about how Anthropic accidentally leaked the full source code for Claude Code CLI. So&mdash;</p>
                </div>
                                <div data-start="1589.609">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Sorry, isn't it Claude rather than Claude?</p>
                </div>
                                <div data-start="1617.893">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Oh, je parle fran&ccedil;ais. I'm Canadian. I speak French. So&mdash;</p>
                </div>
                                <div data-start="1636.346">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Ah, mais oui, ce sont des mots qui vont tr&egrave;s bien ensemble. Sorry, I'm putting you off.</p>
                </div>
                                <div data-start="1652.537">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Basically, when we publish code to production, the magical place where the users are, software developers are supposed to turn off debug mode, which is a nerdy thing that we use so that we can find problems and fix things. And then we also usually have something called an ignore file, which means don't put all of those files up there. These are the just-for-us files. And both of those things didn't happen. And so then they published this file, it's called a source map file, and it can be opened like a present, and inside was the code.</p>
                </div>
                                <div data-start="1667.71">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>What actually got leaked here? This was Anthropic, the big AI company, which did this. They leaked the code for Claude. Is that right? The thing they spent billions on, right?</p>
                </div>
                                <div data-start="1711.926">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So they accidentally leaked all the intellectual property. This would be a data spill because they did it themselves. I can't imagine being the software developer that did that because they're probably pretty upset with themselves. So it wasn't a hack, it was human error. And the reason why this is a really big deal is, so first of all, they spilled their intellectual property. And as a person who has made most of her income off of her intellectual property her whole life, 'cause when I was younger, I was a professional musician, then I was a software developer writing code, then I wrote books. I did all of these things, right? All of that's intellectual property. So that's one thing. But the other thing is that then the internet got ahold of it and analyzed it for vulnerabilities and started writing exploits for it so that they could take advantage of Claude. And so people can dissect all of its defenses and come up with better attacks. And all of the other AI companies now are stealing it. And basically, so someone, rather than seeing that and reporting it immediately to Anthropic, the person's "you know what I'm gonna do? I'm gonna copy it to my own GitHub repo and start distributing it." Which makes me sad. And I know that it's a cool thing to find. I would be really excited too, but&mdash;</p>
                </div>
                                <div data-start="1728.182">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>The thing is, yes, obviously that's naughty, right? Because it's Anthropic's code, right? But let's not forget what Anthropic and the other AI companies have been doing for years, which is they've been stealing everyone else's content without permission in order to train their AI models, right? So isn't this just actually a case of they're getting their just desserts. They have spilt their code and now it's in the hands of everybody.</p>
                </div>
                                <div data-start="1741.5">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So I would say yes to that part. So I've written two books and my second book came out last year and it is barely sold. And the theory is, is because Claude and all the other AIs just give you all the answers. When you go and you Google something now, it'll just tell you the smart thing that Tanya said, but it doesn't say Tanya said it.</p>
                </div>
                                <div data-start="1777.69">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And so before people would Google things and it'd be "oh, you wanna know what pushing left is, or you wanna know what security drift is, or whatever the many things that I have defined throughout my entire career." And then instead of it bringing you to the blog post where I'll explain that to you, it now just tells you the answer. No. So there's a place where I write articles for them that I'm not gonna name 'cause I like them. And I used to write articles for them and they'd get a couple hundred thousand reads, and now they're getting 2,000 reads. It's that different because the AI reads it and then now it knows everything Tanya just spent weeks researching to write that article. And so this is a huge problem for those of us that do research and release research because immediately it's taken from us. It sucks.</p>
                </div>
                                
                                <div data-start="1831.799">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I know we're supposed to do one article, but I wanted to do two because they're related. So Anthropic also announced but did not publicly release a new model called Mythos. And what Mythos does, it's quite dangerous. So it finds vulnerabilities in applications and chains them together into exploits. And it has been finding novel new kinds of things that humans haven't been able to find before. And it's been finding them so terribly fast. It's absolutely completely terrifying. So for instance, they found, I can't even remember just how many bugs in OpenSSL, but Heartbleed level terrifying bugs. For those of you that don't know, Heartbleed was a bug found in OpenSSL where you could just send a specially crafted call and then it would just tell you all the secret sauce.</p>
                </div>
                                <div data-start="1849.57">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yeah, it would spit back what should have been confidential encrypted information, things which no one should ever have been able to see.</p>
                </div>
                                <div data-start="1871.671">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And Anthropic, they're not publicly releasing it. They're just working with a couple trusted organizations for now. But they've openly admitted that they can't fully control it or understand it. And I would really not want to see Mythos on the internet.</p>
                </div>
                                <div data-start="1889.181">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Oh, okay. So let's just backtrack for one second. So we've got this company Anthropic, which has just goofed up. They called it a human error. They said it was a release packaging issue rather than a security breach. And they're saying, oh, it doesn't matter because no customer data or credentials were involved. And technically that's right. It's their code. It's not somebody else's. But, you know, they were leaking their source code. They were careless.</p>
                </div>
                                <div data-start="1906.058">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>It's still a data spill. It's their data and they spilled it and it was private, confidential data that's high value.</p>
                </div>
                                <div data-start="1922.079">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yeah. And meanwhile, they've just publicized this new technology they've built called Mythos, which can do something which could be very useful for many people in terms of securing their systems, because it can find vulnerabilities and you could find flaws in software and you could hopefully patch them and fix those bugs. But if that fell into the wrong hands, if they had a release packaging issue and they spilt it out like they've just spilt out something, that's horrendous because anybody could use something like Mythos to hack all kinds of systems and software, couldn't they?</p>
                </div>
                                <div data-start="1955.768">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>And there have been AI-powered bug hunting solutions in the past. I mean, I believe if you look at the HackerOne league table right now, the number one bug hunter is an AI-powered bug hunting solution at the moment.</p>
                </div>
                                <div data-start="1991.685">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>But the other thing which worries me is that, okay, so Anthropic has had this data spill. We're worried that maybe it could happen with Mythos as well. Potentially it could. The thing which I think changes the story a bit, this isn't even the first time Anthropic has had a data leak this. I mean, earlier versions of the same package in 2025 also shipped with full source maps before being pulled. So this isn't a one-off slip. It seems to almost be a pattern which has happened. And who's to say it couldn't happen again? And maybe it could happen with Mythos.</p>
                </div>
                                <div data-start="2011.59">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>You know what, Graham? I had no idea that they'd previously accidentally leaked their map. Oh my gosh. This is completely shocking. I don't mean to sound insulting, but I can't believe that they could make the same mistake again, right? Because that would be so painful the first time.</p>
                </div>
                                <div data-start="2023.951">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>So Anthropic says this is a human error. But should it be possible for a single human error to publish source code that should never have been made public? Is that a process failure? Is it a tooling failure? Do we just have to sort of shrug and say, oh well, that's life, these things happen?</p>
                </div>
                                <div data-start="2066.293">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So first of all, in Git, so Git is a tool that you can use to hold your source code and take care of it and manage it and store it. There's this setting that you can do called .gitignore, and you list all of these files to say basically no matter what I say, don't upload this.</p>
                </div>
                                <div data-start="2084.557">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yes. Override my own stupidity. Yes.</p>
                </div>
                                <div data-start="2097.376">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Yeah, exactly. And I take advantage of that all the time. So there should be a default for every org and it should include those map files. So that's step one is that we want to have the ignore file things set up properly. And then we always know we're not supposed to have debug mode in production, right? So, we know that we should have on the build server these settings turned off. And so basically this is like security misconfiguration happening twice, which is on the new OWASP Top 10 2025, as a top risk to web apps. Basically, they didn't configure the build server correctly and then they didn't configure Git correctly. And then they don't have a process or a checklist to check that. So I would love to see those three things. I teach supply chain security. I'm expanding and expanding that class all the time because there's more and more that we're doing wrong there. And I feel like if organizations had a checklist and they had, you know, a hardening of these things that they're using that are part of their supply chain, like we talked about earlier, if we properly hardened our build server. So, the CI/CD and build server, those are usually synonymous. They're usually the same thing. Or you have a build server and then you have a pipeline and you connect the two, but usually, it's all one big thing. And so, if we were properly hardening that, if we're checking it at least once a year, if we analyzed who, you know, there's an alert. Oh my gosh, there's a new administrator.</p>
                </div>
                                
                                <div data-start="2130.018">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Who's that? Why do we have a new administrator? We could do a lot better. So, it is a human error, but the human error happened because we didn't have processes to protect that human from making that error. And I don't like to blame Alice or Bob. I like to look at, no, but did we train Alice or Bob on this? Did we? Right? Did we have a safeguard to stop them from making this error? Did we have a policy? Or do we just assume they knew? Because when we assume, we're let down a lot.</p>
                </div>
                                <div data-start="2144.717">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>So what we have here, Tanya, is an AI company which has leaked the source code of its AI coding assistant. Via a packaging mistake, which is kind of ironic. I'm going to give you a little bit of silver lining on the cloud, right? Because this has all been a bit depressing.</p>
                </div>
                                <div data-start="2158.373">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Okay. But we don't know that.</p>
                </div>
                                <div data-start="2207.382">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>That's true, actually. That is true.</p>
                </div>
                                <div data-start="2223.628">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Right? Have you heard this term dark factory?</p>
                </div>
                                
                                <div data-start="2254.132">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So we don't know if Anthropic is becoming a dark factory. So in manufacturing, it means we just have robots, so we don't need lights. But there's software dark factories being built now where you don't have a single software developer anymore, and literally every single part is only written by the AI. And wouldn't you think the AI company might be most likely to do something like that? I don't know.</p>
                </div>
                                <div data-start="2268.954">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Well, thank you very much, Tanya. There I was trying to be optimistic and cheer everybody up, and you've just made it all doomy and gloomy again. Great. That's great. Thank you.</p>
                </div>
                                <div data-start="2282.996">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>This episode of Smashing Security is brought to you with support from CoreView.</p>
                </div>
                                <div data-start="2300.327">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Now, Joe, quick question. If someone broke into your Microsoft 365 tenant right now and quietly disabled your conditional access policies, grabbed global admin rights, turned off Defender, would you even notice?</p>
                </div>
                                
                                <div data-start="2332.99">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Well, that's the spirit, Joe. Good job. But here's the uncomfortable reality. 63% of Microsoft 365 tenants hand out admin rights not that they're going out of fashion. One compromised account and an attacker can quietly reshape your entire tenant. No alerts, no noise, just someone systematically dismantling your defenses while you're none the wiser.</p>
                </div>
                                <div data-start="2350.492">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>So wait, restore from backup doesn't fix that?</p>
                </div>
                                <div data-start="2365.197">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>No, no, no. Backups protect your data. They don't restore tenant-level configurations. There's no native rollback for that. You could be rebuilding your tenant settings from scratch for weeks.</p>
                </div>
                                <div data-start="2379.197">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>And who's doing that?</p>
                </div>
                                <div data-start="2401.905">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Exactly. Who wants to do that? Well, CoreView have written a white paper called Total Tenant Takeover: The Microsoft 365 Disaster No One's Ready For. It's actually a really practical read. It covers how these attacks unfold step by step, where your existing tools are leaving gaps, and what it actually takes to recover control once it's been lost.</p>
                </div>
                                <div data-start="2423.164">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>So less detect and panic, more here's how to actually get your tenant back.</p>
                </div>
                                <div data-start="2444.403">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>That's it. Exactly. And you can download this paper for free right now. You can learn more at smashingsecurity.com/coreview and maybe do it before someone else does something bad to your organization.</p>
                </div>
                                <div data-start="2462.467">
                    <p><span>Joe</span>
                        
