<?xml version="1.0" encoding="utf-8"?><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:snf="http://www.smartnews.be/snf">
    <channel>
        <title>ScamAlert24</title>
        <link>https://www.scamalert24.co.za/</link>
        <description>ScamAlert24.co.za is South Africa’s dedicated platform for reporting, exposing, and educating the public about scams, fraud, and online deception. Whether it&apos;s fake job posts, investment fraud, phishing schemes, or social media scams, we help individuals and businesses stay informed and alert. Our community-driven portal empowers users to report suspicious activities, read verified scam reports, and get tips on how to protect their money and identity. Be part of the solution — report a scam, share your story, and help others stay safe.</description>
        <lastBuildDate>Sat, 18 Apr 2026 12:00:10 +0300</lastBuildDate>
        <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
                    <item>
                <title>$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims</title>
                <link>https://www.scamalert24.co.za/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims-3799.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 18, 2026</span></span><span>Money Laundering / Regulatory Compliance</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPcUvJCFRqDmEr1ZDSaUJCAymmKwZOeXdmfPY6Eekp7tLOpqjXLKHilHOHlNyuxmennQE8H5oxuRTaCncC8hsoGYEloD8OrDlR1wpbxGivBBB7KdVX8kiv_pOzC6GQ7LNPKoJGkFklpW0XutuLRPjl3I5cPta1n-BqVyAdO1luW3EUR8jyiZEtVjVTGWUK/s1700-e365/grinex.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPcUvJCFRqDmEr1ZDSaUJCAymmKwZOeXdmfPY6Eekp7tLOpqjXLKHilHOHlNyuxmennQE8H5oxuRTaCncC8hsoGYEloD8OrDlR1wpbxGivBBB7KdVX8kiv_pOzC6GQ7LNPKoJGkFklpW0XutuLRPjl3I5cPta1n-BqVyAdO1luW3EUR8jyiZEtVjVTGWUK/s1700-e365/grinex.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange <a href="https://thehackernews.com/2025/08/us-sanctions-garantex-and-grinex-over.html">sanctioned</a> by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74 million hack.</p>
<p>The exchange said it fell victim to what it described as a large-scale cyber attack that bore hallmarks of foreign intelligence agency involvement. This attack led to the theft of over 1 billion rubles in user funds.</p>
<p>"Digital forensic evidence and the nature of the attack point to an unprecedented level of resources and technological sophistication &ndash; capabilities typically available exclusively to the agencies of hostile states," the company <a href="https://grinex.io/">said</a> in a statement posted on its website. "Preliminary findings suggest the attack was coordinated with the specific objective of inflicting direct damage upon Russia's financial sovereignty."</p>
<div><p><a href="https://thehackernews.uk/ai-blindspot-d-2" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu/s728-e100/nudge-d-2.jpg" width="729" height="91"></a></p></div>
<p>A spokesperson for the company went on to state that the exchange's infrastructure had been under attack since the beginning of its operations, and that the latest development represents a new level of escalation aimed at destabilising the domestic financial sector.</p>
<p>Grinex is believed to be a rebrand of Garantex, a cryptocurrency exchange that was <a href="https://thehackernews.com/2022/04/us-treasury-department-sanctions-russia.html">sanctioned</a> by the U.S. Treasury Department in April 2022 for laundering funds linked to ransomware and darknet markets like Conti and Hydra. The Treasury <a href="https://thehackernews.com/2025/08/us-sanctions-garantex-and-grinex-over.html">renewed</a> sanctions against Garantex in August 2025 for processing more than $100 million in illicit transactions and enabling money laundering.</p>
<p>According to the Treasury and details shared by blockchain intelligence firms Elliptic and TRM Labs, Garantex is said to have moved its customer base to Grinex in response to the sanctions and remained operational by using a ruble-backed stablecoin called A7A5.</p>
<p>In a report published earlier this February, Elliptic also <a href="https://www.elliptic.co/blog/russia-linked-cryptocurrency-services-and-sanctions-evasion">disclosed</a> that Rapira, a Georgia-incorporated exchange with an office in Moscow, has engaged in direct cryptoasset transactions to and from Grinex totaling more than $72 million, highlighting how exchanges with ties to Russia continue to enable sanctions evasion.</p>
<p>The British blockchain analytics firm <a href="https://www.elliptic.co/blog/sanctioned-russia-linked-crypto-exchange-grinex-halts-operations-following-alleged-hack">said</a> the Grinex asset theft occurred on April 15, 2026, at around 12:00 UTC, and that the stolen funds were subsequently sent to further accounts on the TRON or Ethereum blockchains. "This USDT was then converted to another asset, either TRX or ETH. By doing so, the thief avoided the risk of the stolen USDT being frozen by Tether," it added.</p>
<p>TRM Labs has <a href="https://www.trmlabs.com/resources/blog/sanctioned-russian-exchange-grinex-and-kyrgyzstani-exchange-tokenspot-hit-in-usd-15-million-theft">identified</a> about 70 addresses connected to the incident, noting that TokenSpot, a Kyrgyzstan-based exchange that likely operates as a front for Grinex, was simultaneously impacted.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>On the same day Grinex suffered the breach, TokenSpot <a href="https://t.me/tokenspot/1590">posted</a> on its Telegram channel that the platform would be temporarily unavailable due to technical maintenance. On April 16, it <a href="https://t.me/tokenspot/1592">announced</a> that full operations had resumed. The attacker is estimated to have stolen less than $5,000 from TokenSpot. The funds were routed through two TokenSpot addresses to the same consolidation address used by the Grinex-linked wallets.</p>
<p>Chainalysis, in its own breakdown of the incident, said the stablecoin funds were quickly swapped for a non-freezable token and that this "frantic swapping" from stablecoins to more decentralized tokens is a tactic adopted by bad actors to launder their illicit proceeds before the assets can be frozen.</p>
<p>"Given the exchange's heavily sanctioned status, its restricted ecosystem, and the on-chain use of Garantex&rsquo;s preferred obfuscation techniques, it is worth considering if this incident could be a false flag attack," it <a href="https://www.chainalysis.com/blog/sanctioned-grinex-exchange-suspends-operations/">said</a>. "Whether this event represents a legitimate exploit by cybercriminals or an orchestrated false flag operation by Russia-linked insiders, the disruption of Grinex deals a significant blow to the infrastructure supporting Russian sanctions evasion."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a $13.74 million hack. The exchange said it fell victim to what it described...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims-3799.html</guid>
                <pubDate>Sat, 18 Apr 2026 12:00:10 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPcUvJCFRqDmEr1ZDSaUJCAymmKwZOeXdmfPY6Eekp7tLOpqjXLKHilHOHlNyuxmennQE8H5oxuRTaCncC8hsoGYEloD8OrDlR1wpbxGivBBB7KdVX8kiv_pOzC6GQ7LNPKoJGkFklpW0XutuLRPjl3I5cPta1n-BqVyAdO1luW3EUR8jyiZEtVjVTGWUK/s1700-e365/grinex.jpg"/>
            </item>
                    <item>
                <title>Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet</title>
                <link>https://www.scamalert24.co.za/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet-3798.html</link>
                                <content:encoded><![CDATA[<div id="articlebody">
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6cxZZMfiWctk3Me9QO6UlzVRFab0SPGMTzThjpcPHCXm49bQ0rRvtG2W6gicJw4Mi1QUuv-yTDMK5GKJju3QicyjYJwdbA86Ok8w2oU5Vg28l4s0HAVv7_c03dStaM7OPd4Yq0khmm9MeQVUYnCYThMx4JvkCnZZ5PEtCXAA90vKfsAumsMAIw085JIsz/s1700-e365/botnet-ddos.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6cxZZMfiWctk3Me9QO6UlzVRFab0SPGMTzThjpcPHCXm49bQ0rRvtG2W6gicJw4Mi1QUuv-yTDMK5GKJju3QicyjYJwdbA86Ok8w2oU5Vg28l4s0HAVv7_c03dStaM7OPd4Yq0khmm9MeQVUYnCYThMx4JvkCnZZ5PEtCXAA90vKfsAumsMAIw085JIsz/s1700-e365/botnet-ddos.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>

<p>Threat actors are exploiting security flaws in TBK DVR and end&#8209;of&#8209;life (EoL) TP-Link Wi-Fi routers to deploy <a href="https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html">Mirai</a>-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42.</p>
<p>The attack targeting TBK DVR devices has been found to exploit <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3721">CVE-2024-3721</a> (CVSS score: 6.3), a medium-severity command injection vulnerability affecting TBK DVR-4104 and DVR-4216 digital video recording devices, to deliver a Mirai variant called <b>Nexcorium</b>.</p>
<p>"IoT devices are increasingly prime targets for large-scale attacks due to their widespread use, lack of patching, and often weak security settings," security researcher Vincent Li <a href="https://www.fortinet.com/blog/threat-research/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign">said</a>. "Threat actors continue exploiting known vulnerabilities to gain initial access and deploy malware that can persist, spread, and cause distributed denial-of-service (DDoS) attacks."</p>
<div><p><a href="https://thehackernews.uk/ai-blindspot-d-2" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu/s728-e100/nudge-d-2.jpg" width="729" height="91"></a></p></div>
<p>This is not the first time the vulnerability has been exploited in the wild. Over the past year, the security issue has been leveraged to deploy a <a href="https://thehackernews.com/2025/06/botnet-wazuh-server-vulnerability.html">Mirai variant</a>&nbsp;as well as a distinct, relatively new botnet called <a href="https://thehackernews.com/2025/07/rondodox-botnet-exploits-flaws-in-tbk.html">RondoDox</a>. In September 2025, CloudSEK also <a href="https://www.cloudsek.com/blog/botnet-loader-as-a-service-infrastructure-distributing-rondodox-and-mirai-payloads">disclosed</a> details of a large-scale loader-as-a-service botnet that has been distributing <a href="https://www.f5.com/labs/articles/tracking-rondodox-malware-exploiting-many-iot-vulnerabilities">RondoDox</a>, Mirai, and Morte payloads through weak credentials and old flaws in routers, IoT devices, and enterprise apps.</p>
<p>The attack activity outlined by Fortinet involves the exploitation of CVE-2024-3721 to obtain and drop a downloader script, which then launches the botnet payload based on the Linux system's architecture. Once the malware is executed, it displays a message stating "nexuscorp has taken control."</p>
<p>"Nexcorium has a similar architecture to the Mirai variant, including XOR-encoded configuration table initialization, watchdog module, and DDoS attack module," the security vendor said.</p>
<p>The malware also includes an exploit for CVE-2017-17215 to target Huawei HG532 devices in the network and incorporates a list of hard-coded usernames and passwords for use in brute-force attacks targeting the victim's hosts by opening a Telnet connection.</p>
<p>If the Telnet login is successful, it attempts to obtain a shell, set up persistence using crontab and systemd service, and connect to an external server to await commands for launching DDoS attacks over UDP, TCP, and SMTP. Once persistence is established on the device, the malware deletes the original downloaded binary to evade analysis.</p>
<p>"The Nexcorium malware displays typical traits of modern IoT-focused botnets, combining vulnerability exploitation, support for multiple architectures, and various persistence methods to sustain long-term access to infected systems," Fortinet said. "Its use of known exploits, such as CVE-2017-17215, along with extensive brute-force capabilities, underscores its adaptability and efficacy in increasing its infection reach."</p>
<p>The development comes as Unit 42 <a href="https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/">said</a> it detected active, automated scans and probes attempting to exploit CVE-2023-33538 (CVSS score: 8.8), a command injection vulnerability impacting EoL TP-Link wireless routers, albeit using a flawed approach that doesn't result in a successful compromise.</p>
<p>It's worth noting that the security flaw was <a href="https://thehackernews.com/2025/06/tp-link-router-flaw-cve-2023-33538.html">added</a> to the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog in June 2025. The vulnerability affects the following models -</p>
<ul>
<li>TL-WR940N v2 and v4</li>
<li>TL-WR740N v1 and v2</li>
<li>TL-WR841N v8 and v10</li>
</ul>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>"Although the in-the-wild attacks we observed were flawed and would fail, our analysis confirms the underlying vulnerability is real," researchers Asher Davila, Malav Vyas, and Chris Navarrete said. "Successful exploitation requires authentication to the router's web interface."</p>
<p>The attacks, in this case, attempt to deploy a Mirai-like botnet malware, with the source code featuring numerous references to the string "<a href="https://thehackernews.com/2023/06/new-condi-malware-hijacking-tp-link-wi.html">Condi</a>." It also comes equipped with the ability to update itself with a newer version and act as a web server to spread the infection to other devices that connect to it.</p>
<p>Given that the affected TP&#8209;Link devices are no longer actively supported, users are advised to replace them with a newer model and ensure that default credentials are not used.</p>
<p>"For the foreseeable future, the security landscape will continue to be shaped by the persistent risk of default credentials in IoT devices," Unit 42 said. "These credentials can turn a limited, authenticated vulnerability into a critical entry point for determined attackers."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet-3798.html</guid>
                <pubDate>Sat, 18 Apr 2026 10:00:09 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6cxZZMfiWctk3Me9QO6UlzVRFab0SPGMTzThjpcPHCXm49bQ0rRvtG2W6gicJw4Mi1QUuv-yTDMK5GKJju3QicyjYJwdbA86Ok8w2oU5Vg28l4s0HAVv7_c03dStaM7OPd4Yq0khmm9MeQVUYnCYThMx4JvkCnZZ5PEtCXAA90vKfsAumsMAIw085JIsz/s1700-e365/botnet-ddos.jpg"/>
            </item>
                    <item>
                <title>That data breach alert might be a trap</title>
                <link>https://www.scamalert24.co.za/that-data-breach-alert-might-be-a-trap-3797.html</link>
                                <content:encoded><![CDATA[<div>
    <p>Scams</p>        <p>Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.</p>
    
    <div><div><a href="https://www.welivesecurity.com/en/our-experts/phil-muncaster/" title="Phil Muncaster"><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" media=" 768px)"></source><img src="https://web-assets.esetstatic.com/tn/-x45/wls/2021/04/Phil_Muncaster.jpg" alt="Phil Muncaster"></a></div></div>
    <p>
        <span>17 Apr 2026</span>
        <span>&nbsp;&bull;&nbsp;</span>
        <span>, </span>
        <span>5 min. read</span>
    </p>

    <div>
        <source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2026/04-26/fake-data-breach-alert.jpg" media=" 768px)"></source><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2026/04-26/fake-data-breach-alert.jpg" media=" 1120px)"></source><img src="https://web-assets.esetstatic.com/tn/-x700/wls/2026/04-26/fake-data-breach-alert.jpg" alt="That data breach alert might be a trap">    </div>
</div><div>
    <p>Receiving a <a href="https://www.welivesecurity.com/2021/11/22/what-do-if-you-receive-data-breach-notice/" target="_blank" rel="noopener">data breach notice</a> may have once been a rare event. With data breaches hitting record numbers, however, these notifications are no longer as surprising as they once were. In the US alone, there were 3,322 such breaches reported last year, resulting in nearly <a href="https://www.idtheftcenter.org/publication/2025-data-breach-report/" target="_blank" rel="noopener">280 million notices</a> being emailed to victims. In Europe, <a href="https://sweden.dlapiper.com/en/news/number-personal-data-breaches-europe-increased-22-cent-2025" target="_blank" rel="noopener">daily incidents grew</a> by 22% annually in 2025 to reach 443 on average per day.</p>
<p>This represents a growing opportunity for fraudsters. They know that many people may be on the lookout for these notifications. And when they receive one, they may be more predisposed to follow the advice contained in it.</p>
<p>To be clear: real breaches happen every day, and ignoring a legitimate notice could be as dangerous as clicking a fake one. The goal is to stop reacting on autopilot and being able to tell a genuine alert from a fake one. Take a minute to familiarize yourself with data breach-themed scams, and you&rsquo;ll be better prepared the next time one lands in your inbox.</p>
<h2>What do fake breach notification scams look like?</h2>
<p>There are two basic tactics at play here. Either:</p>
<ol>
<li><strong>The scammers wait for a real breach</strong>, and piggyback on the news to send out a fake notification. In this scenario, the victims are more likely to believe the scam as they&rsquo;ll be expecting a notification</li>
<li><strong>The fraudsters invent a breach </strong>and a fake notification providing details of the non-existent event. It&rsquo;s most likely to be spoofed as if sent from a well-known and popular brand, in order to make it both relevant to the recipient and likely to be trusted. However, scammers could also impersonate the victim&rsquo;s IT department at work</li>
</ol>
<p>In both cases, scammers are increasingly using phishing kits and AI tools to automate and enhance the creation of fake notifications. AI is particularly good at crafting lookalike lures in perfect local languages, copying the wording and tone of real notices. <a href="https://www.reddit.com/r/ledgerwallet/comments/1ixhwzr/phishing_scam_w_subj_data_breach_notice/" target="_blank" rel="noopener">Relevant branding and logos</a> will also be included to add further legitimacy. All of this can be done in minutes, meaning fake notifications can be emailed out rapidly at scale after an incident.</p>
<p>The end goal may be to trick you into clicking on a malicious link or opening a malicious attachment, which might trigger installation of <a href="https://www.welivesecurity.com/en/malware/theyre-coming-data-infostealers-how-stay-safe/" target="_blank" rel="noopener">infostealing malware</a>, for example. Or it could be a pretext to get hold of your personal and financial information and/or passwords.</p>
<h3>Spotting the red flags</h3>
<p>Fake breach notifications should be easy to spot if you know what to look out for. Consider the following tell-tale signs:</p>
<ul>
<li><strong>Immediate action required: </strong>Scammers will use classic social engineering techniques to trick you into handing over your personal information (like <a href="https://www.reddit.com/r/Scams/comments/1r3ghek/conduent_business_data_breach_and_epiq_privacy/" target="_blank" rel="noopener">Social Security number</a>) or clicking on a malicious link. Often, this involves creating a sense of urgency to rush you into acting &ndash; e.g., by saying your data is at risk if you don&rsquo;t update your password or confirm your personal details.</li>
<li><strong>Unusual sender email: </strong>Scammers will often try to spoof the sender email to make it look as if it came from the organization they&rsquo;re impersonating. So look out for typos in the name (a sign of <a href="https://www.eset.com/blog/en/business-topics/cloud-and-application-security/cloud-office-deceptive-attacks/" target="_blank" rel="noopener">typosquatting</a>) and <a href="https://www.reddit.com/r/Scams/comments/1g60pao/new_to_me_fake_google_security_alert_email/" target="_blank" rel="noopener">hover your cursor over it in</a> case the display name is hiding a random (and unconnected) sender domain.</li>
<li><strong>Poor spelling and grammar:</strong> As mentioned, this is less likely the more threat actors embrace generative AI (GenAI) to <a href="https://www.eset.com/uk/about/newsroom/press-releases/eset-threat-report-h2-2025-uk/?srsltid=AfmBOor9NqjSfGUmGPyqOCx7a5JKIQVyg1S6nn3VKNdRcDrz4b42ljjS" target="_blank" rel="noopener">enhance their phishing campaigns</a>. But it&rsquo;s still a useful first check to run</li>
<li><strong>Links and attachments: </strong>Many of these missives are crammed full of links to phishing sites designed to steal your personal/financial information and passwords. They might also contain attachments masquerading as notices which covertly install malware.</li>
<li><strong>A lack of specificity: </strong>If you get a legitimate letter from a breached company, it will usually include some of your personal details, such as account number and username. But the scammers don&rsquo;t have these, so their outreach will be vague and lacking detail.</li>
</ul>
<h2>Staying safe</h2>
<p>Understanding what to look out for is the first step to staying safe from breach notification scams. If something feels off, don&rsquo;t be rushed into making a hasty decision on what to do next. Take a deep breath, and slow down.</p>
<p>If you receive a notice, always check directly with the apparent source &ndash; but not by replying to the sender or using any contact details in the notice itself. Log into your real account and/or call or email the company to check whether the breach event is real or not. <a href="https://www.eset.com/us/home/identity-protection/" target="_blank" rel="noopener">Identity protection features</a> that often come with reputable security software, as well as services like <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">HaveIBeenPwned.com</a>, can provide a useful secondary way of checking whether your details have been compromised.</p>
<p>Mitigate risk further by using strong, unique passwords stored in a password manager, and complemented by multi&ndash;factor authentication (MFA). That means, even if hackers get hold of your credentials, they won&rsquo;t be able to access your accounts.</p>
<p>Make sure you have robust email security installed from a reputable provider. This will ideally leverage AI to help spot and block phishing attempts and malware.</p>
<h2>Victims: do this now</h2>
<p>If you think you&rsquo;ve been taken in by a scam, it&rsquo;s important to act fast. Do the following:</p>
<ul>
<li>Change any passwords you might have shared with your hackers (across all the sites you use them for). A <a href="https://www.welivesecurity.com/2020/06/26/what-is-password-manager-why-is-it-useful/" target="_blank" rel="noopener">password manager</a> is best for storing unique credentials across numerous sites and apps</li>
<li>Switch on MFA for all sensitive accounts, so that even if the bad guys have your passwords they can&rsquo;t get in</li>
<li>Run a malware scan using reputable security software</li>
<li>If you&rsquo;ve shared financial information, contact your bank and tell them. Freeze credit/debit cards if applicable</li>
<li>Keep an eye on your financial accounts to check for suspicious activity</li>
<li>Report the incident to <a href="https://www.identitytheft.gov/">the FTC</a> (US), <a href="https://www.reportfraud.police.uk/fraud-recovery-fraud/">Report Fraud</a> (UK), <a href="https://www.cyber.gov.au/report-and-recover/report">the ASD</a> (Australia), or your local equivalent</li>
</ul>
<p>As the world becomes saturated in data breach notifications, there&rsquo;s a risk that we become so inured to them we automatically believe the latest notices that hit our inbox. As tiresome as it is, careful vetting of such notices is essential. This won&rsquo;t just help you avoid fraud. It will also ensure you take legitimate notifications more seriously.</p>
</div><div>
                    <hr>
                    <div>
  <div>
    <h2>
      Let us keep you <br>up to date
    </h2>
    <p>
      Sign up for our newsletters
    </p>
    
  </div>
  <svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 600 201.7451"><path d="m600,0v176.576c0,13.8934-11.2757,25.1691-25.1691,25.1691H25.1691c-13.9034,0-25.1691-11.2757-25.1691-25.1691v-110.6331c36.0722,38.8207,82.2223,71.8325,145.2255,88.6052.0402,0,.0805.0101.1107.0301,0,0,.0906,0,.1107.0302,108.7605,28.9444,198.3321-8.95,271.9366-49.865l29.5585-16.9537L600,0Z"></path></svg></div>                </div>
]]></content:encoded>
                                <description><![CDATA[Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/that-data-breach-alert-might-be-a-trap-3797.html</guid>
                <pubDate>Sat, 18 Apr 2026 09:00:13 +0300</pubDate>
                <media:thumbnail url="https://web-assets.esetstatic.com/wls/2026/04-26/fake-data-breach-alert.jpg"/>
            </item>
                    <item>
                <title>Critical sandbox bypass fixed in popular Thymeleaf Java template engine</title>
                <link>https://www.scamalert24.co.za/critical-sandbox-bypass-fixed-in-popular-thymeleaf-java-template-engine-3796.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				The 9.1-CVSS vulnerability enables attackers to circumvent RCE protections in the de facto template engine for the Java Spring ecosystem.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Maintainers of Thymeleaf, a widely used template engine for Java web applications, fixed a rare critical vulnerability that allows unauthenticated attackers to execute malicious code on servers.</p>



<p>The vulnerability, tracked as CVE-2026-40478, is rated 9.1 on the CVSS severity scale and is described as a Server-Side Template Injection (SSTI) issue. Thymeleaf has a sandbox-like protection that prevents user input from executing dangerous expressions, but this flaw allows attackers to bypass those protections.</p>



<p>&ldquo;Although the library provides mechanisms to prevent expression injection, it fails to properly neutralize specific syntax patterns that allow for the execution of unauthorized expressions,&rdquo; the developers said in <a href="http://github.com/advisories/GHSA-xjw8-8c5c-9r79">their advisory</a>. &ldquo;If an application developer passes unvalidated user input directly to the template engine, an unauthenticated remote attacker can bypass the library&rsquo;s protections to achieve Server-Side Template Injection (SSTI).&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Thymeleaf is the de facto template engine in the Java Spring ecosystem and Spring is the most popular framework for developing web applications in Java. Since Java is still widely used for development in enterprise environments, this vulnerability has the potential to impact numerous business applications.</p>

		

			


<div><p>All Thymeleaf versions before 3.1.4.RELEASE are affected and no work-around exists. Companies are advised to identify which of their applications use Thymeleaf and upgrade to 3.1.4.RELEASE as soon as possible.</p></div>



<h2 id="straightforward-exploitation">Straightforward exploitation</h2>



<p>According to researchers from application security testing firm Endor Labs, exploitation is straightforward with no special privileges or conditions required. Attackers just need to control input that reaches Thymeleaf&rsquo;s expression engine, which is a common pattern in web applications.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Endor Labs notes in <a href="https://www.endorlabs.com/learn/its-about-thyme-how-a-whitespace-character-broke-thymeleafs-expression-sandbox-cve-2026-40478">their report</a> that Thymeleaf has defense-in-depth layers to block dangerous expressions and in this case two of them failed. For example, a string check scanned the expression text for dangerous patterns, such as the new keyword followed by an ASCII space, T (Spring Expression Language type references) and @ (SpEL bean references in some code paths). However, the check only looked for ASCII space 0x20 characters, but the SpEL&rsquo;s parser also accepts tab (0x09), newline (0x0A), and other control characters between new and the class name.</p>



<p>Another policy blocked classes that start with java.* from being used inside T()&nbsp;type references, but did not block types from org.springframework.*, ognl.*, or javax.*.</p>



<p>&ldquo;Since typical Spring applications have spring-core on the classpath, classes like org.springframework.core.io.FileSystemResource were freely constructable, and that class can create arbitrary files on disk,&rdquo; the researchers said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>As such, Endor Labs was able to easily build a proof-of-concept exploit by combining the two: use a tab character after new and calling the org.springframework.core.io.FileSystemResource class to create a file on disk.</p>



<p>&ldquo;With the right class, an attacker can escalate from file creation to full remote code execution, for example, instantiating a ProcessBuilder wrapper from a third-party library, or leveraging Spring&rsquo;s own GenericApplicationContext to register and invoke arbitrary beans,&rdquo; the researchers explained.</p>



<p><a href="https://www.csoonline.com/article/572455/remote-code-execution-flaws-in-spring-and-spring-cloud-frameworks-put-java-apps-at-risk.html">Vulnerabilities in the Java Spring Framework itself have been exploited in the past</a> to compromise web servers, so it&rsquo;s likely that an easy-to-exploit flaw such as this one will be quickly adopted by attackers.</p>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Maintainers of Thymeleaf, a widely used template engine for Java web applications, fixed a rare critical vulnerability that allows unauthenticated attackers to execute malicious code on servers. The vulnerability, tracked as CVE-2026-40478, is rated 9.1 on the CVSS severity...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/critical-sandbox-bypass-fixed-in-popular-thymeleaf-java-template-engine-3796.html</guid>
                <pubDate>Sat, 18 Apr 2026 03:00:11 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4160520-0-42278900-1776467192-alexander-dummer-x4jRmkuDImo-unsplash.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Flawed Cisco update threatens to stop APs from getting further patches</title>
                <link>https://www.scamalert24.co.za/flawed-cisco-update-threatens-to-stop-aps-from-getting-further-patches-3795.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Logs in wireless access point flash memory grow by 5MB a day in certain IOS XE devices until space runs out.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						
<div id="remove_no_follow">
<div>
					  <div>
						<div>




<p>Cisco admins are scrambling to patch a critical flash memory overflow vulnerability in over 200 Cisco Systems IOS XE-based models of wireless access points (APs), caused by a recent flawed software update.</p>



<p>If the issue is not corrected quickly, the AP&rsquo;s memory will become so flooded that new software updates will be blocked and the AP rendered insecure, or possibly even bricked.</p>



<p>The problematic library update causes a specific log file in the flash memory of affected access points to grow by about 5MB a day. Over time,<a href="https://www.cisco.com/c/en/us/support/docs/field-notices/743/fn74383.html" target="_blank" rel="noreferrer noopener"> Cisco said in an advisory this week</a>, this could consume &ldquo;a big portion&rdquo; of the available memory space.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The longer an AP runs the affected software, the higher the probability that a software download will fail due to insufficient space,&rdquo; the advisory says.</p>

		

			


<p>Analyst <a href="https://www.linkedin.com/in/rob-enderle-03729" target="_blank" rel="noreferrer noopener">Rob Enderle</a> of the Enderle Group said that &lsquo;buggy logs&rsquo; are a common trope in networking. But, he added, &ldquo;this particular case is dangerous because it targets the physical limitations of flash memory on hardware that is notoriously difficult to access once it becomes bricked or enters a boot loop. In the world of networking, this is a&nbsp;high-impact, medium-rarity&nbsp;event.&rdquo;</p>



<p>He explained, &ldquo;what makes this unique is the Catch-22 it creates. To fix the bug, you must upgrade the software. However, the bug itself prevents the device from having enough space to download the fix. If an admin waits too long, the device may require manual, physical intervention or become permanently stuck in a boot loop.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><a href="https://www.sans.org/profiles/dr-johannes-ullrich" target="_blank" rel="noreferrer noopener">Johannes Ullrich</a>, dean of research at the SANS Institute, called this particular problem uncommon, although he acknowledged flash memory space in IoT devices like access points is limited and may fill up from time to time.</p>



<p>&ldquo;But,&rdquo; he added, &ldquo;there is a bigger issue: A competent [vendor] vulnerability management program must always include verification that the patch was indeed applied as expected. There are many reasons why a patch may not be applied correctly, and this is just one way a patch may fail to apply.&rdquo;</p>



<p><a href="https://www.linkedin.com/in/kellman/" target="_blank" rel="noreferrer noopener">Kellman Meghu</a>, CTO of incident response firm DeepCove Cybersecurity, said overflowing a fixed device&rsquo;s memory due to a bug &ldquo;would have me rather annoyed with this vendor. This is very rare in my experience, and something that was an issue way back when storage costs were a factor. I would expect my vendor to be able to clean and manage storage for fixed devices. If this device is supported, this would be an RMA [return merchandise authorization] or fix issue, and expectation [for vendor action] would be right away/proactive.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>[Related content:</strong> <a href="https://www.csoonline.com/article/4159827/cisco-systems-issues-three-advisories-for-critical-vulnerabilities-in-webex-ise.html" target="_blank">Cisco Webex SSO flaw</a><strong>]</strong></p>



<p>Affected are access points running IOS XE versions 17.12.4, 17.12.5, 17.12.6, and 17.12.6a. These include Cisco Catalyst 9130AX series APs, as well as 9130AX models with a Stadium Antenna, Catalyst 91361, 91621, 9163E, 91641, 9166D1, and IW9167 series APs, and Wi-Fi 6 Outdoor APs,</p>



<p>There are two ways for admins to solve the problem: <a href="https://developer.cisco.com/docs/wireless-troubleshooting-tools/wlan-poller-wlan-poller" target="_blank" rel="noreferrer noopener">Download a Cisco tool called WLANPoller</a>, which automates execution of a fix across multiple APs, or manually use the <strong>show boot</strong> command on each device to look into the boot partition and see if it has enough space for an upgrade. Greater detail on the necessary action is in the Cisco advisory.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Cisco says a mandatory precheck of an AP&rsquo;s status should be run as close to the scheduled maintenance window as possible. But because the affected log file grows daily, Enderle said, &ldquo;you sure don&rsquo;t want to wait until [AP] failure.&rdquo;&nbsp;</p>



<p>Manual fixing will probably take 5-10 minutes of active work per AP, he cautioned, plus another 15-20 minutes soak time to make sure the fix takes if the AP does have room for the upgrade. But if the AP has space problems, the time per device could jump to around 20-45 minutes.</p>



<p>And if the AP has failed, then it would take one to two hours to fix, he added, and would need physical access to the device.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Using WLANPoller will make the process faster, he added.</p>



<p>Enderle said that if an admin finds an AP whose flash memory is already too full to upgrade, a&nbsp;reboot&nbsp;sometimes clears temporary buffers or allows a small window for a manual transfer. However, with this specific log bug, a reboot may not be enough if the file is persistent. Admins should contact Cisco for the emergency cleanup script before attempting a mass push, he said.</p>



<p>Ultimately, Enderle said, the pushing of a flawed update is a supply chain integrity issue. CSOs should ask their teams, &lsquo;Do we have monitoring in place for hardware health metrics (CPU, RAM, Flash), or only for &lsquo;Up/Down&rsquo; status?&rsquo;&nbsp;An AP that is Up but has 0MB of free flash memory is a liability, he said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>CSOs should look at this vulnerability as a&nbsp;Critical Availability Risk, he added. &ldquo;While it isn&rsquo;t a data breach, the potential for a site-wide Wi-Fi outage (due to failed automated updates or boot loops) can halt business operations,&rdquo; he noted, adding that CSOs should also enforce a policy where even &ldquo;minor library updates&rdquo; are still tested in a lab environment for seven to 14 days. &ldquo;This 5MB/day log growth would likely have been caught in a lab before hitting a production fleet of 5,000 APs,&rdquo; Enderle said.</p>