                    </p>
                    <p>That's smashingsecurity.com/coreview. And thanks to CoreView for supporting the show.</p>
                </div>
                                <div data-start="2484.293">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And welcome back.</p>
                </div>
                                <div data-start="2498.641">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>And you join us for our favorite part of the show, the part of the show that we like to call pickpocketing. Pick of the Week.</p>
                </div>
                                <div data-start="2512.981">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Pick of the Week.</p>
                </div>
                                <div data-start="2527.103">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish. It doesn't have to be security related necessarily. Well, my Pick of the Week this week is actually security related. In fact, my Pick of the Week this week, and this is gonna get very, very meta, not in a Mark Zuckerberg kind of way, because my pick of the week this week is actually about the Smashing Security podcast, because I've been busy doing a bit of vibe coding. I know, very dangerous. I've been exploring the world of podcast transcripts, ladies and gentlemen. I think it must have been about 9 years ago when I first got an email from a listener saying, why don't you have a transcript? I'd much rather read rather than listen to you. And I said, well, you know, it's very hard putting together a transcript. I'd be up all hours typing my nonsensical words into a word processor. Or I'd get some computer system to try and transcribe me into written English. And, you know, the quality is going to be diabolical anyway. After quite a lot of work involving largely pipe cleaners and pots of treacle, bicycle chains, I have got together a Heath Robinson-type solution which now has, I believe, acceptable transcripts for this show. Now, my podcast host, does create automated transcripts. So if you go into your favorite podcast app at the moment and look at transcripts, if it supports that, you will see a very, very bad transcript of the show. My intention is to replace all of those. And if you go to my website or to the Smashing Security website right now, you will find a much better transcript. And in fact, it will even display the words as they are being said. So you can read as you are listening I think it works reasonably well most of the time. Sometimes it makes a mistake, for goodness' sake. Yes, I know. Sometimes it will mix up my name with someone else's or something will go wrong. But most of the time, I think it's pretty darn impressive. So my pick of the week, rather self-referentially, is the new transcripts on the Smashing Security podcast. Go to smashingsecurity.com or go and check out my articles on Graham Cluley.com. And you will be able to see the transcripts in all of their glory there and tell me that it doesn't work. And then I'll have to try and work out what the code's doing and try and fix it. Cool. That is my pick of the week.</p>
                </div>
                                <div data-start="2542.394">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I your pick of the week, Graham.</p>
                </div>
                                <div data-start="2560.67">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Thank you very much.</p>
                </div>
                                <div data-start="2581.222">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>That was awesome. Well done.</p>
                </div>
                                <div data-start="2595.798">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Do you have a pick of the week, Tanya?</p>
                </div>
                                <div data-start="2613.369">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>I do. So my pick of the week is a television show on Apple TV called Shrinking. And it is about three psychologists that are friends that are all grieving because one of the psychologists, his wife died. And it shows how he grieves, how his daughter grieves, how the two other psychologists grieve. And they teach all these different psychology lessons essentially in the show. And last year I did a talk about the psychology of bad code and applying economic behavior types of concepts to our security programs. And how if we do that, we can get better results. 'Cause just yelling at software developers actually doesn't improve code quality at all, as it turns out. Just being mean to them doesn't work. We've tried that for two decades. So, I was what if instead we did something different?</p>
                </div>
                                <div data-start="2629.135">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Have you tried the old cricket bat trick of taking a cricket bat and just bopping them on the back of the head? Does that help at all?</p>
                </div>
                                <div data-start="2642.543">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>My old boss was have you tried violence, Tanya? And I was no, I haven't. And he's you're not really trying to problem solve at all, are you?</p>
                </div>
                                <div data-start="2659.784">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Oh, so I've just realized why your show is called Shrinking because of&mdash;</p>
                </div>
                                <div data-start="2680.065">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>It shrinks. Yeah.</p>
                </div>
                                <div data-start="2693.856">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>I'm so stupid sometimes. It's taken me this long to work it out. Okay.</p>
                </div>
                                <div data-start="2705.4">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>No, but so I'm fascinated by the reason that people do things and why people react the way they do. I've always been really curious about things like that. And so also so that I could get better results, right? If someone blows up at me, it's like, why did they blow up at me? And often it's not because of something I did. It's because they feel insecure or afraid or whatever.</p>
                </div>
                                <div data-start="2738.851">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>And so in the show, they're always explaining these different concepts and I keep seeing them pop up in my life, whether it be at work or personally. And so most shows aren't very educational, Graham. Most of them are kind of garbage.</p>
                </div>
                                <div data-start="2752.411">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Oh, really? I'd never noticed. I've just been watching Married at First Sight Australia. So I thought all of them were really high quality, personally.</p>
                </div>
                                <div data-start="2772.197">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>But so this one teaches lots of psychology lessons and why people do the things they do, but in an entertaining way. So I don't know, I like that. I think if people are curious about, you know, why people do the things they do, they might like this.</p>
                </div>
                                <div data-start="2784.228">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>And is this a drama or a documentary? What is it?</p>
                </div>
                                <div data-start="2799.648">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>So it's sort of a drama and it's sort of a comedy. So I think they call them dramedies.</p>
                </div>
                                <div data-start="2812.335">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>I think that's what you call a one-humped camel, actually. So anyway, yes, carry on. So a dromedary, right?</p>
                </div>
                                <div data-start="2827.905">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Basically, there's a bunch of parts that are sad, and then there's a bunch of parts that are funny. And so I think they call it a drama comedy, which they literally put on Apple TV, Dramedy.</p>
                </div>
                                <div data-start="2841.11">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Oh, I don't know if I like that word. Yeah. I'm not so sure about that.</p>
                </div>
                                <div data-start="2858.586">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>You're like, no, I do not accept.</p>
                </div>
                                <div data-start="2872.639">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Anyway. Okay. So your pick of the week is the TV show Shrinking.</p>
                </div>
                                
                                <div data-start="2927.994">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Well, that just about wraps up the show for this week. Thank you so much, Tanya, for joining us. I think you've been absolutely smashing. I'm sure lots of our listeners would love to find out what you're up to and follow you online or listen to your podcast, of course. What's the best way to do that?</p>
                </div>
                                <div data-start="2966.74">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>Yes, that's what we need more of, is more memes.</p>
                </div>
                                
                                <div data-start="2998.443">
                    <p><span>Graham Cluley</span>
                        
                    </p>
                    <p>That and emojis and animated GIFs. And of course, Smashing Security is on social media as well. You can find me, Graham Cluley, on LinkedIn, or you can follow Smashing Security on Reddit or Bluesky or Mastodon. And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts for episode show notes, sponsorship info, guest lists, and the entire back catalog of 463 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye.</p>
                </div>
                                <div data-start="3014.876">
                    <p><span>Tanya Janca</span>
                        
                    </p>
                    <p>Bye. You've been listening to Smashing Security with me, Graham Cluley, and I'm very grateful to Tanya for joining us this week and this episode's sponsors, CoreView, Vanta, and Meta. And of course, to all of our fabulous supporters via Patreon.</p>
                </div>
                            </div>
]]></content:encoded>
                                <description><![CDATA[A hacking group claims to have broken into the flood defence system protecting Venice's Piazza San Marco - and is offering to sell access to whoever wants it. The asking price? A frankly insulting $600. Meanwhile, Anthropic accidentally leaked...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/smashing-security-podcast-463-this-ai-company-leaked-its-own-code-it-s-also-built-something-terrifying-3745.html</guid>
                <pubDate>Thu, 16 Apr 2026 03:00:13 +0300</pubDate>
                <media:thumbnail url="https://grahamcluley.com/wp-content/uploads/2026/04/ss-episode-463.webp"/>
            </item>
                    <item>
                <title>Critical MCP Integration Flaw Puts NGINX at Risk</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/critical-mcp-integration-flaw-puts-nginx-at-risk-3744.html</link>
                                <content:encoded><![CDATA[Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration files.]]></content:encoded>
                                <description><![CDATA[Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration files.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/critical-mcp-integration-flaw-puts-nginx-at-risk-3744.html</guid>
                <pubDate>Thu, 16 Apr 2026 02:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt446b8eb1b9e96075/69e00259f061614772ab3b7e/mcp_Jack_the_sparow_shutterstock.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Critical nginx UI tool vulnerability opens web servers to full compromise</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/critical-nginx-ui-tool-vulnerability-opens-web-servers-to-full-compromise-3743.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				The MCP endpoint authentication weakness has been under active exploitation since March.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Security vendor Pluto Security has published details of a critical vulnerability in the open-source nginx UI web server configuration tool that has been under active exploitation by cybercriminals since March.</p>



<p>News of the flaw, identified as <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33032" target="_blank" rel="noreferrer noopener">CVE-2026-33032</a>, first appeared on the National Vulnerability Database (NVD) on March 30, the same day that threat intelligence companies VulnCheck and Recorded Future&rsquo;s Insikt Group noted it was under active exploitation.</p>



<p>What users didn&rsquo;t have at that point were any details on the flaw from Pluto Security, the company that discovered it earlier that month. This week, the company rectified this, publishing a <a href="https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/" target="_blank" rel="noreferrer noopener">full breakdown of the vulnerability</a>.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Nginx UI is a convenient real-time dashboard and control panel interface for managing nginx single-node and cluster nodes without having to resort to the command line interface (CLI).</p>

		

			


<p>The vulnerability, with a CVSS score of 9.8, relates to the software&rsquo;s support for Model Context Protocol (MCP) servers, which was added in late 2025 and enables communication between nginx web servers and AI models though two HTTP-accessible MCP URL endpoints.</p>



<p>Unfortunately, in the case of nginx UI, one of these endpoints, <em>/mcp_message</em>, was implemented without authentication, a weakness Pluto Security dubbed &lsquo;MCPwn&rsquo;.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;This exposes 12 MCP tools, including config writes with automatic nginx reload, to any host on the network. One unauthenticated API call is all it takes to inject a config and take over nginx,&rdquo; said Pluto Security.</p>



<p>Leveraging MCPwn, an attacker would be able to intercept all traffic, harvest admin credentials, maintain persistent access, conduct infrastructure reconnaissance via nginx configuration files, and kill the service, the company said.</p>



<h2 id="mcp-attack-surface">MCP attack surface</h2>



<p>Nginx UI&rsquo;s user base of hundreds of thousands is relatively small compared to the vast global popularity of the nginx web server. Many of its installations will also be internal and therefore not directly exposed to remote attack. However, using Shodan, Pluto Security was still able to find 2,689 vulnerable nginx UI instances reachable from the internet, it said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;This is a clear example of how AI integrations can unintentionally expand the attack surface,&rdquo; commented Pluto Security&rsquo;s CEO, <a href="https://www.linkedin.com/in/shahar-bahat-%E2%98%84%EF%B8%8F-84770b196/" target="_blank" rel="noreferrer noopener">Shahar Bahat</a>. &ldquo;MCP servers aren&rsquo;t just developer tools, they&rsquo;re privileged access points into production systems.&rdquo;</p>



<p>MCP has been implemented at breakneck speed to enable AI agents, leading to the adoption of tools without the risks they create being understood, Bahat pointed out.</p>



<p>&ldquo;This vulnerability shows how a single exposed endpoint can enable full compromise. AI integration layers must be treated as part of the attack surface, not an afterthought,&rdquo; she said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>To security teams, this will be reminiscent of the problems experienced when APIs started to boom a decade ago. By enabling an integration layer such as MCP, and the tools used to manage it, developers risk inadvertently creating a new layer of vulnerability.</p>



<p>As Bahat put it: &ldquo;AI integration endpoints expose the same capabilities as the core application, but often skip its security controls.&rdquo; When planning MCP integrations, Pluto Security recommends giving MCP endpoints the same security attention as APIs, auditing Server-Sent Events (SSE) endpoints and fully testing authentication parameters.</p>