<p><em>This article originally appeared on <a href="https://www.networkworld.com/article/4160480/flawed-cisco-update-threatens-to-stop-aps-from-getting-further-patches.html" target="_blank">NetworkWorld</a>.</em></p>
</div></div></div>
</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Cisco admins are scrambling to patch a critical flash memory overflow vulnerability in over 200 Cisco Systems IOS XE-based models of wireless access points (APs), caused by a recent flawed software update. If the issue is not corrected quickly,...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/flawed-cisco-update-threatens-to-stop-aps-from-getting-further-patches-3795.html</guid>
                <pubDate>Sat, 18 Apr 2026 01:00:09 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4160507-0-49087100-1776459648-shutterstock_2539612143.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>How NIST&apos;s Cutback of CVE Handling Impacts Cyber Teams</title>
                <link>https://www.scamalert24.co.za/how-nist-s-cutback-of-cve-handling-impacts-cyber-teams-3793.html</link>
                                <content:encoded><![CDATA[Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.]]></content:encoded>
                                <description><![CDATA[Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/how-nist-s-cutback-of-cve-handling-impacts-cyber-teams-3793.html</guid>
                <pubDate>Sat, 18 Apr 2026 00:00:08 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf63750cb2e1d5266/69e26d60df4579bd291869e2/NIST_HQ_Grandbrothers_Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing</title>
                <link>https://www.scamalert24.co.za/tycoon-2fa-phishers-scatter-adopt-device-code-phishing-3794.html</link>
                                <content:encoded><![CDATA[In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.]]></content:encoded>
                                <description><![CDATA[In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/tycoon-2fa-phishers-scatter-adopt-device-code-phishing-3794.html</guid>
                <pubDate>Sat, 18 Apr 2026 00:00:08 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt70085bc1304b3cb3/69e2855c41f7f85ddb368bc3/QR_code-Harry_Wedzinga-Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Every Old Vulnerability Is Now an AI Vulnerability</title>
                <link>https://www.scamalert24.co.za/every-old-vulnerability-is-now-an-ai-vulnerability-3792.html</link>
                                <content:encoded><![CDATA[AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones.]]></content:encoded>
                                <description><![CDATA[AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/every-old-vulnerability-is-now-an-ai-vulnerability-3792.html</guid>
                <pubDate>Fri, 17 Apr 2026 19:00:05 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc29c0d49db0e3dc1/69e15cd7061435b0d4675403/cute_robot_power_off_button.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>2026-2176 - Chef Comptable H/F</title>
                <link>https://www.scamalert24.co.za/2026-2176-chef-comptable-h-f-3791.html</link>
                                <content:encoded><![CDATA[<div id="contenu-ficheoffre" data-class="ts-offer-details-content">&#13;
&#13;
        &#13;
&#13;
            <h2>&#13;
                Informations g&eacute;n&eacute;rales&#13;
            </h2>&#13;
&#13;
            <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_entityBlock">&#13;
                &#13;
                <p><img id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_Logo" title="Entité légale (HRRO) - Clé Oracle (logo)" src="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183" alt="Entité légale (HRRO) - Clé Oracle (logo)">&#13;
                </p>&#13;
&#13;
                <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_divEntityDesc">&#13;
                    <h3>&#13;
                        Entit&eacute; de rattachement&#13;
                    </h3><p>&#13;
                    Parmi les leaders du march&eacute; des services maritimes &agrave; l'offshore, BOURBON propose aux producteurs d'&eacute;nergie en mer les plus exigeants une vaste gamme de services maritimes de surface et sous-marins, sur les champs p&eacute;troliers, gaziers et &eacute;oliens. Cette offre de services repose sur une flotte moderne et standardis&eacute;e de 223 navires et sur plus de 5 842 professionnels hautement qualifi&eacute;s. En recherche permanente d'excellence op&eacute;rationnelle, le groupe offre &agrave; ses clients un service de proximit&eacute; dans ses 37 pays d'intervention, en garantissant les plus hauts standards de qualit&eacute; et de s&eacute;curit&eacute;. En 2024, BOURBON a r&eacute;alis&eacute; un chiffre d'affaires ajust&eacute; de plus de 733 M&euro;.&nbsp;&nbsp;&#13;
                </p></div>&#13;
&#13;
                &#13;
        &#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
            </div><h3>&#13;
	Type d'offre (personnel s&eacute;dentaire/navigant)&#13;
</h3><p id="fldoffer_customcodetablevalue1">Personnel s&eacute;dentaire</p><h2>Description du poste</h2><h3>&#13;
	Intitul&eacute; du poste&#13;
</h3><p id="fldjobdescription_jobtitle">Chef Comptable H/F</p><h3>&#13;
	Contrat&#13;
</h3><p id="fldjobdescription_contract">CDD</p><h3>&#13;
	R&ocirc;les et responsabilit&eacute;s&#13;
</h3><div id="fldjobdescription_description1">&#13;
	<p>BOURBON recrute une(e)</p><p><strong>Chef Comptable H/F</strong></p><p>Votre mission&nbsp;: vous produisez une information comptable de qualit&eacute; et dans les d&eacute;lais pour l'ensemble des soci&eacute;t&eacute;s de votre p&eacute;rim&egrave;tre. Vous managez et d&eacute;veloppez une &eacute;quipe de comptables, en garantissant &agrave; la fois la fiabilit&eacute; des donn&eacute;es et la mont&eacute;e en comp&eacute;tences de vos collaborateurs.</p><p><span><strong>VOS MISSIONS ET RESPONSABILITES&nbsp;:</strong></span></p><p><strong>Comptabilit&eacute; g&eacute;n&eacute;rale</strong></p><p>Vous &ecirc;tes garant(e) de la comptabilit&eacute; g&eacute;n&eacute;rale des soci&eacute;t&eacute;s de votre p&eacute;rim&egrave;tre, de bout en bout :</p><p>Vous assurez la production comptable jusqu'&agrave; la remont&eacute;e des &eacute;l&eacute;ments groupe - management accounts mensuels, comptes consolid&eacute;s trimestriels et annuels - ainsi que l'&eacute;tablissement des &eacute;tats financiers annuels.</p><p>Vous garantissez la fiabilit&eacute;, la qualit&eacute; et la conformit&eacute; des donn&eacute;es comptables aux normes groupe (SL / IFRS), dans le respect des d&eacute;lais de reporting interne mensuel et de consolidation trimestrielle/annuelle.</p><p>Vous veillez &agrave; la fiabilit&eacute; et &agrave; la conformit&eacute; des comptes sociaux - P&amp;L, &eacute;tats financiers, comptes annuels, rapport de gestion - dans le respect des d&eacute;lais r&eacute;glementaires.</p><p>Vous &eacute;tablissez et supervisez les d&eacute;clarations fiscales des soci&eacute;t&eacute;s de votre p&eacute;rim&egrave;tre, dont l'IS en collaboration avec le d&eacute;partement fiscal si n&eacute;cessaire.</p><p>Vous mettez en place et assurez la revue des contr&ocirc;les r&eacute;currents mensuels (justificatifs de comptes, r&eacute;conciliations, etc.).</p><p>Vous r&eacute;alisez les contr&ocirc;les comptables Sapin II dans le cadre des exigences de conformit&eacute; du groupe.</p><p>Management d'&eacute;quipe</p><p>Vous pilotez, organisez et structurez l'activit&eacute; de comptabilit&eacute; g&eacute;n&eacute;rale de votre p&eacute;rim&egrave;tre :</p><p>Vous supervisez les travaux comptables de votre &eacute;quipe et apportez votre expertise en soutien op&eacute;rationnel au quotidien.</p><p>Vous accompagnez la mont&eacute;e en comp&eacute;tences de vos comptables, en d&eacute;veloppant leur autonomie et leur ma&icirc;trise des normes et outils groupe.</p><p>Vous f&eacute;d&eacute;rez votre &eacute;quipe autour d'objectifs clairs, dans un environnement international exigeant.</p>&#13;
</div><h3>&#13;
	Profil&#13;
</h3><div id="fldjobdescription_description2">&#13;
	<p><span><strong>VOTRE PROFIL</strong></span></p><p>- Vous &ecirc;tes titulaire d'un Bac+4/5 en comptabilit&eacute;, finance ou &eacute;quivalent -&nbsp; DSCG, Master CCA, &eacute;cole de commerce ou formation similaire.</p><p>- Vous justifiez d'une exp&eacute;rience de 5 &agrave; 8 ans en comptabilit&eacute;, dont une premi&egrave;re exp&eacute;rience r&eacute;ussie en management d'&eacute;quipe. Une exp&eacute;rience au sein d'un groupe international est indispensable pour ce poste.</p><p>- Vous ma&icirc;trisez les techniques comptables ainsi que les normes comptables locales et IFRS. Vous &ecirc;tes &agrave; l'aise avec les outils ERP, notamment Oracle, et avez id&eacute;alement manipul&eacute; d'autres solutions telles que CTU, SAP BFC ou &eacute;quivalents.</p><p>- Vous faites preuve de rigueur et de m&eacute;thode dans votre travail quotidien. Vous savez g&eacute;rer les d&eacute;lais et les priorit&eacute;s, m&ecirc;me dans des environnements exigeants et &agrave; forts enjeux.</p><p>- Vous agissez en autonomie tout en sachant embarquer votre &eacute;quipe. Vous avez la capacit&eacute; d'encadrer, de former et de faire monter en comp&eacute;tences les collaborateurs qui vous sont rattach&eacute;s.</p><p>- La ma&icirc;trise du fran&ccedil;ais ainsi que de l'anglais professionnel, &agrave; l'&eacute;crit comme &agrave; l'oral, est requise pour &eacute;voluer dans notre environnement international.</p><p>- En contexte international, vous avez une excellente maitrise du fran&ccedil;ais et de l&rsquo;anglais (lu, &eacute;crit et oral), ainsi que des outils informatiques (Outlook, EXCEL, BI, PowerPoint&hellip;).&nbsp;</p><p>Poste en CDD de 6 mois bas&eacute; &agrave; Marseille, &agrave; pourvoir d&egrave;s que possible.</p><p>Dans le cadre de notre politique d&rsquo;emploi, ce poste est ouvert aux personnes en situation de handicap.</p>&#13;
</div><h3>&#13;
	Pourquoi choisir Bourbon ?&#13;
</h3><p id="fldjobdescription_longtext1">Parmi les leaders du march&eacute;, Bourbon propose aux soci&eacute;t&eacute;s p&eacute;troli&egrave;res et gazi&egrave;res les plus exigeantes, une large gamme de services maritimes, de surface et sous-marins, pour les champs offshores et les parcs &eacute;oliens ; en s'appuyant sur une flotte innovante et performante de navires de nouvelle g&eacute;n&eacute;ration ainsi que sur l'expertise de plus de 8 400 employ&eacute;s qualifi&eacute;s.</p><h2>Localisation du poste</h2><h3>&#13;
	Localisation du poste&#13;
</h3><p id="fldlocation_location_geographicalareacollection">Europe, France, Marseille Joliette</p><h2>Crit&egrave;res candidat</h2><h3>&#13;
	Niveau d'&eacute;tudes min. requis&#13;
</h3><p id="fldapplicantcriteria_educationlevel">4. Niveau Bac + 4/5</p><h3>&#13;
	Niveau d'exp&eacute;rience min. requis&#13;
</h3><p id="fldapplicantcriteria_experiencelevel">6-10 ans</p><h3>&#13;
	Langues&#13;
</h3><ul><li>French (Native)</li><li>English (Advanced +++)</li></ul>&#13;
&#13;
        &#13;
    </div>
]]></content:encoded>
                                <description><![CDATA[Contract type : Temporary Contract Position description : BOURBON recrute une(e) Chef Comptable H/F Votre mission : vous produisez une information comptable de qualité et dans les délais pour l'ensemble des sociétés de votre périmètre. Vous managez et développez une...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/2026-2176-chef-comptable-h-f-3791.html</guid>
                <pubDate>Fri, 17 Apr 2026 18:00:10 +0300</pubDate>
                <media:thumbnail url="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183"/>
            </item>
                    <item>
                <title>DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’</title>
                <link>https://www.scamalert24.co.za/ddos-for-hire-services-disrupted-by-international-police-action-in-operation-poweroff-3790.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-bb4a7dc5-c6b4-472d-8378-339d1d1ae925" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>A multi-national law enforcement operation has resulted in the takedown of 53 domains associated with Distributed Denial of Service (DDoS) attacks and the arrest of four people suspected of providing DDoS-for-hire services.</p>

<p>Operation PowerOff saw police and cybersecurity agencies from 21 countries involved in coordinated enforcement and prevention measures against the threat of <a href="https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/">DDoS attacks</a>.</p>

<p>In a statement, <a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-supported-global-operation-targets-over-75-000-users-engaged-in-ddos-attacks">published on April 16</a>, Europol described <a href="https://www.infosecurity-magazine.com/news/ddos-hire-network-dismantled/">DDoS-for-hire</a> attacks as &ldquo;one of the most prolific and easily accessible trends in cybercrime&rdquo; because they enable individuals with little technical knowledge to follow step-by-step tutorials to execute cyber-attacks.</p>

<p>&ldquo;These attacks inflict significant harm on businesses and individuals across the globe by targeting servers, websites, or online services and making them inaccessible to legitimate users,&rdquo; the agency added.</p>

<p>The operation disrupted illegal booter services, the infrastructure which made DDoS-for-hire attacks possible, while it also disrupted technical infrastructure used to support DDoS attacks, which included servers and databases.</p>

<p>Europol said that the seizure of the infrastructure has hindered the targeted DDoS-for-hire services and has prevented further victims from being targeted and disrupted by attacks.</p>

<p>The operation also seized databases, which provided data on over three million criminal user accounts. This resulted in four arrests and 53 domains being taken down, plus the removal of over 100 URLs advertising DDoS-for-hire services from search engine results.</p>

<p>Law enforcement also used the information gleaned from DDoS-for-hire user accounts to distribute 75 000 warning emails and letters to users of the services, plus additional warnings posted to cryptocurrency and blockchain platforms cyber criminals use to pay for hiring DDoS attacks.</p>

<p>&ldquo;The FBI through its unique authorities, world-class capabilities, and enduring partnerships continues to defend against the cyber threat,&rdquo; said <a href="https://www.fbi.gov/contact-us/field-offices/anchorage/fbi-intensify-efforts-to-combat-illegal-ddos-attacks">an FBI statement</a> on Operation PowerOff</p>

<p>&ldquo;Partnerships are critical because there is no one government or private sector entity that can address the range of cyber threats we face alone,&rdquo; the agency added.</p>

<p>The full list of countries involved in the joint action, which is still ongoing, is:&nbsp; Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, the Netherlands, Norway, Poland, Portugal, Sweden, Thailand, the United Kingdom and the United States.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests – and sends warning letters to known DDoS service users]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/ddos-for-hire-services-disrupted-by-international-police-action-in-operation-poweroff-3790.html</guid>
                <pubDate>Fri, 17 Apr 2026 17:00:16 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/a0320272-9c3b-4982-8ffa-7c4b4add0375.jpg"/>
            </item>
                    <item>
                <title>Commercial AI Models Show Rapid Gains in Vulnerability Research</title>
                <link>https://www.scamalert24.co.za/commercial-ai-models-show-rapid-gains-in-vulnerability-research-3789.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-3cf00dba-492b-416a-95e2-8b145c6632e6" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>While non-public frontier AI models, like <a href="https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/">Anthorpic&rsquo;s Claude Mythos</a>, have been shown to identify thousands of zero-day vulnerabilities across major operating systems, commercial models are also indicating progress in the discovery of software bugs.</p>

<p>Forescout&rsquo;s Verde Labs found that just a year ago 55% of AI models failed basic vulnerability research and 93% failed exploit development tasks.</p>

<p>Progress has been made however, and in 2026 the cybersecurity firm said all tested models&rsquo; complete vulnerability research tasks, and half can generate working exploits autonomously.</p>

<p>As part of the research, 50 AI models were tested including commercial, open-source and underground.</p>

<p>The most capable models Forescout tested &ndash; Claude Opus 4.6 and Kimi K2.5 &ndash; can now find and exploit vulnerabilities without complex prompts, making them accessible to inexperienced attackers.</p>