<h2 id="a-priority-fix">A priority fix</h2>



<p>The fact that the nginx vulnerability has been under exploitation for at least a month should make applying the recommended fix, version 2.3.4, released March 15, a priority for anyone using this software, since nginx servers represent a big prize for threat actors. In February, attackers were discovered exploiting the &lsquo;React2Shell&rsquo; vulnerability (CVE-2025-55182) inReact Server Components (RSC) to <a href="https://www.csoonline.com/article/4127554/threat-actors-hijack-web-traffic-after-exploiting-react2shell-vulnerability.html" target="_blank">target nginx servers</a>. </p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>For those who can&rsquo;t patch immediately, the stopgap workaround is to disable MCP, or lock the IP whitelist to trusted hosts, as well as reviewing access logs for unusual configuration changes.</p>




</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Security vendor Pluto Security has published details of a critical vulnerability in the open-source nginx UI web server configuration tool that has been under active exploitation by cybercriminals since March. News of the flaw, identified as CVE-2026-33032, first appeared...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/critical-nginx-ui-tool-vulnerability-opens-web-servers-to-full-compromise-3743.html</guid>
                <pubDate>Thu, 16 Apr 2026 00:00:18 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159248-0-74045300-1776286354-shutterstock_2466601291.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Navigating the Unique Security Risks of Asia&apos;s Digital Supply Chain</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/navigating-the-unique-security-risks-of-asia-s-digital-supply-chain-3742.html</link>
                                <content:encoded><![CDATA[Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian organizations must wrangle.]]></content:encoded>
                                <description><![CDATA[Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian organizations must wrangle.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/navigating-the-unique-security-risks-of-asia-s-digital-supply-chain-3742.html</guid>
                <pubDate>Wed, 15 Apr 2026 23:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b40c5c605abfefc/69dfd2fef061610469ab3b48/digital_supply_chain_map_Aleksey_Funtap_Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails-3741.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 15, 2026</span></span><span>Threat Intelligence / Cloud Security</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXMJaHSQp1aJ8l7rKKtfILQtDMLWTUVOPwWqizQ-nRzb5JbG1BJOFKTs0NYGVQ0fBFTzLkjaY0bntn7UDnlyy502mDQJzvqFhTJwmYlctN551StWLJf8hnET4i8ZrwWvtzhswLW_2GoSI1zlMVRnI89aVrFU1lbes9p7fpYFjT9V7OxAmbmMW3UR-hv9_/s1700-e365/webhook.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXMJaHSQp1aJ8l7rKKtfILQtDMLWTUVOPwWqizQ-nRzb5JbG1BJOFKTs0NYGVQ0fBFTzLkjaY0bntn7UDnlyy502mDQJzvqFhTJwmYlctN551StWLJf8hnET4i8ZrwWvtzhswLW_2GoSI1zlMVRnI89aVrFU1lbes9p7fpYFjT9V7OxAmbmMW3UR-hv9_/s1700-e365/webhook.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Threat actors&nbsp;have been&nbsp;observed weaponizing <a href="https://thehackernews.com/2026/03/critical-n8n-flaws-allow-remote-code.html">n8n</a>, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated&nbsp;emails.</p>
<p>"By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery vehicles for persistent remote&nbsp;access," Cisco Talos researchers Sean Gallagher and Omid&nbsp;Mirzaei <a href="https://blog.talosintelligence.com/the-n8n-n8mare/">said</a> in an analysis published&nbsp;today.</p>
<p>N8n is a workflow automation platform that allows users to connect various web applications, APIs, and AI model services to sync data, build agentic systems, and run repetitive rule-based&nbsp;tasks.</p>
<p>Users can register for a developer account at no extra cost&nbsp;to avail a managed cloud-hosted service and run automation workflows&nbsp;without having to set up their own infrastructure.Doing so, however, creates&nbsp;a unique custom&nbsp;domain that goes&nbsp;by the&nbsp;format&nbsp;&ndash; &lt;account name&gt;.app.n8n.cloud &ndash; from where a user can access their applications.</p>
<div><p><a href="https://thehackernews.uk/vpn-risk-report-inside-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm/s728-e100/z-d.jpg" width="729" height="91"></a></p></div>
<p>The platform also&nbsp;supports the ability&nbsp;to <a href="https://docs.n8n.io/integrations/builtin/core-nodes/n8n-nodes-base.webhook/">create&nbsp;webhooks</a> to receive data from apps and services&nbsp;when certain events are triggered.Thismakes it possible to&nbsp;initiate a&nbsp;workflow after&nbsp;receiving certain&nbsp;data.The data,&nbsp;in this case, is sent via a unique webhook&nbsp;URL.</p>
<p>According to Cisco&nbsp;Talos, it's these URL-exposed webhooks &ndash; which make use of the same *.app.n8n[.]cloud subdomain &ndash; that has been abused in phishing attacks as far back as October&nbsp;2025.</p>
<p>"A webhook, often referred to as&nbsp;a&nbsp;'reverse&nbsp;API,' allows one application to provide real-time information to another. These&nbsp;URLs register an application as&nbsp;a&nbsp;'listener' to receive data, which can include programmatically pulled HTML&nbsp;content," Talos explained.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyZMXs7e5kEEfgpciVNOrKQ9OG9_RuwzyCKi1qp1CU51-ATu1SCWTC-cbtMm5SeIYbboBZ9wbO8W-ESUQE2MPjOZ-TjJ08g8bAfAIOBGKmppcfuwpKcsEcly8F11LLHkj3gH_m8iTmOexsEGPxwuhXHPBOsPtLLyI-psvpKd8VbzjQ1NUZu4PWf8Io5KWO/s1700-e365/talos.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyZMXs7e5kEEfgpciVNOrKQ9OG9_RuwzyCKi1qp1CU51-ATu1SCWTC-cbtMm5SeIYbboBZ9wbO8W-ESUQE2MPjOZ-TjJ08g8bAfAIOBGKmppcfuwpKcsEcly8F11LLHkj3gH_m8iTmOexsEGPxwuhXHPBOsPtLLyI-psvpKd8VbzjQ1NUZu4PWf8Io5KWO/s1700-e365/talos.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="475" data-original-width="1000"></a></p>
<p>"When the URL receives a request, the subsequent workflow steps are triggered, returning results as an HTTP data stream to the requesting application. If&nbsp;the URL is accessed via email, the recipient's browser acts as the receiving application, processing the output as a web&nbsp;page."</p>
<p>What&nbsp;makes this significant is that it opens a new door for threat actors to propagate malware while maintaining a veneer of legitimacy by giving the impression that they are originating from a trusted&nbsp;domain.</p>
<p>Threat&nbsp;actors have wasted no time taking advantage of the behavior to set up n8n webhook URLs for malware delivery and device fingerprinting. The&nbsp;volume of email messages containing these URLs in March 2026 is said to have been about 686% higher than in January&nbsp;2025.</p>
<p>In&nbsp;one campaign observed by Talos, threat actors have been found to embed an n8n-hosted webhook link in emails that claimed to be a shared document. Clicking the link takes the user to a web page that displays a CAPTCHA, which, upon completion, activates the download of a malicious payload from an external&nbsp;host.</p>
<p>"Because the entire process is encapsulated within the JavaScript of the HTML document, the download appears to the browser to have come from the n8n domain," the researchers&nbsp;noted.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>The&nbsp;end goal of the attack is to deliver an executable or an MSI installer that serves as a conduit for modified versions of legitimate Remote Monitoring and Management (RMM) tools like Datto and ITarian Endpoint Management, and use them to establish persistence by establishing a connection to a command-and-control (C2)&nbsp;server.</p>
<p>A&nbsp;second prevalent case concerns the abuse of n8n for fingerprinting. Specifically, this entails embedding in emails an invisible image or tracking pixel that's hosted on an n8n webhook URL. As&nbsp;soon as the digital missive is opened via an email client, it automatically sends an HTTP GET request to the n8n URL along with tracking parameters, like the victim's email address, thereby enabling the attackers to identify&nbsp;them.</p>
<p>"The same workflows designed to save developers hours of manual labor are now being repurposed to automate the delivery of malware and fingerprinting devices due to their flexibility, ease of integration, and seamless automation," Talos said. "As we continue to leverage the power of low-code automation, it&rsquo;s the responsibility of security teams to ensure these platforms and tools remain assets rather than liabilities."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated emails. "By leveraging trusted infrastructure, these attackers bypass traditional security filters, turning...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails-3741.html</guid>
                <pubDate>Wed, 15 Apr 2026 21:00:11 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSXMJaHSQp1aJ8l7rKKtfILQtDMLWTUVOPwWqizQ-nRzb5JbG1BJOFKTs0NYGVQ0fBFTzLkjaY0bntn7UDnlyy502mDQJzvqFhTJwmYlctN551StWLJf8hnET4i8ZrwWvtzhswLW_2GoSI1zlMVRnI89aVrFU1lbes9p7fpYFjT9V7OxAmbmMW3UR-hv9_/s1700-e365/webhook.jpg"/>
            </item>
                    <item>
                <title>OpenAI Unveils GPT-5.4-Cyber for Improving Cyber Defense With AI</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/openai-unveils-gpt-5-4-cyber-for-improving-cyber-defense-with-ai-3740.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-172b0603-a244-478a-81e7-3be1980c454e" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>OpenAI has launched a new large language model (LLM) focused on use cases for cybersecurity and expanded its Trusted Access for Cyber (TAC) program, as the AI company behind ChatGPT looks to enhance how its models can be deployed for cyber defense capabilities.</p>

<p>In a blog post which announced the expanded TAC program, <a href="https://openai.com/index/scaling-trusted-access-for-cyber-defense/">published April 14</a>, OpenAI revealed GPT&#8209;5.4&#8209;Cyber, a variant of GPT 5.4 which has been trained to be &ldquo;cyber-permissive&rdquo; and &ldquo;fine-tuned for cybersecurity use cases.&rdquo;</p>

<p>Initially revealed in February, the OpenAI Trusted Access for Cyber Program was designed to automate identity verification to help reduce the friction of safeguards on cybersecurity-related tasks and partner with a limited set of organizations.</p>

<p>This has since been followed by the <a href="https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/">Anthropic launch of Claude Mythos Preview and Project Glasswing</a>, an initiative designed to discover and fix cybersecurity vulnerabilities in software with the aid of LLMs. &nbsp;</p>

<p>Now, <a href="https://www.infosecurity-magazine.com/news/openai-enhances-defensive-models/">OpenAI</a> has opted to publicly announce the expansion of its own program, following what the company described as &ldquo;many months of iterative improvement.&rdquo;</p>

<p>The company said that it has chosen a staggered release for GPT&#8209;5.4&#8209;Cyber so that it can &ldquo;learn the most by&nbsp;putting these systems into the world carefully&#8288;&rdquo; to help understand the potential benefits and risks.</p>

<p><a href="https://www.infosecurity-magazine.com/news/ai-companies-to-play-bigger-role/"><em>Read more: </em><em>AI Companies to Play Bigger Role in CVE Program, Says CISA</em></a></p>

<p>The expansion of TAC sees the introduction of additional tiers to the program, with the highest tiers reserved exclusively for &ldquo;users willing to work with OpenAI to authenticate themselves as cybersecurity defenders.&rdquo;</p>

<h2><strong>New Capabilities for Cyber Defenders</strong></h2>

<p>In return, users will gain access to a frontier model: &ldquo;This is a version of GPT&#8209;5.4 which lowers the refusal boundary for legitimate cybersecurity work and enables new capabilities for advanced defensive workflows.&rdquo;</p>

<p>While the expanded tools are currently only available to vetted security vendors, organizations and researchers, OpenAI said it wants to &ldquo;make these tools as widely available as possible while preventing misuse.&rdquo;</p>

<p>That is why the company has announced a requirement for stronger verification processes to ensure that the cyber defense capabilities of the model can&rsquo;t be abused.</p>

<p>&ldquo;Cyber capabilities are inherently dual use, so risk isn&rsquo;t defined by the model alone,&rdquo; the company said, in reference to how <a href="https://www.infosecurity-magazine.com/news/ai-powered-cyberattacks-up/">malicious cyber-attackers have also look for ways to enhance their capabilities with AI</a>.</p>

<p>The new model is also a reaction to what OpenAI described as &ldquo;steady improvements in agentic coding&rdquo; and the &ldquo;direct implications for cybersecurity&rdquo; this has.</p>

<p>The company has also called for software development itself to be more secure and views GPT&#8209;5.4&#8209;Cyber and TAC can help improve this.</p>

<p>&ldquo;The strongest ecosystem is one that continuously identifies, validates and fixes security issues as software is written,&rdquo; said the blog post.</p>

<p>&ldquo;By integrating advanced coding models and agentic capabilities into developer workflows, we can give developers immediate, actionable feedback while they are building, shifting security from episodic audits and static bug inventories to ongoing, tangible risk reduction.&rdquo;</p>

<p><em>Image credit: Samuel Boivin / Shutterstock.com</em></p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[OpenAI’s new frontier model focused on cybersecurity comes following Anthropic’s launch of Claude Mythos Preview and Project Glasswing]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/openai-unveils-gpt-5-4-cyber-for-improving-cyber-defense-with-ai-3740.html</guid>
                <pubDate>Wed, 15 Apr 2026 20:00:16 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/ca471799-0488-4dc3-b193-26d165d68c40.jpg"/>
            </item>
                    <item>
                <title>Signed Adware Operation Disables Antivirus Across 23,000 Hosts</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/signed-adware-operation-disables-antivirus-across-23-000-hosts-3739.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-5a949bef-8ec3-4c34-ae79-ff339b67ca0b" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>A signed software operation linked to a company called Dragon Boss Solutions LLC has reportedly been silently disabling antivirus products on more than 23,000 endpoints worldwide</p>

<p>According to<a href="https://www.huntress.com/blog/pups-grow-fangs" target="_blank"> research</a> published by Huntress on Tuesday, the&nbsp;campaign used a legitimate code-signing certificate and an off-the-shelf update mechanism to deploy a PowerShell-based payload that systematically kills, uninstalls and blocks the reinstallation of security tools.</p>

<p>Huntress researchers first observed the antivirus-killing behavior in late March 2025, though the underlying loaders had been present on some hosts since late 2024. The executables use Advanced Installer to poll remote servers for MSI-based updates.</p>

<p>Once delivered, a script called ClockRemoval.ps1 executes with SYSTEM privileges, targeting products from Malwarebytes, Kaspersky, McAfee and ESET.</p>

<h2><strong>How the Attack Chain Works</strong></h2>

<p>Before deploying its full capabilities, the payload checks for admin status, detects virtual machines and queries the registry for installed security products.</p>

<p>It then establishes five scheduled tasks and Windows Management Instrumentation (WMI) event subscriptions that maintain persistence across reboots, logons and at 30-minute intervals.</p>

<p>A tight polling loop kills matching AV processes every 100 milliseconds for 20 seconds at boot, terminating security tools before they can initialize. The script also strips registry entries, runs vendor uninstallers silently and modifies the Windows hosts file to redirect AV update domains to 0.0.0.0.</p>

<p>Defender exclusions are added for directories like DGoogle and EMicrosoft that appear to serve as staging areas for follow-on payloads.</p>

<p><em><a href="https://www.infosecurity-magazine.com/news/deepload-malware-clickfix-ai-code/" target="_blank">Read more on WMI-based malware persistence: DeepLoad Malware Combines ClickFix With AI-Code to Avoid Detection</a></em></p>

<p>What elevated the threat was the discovery that a primary update domain in the operation's configuration was unregistered. Anyone willing to spend a few dollars could have pushed arbitrary payloads to every affected host.</p>

<h2><strong>Sinkhole Reveals Global Infection Footprint</strong></h2>

<p>Huntress registered the domain first and pointed it to a sinkhole. Within 24 hours, 23,565 unique IP addresses requested instructions. Infections spanned 124 countries, with the US accounting for roughly 54% of connections, followed by France, Canada, the UK and Germany.</p>

<p>The firm identified 324 infections on high-value networks, including:</p>

<ul>
	<li>
	<p>221 universities and colleges</p>
	</li>
	<li>
	<p>41 operational technology networks, including electric utilities</p>
	</li>
	<li>
	<p>35 government entities</p>
	</li>
	<li>
	<p>Three healthcare organizations</p>
	</li>
</ul>

<p>According to CrunchBase, Dragon Boss Solutions is based in Sharjah, United Arab Emirates, and describes itself as conducting "search monetization research." AV vendors have historically categorized their signature as adware with browser-hijacking functionality.</p>

<p>While the immediate payload remains an AV killer, Huntress warned that the update infrastructure could deliver any payload type. With antivirus already neutralized, the operation could pivot to <a href="https://www.infosecurity-magazine.com/news-features/why-ransomware-remains/" target="_self">ransomware</a>, cryptomining or data theft without additional exploitation.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Huntress uncovers adware deploying AV-killing payloads via signed updates across 23,000 endpoints]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/signed-adware-operation-disables-antivirus-across-23-000-hosts-3739.html</guid>
                <pubDate>Wed, 15 Apr 2026 19:00:16 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/c4057885-1e12-4f99-886e-5d56ccb30aeb.jpg"/>
            </item>
                    <item>
                <title>European Cybersecurity Agency ENISA Seeks Top-Tier Status in CVE Program</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/european-cybersecurity-agency-enisa-seeks-top-tier-status-in-cve-program-3738.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-1d41afa7-d2ac-4617-9243-bc7b9cf2a740" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>ENISA, the EU&rsquo;s Cybersecurity Agency, is strengthening its ties with the US-funded Common Vulnerabilities and Exposures (CVE) program, a top leader of the agency has announced.</p>

<p>Invited&nbsp;to speak at VulnCon26's opening keynote in Scottsdale, Arizona, on April 14, Nuno Rodrigues Carvalho, head of sector for Incidents and Vulnerability Services at ENISA, revealed that the agency was currently being onboarded by the US Cybersecurity and Infrastructure Security Agency (CISA), sole sponsor of the program, to become a top-level root CVE Numbering Authority (TL-Root CNA).</p>

<p>Speaking to <em>Infosecurity</em> after the session, Carvalho said he hopes the European agency can obtain this status &ldquo;in 2026 or early 2027.&rdquo;</p>

<h2><strong>CNA, Root CNA and TL-Root CNA Explained</strong></h2>

<p>Only two entities currently hold TL-Root CNA status: CISA, the program&rsquo;s sponsor, and MITRE, the US-funded nonprofit which runs the program.</p>

<p>ENISA became a <a href="https://www.infosecurityeurope.com/en-gb/blog/guides-checklists/how-to-disclose-software-vulnerability.html" target="_blank">CVE Numbering Authority</a> (CNA) &ndash; an organization authorized to assign CVE IDs to vulnerabilities &ndash; in 2024. &nbsp;It then became a root CNA &ndash; an organization that oversees and coordinates multiple CNAs within a specific domain or region, onboarding new CNAs and resolving disputes &ndash; in 2025.</p>

<p>With the TL-Root CNA status, <a href="https://www.infosecurity-magazine.com/news/enisa-coordinate-36m-euwide/" target="_blank">ENISA</a> would become a top-level authority with the responsibility to manage the entire CVE Program alongside CISA and MITRE, setting global policies and ensuring consistency across all Root CNAs and CNAs.</p>

<p>Speaking to <em>Infosecurity</em>, Johannes Kaspar Clos, a responsible disclosure and CSIRT collaboration expert who works on CNA service implantation in Carvalho&rsquo;s team at ENISA, said the agency&rsquo;s future expended role in the CVE program is not only aimed at more operational leverage but also enhanced power in policy and administrative decision-making.</p>

<p>&ldquo;As a Root CNA, we have a bigger operational footprint: we will now onboard new CNAs in Europe instead of MITRE and we are now represented in the Council of Roots helping to shape and operationalize the program, deal with challenges, adopt the program&rsquo;s rules accordingly and support MITRE,&rdquo; he explained.</p>

<p>&ldquo;Now, as a TL-Root CNA, we would be represented in the CVE program&rsquo;s Board, where there is currently no European representatives. We want to help and support the CVE Program to blossom and grow and share our European vision.&rdquo;</p>

<p><a href="https://www.infosecurity-magazine.com/news/ai-companies-to-play-bigger-role/" target="_blank"><em>Read more: AI Companies to Play Bigger Role in CVE Program, Says CISA</em></a></p>

<h2><strong>ENISA&rsquo;s Priority: Onboarding EU National CSIRTs As CNAs</strong></h2>

<p>The onboarding of ENISA as the third TL-Root CNA aligns with the CVE Program&rsquo;s broader diversification and internationalization strategy.</p>

<p>Currently, the CVE Program has 502 CNAs, of which only 83 are Europe-based organizations.</p>

<p>Carvalho told <em>Infosecurity</em> that, while he would not say that Europe is &ldquo;underrepresented&rdquo; in the program, &ldquo;there should be a bit more&rdquo; European CNAs than there are.</p>

<p>&ldquo;We know that the European market is not as big as the US market, but we&rsquo;d like to have more representatives from the EU,&rdquo; he added.</p>

<p>During his VulnCon speech, Carvalho said ENISA is already onboarding new CNAs and that the agency&rsquo;s priority is to vet &ldquo;all national computer emergency response teams (CERTs) and computer security incident response teams (CSIRTs) in Europe&rdquo; to become CNAs.</p>

<h2><strong>ENISA&rsquo;s Vulnerability Branch Is Hiring</strong></h2>

<p>Both Carvalho and Clos said that the push to get ENISA more involved in the CVE Program came from EU member-states.</p>

<p>Clos &nbsp;added that the growing volume and complexity of reported vulnerabilities calls for more stakeholders to take part in the program, especially now that AI companies, like OpenAI and <a href="https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/" target="_blank">Anthropic</a>, have launched models that promise to autonomously find and fix cybersecurity vulnerabilities at scale.</p>

<p>&ldquo;We need to include a diverse crowd of cybersecurity practitioners, from product and nationals CERTs and CSIRTs to researchers and vulnerability finders,&rdquo; Clos said.</p>

<p>Carvalho also explained that, while the will to get more involved in the CVE program had been an aim of ENISA for a while, the agency needed to &ldquo;mature its services and team to adequately represent EU interests on the program&rsquo;s Board.&rdquo;</p>

<p>&ldquo;The challenge was always in front of us but was never picked up. I guess the concerns about software vulnerabilities were not big enough until now&rdquo; Clos told <em>Infosecurity</em>.</p>

<p>&ldquo;We are a very small team, that&rsquo;s why, to do this, we need more people to work and support, a critical mass to work on and support the CVE program in different tasks, including onboarding national CERTs and CSIRTs. And indeed, we are growing and hiring. You&rsquo;ll find vacancy notices on ENISA&rsquo;s website,&rdquo; Carvalho added.</p>

<p>Additionally, both Carvalho and Clos agreed that the TL-Root CNA onboarding process is &ldquo;unchartered territory&rdquo; as CISA and MITRE have operated it from the inception of the program and no one has ever been granted it ever since.</p>