<p>&ldquo;These are widely available AI models exceeding human capability,&rdquo; said Rik Ferguson, VP Security Intelligence at Forescout. However, he admitted this may not be at the scale, speed and quality of Mythos.</p>

<p>During testing Forescout said that using single prompts, the RAPTOR agentic framework, and the firm&rsquo;s own extensions, they discovered four new zero-day vulnerabilities in OpenNDS which is widely deployed.</p>

<p>RAPTOR is an open-source, agentic AI framework designed for cybersecurity research, offense and defense.</p>

<p>Ferguson explained that one of the vulnerabilities that was found was in code that Verde Labs had already manually analyzed and had not identified.&nbsp;</p>

<h2><strong>AI Lowers the Barrier to Discovering Unknown Vulnerabilities</strong></h2>

<p>The commercial models performed best in Forescout&rsquo;s testing, but they remain expensive, the firm admitted. Claude Opus 4.6 for example costs up to $25 per million output tokens.</p>

<p>Meanwhile, open-source alternatives such as DeepSeek 3.2 can handle basic tasks at a fraction of the cost, with all test tasks costing less than $0.70.</p>

<p>Claude Mythos by comparison will be available to participants at $25/$125 per million input/output tokens.</p>

<p>Using different models based on task complexity and cost is emerging as a practical strategy for both defenders and attackers.</p>

<p>Forescout noted, that if its research can uncover new vulnerabilities with open models, and large initiatives such as Project Glasswing can surface thousands of zero-days in critical software, organizations should assume their environments contain unknown vulnerabilities that AI will find, whether used by&nbsp;</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/commercial-ai-models-show-rapid-gains-in-vulnerability-research-3789.html</guid>
                <pubDate>Fri, 17 Apr 2026 17:00:15 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/17cde6aa-9990-4da6-b222-72ee2f608443.jpg"/>
            </item>
                    <item>
                <title>Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</title>
                <link>https://www.scamalert24.co.za/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched-3788.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 17, 2026</span></span><span>Vulnerability / Endpoint Security</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ8x3Yg0CYomOu1IpHfhfmiqJtgaMSnnoE2tJR6RdXGIy1rLRTORge-ukCLYkEj6xzeGTvmuy-68qfU4me_nG7pvwZi21h7ycQFwY3OXCH1_p_g35BAYeaHdz3uRKJD2mQCjUIcxha2WzMePpup2VHarxZVxy3QNtaRAjET-2FK7GemiuvyI8MpNPFVyEQ/s1700-e365/defender.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ8x3Yg0CYomOu1IpHfhfmiqJtgaMSnnoE2tJR6RdXGIy1rLRTORge-ukCLYkEj6xzeGTvmuy-68qfU4me_nG7pvwZi21h7ycQFwY3OXCH1_p_g35BAYeaHdz3uRKJD2mQCjUIcxha2WzMePpup2VHarxZVxy3QNtaRAjET-2FK7GemiuvyI8MpNPFVyEQ/s1700-e365/defender.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Huntress is <a href="https://x.com/HuntressLabs/status/2044882050314817880">warning</a> that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems.</p>
<p>The activity <a href="https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html#new-defender-zero-day">involves</a>&nbsp;the exploitation of three vulnerabilities that are codenamed <a href="https://github.com/Nightmare-Eclipse/BlueHammer">BlueHammer</a> (requires GitHub sign-in), <a href="https://github.com/Nightmare-Eclipse/RedSun">RedSun</a>, and <a href="https://github.com/Nightmare-Eclipse/UnDefend">UnDefend</a>, all of which were released as zero-days by a researcher known as Chaotic Eclipse (aka Nightmare-Eclipse) in response to Microsoft's handling of the vulnerability disclosure process.</p>
<p>While both BlueHammer and RedSun are local privilege escalation (LPE) flaws impacting Microsoft Defender, UnDefend can be used to trigger a denial-of-service (DoS) condition and effectively block definition updates.</p>
<div><p><a href="https://thehackernews.uk/ai-security-guide-d-1" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRxP56rpa2W0O_0yc0xgs5l2r4FRV4Wiuq3IqWuFdsd_4g1c3oRVXoHtW9gxo8ObuxmyjqkAf3cD6N1JbVDos7QX99ZHtmeVrg-FUzSnMZLTl1ZFyiSkpqQiw6BcHXz52jr3s42xWEDFOpwWK6HgXOqscGMNkhA5pZK7h6zVV4dpDaLfgy17TidZXVrtUB/s728-e100/nudge-d-1.jpg" width="729" height="91"></a></p></div>
<p>Microsoft moved to address BlueHammer as part of its Patch Tuesday updates released earlier this week. The vulnerability is being tracked under the CVE identifier <a href="https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html">CVE-2026-33825</a>. However, the other flaws do not have a fix as of writing.</p>
<p>In a series of posts shared on X, Huntress said it observed all three flaws being exploited in the wild, with BlueHammer being weaponized since April 10, 2026, followed by the use of RedSun and UnDefend proof-of-concept (PoC) exploits on April 16.</p>
<p>"These invocations followed after typical enumeration commands: whoami /priv, cmdkey /list, net group, and others that indicate hands-on-keyboard threat actor activity," it added.</p>
<p>The cybersecurity vendor said it has taken steps to isolate the affected organization to prevent further post-exploitation. The Hacker News has reached out to Microsoft for comment, and we will update the story if we hear back.</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched-3788.html</guid>
                <pubDate>Fri, 17 Apr 2026 17:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ8x3Yg0CYomOu1IpHfhfmiqJtgaMSnnoE2tJR6RdXGIy1rLRTORge-ukCLYkEj6xzeGTvmuy-68qfU4me_nG7pvwZi21h7ycQFwY3OXCH1_p_g35BAYeaHdz3uRKJD2mQCjUIcxha2WzMePpup2VHarxZVxy3QNtaRAjET-2FK7GemiuvyI8MpNPFVyEQ/s1700-e365/defender.jpg"/>
            </item>
                    <item>
                <title>Coast Guard&apos;s New Cybersecurity Rules Offers Lessons for CISOs</title>
                <link>https://www.scamalert24.co.za/coast-guard-s-new-cybersecurity-rules-offers-lessons-for-cisos-3787.html</link>
                                <content:encoded><![CDATA[The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role.]]></content:encoded>
                                <description><![CDATA[The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/coast-guard-s-new-cybersecurity-rules-offers-lessons-for-cisos-3787.html</guid>
                <pubDate>Fri, 17 Apr 2026 17:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6abfeadd95d5d9a7/69e150afd52b1acba510683c/maritime-shipping-GreenOak-shutterstock.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>White House moves to give federal agencies access to Anthropic’s Claude Mythos</title>
                <link>https://www.scamalert24.co.za/white-house-moves-to-give-federal-agencies-access-to-anthropic-s-claude-mythos-3786.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				The move would allow civilian agencies to access a modified version of Anthropic&rsquo;s powerful vulnerability&#8209;hunting AI, under safeguards designed to limit misuse.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>The US government is preparing to authorize a version of Anthropic&rsquo;s Claude Mythos model for use by major US federal agencies, amid concerns that the AI model could rapidly spot cybersecurity vulnerabilities and offer the ability to exploit them.</p>



<p>Federal Chief Information Officer Gregory Barbaccia at the White House Office of Management and Budget (OMB) told officials at Cabinet departments on Tuesday that the OMB was setting up protections to allow federal agencies to begin using the model, reported <a href="https://www.bloomberg.com/news/articles/2026-04-16/white-house-moves-to-give-us-agencies-anthropic-mythos-access">Bloomberg</a>, citing an internal memo.</p>



<p>The memo did not commit specific agencies to deployment or provide a timeline, the report said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;We&rsquo;re working closely with model providers, other industry partners, and the intelligence community to ensure the appropriate guardrails and safeguards are in place before potentially releasing a modified version of the model to agencies,&rdquo; Barbaccia wrote in the email, according to the report.</p>

		

			


<p>The OMB move comes while the Department of Defense&rsquo;s supply-chain risk designation against Anthropic, issued on March 3, remains in force. The D.C. Circuit <a href="https://www.computerworld.com/article/4156534/us-court-refuses-to-stay-pentagons-supply-chain-risk-blacklisting-of-anthropic.html">refused to stay the designation</a> on April 8, keeping Anthropic barred from defense contracts while civilian agencies are now being positioned for access.</p>



<p>The White House and Anthropic did not immediately respond to requests for comment.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="defining-the-guardrails">Defining the guardrails</h2>



<p>The memo&rsquo;s reference to a modified version of the model points to open questions about what agency deployment would actually look like. Anthropic announced Claude Mythos Preview on April 7 under <a href="https://www.csoonline.com/article/4155342/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery.html">Project Glasswing</a>, a controlled-access program for select technology and financial organizations.</p>



<p>The company then said the model identified thousands of zero-day vulnerabilities across every major operating system and browser in internal testing and stated it did not plan to make the model generally available.</p>



<p>&ldquo;For a federal deployment to be defensible, the modifications must cover specific assurance dimensions,&rdquo; said Neil Shah, VP for research and partner at Counterpoint Research. &ldquo;The software code base being scanned should remain sovereign within an isolated and air-gapped environment, and the data should not be used to retrain the base model.&rdquo; Additional steps could include transparency requirements and human-in-the-loop review before any bug fix is applied, he said, to make the deployment more controlled.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="enterprise-implications">Enterprise implications</h2>



<p>Those same assurance questions translate directly to enterprise procurement. The OMB move signals that federal cyber defense is pivoting toward frontier models that can find vulnerabilities faster than human teams can patch them, and the rift between the Pentagon and the White House carries a lesson for private-sector buyers, Shah said.</p>



<p>&ldquo;The rift between the two government entities is a lesson on how important it is to control the deployment of potent AI capabilities which could be misused,&rdquo; he said, calling for a multi-layered control framework spanning discovery, classification, security, assurance, and action.</p>



<p>The asymmetry extends beyond US borders. European agencies have <a href="https://www.csoonline.com/article/4158560/european-authorities-without-access-to-anthropics-ai-for-hacking.html">largely been blocked out</a> of early access, with only the UK AI Security Institute granted the ability to test the model. If the OMB authorization proceeds on the terms Barbaccia described, defensive AI capability inside the US federal government would advance ahead of European counterparts, while the Pentagon designation against the same vendor continues to move through the courts.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="a-civilian-workaround-to-the-pentagon-ban">A civilian workaround to the Pentagon ban</h2>



<p>The modified version approach is how Anthropic is navigating around the Pentagon position without losing control of the model, Shah said.</p>



<p>&ldquo;The Anthropic modified version thereby circumvents the Pentagon&rsquo;s black and white approach and helps other entities adopt the model as a security enclave for civilian and enterprise sovereignty with agreed-upon guardrails,&rdquo; Shah said. He added that the arrangement sets a precedent for Anthropic&rsquo;s future adoption across other government entities and enterprises.</p>



<p>Federal access to Anthropic has been in flux for weeks. A US District Court in California granted Anthropic a preliminary injunction on March 26 against a parallel civilian designation, a <a href="https://www.cio.com/article/4151148/anthropic-wins-reprieve-against-us-dod-ban-buying-time-for-contractors-to-assess-ai-supply-chains.html" target="_blank">ruling</a> that gave contractors breathing room to reassess AI supply chains.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<p>Anthropic is now simultaneously blacklisted from military procurement, enjoined from removal across civilian systems, and under discussion for expanded access through OMB. Contractors face operational difficulty identifying where specific AI models sit inside their stacks, a <a href="https://www.csoonline.com/article/4147298/anthropic-ban-heralds-new-era-of-supply-chain-risk-with-no-clear-playbook.html">challenge</a> that has reshaped supply-chain risk across federal AI deployments.</p></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[The US government is preparing to authorize a version of Anthropic’s Claude Mythos model for use by major US federal agencies, amid concerns that the AI model could rapidly spot cybersecurity vulnerabilities and offer the ability to exploit them....]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/white-house-moves-to-give-federal-agencies-access-to-anthropic-s-claude-mythos-3786.html</guid>
                <pubDate>Fri, 17 Apr 2026 16:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4160303-0-08482100-1776429168-shutterstock_editorial_2338803257.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities</title>
                <link>https://www.scamalert24.co.za/nist-revamps-cve-framework-to-focus-on-high-impact-vulnerabilities-3785.html</link>
                                <content:encoded><![CDATA[The National Institute of Standards and Technology carved a new path for vulnerability remediation by changing the way it prioritizes software flaws.]]></content:encoded>
                                <description><![CDATA[The National Institute of Standards and Technology carved a new path for vulnerability remediation by changing the way it prioritizes software flaws.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/nist-revamps-cve-framework-to-focus-on-high-impact-vulnerabilities-3785.html</guid>
                <pubDate>Fri, 17 Apr 2026 16:00:07 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta5e672c25e2a318e/689359079136f61896630252/vulnerability-ktdesign-AdobeStock.jpeg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Caught, Quarantined, Re-installed: RedSun turns Microsoft Defender on itself</title>
                <link>https://www.scamalert24.co.za/caught-quarantined-re-installed-redsun-turns-microsoft-defender-on-itself-3784.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				New PoC shows how Microsoft Defender can be tricked into rewriting malicious files into protected locations, enabling SYSTEM-level privilege escalation on fully patched Windows systems.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						
<div id="remove_no_follow">
<div>
					  <div>
						<div>




<p>Days after Microsoft patched a high-severity issue affecting its Windows Defender antivirus tool through April&rsquo;s Patch Tuesday, researchers warn of another vulnerability that could enable SYSTEM privileges through local escalation.</p>



<p>In a newly disclosed proof-of-concept (PoC) exploit, dubbed &ldquo;RedSun,&rdquo; GitHub user going by the name &ldquo;Nightmare Eclipse&rdquo; demonstrated how Microsoft Defender&rsquo;s handling of certain cloud-tagged files can be abused to overwrite protected system files and escalate privileges.</p>



<p>&ldquo;When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that&rsquo;s supposed to protect decides that it is a good idea to just rewrite the file it found again to its original location,&rdquo; Eclipse <a href="https://github.com/Nightmare-Eclipse/RedSun" target="_blank" rel="noreferrer noopener">wrote</a> in the PoC repository description.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The PoC exploit impacts Windows 10 and Windows 11 systems running Microsoft Defender, specifically builds with cloud files features enabled.</p>

		

			


<h2><a></a>Antivirus rewrites the threat</h2>



<p>The RedSun PoC highlights a counterintuitive behavior. Defender&rsquo;s remediation process may restore a flagged file under certain conditions. Specifically, files tagged with cloud metadata (such as those used by OneDrive and similar services) trigger a different handling path inside the antivirus engine.</p>



<p>Rather than permanently removing the malicious file, Defender attempts to restore it to its original source, rewriting the file back to disk. The PoC exploits this mechanism to, during the rewrite process, manipulate the file contents or destination.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>If an attacker can control the timing and location of the rewrite, they can replace legitimate system binaries or configuration files with malicious payloads. RedSun demonstrated this exploit to gain SYSTEM-level privileges.</p>



<p>Will Dormann from Infosec Exchange verified the PoC using the Cloud Files API. &ldquo;This works ~100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server 2019+ with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled,&rdquo; he said. &ldquo;Any system that has cldapi.dll should be affected.&rdquo;</p>



<p>Dormann used the Cloud Files API to introduce a specially crafted file, followed by &ldquo;oplock&ldquo; to control file access timing. From there, the exploit leverages Volume Shadow Copy race conditions and directory junctions/reparse points to redirect where Defender writes the file.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2><a></a>Second Defender-based LPE in days</h2>



<p>The Defender flaw addressed <a href="https://www.csoonline.com/article/4158706/april-patch-tuesday-roundup-zero-day-vulnerabilities-and-critical-bugs.html">earlier this week</a> as part of Patch Tuesday was one of the two zero-day bugs Microsoft fixed, and it also allowed local privilege escalation stemming from &ldquo;insufficient granularity of access control.&rdquo;</p>



<p>While Microsoft attributed the discovery of the flaw, tracked as CVE-2026-33825, to security researcher Zen Dodd, the flaw already had a PoC exploit, &ldquo;BlueHammer,&rdquo; available before it was even fixed. It came from &ldquo;Chaotic Eclipse,&rdquo; an alias used by Nightmare Eclipse on other publishing platforms. The flaw received a high-severity rating of 7.8 out of 10.</p>



<div><p>Eclipse has some <a href="https://deadeclipse666.blogspot.com/2026/04/public-disclosure-response-for-cve-2026.html" target="_blank" rel="noreferrer noopener">disagreements</a> with how Microsoft handled the disclosure of CVE-2026-33825. While it is unknown if &ldquo;RedSun&rdquo; was reported to Microsoft before disclosure, the PoC still sits unaddressed.</p><p>Microsoft did not immediately respond to CSO&rsquo;s requests for comments. Dormann confirmed that the exploit is being detected on VirusTotal, but relies heavily on a test file signature (EICAR), which can be handled to some extent with string encryption. &ldquo;Defender (Microsoft)&nbsp; currently doesn&rsquo;t detect the exploit in either case,&rdquo; he noted.</p></div>
</div>
							</div>
							</div>
							
							
</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Days after Microsoft patched a high-severity issue affecting its Windows Defender antivirus tool through April’s Patch Tuesday, researchers warn of another vulnerability that could enable SYSTEM privileges through local escalation. In a newly disclosed proof-of-concept (PoC) exploit, dubbed “RedSun,”...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/caught-quarantined-re-installed-redsun-turns-microsoft-defender-on-itself-3784.html</guid>
                <pubDate>Fri, 17 Apr 2026 15:00:13 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4160275-0-53249900-1776426927-shutterstock_editorial_1450286750.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Sometimes changing the password on your email mailbox isn’t enough</title>
                <link>https://www.scamalert24.co.za/sometimes-changing-the-password-on-your-email-mailbox-isn-t-enough-3783.html</link>
                                <content:encoded><![CDATA[Have you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your time. Because newly released research reveals that hackers may already have beaten you to it.