<p>&ldquo;While it doesn&rsquo;t&rsquo; depend solely on us, we hope ENISA can become a TL-Root CNA in 2026 or in early 2027. We will do our best for meeting this timeframe,&rdquo; Carvalho concluded.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[The EU cybersecurity agency looks to become the third Top-Level Root CVE Numbering Authority, alongside CISA and MITRE]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/european-cybersecurity-agency-enisa-seeks-top-tier-status-in-cve-program-3738.html</guid>
                <pubDate>Wed, 15 Apr 2026 19:00:16 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/8ea909f9-ad16-4fa1-be80-9fe043936cc7.jpg"/>
            </item>
                    <item>
                <title>Prepping for &apos;Q-Day&apos;: Why Quantum Risk Management Should Start Now</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/prepping-for-q-day-why-quantum-risk-management-should-start-now-3736.html</link>
                                <content:encoded><![CDATA[Quantum computers are coming and may impact systems in unexpected ways, and it will "take years to be fully quantum-safe, if ever," cryptography expert warns.]]></content:encoded>
                                <description><![CDATA[Quantum computers are coming and may impact systems in unexpected ways, and it will "take years to be fully quantum-safe, if ever," cryptography expert warns.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/prepping-for-q-day-why-quantum-risk-management-should-start-now-3736.html</guid>
                <pubDate>Wed, 15 Apr 2026 19:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3bb6d1a7c39a8cb8/69df9d987f84f1210cd92dd6/quantum_TiratusPhaesuwan_Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/audit-big-tech-often-ignores-ca-privacy-law-opt-out-requests-3737.html</link>
                                <content:encoded><![CDATA[Google, Meta, and Microsoft about half the time don't comply with requests to opt out of online tracking per a California law mandate, privacy watchdog finds.]]></content:encoded>
                                <description><![CDATA[Google, Meta, and Microsoft about half the time don't comply with requests to opt out of online tracking per a California law mandate, privacy watchdog finds.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/audit-big-tech-often-ignores-ca-privacy-law-opt-out-requests-3737.html</guid>
                <pubDate>Wed, 15 Apr 2026 19:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4602d9695ec3e1f1/69655ab9ae1d94027b8f024c/HWP2C7.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Critical Nginx-ui MCP Flaw Actively Exploited in the Wild</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/critical-nginx-ui-mcp-flaw-actively-exploited-in-the-wild-3735.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-b06a8cfc-f7ab-44cc-a257-b5e5a60c785a" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>A critical authentication bypass in nginx-ui, a widely used open-source web interface for managing nginx servers, has been actively exploited in the wild.</p>

<p>The vulnerability, tracked as CVE-2026-33032 with a CVSS score of 9.8, was discovered by Pluto Security and allows any network-adjacent attacker to take full control of an nginx server through a single unauthenticated API request.</p>

<p>VulnCheck has added the flaw to its Known Exploited Vulnerabilities (KEV) list. Recorded Future's Insikt Group independently flagged it in a<a href="https://www.recordedfuture.com/blog/march-2026-cve-landscape" target="_blank"> recent report</a> as one of 31 high-impact vulnerabilities exploited during March 2026, assigning it a risk score of 94 out of 100.</p>

<h2><strong>Missing Middleware, Full Access</strong></h2>

<p>The root cause comes down to a single missing function call: nginx-ui recently added support for the Model Context Protocol (MCP), which splits communication across two HTTP endpoints.</p>

<p>The /mcp endpoint, used for establishing connections, carries both IP whitelisting and authentication middleware. But /mcp_message, the endpoint that processes every tool invocation including configuration writes and server restarts, shipped without the authentication check.</p>

<p>That omission exposes 12 MCP tools to unauthenticated callers. Seven are destructive, enabling attackers to inject nginx configurations, reload the server and intercept all traffic passing through it. The remaining five provide reconnaissance capabilities such as reading existing configs and mapping backend infrastructure.</p>

<p><em><a href="https://www.infosecurity-magazine.com/news/mcp-servers-risk-rce-data-leaks/" target="_blank">Read more on MCP-focussed attacks: Hundreds of MCP Servers at Risk of RCE and Data Leaks</a></em></p>

<h2><strong>Thousands of Instances at Risk</strong></h2>

<p>Pluto Security's researchers said they used <a href="https://www.infosecurityeurope.com/en-gb/blog/future-thinking/what-is-offensive-cybersecurity.html" target="_self">Shodan</a> to identify over 2,600 publicly reachable nginx-ui instances across cloud providers including Alibaba Cloud, Oracle and Tencent.</p>

<p>Most were running on the default port 9000. The tool's Docker image has been pulled more than 430,000 times, suggesting a much larger population of potentially vulnerable deployments sitting behind firewalls.</p>

<p>The nginx-ui maintainers released a patch in version 2.3.4 just one day after disclosure. The fix amounted to 27 characters of added code, along with a regression test to prevent the same oversight from recurring. Organizations running nginx-ui with MCP enabled should take immediate action:</p>

<ul>
	<li>
	<p>Update to version 2.3.4 or later</p>
	</li>
	<li>
	<p>If patching is not possible, disable MCP functionality entirely</p>
	</li>
	<li>
	<p>Restrict network access to the management interface</p>
	</li>
	<li>
	<p>Review server logs and configuration directories for unauthorized changes</p>
	</li>
</ul>

<p>This is the second MCP vulnerability Pluto Security has disclosed in recent weeks, following MCPwnfluence, an SSRF-to-RCE chain in the Atlassian MCP server.</p>

<p>Both cases expose a recurring weakness: when MCP is connected to existing applications, its endpoints often inherit full capabilities without inheriting any of the security controls.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Critical nginx-ui MCP authentication bypass CVE-2026-33032 actively exploited with CVSS 9.8]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/critical-nginx-ui-mcp-flaw-actively-exploited-in-the-wild-3735.html</guid>
                <pubDate>Wed, 15 Apr 2026 17:00:19 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/8e4b0528-91b6-4c11-bc8d-61b198214c97.jpg"/>
            </item>
                    <item>
                <title>PPC Analysis: How to Analyze PPC Campaigns for Better Performance</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/ppc-analysis-how-to-analyze-ppc-campaigns-for-better-performance-3734.html</link>
                                <content:encoded><![CDATA[<div>
              <div>
                <p><span id="hs_cos_wrapper_post_body" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text"><div>
<p>TL;DR</p>
<ul>
<li>PPC analysis is the ongoing process of evaluating paid advertising performance to improve targeting, reduce wasted spend, and increase ROI.</li>
<li>Effective PPC campaign analysis goes beyond clicks and impressions to examine traffic quality, engagement, conversions, and cost efficiency.</li>
<li>Key metrics include CPC, CPA, <a href="https://www.anura.io/blog/improve-campaign-conversion-rate" rel="noopener" target="_blank">conversion rate</a>, impression share, and engagement signals like bounce rate and time on site.</li>
<li>Google Ads reports, such as search terms, Quality Score, auction insights, and conversion lag, are essential to analyzing paid ad performance effectively.</li>
<li>ROI calculations fall apart when invalid or non-human traffic inflates clicks and conversions.</li>
<li>Tools like Anura validate traffic in real time, ensuring PPC data analysis reflects real human engagement so optimization decisions are based on clean data.</li>
</ul>
</div>
<p><span id="hs-cta-wrapper-0582645b-612d-411d-9d9e-deca8321e22d"><span id="hs-cta-0582645b-612d-411d-9d9e-deca8321e22d"><a href="https://cta-redirect.hubspot.com/cta/redirect/2215919/0582645b-612d-411d-9d9e-deca8321e22d"><img id="hs-cta-img-0582645b-612d-411d-9d9e-deca8321e22d" height="188" width="900" src="https://no-cache.hubspot.com/cta/default/2215919/0582645b-612d-411d-9d9e-deca8321e22d.png" alt="New call-to-action"></a></span></span></p>
<p>PPC analysis is the foundation of profitable <a href="https://www.anura.io/blog/paid-media-strategy-essentials" rel="noopener" target="_blank">paid advertising</a>, helping marketers understand what&rsquo;s working, what&rsquo;s wasting budget, and where performance can improve. In today&rsquo;s competitive, automation-heavy ad landscape, launching campaigns without regularly analyzing performance data leaves advertisers vulnerable to inefficiencies, poor targeting, and distorted results.</p>
<p>Modern platforms like Google Ads rely heavily on machine learning and automated bidding, which means bad data can compound quickly if left unchecked. <a href="https://support.google.com/google-ads/answer/7065882" rel="noopener" target="_blank">According to Google</a>, smart bidding systems optimize based on historical performance signals, making accurate data critical to long-term results.</p>
<p>This guide walks through how to analyze PPC campaigns step-by-step so your decisions are grounded in clarity, consistency, and clean data.</p>
<h2 id="what-is-ppc-analysis">What is PPC Analysis?</h2>
<p>PPC analysis is the ongoing process of evaluating <a href="https://www.anura.io/fraud-tidbits/pay-per-click-problems" rel="noopener" target="_blank">pay-per-click advertising</a> performance to understand how well campaigns support business goals. It goes beyond reviewing surface metrics to examine how users behave after the click, how efficiently the budget is being spent, and where optimization opportunities still exist. At its core, <a href="https://www.designrush.com/agency/paid-media-pay-per-click/trends/paid-search-metrics" rel="noopener" target="_blank">PPC data</a> analysis turns raw performance data into insights that guide smarter targeting, creative decisions, and budget allocation.</p>
<p>Basic reporting often focuses on clicks and impressions in isolation. True PPC campaign analysis looks at how metrics work together, like how <a href="https://support.google.com/google-ads/answer/6167118" rel="noopener" target="_blank">Quality Score</a> influences cost per click or how engagement impacts conversion rates. Google confirms that Quality Score directly affects both ad rank and cost efficiency, which is why deeper analysis is essential.</p>
<p>Clicks alone don&rsquo;t equal success. A campaign can generate high traffic while still underperforming if that traffic doesn&rsquo;t convert or engage. PPC analysis helps advertisers determine whether traffic is genuinely valuable by evaluating engagement, attribution accuracy, and cost efficiency. When done consistently, it enables smarter spend distribution, tighter targeting, and continuous optimization that improves <a href="https://www.anura.io/ad-fraud-ultimate-guide/how-ad-fraud-bots-destroy-roi" rel="noopener" target="_blank">ROI</a> over time.</p>
<h2 id="what-is-included">What Is Included in a PPC Campaign Analysis?</h2>
<p>A comprehensive PPC campaign analysis typically includes the following:</p>
<ol>
<li><strong>Account structure review:</strong> Evaluating how campaigns, ad groups, and keywords are organized to ensure logical segmentation and clearer performance insights.</li>
<li><strong>Traffic and engagement quality assessment: </strong>Analyzing bounce rate, session duration, and post-click activity to identify low-quality or mismatched traffic.</li>
<li><strong>Conversion performance and attribution accuracy:</strong> Ensuring conversion tracking is configured correctly, and attribution models reflect real customer journeys.</li>
<li><strong>Cost efficiency and spend distribution:</strong> Reviewing CPC, CPA, and ROAS to determine whether spend aligns with outcomes.</li>
<li><strong>Ongoing PPC monitoring vs. one-time audits:</strong> Continuous monitoring outperforms sporadic reviews by catching performance issues before they escalate.</li>
</ol>
<h2 id="core-metrics">Core Metrics to Review During PPC Analysis</h2>
<p>Effective PPC analysis depends on reviewing multiple categories of metrics together, not separately. These include:</p>
<ul>
<li>Traffic quality</li>
<li>Cost efficiency</li>
<li>Engagement</li>
<li>Visibility</li>
</ul>
<p>All of these metrics influence performance and isolating any one of them without the others leads to misleading conclusions. A campaign may look successful based on clicks or impressions alone, while underlying inefficiencies quietly drain marketing budgets.</p>
<p>Evaluating <a href="https://www.anura.io/traffic-quality-audit" rel="noopener" target="_blank">traffic quality</a> helps determine whether clicks come from real, high-intent users or invalid sources that distort reporting and inflate spend. Cost and efficiency metrics reveal how well the budget translates into meaningful results, while engagement and conversion data show whether users actually take action after clicking. Visibility metrics round out the picture by identifying missed opportunities caused by budget limits or ad rank constraints.</p>
<p>When these metric groups are analyzed together, advertisers gain a clearer understanding of campaign health, can diagnose performance issues faster, and make smarter decisions that improve ROI.</p>
<h2 id="how-do-you-measure">How Do You Measure ROI in PPC Ads?</h2>
<p>Measuring ROI for PPC ads requires looking at how well your campaigns turn ad spend into meaningful results. ROI (return on investment) focuses on profitability after costs, while <a href="https://www.anura.io/blog/increase-return-on-ad-spend" rel="noopener" target="_blank">ROAS (return on ad spend)</a> shows how much revenue your ads generate for each dollar spent. Industry benchmarks show PPC remains a revenue driver, with <a href="https://www.octoboard.com/blog/ppc-analytics/ppc-data-trends-roas-and-automation" rel="noopener" target="_blank">average ROAS figures around 1.5-3x</a> depending on industry and strategy, underscoring the importance of measuring both efficiency and profitability rather than just traffic volume.</p>
<p>To truly assess ROI, advertisers should consider:</p>
<ul>
<li><strong>Revenue-based ROI:</strong> Best for ecommerce or direct sales models where revenue can be tied back to PPC spend.</li>
<li><strong>Lead-based ROI:</strong> when PPC generates leads rather than immediate sales, linking those leads back to actual revenue (via CRM or long-term sales data) provides a more accurate picture.</li>
<li><span>Comparative benchmarks:</span> Using industry metrics for guidance helps set realistic expectations for PPC performance. For example, <a href="https://www.wordstream.com/wp-content/uploads/2024/05/ws-guide-google-ads-benchmarks-2024.pdf" rel="noopener" target="_blank">PPC can consistently deliver meaningful conversion rates and revenue performance</a> when strategies focus on intent and quality metrics.</li>
</ul>
<p>By measuring ROI and ROAS alongside cost and conversion metrics, businesses can determine whether PPC campaigns are delivering balanced value by maximizing revenue without overspending.</p>
<h2 id="how-often">How Often Should You Perform PPC Analysis?</h2>
<p>PPC analysis shouldn&rsquo;t be a one-and-done exercise; <a href="https://www.ozairwebs.com/5-ppc-strategies-to-boost-roi-2025-maximize-roi/" rel="noopener" target="_blank">it needs regular review</a>. Daily checks help spot urgent issues, like sudden spikes in spending, unexpected drops in conversions, or early signs of campaign inefficiencies, and allow rapid corrective action. Weekly and monthly reviews tend to reveal trends so you can refine targeting, budget allocation, and bidding strategies.</p>
<p>Certain performance triggers should prompt deeper investigation immediately, including:</p>
<ul>
<li>Major fluctuations in cost metrics like CPC and CPA.</li>
<li>Significant changes in conversion rates.</li>
<li>Unusual shifts in traffic quality or engagement.</li>
<li>Sudden drops in visibility metrics like impression share.</li>
</ul>
<p>Consistent PPC monitoring delivers better insights over time, enabling advertisers to catch small issues before they become costly problems, especially as automated bidding systems respond continuously to performance patterns.</p>
<h2 id="common-ppc">Common PPC Performance Issues that PPC Analysis Reveals</h2>
<p>A thorough PPC analysis often uncovers common performance bottlenecks that aren&rsquo;t obvious from basic reporting. For example:</p>
<ul>
<li><strong>High spend, low engagement traffic:</strong> Spending heavily on low-quality traffic drains budget without driving results.</li>
<li><strong>Clicks without conversions:</strong> This can point to mismatched intent, weak landing page relevance, or poor user experience.</li>
<li><strong>Geographic or device inefficiencies:</strong> Performance often varies significantly by location or device type, revealing where bids or creatives need to be adjusted.</li>
<li><span>Invalid or non-human traffic inflating metrics:</span> <a href="https://www.anura.io/invalid-traffic" rel="noopener" target="_blank">Traffic quality issues</a> skew data and lead to poor optimization choices, a problem that only deeper analysis can find.</li>
</ul>
<p>Industry metrics reinforce that focusing solely on high-level numbers like impressions or generic clicks often misses these nuances, underscoring why deeper analysis is necessary for meaningful optimization.</p>

<p>Effective PPC analysis combines <a href="https://www.ozairwebs.com/5-ppc-strategies-to-boost-roi-2025-maximize-roi/" rel="noopener" target="_blank">multiple tools</a> to create a complete picture of how campaigns perform:</p>
<ul>
<li><strong>Native platform reporting:</strong> Built-in dashboards like Microsoft Ads, etc., provide core metrics like CPC, conversion rate, and impression share that are foundational to review.</li>
<li><strong>Analytics platforms:</strong> Third-party tools, such as Google Analytics 4 or Adobe Analytics, help connect clicks to onsite engagement and conversions.</li>
<li><strong>Visualization and dashboard tools:</strong> Tools like Looker, Tableau, or Data Studio unify metrics across channels, making trends and anomalies easier to spot.</li>
<li><strong>Traffic validation and quality tools:</strong> Ensuring that PPC analysis reflects real user engagement rather than bots, automated clicks, or invalid interactions strengthens the quality of decisions made from the data.</li>
</ul>
<p>Layering these tools together gives advertisers a multi-dimensional view of performance that supports smarter optimization and better budget decisions.</p>
<h2 id="how-anura">How Anura Strengthens PPC Analysis</h2>
<p>One of the biggest hidden issues in PPC analysis is data quality. Invalid traffic, including bot activity, automated scripts, or malicious interactions, can inflate metrics like CPC, conversion rate, and even derived ROI figures. When these invalid signals enter reporting, automated bidding systems and optimization logic can push budget toward traffic sources that aren&rsquo;t delivering real value.</p>
<p>Anura addresses this challenge by validating traffic in real time, identifying non-human interactions before they reach analytics or bidding systems. This ensures that the performance data you analyze and optimize against reflects real human engagement.</p>
<p>With a <a href="https://www.anura.io/accuracy-guarantee" rel="noopener" target="_blank">99.999% Accuracy Guarantee</a>, Anura ensures that when traffic is flagged as invalid, you can trust that assessment with confidence. Clean data leads to clearer insights, letting you optimize bids, refine targeting, and allocate budget with assurance that your performance metrics are meaningful and actionable.</p>
<h2 id="turning-ppc-into-action">Turning PPC Analysis into Action</h2>
<p>PPC analysis is an ongoing discipline that bridges data and decision-making. Accurate measurement, consistent monitoring, and clean traffic data unlock the insights needed to optimize effectively, scale performance, and improve ROI.</p>
<p>When your analysis reflects real engagement rather than inflated metrics, your optimization strategies become more reliable, more strategic, and ultimately more impactful.</p>
<p>Experience the power of Anura and discover just how much fraud you have with a <a href="https://www.anura.io/traffic-quality-audit" rel="noopener" target="_blank">free Traffic Quality Audit</a>.</p>
<p><span id="hs-cta-wrapper-6c0c2b3d-1bd3-415f-a701-8fc3d6daa420"><span id="hs-cta-6c0c2b3d-1bd3-415f-a701-8fc3d6daa420"><a href="https://cta-redirect.hubspot.com/cta/redirect/2215919/6c0c2b3d-1bd3-415f-a701-8fc3d6daa420"><img id="hs-cta-img-6c0c2b3d-1bd3-415f-a701-8fc3d6daa420" height="424" width="900" src="https://no-cache.hubspot.com/cta/default/2215919/6c0c2b3d-1bd3-415f-a701-8fc3d6daa420.png" alt="New call-to-action"></a></span></span></p></span></p>
              </div>

            </div>
]]></content:encoded>
                                <description><![CDATA[TL;DR PPC analysis is the ongoing process of evaluating paid advertising performance to improve targeting, reduce wasted spend, and increase ROI. Effective PPC campaign analysis goes beyond clicks and impressions to examine traffic quality, engagement, conversions, and cost efficiency....]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/ppc-analysis-how-to-analyze-ppc-campaigns-for-better-performance-3734.html</guid>
                <pubDate>Wed, 15 Apr 2026 17:00:13 +0300</pubDate>
                <media:thumbnail url="https://www.anura.io/hubfs/2026-Blogs/Blog-Image_How-to-do-PPC-Analysis.webp"/>
            </item>
                    <item>
                <title>April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more-3733.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 15, 2026</span></span><span>Vulnerability / Data Breach</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-FBwJYevQ8Ner9ypyp5-H1XIPfa5guhQXC-W4llTZuBI072vjCoxKh9PUexQBZGJIeuZXoBAKboz9xz5Gzd0p1SiT5UME0wd0lTTOS6EIh3nJ6vsAeMzGmT0P38ry2ySiLc-je0e0YAZAPDYmhw3jSfqbExcsQW5nL8syaClAcSfZziU-KPneawQFfo6p/s1700-e365/patches.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-FBwJYevQ8Ner9ypyp5-H1XIPfa5guhQXC-W4llTZuBI072vjCoxKh9PUexQBZGJIeuZXoBAKboz9xz5Gzd0p1SiT5UME0wd0lTTOS6EIh3nJ6vsAeMzGmT0P38ry2ySiLc-je0e0YAZAPDYmhw3jSfqbExcsQW5nL8syaClAcSfZziU-KPneawQFfo6p/s1700-e365/patches.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A number&nbsp;of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April's Patch Tuesday&nbsp;releases.</p>
<p>Topping the list is an SQL injection vulnerability impacting SAP Business Planning and Consolidation and SAP Business Warehouse&nbsp;(<a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2026.html">CVE-2026-27681</a>, CVSS score: 9.9) that could result in the execution of arbitrary database&nbsp;commands.</p>
<p>"The vulnerable ABAP program allows a low-privileged user to upload a file with arbitrary SQL statements that will then be executed,"&nbsp;Onapsis <a href="https://onapsis.com/blog/sap-security-notes-april-2026-patch-day/">said</a> in an&nbsp;advisory.</p>
<p>In a potential attack scenario, a bad actor could abuse the affected upload-related functionality to run malicious SQL against BW/BPC data stores, extract sensitive data, and delete or corrupt database&nbsp;content.</p>
<p>"Manipulated planning figures, broken reports, or deleted consolidation data can undermine close processes, executive reporting, and operational planning,"&nbsp;Pathlock <a href="https://pathlock.com/blog/security-alerts/sap-patch-day-april-2026-critical-sql-injection-authorization-flaws/">said</a>. "In the wrong hands, this issue also creates a credible path to both stealthy data theft and overt business disruption."</p>
<p>Another security vulnerability that deserves a mention is a critical-severity remote code execution in Adobe Acrobat Reader&nbsp;(<a href="https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html">CVE-2026-34621</a>, CVSS score: 8.6) that has come under active exploitation in the&nbsp;wild.</p>
<div><p><a href="https://thehackernews.uk/vpn-risk-report-inside-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm/s728-e100/z-d.jpg" width="729" height="91"></a></p></div>
<p>That said, there are many unknowns at this stage. It&nbsp;is not clear how many people have been affected by the hacking campaign. Nor&nbsp;is there any information about who is behind the activity, who is being targeted, and what their motives could&nbsp;be.</p>
<p>Also <a href="https://helpx.adobe.com/security/security-bulletin.html">patched</a> by Adobe&nbsp;are <a href="https://helpx.adobe.com/security/products/coldfusion/apsb26-38.html">five critical flaws in ColdFusion versions 2025 and&nbsp;2023</a> that, if successfully exploited, could lead to&#8239;arbitrary code execution, application denial-of-service, arbitrary file system read, and security feature&nbsp;bypass.</p>
<p>The vulnerabilities are listed below&nbsp;-</p>
<ul>
<li><strong>CVE-2026-34619</strong> (CVSS score: 7.7) - A path traversal vulnerability leading to security feature bypass</li>
<li><strong>CVE-2026-27304</strong> (CVSS score: 9.3) - An improper input validation vulnerability leading to arbitrary code execution</li>
<li><strong>CVE-2026-27305</strong> (CVSS score: 8.6) - A path traversal vulnerability leading to arbitrary file system read</li>
<li><strong>CVE-2026-27282</strong> (CVSS score: 7.5) - An improper input validation vulnerability leading to security feature bypass</li>
<li><strong>CVE-2026-27306</strong> (CVSS score: 8.4) - An improper input validation vulnerability leading to arbitrary code execution</li>
</ul>