Read more in my article on the Fortra blog.]]></content:encoded>
                                <description><![CDATA[Have you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your time. Because newly released research reveals that hackers may already have beaten you to it. Read...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/sometimes-changing-the-password-on-your-email-mailbox-isn-t-enough-3783.html</guid>
                <pubDate>Fri, 17 Apr 2026 15:00:12 +0300</pubDate>
                <media:thumbnail url="https://www.scamalert24.co.za/site/uploads/2025/Jul/31/ChatGPT Image Jul 31, 2025, 08_18_48 AM (2).png"/>
            </item>
                    <item>
                <title>Singer loses life savings to fake wallet downloaded from the Apple App Store</title>
                <link>https://www.scamalert24.co.za/singer-loses-life-savings-to-fake-wallet-downloaded-from-the-apple-app-store-3782.html</link>
                                <content:encoded><![CDATA[<div><p>If you hold cryptocurrency, there's a very simple golden rule that you should always follow. Never hand over your seed phrase.</p><p>Garrett Dutton, better known as G. Love - the front man of blues-hip-hop outfit G. Love &amp; Special Sauce - has learnt that lesson the hard way.</p><p>In what must have been a painful admission earlier this month, G. Love <a href="https://xcancel.com/glove/status/2043047605614063968">described</a> how while setting up a new computer, he downloaded what he believed was the legitimate Ledger Live app from Apple's official App Store.</p><p>The bogus app tricked the singer into entering his seed phrase - the master key to his cryptocurrency holdings. With that vital information in their hands, the thieves were able to steal 5.9 Bitcoin (approximately US $440,000), which G. Love had been holding for ten years and considered to be his retirement fund.</p><figure><img src="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/glove-tweet.jpeg" alt="" loading="lazy" width="600" height="574" srcset="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/glove-tweet.jpeg 600w"></figure><p>A seed phrase (also known as a recovery phrase) is the sequence of 12 or 24 words that are generated when you set up a cryptocurrency wallet. Anyone who has the seed phrase has full, irrevocable access to your funds - making it impossible to reverse any fraudulent transfers made into someone else's account without your permission.</p><p>The real Ledger Live app will never ask you for your seed phrase. In fact, no legitimate wallet software ever will ask for it. If any app requests your seed phrase, it is a scam.</p><p>It won't be much consolation for G. Love, but he's not the only one to suffer.</p><p>Renowned cryptocurrency investigator ZackXBT <a href="https://t.me/investigations/313">revealed on Telegram</a> that the same fake Ledger Live app had been linked to the theft of some US $9.5 million from more than 50 victims between April 7-13, with the three victims hardest hit each lost seven-figure sums.</p><p>Apple removed the app from its online store on April 12, but not before the damage had been done.</p><p>It remains to be seen whether victims will launch a class action against Apple due to their heavy losses, but serious questions must be asked about the thoroughness of the company's App Store vetting due to the fact that the app remained available long enough to defraud dozens of people.</p><p>G. Love, who says he is not a naive newcomer to cryptocurrency, has <a href="https://xcancel.com/glove/status/2043300386811847055#m">publicly reached out to Apple</a> - but does not appear to have had any response.</p><p>If you hold cryptocurrency, here is what you can do to better protect yourself.</p><ul><li>Never enter your seed phrase into any app, website, or form &mdash; for any reason whatsoever.</li><li>Be especially careful when setting up a new device. That is precisely when you are most likely to search for and reinstall familiar apps, and exactly when scammers are counting on you to drop your guard.</li><li>Check developer names and ratings carefully. Fake apps often attempt to mimic a real product's branding.</li></ul><p>In the past Apple has presented its App Store as a more secure and safer place to find and download apps than other operating systems. G. Love's loss of a ten-year retirement fund serves as a timely lesson that trust in platforms can easily be misplaced.</p></div>
]]></content:encoded>
                                <description><![CDATA[If you hold cryptocurrency, there's a very simple golden rule that you should always follow. Never hand over your seed phrase. Garrett Dutton, better known as G. Love - the front man of blues-hip-hop outfit G. Love &amp; Special...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/singer-loses-life-savings-to-fake-wallet-downloaded-from-the-apple-app-store-3782.html</guid>
                <pubDate>Fri, 17 Apr 2026 15:00:12 +0300</pubDate>
                <media:thumbnail url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/fake-app.jpeg"/>
            </item>
                    <item>
                <title>Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul</title>
                <link>https://www.scamalert24.co.za/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul-3781.html</link>
                                <content:encoded><![CDATA[<div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj84jgyS7JCiumwEWR-XKLRuLv_sljuCRx-alsYQHKikYlefpZeL1Wqh3GEALkiLdX886cZVY22LQA_ETSoYLrNdEJ4115IkJtXq5v1EMvQdvU-_xS61E89OwwSWXvE-F6Lw6_DH17w0wHHnBfUgqFxsy5cI1rTzinKIgA-X3q08jMLOOci5fkkUbCeIeId/s1700-e365/google-ads-android.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj84jgyS7JCiumwEWR-XKLRuLv_sljuCRx-alsYQHKikYlefpZeL1Wqh3GEALkiLdX886cZVY22LQA_ETSoYLrNdEJ4115IkJtXq5v1EMvQdvU-_xS61E89OwwSWXvE-F6Lw6_DH17w0wHHnBfUgqFxsy5cI1rTzinKIgA-X3q08jMLOOci5fkkUbCeIeId/s1700-e365/google-ads-android.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Google this week <a href="https://android-developers.googleblog.com/2026/04/giving-users-clearer-choice-and-everyone-a-safer-more-trusted-app-ecosystem.html">announced</a> a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025.</p>
<p>The new policy updates relate to contact and location permissions in Android, allowing third-party apps to access the contact lists and a user's location in a more privacy-friendly manner. This includes a new Contact Picker, which offers a standardized, secure, and searchable interface for contact selection.</p>
<p>"This feature allows users to grant apps access only to the specific contacts they choose, aligning with Android's commitment to data transparency and minimized permission footprints," Google <a href="https://android-developers.googleblog.com/2026/03/contact-picker-privacy-first-contact.html">said</a>.</p>
<p>Previously, apps requiring access to a specific user's contacts relied on READ_CONTACTS, an overly broad permission that granted apps the ability to access all contacts and their associated information. With the latest change introduced in Android 17, apps can specify which fields from a contact they need, such as phone numbers or email addresses, as opposed to reading the entire record.</p>
<div><p><a href="https://thehackernews.uk/ai-agentic-guide-d-3" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00/s728-e100/nudge-d-3.jpg" width="729" height="91"></a></p></div>
<p>The updated policy will require all applicable apps to use the picker (or the <a href="https://developer.android.com/training/sharing/send">Android Sharesheet</a>) as the main way to access users' contacts, with READ_CONTACTS now reserved only for apps that can't function without it. It's advised to entirely remove the READ_CONTACTS permission from the app manifest declaration if it's targeting Android versions 17 (currently in beta) and later.</p>
<p>"If your app requires full, ongoing access to a user's contact list to function, you must justify this need by submitting a Play Developer Declaration in the Play Console," Google noted.</p>
<p>The second policy change revolves around a <a href="https://android-developers.googleblog.com/2026/03/location-privacy.html">streamlined location button</a> that Google has introduced in Android 17 that enables apps to request one-time access to a user's precise location. In doing so, it allows the user to make a better choice about how much information they want to share and for what duration. What's more, a persistent indicator will appear to alert a user every time a non-system app accesses their location.</p>

<p>To comply with this update, developers are being urged to review their apps' location usage to ensure that they are requesting the minimum amount of location data necessary for them to function.</p>
<p>"If your app targets Android 17 and above and uses precise location for discrete, temporary actions, implement the location button by adding the onlyForLocationButton flag in your manifest," the tech giant said. "If your app requires persistent, precise location to function, you will need to submit a Play Developer Declaration in Play Console to show why the new button or coarse location isn't sufficient for your app's core features."</p>
<p>The declaration form is expected to be available before October 2026, with pre-review checks in the Play Console to go live starting October 27 to identify potential contacts or location permissions policy issues.</p>
<p>Google is also implementing a secure way for businesses to transfer ownership of their apps through a native account transfer feature built into Play Console so as to stay protected against fraud. The company is recommending that app developers handle account ownership changes through this feature starting May 27, 2026.</p>
<p>"That means that unofficial transfers (like sharing login credentials or buying and selling accounts on third-party marketplaces), which leave your business vulnerable, are not permitted," it said.</p>
<h3>Google Takes Aim at Malvertising</h3>
<p>The changes to the Android ecosystem come as Google <a href="https://blog.google/products/ads-commerce/2025-ads-safety-report/">said</a> it's harnessing the capabilities of Gemini, its artificial intelligence (AI) model, to detect and block malicious ads on its platform. More than 99% of policy-violating ads were caught by its systems in 2025 before they were shown to users, it noted.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>"Unlike earlier keyword-based systems, our latest models better understand intent, helping us spot malicious content and preemptively block it, even when it's designed to evade detection," Keerat Sharma, vice president and general manager of Ads Privacy and Safety at Google, said in a post shared with The Hacker News.</p>
<p>Taken together, the company removed or blocked 602 million ads and 4 million accounts that were associated with scams or scam-related activity last year. More than 4.8 billion ads were restricted, and over 480 million web pages were actioned for attempting to serve sexually explicit content, weapons promotion, online gambling, alcohol, tobacco, and malware.</p>
<p>In contrast, Google <a href="https://thehackernews.com/2025/04/google-blocked-51b-harmful-ads-and.html">suspended</a> over 39.2 million advertiser accounts in 2024, and stopped 5.1 billion bad ads, restricted 9.1 billion ads, and blocked or restricted ads on 1.3 billion pages.</p>
<p>"Bad actors are using generative AI to create deceptive ads at scale, and Gemini helps us detect and block them in real time," Google said. "By the end of last year, the majority of Responsive Search Ads created in Google Ads were reviewed instantly, and harmful content was blocked at submission -- a capability we plan to bring to more ad formats this year."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul-3781.html</guid>
                <pubDate>Fri, 17 Apr 2026 15:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj84jgyS7JCiumwEWR-XKLRuLv_sljuCRx-alsYQHKikYlefpZeL1Wqh3GEALkiLdX886cZVY22LQA_ETSoYLrNdEJ4115IkJtXq5v1EMvQdvU-_xS61E89OwwSWXvE-F6Lw6_DH17w0wHHnBfUgqFxsy5cI1rTzinKIgA-X3q08jMLOOci5fkkUbCeIeId/s1700-e365/google-ads-android.jpg"/>
            </item>
                    <item>
                <title>Palo Alto’s Helmut Reisinger sees a cyber sea change ahead as AI advances</title>
                <link>https://www.scamalert24.co.za/palo-alto-s-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances-3780.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Helmut Reisinger, Palo Alto&rsquo;s CEO for EMEA, reflects on the importance of Project Glasswing, the company&rsquo;s recent slate of acquisitions, and the evolution of cybersecurity in the AI era.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>In two decades,&nbsp;Palo Alto Networks&nbsp;has evolved from a next-generation niche player to one of the largest global cybersecurity giants today. Under its mantra of &ldquo;platformization,&rdquo; the company has catapulted its revenues over its closest competitors and boosted its stock valuation to over $130 billion.</p>



<p>No stranger to AI use in cybersecurity, Palo Alto recently announced its participation in&nbsp;<a href="https://www.csoonline.com/article/4155342/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery.html">Project Glasswing</a>, an AI-based vulnerability-discovery initiative led by Anthropic that many are viewing as a <a href="https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html">structural shift for the cyber industry</a>. The initiative, which includes 10 other major technology companies as coalition partners, including AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, and Microsoft, aims to leverage Anthropic&rsquo;s Claude Mythos to improve the security of the software that underpins much of the world&rsquo;s technical infrastructure.</p>



<p>It is in this context that Computerworld Spain spoke with&nbsp;Helmut Reisinger, CEO of Palo Alto Networks for EMEA, in Madrid at the company&rsquo;s Ignite event on April 14. The interview was conducted in Spanish, a language that the multilingual Austrian executive and PhD holder speaks fluently.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Following are excerpts from that interview, edited for length and clarity.</p>

		

			


<p><strong>Computerworld Spain: Let&rsquo;s start with the recent announcement of Palo Alto&rsquo;s participation in the exclusive Mythos project, which few companies have access to due to the power of this technology and the risk of it falling into the wrong hands. Or is this just a marketing strategy?</strong></p>



<p><strong>Helmut Reisinger:</strong> Indeed, this is a restricted release that only a few companies can access for vulnerability testing. We&rsquo;ve witnessed firsthand how this pioneering model represents a radical shift. With it, we&rsquo;ve detected zero-day vulnerabilities in an unprecedented number of operating systems and browsers. And it&rsquo;s capable of turning most of these vulnerabilities into working exploits, with all the risks that entails. For now, we can&rsquo;t say much more. We&rsquo;re currently working on providing more information through a&nbsp;blog. In any case, the important thing is the context in which this is happening.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>On the democratization of AI.</strong></p>



<p>Yes. At Palo Alto, we&rsquo;ve been using AI to improve cybersecurity for a long time. Back in 2014, we integrated&nbsp;machine learning&nbsp;technology into our systems, initially just&nbsp;firewalls. But we also develop cybersecurity solutions specifically for AI. The major challenge today is that, according to a Stanford University report, only 6% of AI deployments are implemented with appropriate cybersecurity. And this is happening in the age of agents, where for every human identity there are approximately 80 machine identities, and even more if we include agents. That&rsquo;s why, thanks to our acquisition of Protect AI, a company founded by Ian Swanson, formerly head of AI at Amazon, we&rsquo;ve launched a security solution for AI deployments, language models, and agents.</p>



<p><strong>This is just one of several purchases Palo Alto has made recently, correct?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Yes, we just <a href="https://www.csoonline.com/article/4131325/palo-alto-closes-privileged-access-gap-with-25b-cyberark-acquisition.html">closed the deal [in February] with&nbsp;CyberArk</a>, a leader in identity security. At Palo Alto, we&rsquo;re convinced that AI and identity are two worlds that must go hand in hand, especially now in the era of generative systems and agents.</p>



<p>Another acquisition we recently completed, in January, and which falls within this context of addressing the current AI landscape, <a href="https://www.paloaltonetworks.com/company/press/2026/palo-alto-networks-completes-chronosphere-acquisition--unifying-observability-and-security-for-the-ai-era">is that of&nbsp;Chronosphere</a>, a leader in observability. Chronosphere is capable of managing and protecting massive volumes of AI-generated data at a lower cost &mdash; half the price &mdash; of other market players. This is an important acquisition because observability is essential in cybersecurity.</p>



<p>And finally,&nbsp;<a href="https://www.csoonline.com/article/4148974/palo-alto-updates-security-platform-to-discover-ai-agents.html">we&rsquo;ve acquired Koi</a>, a deal I expect will close in a few days. Koi&rsquo;s technology focuses on agentic endpoint security &mdash; protecting businesses from the risks of using AI agents and autonomous development tools operating on users&rsquo; devices. Koi&rsquo;s technology will be integrated into our Cortex XDR platform to monitor what AI agents are doing on users&rsquo; computers and detect if they are being manipulated to execute malicious commands.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>I imagine effectively integrate all these companies presents significant challenges.</strong></p>