<p>Fixes have&nbsp;also been&nbsp;released for two critical FortiSandbox vulnerabilities that could result in authentication bypass and code execution&nbsp;-</p>
<ul>
<li><strong><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-112">CVE-2026-39813</a></strong> (CVSS score: 9.1) - A path traversal vulnerability in FortiSandbox JRPC API that could allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests. (Fixed in versions 4.4.9&nbsp;and 5.0.6)</li>
<li><strong><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-100">CVE-2026-39808</a></strong> (CVSS score: 9.1) - An operating system command injection vulnerability in FortiSandbox that could allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests. (Fixed in version 4.4.9)</li>
</ul>
<p>The development comes as&nbsp;Microsoft <a href="https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html">addressed</a> a staggering 169 security defects, including a spoofing vulnerability impacting Microsoft SharePoint Server (CVE-2026-32201, CVSS score: 6.5) that could allow an attacker to view sensitive information. The&nbsp;company said&nbsp;it's being actively&nbsp;exploited, although there are no insights into the in-the-wild exploitation associated with the&nbsp;bug.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>"SharePoint services, especially those used as internal document stores, can be a treasure trove for threat actors looking to steal data, especially data&nbsp;that may be&nbsp;leveraged to force ransom payments using double extortion techniques by threatening to release the stolen data if payment is not made," Kev Breen, senior director of threat research at Immersive,&nbsp;said.</p>
<p>"A secondary concern is that threat actors with access to SharePoint services could deploy weaponised documents or replace legitimate documents with infected versions that would allow them to spread to other hosts or victims moving laterally across the organization."</p>
<h2>Software Patches from Other&nbsp;Vendors</h2>
<p>In addition to Microsoft, security updates have&nbsp;also been&nbsp;released by other vendors over the past several weeks to rectify several vulnerabilities, including&nbsp;&mdash;</p>

<ul>
<li><a href="https://www.abb.com/global/en/company/about/cybersecurity/alerts-and-notifications">ABB</a></li>
<li><a href="https://aws.amazon.com/security/security-bulletins/">Amazon Web Services</a></li>
<li><a href="https://www.amd.com/en/resources/product-security.html#security">AMD</a></li>
<li><a href="https://support.apple.com/en-us/HT201222">Apple</a></li>
<li><a href="https://www.asus.com/security-advisory/">ASUS</a></li>
<li><a href="https://www.aveva.com/en/support-and-success/cyber-security-updates/">AVEVA</a></li>
<li><a href="https://support.broadcom.com/web/ecx/security-advisory">Broadcom</a> (including VMware)</li>
<li><a href="https://psirt.canon/advisory-information/#id_2229656">Canon</a></li>
<li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco</a></li>
<li><a href="https://support.citrix.com/support-home/topic-article-list?trendingCategory=20&amp;trendingTopicName=Latest%20Security%20Bulletin">Citrix</a></li>
<li><a href="https://www.codesys.com/ecosystem/security/latest-codesys-security-advisories/">CODESYS</a></li>
<li><a href="https://supportannouncement.us.dlink.com/">D-Link</a></li>
<li><a href="https://www.3ds.com/trust-center/security/security-advisories">Dassault Syst&egrave;mes</a></li>
<li><a href="https://www.dell.com/support/security/">Dell</a></li>
<li><a href="https://devolutions.net/security/advisories/">Devolutions</a></li>
<li><a href="https://www.dormakabagroup.com/en/security-advisories">dormakaba</a></li>
<li><a href="https://www.drupal.org/security">Drupal</a></li>
<li><a href="https://discuss.elastic.co/c/announcements/security-announcements/31">Elastic</a></li>
<li><a href="https://my.f5.com/manage/s/new-updated-articles#f-f5_document_type=Security%20Advisory&amp;aq=%40f5_original_published_date%20%3E%3D%20now-7d">F5</a></li>
<li><a href="https://www.fortiguard.com/psirt">Fortinet</a></li>
<li><a href="https://www.foxit.com/support/security-bulletins.html">Foxit Software</a></li>
<li><a href="https://www.fujifilm.com/fbglobal/eng/company/news/notice">FUJIFILM</a></li>
<li><a href="https://www.gigabyte.com/us/Support/Security">Gigabyte</a></li>
<li><a href="https://docs.gitlab.com/releases/18/patch-release-gitlab-18-10-3-released/">GitLab</a></li>
<li>Google <a href="https://source.android.com/docs/security/bulletin/2026/2026-04-01">Android</a> and <a href="https://source.android.com/docs/security/bulletin/pixel/2026/2026-04-01">Pixel</a></li>
<li><a href="https://chromereleases.googleblog.com/">Google Chrome</a></li>
<li><a href="https://cloud.google.com/support/bulletins">Google Cloud</a></li>
<li><a href="https://grafana.com/security/security-advisories/">Grafana</a></li>
<li><a href="https://www.hitachienergy.com/in/en/products-and-solutions/cybersecurity/alerts-and-notifications">Hitachi Energy</a></li>
<li><a href="https://support.hp.com/us-en/security-bulletins">HP</a></li>
<li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US#sort=%40hpescuniversaldate%20descending&amp;layout=table&amp;numberOfResults=25&amp;f:@kmdoclanguagecode=%5Bcv1871440%5D&amp;hpe=1">HP Enterprise</a> (including Aruba Networking and <a href="https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=date%20descending&amp;f:ctype=%5BSecurity%20Advisories%5D">Juniper Networks</a>)</li>
<li><a href="https://www.huawei.com/en/psirt/all-bulletins">Huawei</a></li>
<li><a href="https://www.ibm.com/support/pages/bulletin/">IBM</a></li>
<li><a href="https://hub.ivanti.com/s/searchallcontent?language=en_US#q=CVE&amp;sortCriteria=date%20descending&amp;f-sfkbknowledgearticletypec=Security%20Advisory&amp;f-commonlanguage=English">Ivanti</a></li>
<li><a href="https://www.jenkins.io/security/advisories/">Jenkins</a></li>
<li><a href="https://support.lenovo.com/us/en/product_security/ps500001-lenovo-product-security-advisories">Lenovo</a></li>
<li>Linux distributions <a href="https://errata.almalinux.org">AlmaLinux</a>, <a href="https://security.alpinelinux.org">Alpine Linux</a>, <a href="https://alas.aws.amazon.com">Amazon Linux</a>, <a href="https://security.archlinux.org/advisory">Arch Linux</a>, <a href="https://www.debian.org/security/#DSAS">Debian</a>, <a href="https://security.gentoo.org/glsa">Gentoo</a>, <a href="https://linux.oracle.com/ords/f?p=105:21::::RP::">Oracle Linux</a>, <a href="https://advisories.mageia.org">Mageia</a>, <a href="https://access.redhat.com/security/security-updates/security-advisories">Red Hat</a>, <a href="https://errata.rockylinux.org/">Rocky Linux</a>, <a href="https://www.suse.com/support/update/">SUSE</a>, and <a href="https://ubuntu.com/security/notices">Ubuntu</a></li>
<li><a href="https://corp.mediatek.com/product-security-bulletin/April-2026">MediaTek</a></li>
<li><a href="https://www.mitel.com/support/security-advisories">Mitel</a></li>
<li><a href="https://www.mitsubishielectric.com/en/psirt/vulnerability/index.html">Mitsubishi Electric</a></li>
<li><a href="https://www.mongodb.com/resources/products/mongodb-security-bulletins">MongoDB</a></li>
<li><a href="https://www.moxa.com/en/support/product-support/security-advisory">Moxa</a></li>
<li>Mozilla <a href="https://www.mozilla.org/en-US/security/advisories/">Firefox, Firefox ESR, and Thunderbird</a></li>
<li><a href="https://www.netgear.com/about/security/">NETGEAR</a></li>
<li><a href="https://nodejs.org/en/blog/vulnerability/march-2026-security-releases">Node.js</a></li>
<li><a href="https://www.nvidia.com/en-us/security/">NVIDIA</a></li>
<li><a href="https://owncloud.com/security/">ownCloud</a></li>
<li><a href="https://security.paloaltonetworks.com/">Palo Alto Networks</a></li>
<li><a href="https://www.phoenixcontact.com/en-pc/service-and-support/psirt">Phoenix Contact</a></li>
<li><a href="https://community.progress.com/s/global-search/%40uri#t=KnowledgeBase&amp;sort=date%20descending&amp;numberOfResults=100&amp;f:@sfdcareaofinterest=%5BDefects%5D&amp;f:@sfarticletypec=%5BProduct_Alert,Critical_Alert%5D">Progress Software</a></li>
<li><a href="https://www.qnap.com/en/security-advisories">QNAP</a></li>
<li><a href="https://docs.qualcomm.com/product/publicresources/securitybulletin/">Qualcomm</a></li>
<li><a href="https://www.rockwellautomation.com/en-us/company/about-us/sustainability/trust-security/security-advisories.html?sort=pubAsc">Rockwell Automation</a></li>
<li><a href="https://support.ruckuswireless.com/security">Ruckus Wireless</a></li>
<li><a href="https://security.samsungmobile.com/securityUpdate.smsb">Samsung</a></li>
<li><a href="https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp">Schneider Electric</a></li>
<li><a href="https://new.siemens.com/global/en/products/services/cert.html#SecurityPublications">Siemens</a></li>
<li><a href="https://www.sonicwall.com/search/#t=Support&amp;sort=date%20descending&amp;f:sourceTypeFacetId=%5BNotices%5D&amp;f:@language=%5BEnglish%5D">SonicWall</a></li>
<li><a href="https://advisory.splunk.com/">Splunk</a></li>
<li><a href="https://spring.io/security">Spring Framework</a></li>
<li><a href="https://www.supermicro.com/en/support/security_center#!advisories">Supermicro</a></li>
<li><a href="https://www.synology.com/en-in/security/advisory">Synology</a></li>
<li><a href="https://www.tp-link.com/us/press/security-advisory/">TP-Link</a></li>
<li><a href="https://www.watchguard.com/wgrd-psirt/advisories">WatchGuard</a>, and</li>
<li><a href="https://trust.mi.com/zh-CN/misrc/bulletins?tab=advisory">Xiaomi</a></li>
</ul>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April's Patch Tuesday releases. Topping the list is an SQL injection vulnerability impacting SAP Business Planning and Consolidation and SAP Business Warehouse (CVE-2026-27681, CVSS...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more-3733.html</guid>
                <pubDate>Wed, 15 Apr 2026 17:00:11 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-FBwJYevQ8Ner9ypyp5-H1XIPfa5guhQXC-W4llTZuBI072vjCoxKh9PUexQBZGJIeuZXoBAKboz9xz5Gzd0p1SiT5UME0wd0lTTOS6EIh3nJ6vsAeMzGmT0P38ry2ySiLc-je0e0YAZAPDYmhw3jSfqbExcsQW5nL8syaClAcSfZziU-KPneawQFfo6p/s1700-e365/patches.jpg"/>
            </item>
                    <item>
                <title>Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover-3732.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 15, 2026</span></span><span>Web Security / Vulnerability</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-efZdYJpyjLdBQDLfJxWi6aiElSTIIzesGLR7SNMM0laIvBdFHioyAfxmOQkhV-bBV5SqCxRRhocp4-Q3EezvtE5Xp2aeNcFrP6d89jhOY2QiCVhhyMCMCVy39cE5YcTvg_7_tvXAEwI4N1g_eRKNzWwYtLH-k80d5he55NN2UK0sNNkbb0l35ix6MOBR/s1700-e365/nui.png"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-efZdYJpyjLdBQDLfJxWi6aiElSTIIzesGLR7SNMM0laIvBdFHioyAfxmOQkhV-bBV5SqCxRRhocp4-Q3EezvtE5Xp2aeNcFrP6d89jhOY2QiCVhhyMCMCVy39cE5YcTvg_7_tvXAEwI4N1g_eRKNzWwYtLH-k80d5he55NN2UK0sNNkbb0l35ix6MOBR/s1700-e365/nui.png" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the&nbsp;wild.</p>
<p>The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to seize control of the Nginx service. It&nbsp;has been codenamed <b>MCPwn </b>by Pluto&nbsp;Security.</p>
<p>"The&nbsp;nginx-ui <a href="https://www.praetorian.com/blog/mcp-server-security-the-hidden-ai-attack-surface/">MCP</a> (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message," according to&nbsp;an <a href="https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf">advisory</a> released by nginx-ui maintainers last month. "While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting -- and the default IP whitelist is empty, which the middleware treats as 'allow&nbsp;all.'"&nbsp;</p>
<p>"This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads - achieving complete nginx service takeover."</p>
<div><p><a href="https://thehackernews.uk/vpn-risk-report-inside-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm/s728-e100/z-d.jpg" width="729" height="91"></a></p></div>
<p>According to <a href="https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/" rel="nofollow" target="_blank">Pluto Security</a> researcher Yotam Perkal, who identified and reported the flaw, the attack can facilitate a full takeover in seconds via two requests&nbsp;-</p>
<ul>
<li>An HTTP GET request to the /mcp endpoint to establish a session and obtain a session ID.</li>
<li>An HTTP POST request to the /mcp_message endpoint using the session ID to invoke any MCP tool sans authentication</li>
</ul>
<p>In other words, attackers can exploit this vulnerability by sending specially crafted HTTP requests directly to the "/mcp_message" endpoint without any authentication headers or&nbsp;tokens.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisUanfd05ooV_zL11nbqpyOOfWfh6NQpMSfx3tVgUPNxcNVyLrBUFRc1ww7gMxX-pJmXrkpQeGfqQH8X7MiA7ujz2pUNiGT3AU-jE1_F_sB8cii9ARwFsS0UsdmWtgpb3-kVfM9yY2f-rYyNsL2c7J6FZCuoX2VIWMjhjXIHDw52TefXP6bh-qAl9LiS0v/s1700-e365/get.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisUanfd05ooV_zL11nbqpyOOfWfh6NQpMSfx3tVgUPNxcNVyLrBUFRc1ww7gMxX-pJmXrkpQeGfqQH8X7MiA7ujz2pUNiGT3AU-jE1_F_sB8cii9ARwFsS0UsdmWtgpb3-kVfM9yY2f-rYyNsL2c7J6FZCuoX2VIWMjhjXIHDw52TefXP6bh-qAl9LiS0v/s1700-e365/get.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="760" data-original-width="763"></a></p>
<p>Successful exploitation of the flaw could enable them to invoke MCP tools and modify Nginx configuration files and reload the server. Furthermore, an attacker could exploit this loophole to intercept all traffic and harvest administrator credentials.&nbsp;</p>
<p>Following responsible disclosure, the vulnerability was addressed&nbsp;in <a href="https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.4">version&nbsp;2.3.4</a>, released on March 15, 2026. As&nbsp;workarounds, users are advised to add "middleware.AuthRequired()" to the "/mcp_message" endpoint to force authentication. Alternatively, it's advised to change the IP allowlisting default behavior from "allow-all" to "deny-all."</p>
<p>The disclosure comes as Recorded Future, in a&nbsp;report <a href="https://www.recordedfuture.com/blog/march-2026-cve-landscape">published</a> this week, listed CVE-2026-33032 as one of the 31 vulnerabilities that have been actively exploited by threat actors in March 2026. There&nbsp;are currently no insights on the exploitation activity associated with the security&nbsp;flaw.</p>
<p>"When you bolt MCP onto an existing application, the MCP endpoints inherit the application&rsquo;s full capabilities but not necessarily its security controls. The&nbsp;result is a backdoor that bypasses every authentication mechanism the application was carefully built with," Perkal&nbsp;said.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>Data from Shodan shows that there are about 2,689 exposed instances on the internet, with most of them located in China, the U.S., Indonesia, Germany, and Hong&nbsp;Kong.</p>
<p>"Given the approximately 2,600 publicly reachable nginx-ui instances our researchers identified, the risk to unpatched deployments is immediate and real," Pluto told The Hacker News. "Organizations running nginx-ui should treat this as an emergency: update to version 2.3.4&nbsp;immediately, or disable MCP functionality and restrict network access as an interim&nbsp;measure."</p>
<p>News of CVE-2026-33032 follows the discovery of two security flaws in the Atlassian MCP server ("mcp-atlassian") that could be chained to achieve remote code execution. The&nbsp;flaws &ndash; tracked as CVE-2026-27825 (CVSS 9.1) and CVE-2026-27826 (CVSS 8.2) and dubbed MCPwnfluence &ndash; enable any attacker on the same local network to run arbitrary code on a vulnerable machine without requiring any authentication.</p>
<p>"When chaining both vulnerabilities --&nbsp;we are able&nbsp;to send requests to the MCP from the LAN [local area network], redirect the server to the attacker machine, upload an attachment, and then receive a full unauthenticated RCE from the LAN," Pluto&nbsp;Security <a href="https://blog.pluto.security/p/mcpwnfluence-cve-2026-27825-critical">said</a>.</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-2026-33032 (CVSS score: 9.8), an authentication bypass vulnerability that enables threat actors to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover-3732.html</guid>
                <pubDate>Wed, 15 Apr 2026 17:00:11 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-efZdYJpyjLdBQDLfJxWi6aiElSTIIzesGLR7SNMM0laIvBdFHioyAfxmOQkhV-bBV5SqCxRRhocp4-Q3EezvtE5Xp2aeNcFrP6d89jhOY2QiCVhhyMCMCVy39cE5YcTvg_7_tvXAEwI4N1g_eRKNzWwYtLH-k80d5he55NN2UK0sNNkbb0l35ix6MOBR/s1700-e365/nui.png"/>
            </item>
                    <item>
                <title>Copilot and Agentforce fall to form-based prompt injection tricks</title>
                <link>https://www.scamalert24.co.za.bestpiecejob.co.za/copilot-and-agentforce-fall-to-form-based-prompt-injection-tricks-3731.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Prompt injection flaws in Microsoft Copilot Studio and Salesforce Agentforce let attackers weaponize form inputs to override agents' behavior and exfiltrate sensitive customer and business data.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Enterprise AI agents are supposed to streamline workflows. Instead, two fresh findings show they can just as easily streamline data exfiltration.</p>



<p>Security researchers have uncovered prompt-injection vulnerabilities in both Microsoft Copilot Studio and Salesforce Agentforce that allow attackers to execute malicious instructions via seemingly harmless prompts.</p>



<p>According to Capsule Security findings, SharePoint forms and public-facing lead forms within Copilot are vulnerable to attackers issuing prompts that can override system intent and trigger data exfiltration to attacker-controlled servers.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>One of these flaws has already been assigned a high-severity CVE, with another &ldquo;critical&rdquo; one reportedly missing the bar for categorization. The flaws can allow theft of PIIs, customer/lead records, free-text business context, and operational/workflow data.</p>

		

			


<p>In both cases, AI agents treat untrusted user input as trusted instructions, Capsule researchers noted in the <a href="https://www.capsulesecurity.io/blog-post/pipeleak-the-lead-that-stole-your-database-exploiting-salesforce-agentforce-with-indirect-prompt-injection" target="_blank" rel="noreferrer noopener">disclosures</a> shared with CSO ahead of their<a href="https://www.capsulesecurity.io/blog-post/shareleak-taking-the-wheel-of-microsofts-copilot-studio-cve-2026-21520" target="_blank" rel="noreferrer noopener"> publication</a> on Wednesday.</p>



<h2><a></a>ShareLeak: SharePoint forms data leaked through Copilot</h2>



<p>The Microsoft-side issue, dubbed &ldquo;ShareLeak,&rdquo; is about how Copilot Studio agents process SharePoint form submissions. The attack begins with a crafted payload inserted into a standard form field, like &ldquo;comments&rdquo;, which the agent later ingests as part of its operational context.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Because the system concatenates user input with system prompts, the injected payload overrides the agent&rsquo;s original instructions. The model is thus tricked into believing the attacker&rsquo;s instructions are legitimate system directives. The malicious input moves from form submission to agent execution without any resistance.</p>



<p>Once compromised, the agent can access connected SharePoint Lists and extract sensitive customer data, including names, addresses, phone numbers, and send it externally via email. The researchers found that even when Microsoft&rsquo;s safety mechanisms flagged suspicious behavior, the data was exfiltrated.</p>



<p>The root cause is that there is no reliable separation between trusted system instructions and untrusted user data. In the existing setup, the AI cannot distinguish between the two, the researchers said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Microsoft <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21520" target="_blank" rel="noreferrer noopener">patched</a> the issue following disclosure, assigning <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21520" target="_blank" rel="noreferrer noopener">CVE-2026-21520</a> to it and assessing its severity at 7.5 out of 10 on the CVSS scale. The mitigation was carried out internally, and no further action is required from the users.</p>



<h2><a></a>PipeLeak: Salesforce Agentforce hijacked by a simple lead</h2>



<p>In the Salesforce Agentforce case, attackers embed malicious instructions inside a public-facing lead form. When an internal user later asks the agent to review or process that lead, the agent executes the embedded instructions as if they were part of its task.</p>



<p>According to a Capsule demonstration, the agent retrieves CRM data via the &ldquo;GetLeadsInformation&rdquo; function and then sends it externally via email.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The compromise isn&rsquo;t limited to a single record. Researchers demonstrated that a hijacked agent could query and exfiltrate multiple lead records in bulk, effectively turning a single form submission into a database extraction pipeline.</p>



<p>The researchers said Salesforce acknowledged the prompt injection issue but characterized the exfiltration vector as &ldquo;configuration-specific,&rdquo; pointing to optional human-in-the-loop (<a href="https://www.csoonline.com/article/4108592/human-in-the-loop-isnt-enough-new-attack-turns-ai-safeguards-into-exploits.html">HITL</a>) controls. Capsule&rsquo;s pushback on that framing argues that requiring manual approvals undermines the very purpose of autonomous agents.</p>



<div><p>The deeper issue, they noted, is insecure defaults. Systems designed for automation should not allow untrusted inputs to redefine agent goals.</p><p>Both disclosures converge on a baseline that calls for treating all external inputs as untrusted and having filters in place that separate data from instructions. This would entail enforcing input validation, least-privilege access, and strict controls on actions like outbound email.</p></div>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Enterprise AI agents are supposed to streamline workflows. Instead, two fresh findings show they can just as easily streamline data exfiltration. Security researchers have uncovered prompt-injection vulnerabilities in both Microsoft Copilot Studio and Salesforce Agentforce that allow attackers to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za.bestpiecejob.co.za/copilot-and-agentforce-fall-to-form-based-prompt-injection-tricks-3731.html</guid>
                <pubDate>Wed, 15 Apr 2026 16:00:12 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159079-0-35635400-1776254988-shutterstock_2354016553.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
            </channel>
</rss>