<p>That&rsquo;s right, because many IT companies, when they make acquisitions, focus more on contractual than technological integrations, but that&rsquo;s not our approach. Our strategy involves complete technological integrations, like Protect AI, which is now part of our network platform. This aligns with our commitment to platformization using a modular system.</p>



<p><strong>It&rsquo;s clear that &lsquo;platformization&rsquo; is the company&rsquo;s mantra and a way to simplify life for customers, but doesn&rsquo;t it also create greater dependencies, including vendor&nbsp;lock-in?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Yes, we sometimes hear clients say they don&rsquo;t want to put all their eggs in one basket. But that&rsquo;s precisely why our strategy is modular, so the client can decide. It&rsquo;s also true that all the clients who have experienced a massive data breach have opted for complete platformization. In fact, our founder [Nir Zuk] has always said that &ldquo;everyone will switch to platforms as soon as they suffer a mega-breach.&rdquo;</p>



<p>The speed of platform adoption, therefore, will be determined by the client themselves, their business, their use cases, their existing contracts, and so on. We are also making efforts to reduce costs to encourage clients to migrate and simplify their platformization process. Furthermore, we mustn&rsquo;t lose sight of the fact that the approach to cybersecurity must be comprehensive; it&rsquo;s a global chain.</p>



<p><strong>Regarding cost, Palo Alto has a reputation for having powerful but expensive technology. What&rsquo;s your opinion?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Compared to the level of protection we provide our customers, our technology isn&rsquo;t that expensive. On the other hand, the cost also reflects all the innovation included in our solutions.</p>



<p><strong>How do you see Palo Alto Networks&rsquo; major competitors, primarily Fortinet and CrowdStrike?</strong></p>



<p>The cybersecurity market is fragmented, but we lead it. That said, we have to win every single day.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>The current, highly turbulent geopolitical climate is having a significant impact on the cybersecurity field, as well as on customers&rsquo; IT purchasing decisions. Does being a US player in Europe affect Palo Alto? Are you seeing a shift among public sector clients toward more local options?</strong></p>



<p>CISOs with high levels of responsibility know very well that a wealth of telemetry data is essential for effective protection, and that&rsquo;s why we aren&rsquo;t seeing a decrease in demand. That&rsquo;s the primary reason. Furthermore, each region and country has its own legal frameworks and regulations, which we fully respect. In fact, we were among the first companies in the world to sign the&nbsp;European AI Act&nbsp;and ensured we also obtained the corresponding national certifications.</p>



<p>Our view on sovereignty is that we must find a balance between perfect sovereignty and zero sovereignty. When we talk about sovereignty, we can refer, for example, to hardware. Regarding this issue, we must accept the interdependence we have between different global markets; this happens, for example, in the field of chips. But if we talk about data sovereignty, this is something that can be easily achieved.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>We implement the Bring Your Own Key&nbsp;(BYOK) policy for many clients&nbsp;to ensure that the telemetry data sent by their devices is encrypted and protected. We are not interested in accessing the personal data our clients handle; we only use telemetry, application identity, user, and device data. It was precisely thanks to this type of analysis that we were able to discover the <a href="https://www.csoonline.com/article/570191/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">attempted intrusion using SolarWinds</a>, although, as it occurred years ago [2020], it was carried out using&nbsp;machine learning&nbsp;tools.</p>



<p><strong>How is the current war in Iran affecting the threat landscape?</strong></p>



<p>This has many implications. Our Unit42 team recently published&nbsp;<a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/" target="_blank" rel="noreferrer noopener">a report</a>&nbsp;outlining how the joint military offensive launched by the United States and Israel activated the Iranian-aligned cyber ecosystem, creating a scenario of digital confrontation that transcends the region and combines&nbsp;hacktivism, political messaging campaigns, and pressure on critical infrastructure.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>In this regard, I want to bring up the issue of sovereignty again because what can a company do if its infrastructure is, for example, bombed? In other words, what does the concept of sovereignty mean in an emergency situation? We already have clients in the Middle East who are rethinking their sovereignty strategy because of this situation. Furthermore, as we saw earlier, we are talking about telemetry data, not other types of data. Ultimately, all of this shows that the concept of sovereignty is fluid.</p>



<p><strong>Returning to Europe, in less than two months Palo Alto will be opening new offices in Spain and, in addition, a &lsquo;hub&rsquo;, correct?</strong></p>



<p>Yes, we want to establish a center of excellence here. In Europe, in addition to Madrid, Palo Alto has large offices in London, Amsterdam, Paris, and Munich. From Madrid,&nbsp;Jordi Botifoll&nbsp;has been leading the business for 87 countries &mdash; not only in Southern Europe, but also in the Middle East, Africa, etc. &mdash; for the past three years.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p><strong>And what are your expectations for the new center of excellence? Why have you chosen Spain?</strong></p>



<p>Cybersecurity requires a lot of technological expertise, and Spain has very good engineers who can help our clients in case of emergency, both through our incident response unit, Unit 42, and through our partners, such as Telef&oacute;nica Tech, Kyndryl, and Orange, because ours is a technology company, not a service company.</p>



<p><strong>How many employees do they have in Spain, and what will the number of employees be at the new center?</strong></p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>I can&rsquo;t break down local numbers, but overall, across the entire company, once the 4,000 CyberArk professionals are integrated, we&rsquo;re already around 20,000 people worldwide. Our main development centers are in California and Israel, although we also have others in Poland and Lithuania.</p>



<p><strong>Looking ahead, significant challenges in information security are coming with the arrival of the post-quantum era.</strong></p>



<p>Yes, and we&rsquo;re already preparing. We&rsquo;ve <a href="https://www.csoonline.com/article/4123719/palo-alto-warns-of-quantum-risk-to-digital-security.html">launched Quantum Safe Security</a> to help organizations get ready for the post-quantum era. Because the big question scientists and experts are asking now is when &lsquo;Q Day&rsquo; will be, which might arrive sometime between 2029 and 2035. Furthermore, integrating CyberArk technology will help ensure that credentials used by machines cannot be compromised through quantum decryption.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The cybersecurity of the future must be real-time, highly automated, and simple for customers, or what we call modular &lsquo;platformization.&rsquo;</p>



<p><strong>Finally, what would you say is the biggest challenge for CISOs today?</strong></p>



<p><a href="https://www.csoonline.com/article/4143302/the-cisos-guide-to-responding-to-shadow-ai.html">Shadow AI</a>. We must prevent AI from suffering the same fate as other technologies in the past, creating what&rsquo;s known as&nbsp;shadow IT. AI deployments must be accompanied by robust cybersecurity. And AI and identity management must go hand in hand. Another concern is the fragmentation of solutions. I was recently speaking with an executive at a large European bank who told me they have 60 different solutions; the gaps between these systems are a clear invitation to attack.</p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[In two decades, Palo Alto Networks has evolved from a next-generation niche player to one of the largest global cybersecurity giants today. Under its mantra of “platformization,” the company has catapulted its revenues over its closest competitors and boosted its stock...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/palo-alto-s-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances-3780.html</guid>
                <pubDate>Fri, 17 Apr 2026 14:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159305-0-41494500-1776420293-helmut-PAN_e.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</title>
                <link>https://www.scamalert24.co.za/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions-3779.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 17, 2026</span></span><span>Vulnerability Management</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrjR1nq2z66LZ-KZoSSgEdNs30l3Wv4kqz4R4acFd3CW2tqG0EDILlATrje1-tvZhdjnU9rSRO4cQNmlQGelsfBGGiMl_m9kxotVRlBDFyMISCJIFUPN78Aam2GAYPL0Nljz4aU5XrrWz2QuxBz-cZvY7vr2zSQJNdgrz3IWLldTPG_n_9tJx22A3TBQzZ/s1700-e365/nist-cve.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrjR1nq2z66LZ-KZoSSgEdNs30l3Wv4kqz4R4acFd3CW2tqG0EDILlATrje1-tvZhdjnU9rSRO4cQNmlQGelsfBGGiMl_m9kxotVRlBDFyMISCJIFUPN78Aam2GAYPL0Nljz4aU5XrrWz2QuxBz-cZvY7vr2zSQJNdgrz3IWLldTPG_n_9tJx22A3TBQzZ/s1700-e365/nist-cve.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>


<p>The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions.</p>
<p>"CVEs that do not meet those criteria will still be listed in the NVD but will not automatically be <a href="https://nvd.nist.gov/general/cve-process">enriched by NIST</a>," it <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">said</a>. "This change is driven by a surge in CVE submissions, which increased 263% between 2020 and 2025. We don&rsquo;t expect this trend to let up anytime soon."</p>
<p>The prioritization criteria outlined by NIST, which went into effect on April 15, 2026, are as follows -</p>
<ul>
<li>CVEs appearing in the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog.</li>
<li>CVEs for software used within the federal government.</li>
<li>CVEs for <a href="https://www.nist.gov/system/files/documents/2026/04/15/EO%2014028%20Critical%20FINAL.pdf">critical software</a> as defined by Executive Order 14028: this includes software that's designed to run with elevated privilege or managed privileges, has privileged access to networking or computing resources, controls access to data or operational technology, and operates outside of normal trust boundaries with elevated access.&nbsp;</li>
</ul>
<div><p><a href="https://thehackernews.uk/ai-agentic-guide-d-3" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00/s728-e100/nudge-d-3.jpg" width="729" height="91"></a></p></div>
<p>Any CVE submission that doesn't meet these thresholds will be marked as "Not Scheduled." The idea, NIST said, is to focus on CVEs that have the maximum potential for widespread impact.</p>
<p>"While CVEs that do not meet these criteria may have a significant impact on affected systems, they generally do not present the same level of systemic risk as those in the prioritized categories," it added.</p>
<p>NIST said the CVE submissions during the first three months of 2026 are nearly one-third higher than they were last year, and it's working faster than ever to enrich the submissions. It also said it enriched nearly 42,000 CVEs in 2025, which was 45% more than any prior year.</p>

<p>In cases where a high-impact CVE has been categorized as unscheduled, users have the option to request enrichment by sending an email to "nvd@nist[.]gov."NIST is expected to review those requests and schedule the CVEs for enrichment as applicable.</p>
<p>Changes have also been instituted for various other aspects of the NVD operations. These include -</p>
<ul>
<li>NIST will no longer routinely provide a separate severity score for a CVE where the CVE Numbering Authority has already provided a severity score.</li>
<li>A modified CVE will be reanalyzed only if it "materially impacts" the enrichment data. Users can request specific CVEs to be reanalyzed by sending an email to the same address listed above.</li>
<li>All unenriched CVEs currently in backlog with an NVD publish date earlier than March 1, 2026, will be moved into the "Not Scheduled" category. This does not apply to CVEs that are already in the KEV catalog.</li>
<li>NIST has updated the <a href="https://nvd.nist.gov/vuln/vulnerability-status">CVE status labels and descriptions</a>, as well as the <a href="https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a>, to accurately reflect the status of all CVEs and other statistics in real time.</li>
</ul>
<p>"The announcement from NIST doesn't come as a major surprise, given they've previously telegraphed intent to move to a 'risk-based' prioritization model for CVE enrichment," Caitlin Condon, vice president of security research at VulnCheck, said in a statement shared with The Hacker News.</p>
<p>"On the plus side, NIST is clearly and publicly setting expectations for the community amid a huge and escalating rise in new vulnerabilities. On the other hand, a significant portion of vulnerabilities now appear to have no clear path to enrichment for organizations relying on NIST as their authoritative (or only) source of CVE enrichment data."</p>
<p>Data from the cybersecurity company shows that there are still approximately 10,000 vulnerabilities from 2025 without a CVSS score. NIST is estimated to have enriched 14,000 'CVE-2025' vulnerabilities, accounting for about 32% of the 2025 CVE population.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>"This announcement underscores what we already know: We no longer live in a world where manual enrichment of new vulnerabilities is a feasible or effective strategy," Condon said.</p>
<p>"Even without AI-driven vulnerability discovery accelerating CVE volume and validation challenges, today's threat climate unequivocally demands distributed, machine-speed approaches to vulnerability identification and enrichment, along with a genuinely global perspective on risk that acknowledges the interconnected, interdependent nature of the worldwide software ecosystem &ndash; and the attackers who target it. After all, what we don't prioritize for ourselves, adversaries will prioritize for us."</p>
<p>David Lindner, chief information security officer of Contrast Security, said NIST's decision to only prioritize high-impact vulnerabilities marks the end of an era where defenders could leverage a single government-managed database to assess security risks, forcing organizations to pivot to a proactive approach to risk management that's driven by threat intelligence.</p>
<p>"Modern defenders must move beyond the noise of total CVE volume and instead focus their limited resources on the CISA KEV list and exploitability metrics," Lindner said.</p>
<p>"While this transition may disrupt legacy auditing workflows, it ultimately matures the industry by demanding that we prioritize actual exposure over theoretical severity. Relying on a curated subset of actionable data is far more effective for national resilience than maintaining a comprehensive but unmanageable archive of every minor bug."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National Vulnerability Database (NVD), stating it will only enrich those that fulfil certain conditions owing...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions-3779.html</guid>
                <pubDate>Fri, 17 Apr 2026 11:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrjR1nq2z66LZ-KZoSSgEdNs30l3Wv4kqz4R4acFd3CW2tqG0EDILlATrje1-tvZhdjnU9rSRO4cQNmlQGelsfBGGiMl_m9kxotVRlBDFyMISCJIFUPN78Aam2GAYPL0Nljz4aU5XrrWz2QuxBz-cZvY7vr2zSQJNdgrz3IWLldTPG_n_9tJx22A3TBQzZ/s1700-e365/nist-cve.jpg"/>
            </item>
                    <item>
                <title>Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</title>
                <link>https://www.scamalert24.co.za/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts-3778.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 17, 2026</span></span><span>DDoS / Cybercrime</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgePkLgywRZdW-d26RoQHpyVUy3nKssYfrZuFEdZ-fjRzJHTpESHBPlLvUII_vjjeLVTn4G_TB_oH76mfzh5t4PoKyz_ZhXWBOnCAkssRVXvb_lAMkEdhlK4G9YE6IWvxUUDQ9KDeZSzurWEPKDoQAVozBVjwrRYtSjy6pSbenOhhctqh3NxELjQXeF7H7S/s1700-e365/europol.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgePkLgywRZdW-d26RoQHpyVUy3nKssYfrZuFEdZ-fjRzJHTpESHBPlLvUII_vjjeLVTn4G_TB_oH76mfzh5t4PoKyz_ZhXWBOnCAkssRVXvb_lAMkEdhlK4G9YE6IWvxUUDQ9KDeZSzurWEPKDoQAVozBVjwrRYtSjy6pSbenOhhctqh3NxELjQXeF7H7S/s1700-e365/europol.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals.</p>
<p>The ongoing effort, dubbed <strong>Operation PowerOFF</strong>, disrupted access to the DDoS-for-hire services, took down the technical infrastructure supporting them, and obtained access to databases containing over 3 million criminal user accounts. Authorities are also sending warning emails and letters to the identified criminal users, and 25 search warrants have been issued.</p>
<p>As many as 21 countries participated in the action: Australia, Austria, Belgium, Brazil, Bulgaria, Denmark, Estonia, Finland, Germany, Japan, Latvia, Lithuania, Luxembourg, the Netherlands, Poland, Portugal, Sweden, Thailand, the U.K., and the U.S.</p>
<p>"Booter services allow users to launch DDoS attacks against targeted websites, servers, or networks," Europol <a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-supported-global-operation-targets-over-75-000-users-engaged-in-ddos-attacks">said</a> in a statement. "Their infrastructure is made up of servers, databases, and other technical components that make DDoS-for-hire activities possible. By seizing these infrastructures, authorities were able to hinder these criminal operations and prevent further damage to victims."</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>The agency described <a href="https://thehackernews.com/2025/05/europol-shuts-down-six-ddos-for-hire.html">DDoS-for-hire</a> as one of the most prolific and easily accessible trends in cybercrime, as it allows even individuals with little to no technical knowledge to execute malicious attacks at scale and inflict significant damage to busin</p>
<p>Europol also noted that DDoS activity can originate from well-resourced and skilled threat actors, who could rely on such services to customize or optimize their illicit activities. DDoS attacks often tend to target various web-based services, with the motivations behind them as varied as they are broad.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9AhaexHlRhBSNMo1AHRJsChpcpW3e5Y1Q-WnVxrDYHuxoefzAqSnzrdGXP_tMOODB_f2eCNeKCZKSVqnwhCyjIA3PGfChC0PHvGkakue3K1-tug1bN-B1OPgb-dkO0yrvftem2hwAEsDTCy0bFeFf-b3sTj97bHMdL-ggqHs2lPi9LKAWUJIppzTNz_V0/s1700-e365/Poweroff.png"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9AhaexHlRhBSNMo1AHRJsChpcpW3e5Y1Q-WnVxrDYHuxoefzAqSnzrdGXP_tMOODB_f2eCNeKCZKSVqnwhCyjIA3PGfChC0PHvGkakue3K1-tug1bN-B1OPgb-dkO0yrvftem2hwAEsDTCy0bFeFf-b3sTj97bHMdL-ggqHs2lPi9LKAWUJIppzTNz_V0/s1700-e365/Poweroff.png" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="2192" data-original-width="3888"></a></p>
<p>This ranges from simple curiosity and financial gain through extortion to hacktivism driven by ideological reasons and disruption of competitors' services. Some operators of these services have been found to mask their true motives and escape law enforcement scrutiny by disguising them as stress-testing tools.</p>
<p>The development marks the latest step taken by authorities to dismantle criminal DDoS-for-hire infrastructures worldwide as part of PowerOFF. In August 2025, the U.S. government <a href="https://thehackernews.com/2025/08/doj-charges-22-year-old-for-running.html">announced</a> the takedown of a DDoS botnet called RapperBot that was used to conduct large-scale disruptive attacks targeting victims in over 80 countries since at least 2021.</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts-3778.html</guid>
                <pubDate>Fri, 17 Apr 2026 10:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgePkLgywRZdW-d26RoQHpyVUy3nKssYfrZuFEdZ-fjRzJHTpESHBPlLvUII_vjjeLVTn4G_TB_oH76mfzh5t4PoKyz_ZhXWBOnCAkssRVXvb_lAMkEdhlK4G9YE6IWvxUUDQ9KDeZSzurWEPKDoQAVozBVjwrRYtSjy6pSbenOhhctqh3NxELjQXeF7H7S/s1700-e365/europol.jpg"/>
            </item>
                    <item>
                <title>Supply chain dependencies: Have you checked your blind spot?</title>
                <link>https://www.scamalert24.co.za/supply-chain-dependencies-have-you-checked-your-blind-spot-3777.html</link>
                                <content:encoded><![CDATA[<div>
    <p>Some cyber business risks only show up when you take a closer look. Supply chain blind spots are a perfect example. Behind these essential third-party connections, products and services can lurk unseen vulnerabilities that precipitate major cyber incidents &ndash; halting operations, triggering downstream chaos, and making headlines with their financial, reputational, and legal/compliance impacts.</p>
<p>As supply chains become increasingly digitized and complex, they provide cybercriminals a bigger &ldquo;risk surface&rdquo; to aim for. Organizations need to understand their supply chain dependencies in depth so they can map the risks and deploy effective resilience strategies to protect sensitive data and sustain business continuity. Yet according to the <a href="https://www.eset.com/us/about/newsroom/research/cyber-readiness-index-noram/" target="_blank" rel="noopener">latest research from ESET</a> and other sources, SMBs largely underestimate the potential risks they face from disruption caused by their supply chain, either from a malicious attack or operational outage.</p>
<h2>What is a supply chain and what risks does it pose?</h2>
<p>A supply chain is&nbsp;the total network of organizations, people, activities, information, and resources involved in moving a product or service from its origin to the final customer, encompassing sourcing, production, distribution, and delivery. Modern supply chains are often global and involve complex international logistics or connections.</p>
<p>Supply chain disruption gives rise to multiple, interrelated types of business risk. These include cybersecurity, operational, geopolitical, financial, reputational, compliance, environmental, and societal risks. In real-world scenarios the risks tend to blur. For example, data breaches linked to partners often have operational, financial, compliance, and/or reputational elements.</p>
<p>But perception does not always mirror reality when it comes to cybersecurity hazards. Perhaps reflecting the media&rsquo;s recent focus on AI-powered exploits and geopolitical cyber conflict, <a href="https://www.eset.com/us/about/newsroom/research/cyber-readiness-index-noram/" target="_blank" rel="noopener">ESET&rsquo;s 2026 SMB Cyber Readiness Index</a> released today found that 16% of Canadian and 17% of United States small businesses rate supply chain attacks among the threats they are most concerned about. Conversely, 34% Canadian and 32% United States SMBs identified AI-powered malware in their top threats.</p>
<p>This seems extremely low given the scale and frequency of supply chain incidents &ndash; and how broadly &lsquo;supply chain&rsquo; really stretches. The <a href="https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/" target="_blank" rel="noopener">3CX compromise</a> of 2023 &ndash; where bad actors trojanized a legitimate software update to the VOIP developer&rsquo;s product, potentially exposing its 600,000 customers &ndash; showed how an incident affecting a single compromised vendor can <a href="https://www.welivesecurity.com/en/cybersecurity/recovering-from-a-supply-chain-attack-what-are-the-lessons-to-learn-from-the-3cx-hack/" target="_blank" rel="noopener">cascade across industries</a>. Notably, 3CX itself was the downstream victim of another supply chain attack, courtesy of a compromised Trading Technologies X_TRADER installer. It was the first-ever documented instance of one supply chain attack seeding another, and a reminder of how deep these chains can run.</p>
<p>More recently, the CDK and Change Healthcare ransomware attacks in 2024 and the Jaguar Land Rover (JLR) ransomware attack of August 2025 illustrate how an incident at a vendor that sits at a critical node propagates across an entire sector. JLR belongs on the list for a second reason: the intrusion reached the automaker through one of its IT service providers, placing it squarely in classic supply chain territory.</p>
<p>The <a href="https://www.welivesecurity.com/en/cybersecurity/complexities-cybersecurity-update-processes/" target="_blank" rel="noopener">faulty CrowdStrike update</a> from July 2024 made the same point without an attacker involved, showing showed that supply chain risk isn&rsquo;t only about malice. A botched update release travels the same rails as a malware-laden one, and dependence on a single vendor can turn one point of failure into a global disruption.</p>
<p>Echoing ESET&rsquo;s findings, the World Economic Forum&rsquo;s <a href="https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf" target="_blank" rel="noopener">Global Cybersecurity Outlook 2026</a> asked business leaders across industries and regions to rank the cyber risks that concerned them most. CISOs rated supply chain disruption #2 for 2025 and #2 again for 2026, while CEOs rate supply chain disruption #3 for 2025. I find it surprising that supply chain disruption doesn&rsquo;t continue to rank in a CEO&rsquo;s top 3.</p>
<figure><img title=" World Economic Forum Global Cybersecurity Outlook 2026" src="https://web-assets.esetstatic.com/wls/2026/04-26/wef-global-cybersecurity-outlook.png" alt="wef-global-cybersecurity-outlook" width="" height="">
<em>Source: <a href="https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf" target="_blank" rel="noopener">World Economic Forum Global Cybersecurity Outlook 2026</a></em>
</figure>
<p>Overall, about 30% of data breaches involve a third party, a figure that doubled year-over-year, according to Verizon&rsquo;s <a href="https://www.verizon.com/business/resources/reports/dbir/" target="_blank" rel="noopener">2025 Data Breach Investigations Report</a> (DBIR). The total economic <a href="https://cybersecurityventures.com/global-costs-of-software-supply-chain-attacks-on-the-rise/" target="_blank" rel="noopener">cost of software supply chain attacks skyrocketed</a> from $46 billion in 2023 to $60 billion in 2025, and is expected to reach $138 billion by 2031. Statistics like these should put cyber supply chain risk on every business leader&rsquo;s short list of concerns.</p>
<h2>What are the top cyber supply chain blind spots?</h2>
<p>Supply chain cybersecurity risk concerns all possible ways that attackers could infiltrate a company&rsquo;s networks or other IT infrastructure and steal its data by targeting vulnerabilities in the systems of third-party service providers, vendors, or partners. These attacks often exploit situations where communications are trusted by default, potentially compromising data, personal privacy, operational stability, or even national security.</p>
<p>Supply chain cyber vulnerabilities take various forms, such as:</p>
<ul>
<li>Compromising network-connected SMB suppliers with weaker security to create a backdoor into the target enterprise.</li>
<li>Injecting malicious code into software components (e.g., open-source libraries) or updates, potentially compromising many users.</li>
<li>Using phishing attacks and other social engineering ploys to steal privileged credentials or seed ransomware or other malware via a third-party such as an IT services company.</li>
<li>Hacking or vulnerabilities in physical assets like chipsets or IoT devices at the source.</li>
</ul>
<p>Some of the cyber supply chain blind spots that threaten many organizations include:</p>
<ul>
<li>Thinking your business is more resilient than it actually is (false sense of security) due to inadequate risk assessment.</li>
<li>Geopolitically motivated incidents (see below), where &ldquo;collateral damage&rdquo; can harm numerous organizations not directly related to a conflict.</li>
<li>Cyber vulnerabilities several levels deep in the supply chain where the end customer has no visibility (so-called fourth-party, nth-party, or indirect vendor risk).</li>
<li>&ldquo;Reverse&rdquo; supply chain disruptions impacting a company&rsquo;s customers.</li>
<li>Assuming new and unassessed vulnerabilities along with new supply chain partners that were onboarded quickly due to geopolitical events, natural disasters, or other chaotic scenarios.</li>
<li>Trusting communications with partners instead of leveraging zero trust principles to validate all connections.</li>
<li>&ldquo;Monoculture&rdquo; issues, such as wide-scale reliance among MSSPs or cyber insurance providers on one or a few popular cybersecurity solutions that, if compromised, would wreak instant havoc on a large scale.</li>
</ul>
<p>The sheer complexity of many modern supply chains makes identifying every single risk untenable. The question then becomes, where do you draw the line? How deep and detailed is your vendor risk assessment? And what level of supply chain cyber risk are you willing to accept as beyond your control?</p>
<h2>What have been the impacts from major supply chain attacks?</h2>
<p>Some of the most damaging incidents in recent memory hit organizations that sit at critical nodes in supply chains, and the resulting disruptions cascaded far beyond the original target.</p>
<p>A prime example of a cyberattack with an enormous blast radius is the JLR ransomware attack from August 2025. Attackers reached the automaker through an outsourced IT service provider, then disrupted production lines and IT services for over five weeks. The result was a global manufacturing shutdown that caused a 25% drop in vehicle production across the entire sector in the UK in September 2025. Parts demand crumpled overnight, forcing JLR&rsquo;s suppliers and related businesses to lay off hundreds of workers and driving the UK government to issue a &pound;1.5 billion emergency loan guarantee to forestall a national economic and workforce crisis. Deemed the costliest cyberattack in UK history, it resulted in over &pound;1.9 billion in total economic damage.</p>
<p>The Marks &amp; Spencer (M&amp;S) attack of April 2025 followed a similar pattern. The hackers successfully employed social engineering against an outsourced IT service provider, impersonating employees and <a href="https://www.welivesecurity.com/en/business-security/it-service-desks-security-blind-spot-business/" target="_blank" rel="noopener">convincing help desk staff</a> to reset critical system credentials. Contact details, birth dates, and order histories from millions of customers were apparently exfiltrated, and the company&rsquo;s online and app-based order processing were down for weeks. The lengthy outage cost on the order of &pound;300 million and inflicted lasting reputational damage.</p>
<p>Compromising commonly used open-source software libraries with malicious code is a similar and increasingly popular attack vector, with open-source malware <a href="https://www.darkreading.com/application-security/malicious-open-source-packages-spike" target="_blank" rel="noopener">proliferating 188% from 2024 to 2025</a>.</p>
<p>In a stark illustration of geopolitical blind spots within the software supply chain, a malicious backdoor placed into a legitimate update to the popular M.E.Doc accounting software in 2017 caused widespread distribution. Intended to target the Ukrainian economy, the attack spread <a href="https://www.welivesecurity.com/2017/06/30/telebots-back-supply-chain-attacks-against-ukraine/">NotPetya</a> wiper malware to organizations worldwide, sowing destruction estimated to cost $10 billion. The attack was later attributed to a Russia-aligned source. &nbsp;</p>
<p>Even hardware components like chips and circuit boards can potentially be exploited or weaponized, creating blind spots that are extremely difficult to detect or defend against. An ongoing example is the <a href="https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/">Kr00k</a> firmware supply chain vulnerability (<a href="https://nvd.nist.gov/vuln/detail/cve-2019-15126" target="_blank" rel="noopener">CVE-2019-15126</a>) discovered by ESET in 2019. Attackers can force affected devices, including millions of smartphones, laptops, and IoT devices, to encrypt Wi-Fi transmissions with an all-zero key that allows for easy decryption. It&rsquo;s likely that many affected devices still do not have firmware patches installed due to the mass scale of use.</p>
<p>And as an extreme example, the &ldquo;Operation Grim Beeper&rdquo; supply chain attack of September 2024 saw pagers and walkie-talkies used by Hezbollah members in Lebanon and Syria explode as part of an Israeli intelligence operation. Over 30 people were killed and 3,000 injured after equipment purchased by Hezbollah was systematically intercepted and weaponized for years. Talk about a supply chain blind spot&hellip;</p>
<h2>What are key considerations around geopolitical supply chain risk?</h2>
<p>With Iran launching <a href="https://www.welivesecurity.com/en/business-security/cyber-fallout-iran-war-what-have-radar/" target="_blank" rel="noopener">drone strikes against Amazon Web Services (AWS) data centers</a> in Bahrain and the UAE, geopolitical supply chain cyber risk is front-page news. Where kinetic and cyber warfare overlap, nation state actors and their proxies can exploit critical supply chain dependencies to perpetrate wide-scale economic sabotage for strategic ends that may include monetary theft. Collateral damage is part of the plan.</p>
<p>Some questions that organizations can ask to potentially reduce geopolitical supply chain risk include:</p>
<ul>
<li>Carefully audit all third-party hosting relationships, vendor access to your network, etc. Is your data moving through data centers in volatile regions &ndash; either directly or through service provider activities? Cloud service disruptions can propagate unpredictably through the supply chain.</li>
<li>Are you reliant on hardware or software that cyber combatants are currently targeting with specialized attacks, such as Israeli-made OT hardware?</li>
<li>Check whether your managed security solution provider(s) and other critical vendors have reviewed their own geopolitical cyber risk exposure. If a third party manages your incident detection and response (MDR) capability, for example, their solution becomes part of your attack surface.</li>
</ul>
<h2>How can organizations build supply chain cyber-resilience?</h2>
<div><p>General strategies for mitigating supply chain cyber risk include rigorously vetting suppliers&rsquo; cybersecurity postures, adopting emerging technology to enhance monitoring, leveraging zero trust principles to reduce attack impacts, and creating and testing incident response and business continuity plans to build resilience and better manage supply chain related incidents. Your entire supplier web needs to be part of the risk assessment.</p><p>To build and operationalize supply chain cyber resilience, I recommend a sequence of activities that collectively build resilience over a one-year period.</p></div>
<h3>First 3 months</h3>
<ul>
<li>Nominate business and IT owners for supply chain risk.</li>
<li>Identify all your third-party IT and business supply chain vendors and prioritize them by 1) Access to sensitive data, and 2) Criticality to the business.</li>
<li>Create a policy that defines your minimum acceptable cybersecurity posture or controls for vendors.</li>
<li>Check vendor compliance with your cyber requirements and replace them as needed.</li>
</ul>
<h3>First 6 months</h3>
<ul>
<li>Continue to monitor vendor compliance with your cyber requirements.</li>
<li>Describe key hardware and software supply chain risks (e.g., open-source dependencies) in business terms.</li>
<li>Incorporate your cyber requirements into procurement activities and contract negotiations. Negotiate the right to monitor and audit critical vendors.</li>
<li>Conduct a tabletop incident response exercise that includes strategic vendors.</li>
</ul>
<h3>First 12 months</h3>
<ul>
<li>Implement lessons learned from your tabletop exercise.</li>
<li>Audit vendors against contractual cyber requirements (e.g., average time to patch). Investigate supplier cyber incidents where relevant.</li>
<li>Build redundancy and fail-safes into IT systems wherever possible, while avoiding solution &ldquo;monoculture&rdquo; issues.</li>
<li>Review and update your cyber requirements policy.</li>
<li>Monitor and respond to global cyber regulatory/compliance changes that impact your business.</li>
</ul>
<h2>Resilience is imperative</h2>
<div><p>In a world of escalating threats and risky interdependencies, supply chain cyber resilience is a competitive differentiator at the survival level. Cybercriminals are keen to identify and target an organization&rsquo;s third-party linkages either upstream or downstream. It&rsquo;s possible that a chain of disrupted partners could face collective extortion pressure &ndash; effectively a &ldquo;crowdfunded&rdquo; ransomware scenario.</p><p>As a foundational resilience building block, firms must comprehensively map their critical third-party dependencies and vulnerabilities across digital and non-digital systems, including those that may not be obvious. Some ways to look beyond typical operational supply chain risk assessment include:</p></div>
<ul>
<li>AI-assisted continuous supply chain monitoring</li>
<li>Automated supply chain dependency mapping</li>
<li>Zero-trust supply chain architecture and connections</li>
<li>Application of threat intelligence to supply chain configurations</li>
<li>Extending resilience planning/considerations beyond internal systems to include the broader supply chain ecosystem</li>
<li>Possible input and assistance from your cyber liability insurer, which may have data-driven insights into vendors&rsquo; supply chain cyber performance</li>
</ul>
</div>
]]></content:encoded>
                                <description><![CDATA[Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/supply-chain-dependencies-have-you-checked-your-blind-spot-3777.html</guid>
                <pubDate>Fri, 17 Apr 2026 09:00:16 +0300</pubDate>
                <media:thumbnail url="https://web-assets.esetstatic.com/wls/2026/04-26/supply-chain-dependencies.jpg"/>
            </item>
                    <item>
                <title>Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</title>
                <link>https://www.scamalert24.co.za/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation-3776.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 17, 2026</span></span><span>Vulnerability / Enterprise Security</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5/s1700-e365/apachemq.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5/s1700-e365/apachemq.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A recently disclosed high-severity security flaw in Apache ActiveMQ&nbsp;Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency&nbsp;(CISA).</p>
<p>To that end, the agency&nbsp;has <a href="https://www.cisa.gov/news-events/alerts/2026/04/16/cisa-adds-one-known-exploited-vulnerability-catalog">added</a> the vulnerability, tracked&nbsp;as <strong><a href="https://www.cve.org/CVERecord?id=CVE-2026-34197">CVE-2026-34197</a></strong> (CVSS score: 8.8), to its Known Exploited Vulnerabilities&nbsp;(<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">KEV</a>) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by April 30,&nbsp;2026.</p>
<p>CVE-2026-34197&nbsp;has been <a href="https://thehackernews.com/2026/04/threatsday-bulletin-hybrid-p2p-botnet.html#chained-flaws-enable-stealth-rce">described</a> as a case of improper input validation that could lead to code injection, effectively allowing an attacker to execute arbitrary code on susceptible installations. According&nbsp;to Horizon3.ai's Naveen Sunkavally, CVE-2026-34197 has&nbsp;been&nbsp;"hiding in plain&nbsp;sight" for 13&nbsp;years.&nbsp;</p>
<div><p><a href="https://thehackernews.uk/ai-blindspot-d-2" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu/s728-e100/nudge-d-2.jpg" width="729" height="91"></a></p></div>
<p>"An attacker can invoke a management operation&nbsp;through ActiveMQ's Jolokia API to trick the broker into fetching a remote configuration file and running arbitrary OS&nbsp;commands," Sunkavally&nbsp;added.</p>
<p>"The vulnerability requires credentials, but default credentials (admin:admin) are common in many environments. On some versions (6.0.0&ndash;6.1.1), no credentials are&nbsp;required at&nbsp;all due to another vulnerability, CVE-2024-32114, which inadvertently exposes the Jolokia API without authentication. In those versions, CVE-2026-34197 is effectively an unauthenticated&nbsp;RCE."</p>
<p>The vulnerability <a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt">impacts</a> the following versions&nbsp;-</p>
<ul>
<li>Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.4</li>
<li>Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0&nbsp;before 6.2.3</li>
<li>Apache ActiveMQ (org.apache.activemq:activemq-all) before 5.19.4</li>
<li>Apache ActiveMQ (org.apache.activemq:activemq-all) 6.0.0&nbsp;before 6.2.3</li>
</ul>
<p>Users are&nbsp;advised to upgrade to version 5.19.4&nbsp;or 6.2.3, which addresses the issue. There&nbsp;are currently no details on how CVE-2026-34197&nbsp;is being&nbsp;exploited in the&nbsp;wild, but&nbsp;SAFE Security, in a report published this week, revealed that threat actors are actively targeting exposed Jolokia management endpoints in Apache ActiveMQ Classic deployments.</p>
<p>The findings once again demonstrate that exploitation timelines continue to collapse as attackers pounce upon newly disclosed vulnerabilities at an alarmingly faster rate and breach systems&nbsp;before they can be&nbsp;patched.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>Apache ActiveMQ is&nbsp;a <a href="https://thehackernews.com/2021/02/new-cryptojacking-malware-targeting.html">popular&nbsp;target</a>&nbsp;for <a href="https://thehackernews.com/2023/11/kinsing-hackers-exploit-apache-activemq.html">attack</a>,&nbsp;with <a href="https://thehackernews.com/2024/01/apache-activemq-flaw-exploited-in-new.html">flaws</a> in the open-source message&nbsp;broker <a href="https://thehackernews.com/2024/09/ransomhub-ransomware-group-targets-210.html">repeatedly&nbsp;exploited</a> in various malware campaigns since 2021. In&nbsp;August 2025, a critical vulnerability in ActiveMQ (CVE-2023-46604, CVSS score:&nbsp;10.0) was <a href="https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html">weaponized</a> by unknown actors to drop a Linux malware called DripDropper.</p>
<p>"Given ActiveMQ&rsquo;s role in enterprise messaging and data pipelines, exposed management interfaces present a high-impact risk, potentially enabling data exfiltration, service disruption, or lateral&nbsp;movement," SAFE&nbsp;Security <a href="https://safe.security/resources/blog/threat-research/most-dangerous-new-cves-april-15-2026/">said</a>.&nbsp;"Organizations should audit all deployments for externally accessible Jolokia endpoints, restrict access to trusted networks, enforce strong authentication, and disable Jolokia where it is not&nbsp;required."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To that end, the agency has added the vulnerability, tracked as CVE-2026-34197 (CVSS score: 8.8), to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation-3776.html</guid>
                <pubDate>Fri, 17 Apr 2026 07:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAY7CueGuHevAtV544WN7RTKISrobQLFpjfi4kjdzP1I2BA3rnll69dv1kfvHYSCcU5tQISA0OOgcQVibKrl4o0AvtUyM9crfZuSb1XFH03iLtPglZeHn1e6S8urWxf_4CEH9-tCZdT9BBrvXOFygCxjO_AUmUXnzm4d37Q80fPw3lEn6Hb0_LWlP9XM5/s1700-e365/apachemq.jpg"/>
            </item>
                    <item>
                <title>Here&apos;s What Agentic AI Can Do With Have I Been Pwned&apos;s APIs</title>
                <link>https://www.scamalert24.co.za/here-s-what-agentic-ai-can-do-with-have-i-been-pwned-s-apis-3775.html</link>
                                <content:encoded><![CDATA[
            <p>I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful and makes a meaningful difference. This blog post cuts straight to the good stuff, specifically how you can use AI with Have I Been Pwned to do some pretty cool things.  I'll be showing examples based on OpenClaw running on the Mac Mini in the hero shot, but they're applicable to other agents that turn HIBP's data into more insightful analysis.</p><p>So, let me talk about what you can do right now, what we're working on and what you'll be able to do in the future.</p><h2 id="model-context-protocol-mcp">Model Context Protocol (MCP)</h2><p>A quick MCP primer first: Anthropic came up with the idea of building a protocol that could connect systems to AI apps, and thus the <a href="https://modelcontextprotocol.io/?ref=troyhunt.com" rel="noreferrer">Model Context Protocol</a> was born:</p>Using MCP, AI applications like Claude or ChatGPT can connect to data sources (e.g. local files, databases), tools (e.g. search engines, calculators) and workflows (e.g. specialized prompts)&mdash;enabling them to access key information and perform tasks.<p>If I'm honest, I'm a bit on the fence as to how useful this really is (<a href="https://risky.biz/RBFEATURES7/?ref=troyhunt.com" rel="noreferrer">and I'm not alone</a>), but creating it was a no-brainer, so we now have an MCP server for HIBP:</p>

https://haveibeenpwned.com/mcp

<p>You can't just make an HTTP GET to the endpoint, but you can ask your favourite AI tool to explain what it does:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image.png" alt="" loading="lazy" width="788" height="630" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image.png 788w"></figure><p>In other words, all the stuff we describe in <a href="https://haveibeenpwned.com/API/v3?ref=troyhunt.com" rel="noreferrer">the API docs</a> &#128578; That's an overly simplistic statement, and there are many nuances MCP introduces beyond a computer reading docs intended for humans, but the point is that we've implemented MCP and it's there if you want it. Which means you can easily use the JSON below to, for example, <a href="https://docs.github.com/en/copilot/how-tos/provide-context/use-mcp-in-your-ide/extend-copilot-chat-with-mcp?ref=troyhunt.com" rel="noreferrer">extend GitHub Copilot</a>:</p>

"HIBP": {
  "url": "https://haveibeenpwned.com/mcp",
  "headers": {
    "hibp-api-key": "YOUR_STANDARD_HIBP_API_KEY"
  },
  "type": "http"
}

<p>Now let's do something useful with it.</p><h2 id="human-use-cases">Human Use Cases</h2><p>This is really the point of the whole thing - how can humans use it to do genuinely useful stuff? In particular, how can they use it to do stuff that was hard to do before, and how can "normies" (non-technical folks) use it to do stuff they previously needed developers for? I've been toying with these questions for a while now. Here's what I've come up with:</p><p>Firstly, I'm going to do all these demos on OpenClaw. I've been talking a lot about that on my weekly live streams over the past month, and the "agentic" nature of it (being able to act as an independent agent tying together multiple otherwise independent acts) is <em>enormously</em> powerful. Every company worth its AI salt is now focusing on building out agentic AI so whilst I'm using OpenClaw for these demos, you'll be able to do exactly the same thing in your platform of choice either now or in the very near future.</p><p>I'm using a Telegram bot as my interface into OpenClaw, let's kick it off:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-1.png" alt="" loading="lazy" width="488" height="515"></figure><p>Easy, right? &#128578; There's a different discussion around how secrets are stored and protected, but that's a story for another time (and is also obviously dependent on your agent). But the key is easily rotated on the HIBP dashboard anyway. If you don't have a key already, <a href="https://haveibeenpwned.com/Subscription?ref=troyhunt.com" rel="noreferrer">go and take out a subscription</a> (they start at a few bucks a month), and you'll be up and running in no time.</p><p>Now that I know I'm connected, let's learn about how I'm presently using the service:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-2.png" alt="" loading="lazy" width="635" height="366" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image-2.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-2.png 635w"></figure><p>Most of these are pretty obvious, but I've also included another here that I use to monitor how the service is behaving with a large organisation. It's a real domain with real data, so I'm going to obfuscate it to preserve privacy, but it's a great demonstration of how useful AI is. In fact, the inspiration of this blog post was when I received this notification last week:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-3.png" alt="" loading="lazy" width="623" height="852" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image-3.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-3.png 623w"></figure><p>One of the most asked questions after someone in a large org receives an email like this is "who are those 16 people in the breach"? Because we can't reliably filter large domains in the UI, I'd normally suggest they either download the CSV or JSON format in the dashboard, then search for "Hallmark" in there or use the API and write some code. But now, there's a much easier way:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-4.png" alt="" loading="lazy" width="485" height="474"></figure><p>Well that was easy &#128526; I like the additional context too, and now it has me curious: what have these people been up to?</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-5.png" alt="" loading="lazy" width="491" height="396"></figure><p>Because I'm on a Pro plan (or if you're still on the old Pwned 5 plan), I've also got access to stealer logs. Let's see what's going on there:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-6.png" alt="" loading="lazy" width="486" height="331"></figure><p>If you were running an online service, that first number would indicate compromised customers. But as OpenClaw has suggested here, the second number is the one that's interesting in terms of employees entering their data into other websites using the corporate email address. But they'd <em>never </em>reuse the same password as the work one, right? &#129300; Best check which services they're entering organisational assets into:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-15.png" alt="" loading="lazy" width="488" height="601"></figure><p>The first one makes sense and is extra worrying when you consider these are people infected with infostealers. That's not necessarily malware on a corporate asset; they could always be using an infected personal device to sign into a corporate asset... ok, that's also pretty bad! I was a bit surprised to see Steam in there TBH - who's using their corporate email address to sign into a gaming platform?! A quiet chat with them might be in order. And the bamboozled.net stuff is weird, I want to understand a bit more about that:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-10.png" alt="" loading="lazy" width="484" height="389"></figure><p>Now I'm losing interest in this blog post and am <em>really </em>curious as to what's actually in the data!</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-9.png" alt="" loading="lazy" width="491" height="433"></figure><p>Ok, so there's an entire rabbit hole over there! Let's park that, but think about how useful information like this is to infosec teams when you can pull it so easily. Or how useful info like this is to HR teams &#128556;</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-11.png" alt="" loading="lazy" width="490" height="744"></figure><p>Keep in mind, these are corporate addresses tied to the company and <a href="https://www.troyhunt.com/your-work-email-address-is-your-works-email-address/" rel="noreferrer">are the company's property</a>, so, yeah...</p><p>But remember the agentic nature of OpenClaw means we can ask it to go off and run tasks in the background, tasks like this:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-12.png" alt="" loading="lazy" width="489" height="145"></figure><p>This was just a little thought experiment I set up a few days ago and forgot about until yesterday, when I loaded a new breach:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-13.png" alt="" loading="lazy" width="441" height="434"></figure><p>I never asked it to look for "functional/system accounts"; it just decided that was relevant. And it is - this breach clearly had a lot of data in it related to purchases of services, which is an interesting aspect.</p><p>The idea of running stuff on a schedule opens up a whole raft of new opportunities. For example, monitoring your family's email addresses: "let me know when mum@example.com appears in a new breach". From here, your creativity is the only limit (and even that statement is debatable, given how much stuff AI agents come up with on their own). For example, creating visualisations of the data:</p><figure><img src="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-14.png" alt="" loading="lazy" width="1937" height="881" srcset="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w600/2026/04/image-14.png 600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w1000/2026/04/image-14.png 1000w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w1600/2026/04/image-14.png 1600w, https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/2026/04/image-14.png 1937w"></figure><p>I could go on and on (I started going down another rabbit hole of having it generate executive-level reports with all the data), but you get the idea.</p><h2 id="the-ai-pipeline">The AI Pipeline</h2><p>This is about what's in <em>our </em>pipeline, and the primary theme is putting tooling where it's more easily accessible to the masses. Creating a connector in Claude, an app in ChatGPT, and similar plumbing in the other big players' AI tools is an obvious next step. This will likely involve adding an OAuth layer to HIBP, allowing end users to configure the respective tools to query those HIBP APIs under their identity and achieve the same results as above, but built into the "traditional" AI tooling in a way people are familiar with.</p><h2 id="future">Future</h2><p>A big part of this is about AI enabling more human conversations to achieve technical outcomes. I spotted this from Cloudflare just yesterday, and it's a perfect example of just this:</p>

<div lang="en" dir="ltr"><p>Cloudflare dashboard can now complete tasks for you.</p><p>- "Create a Worker and bind a new R2 bucket to it"<br>- "Change my DNS records to 1.1.1.1"<br>- "How many errors have happened this week"</p><p>Not only do we tell you, but we show you with generative UI.</p><p>PROTIP: Use full-screen mode. <a href="https://t.co/Q1o1vyoOwk?ref=troyhunt.com">pic.twitter.com/Q1o1vyoOwk</a></p></div>&mdash; Brayden (@BraydenWilmoth) <a href="https://twitter.com/BraydenWilmoth/status/2044422996765352226?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com">April 15, 2026</a> 

<p>I've been pretty blown away by both how easy this process has been and how much insight I've been able to draw from data I've been sitting on for ages. We'll be building out more tooling and easily reproducible demos in the future, and I'm sure a lot of that will do stuff we haven't even thought of yet. If you give this a go and find other awesome use cases, please leave a comment and tell me what you've done, especially if you've cut through the hyperbole and created some genuinely awesome stuff &#128526;</p>

            
                <a href="https://www.troyhunt.com/tag/have-i-been-pwned-3f/">Have I Been Pwned</a>
            
        
]]></content:encoded>
                                <description><![CDATA[I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real "gold" - AI stuff that's genuinely useful...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/here-s-what-agentic-ai-can-do-with-have-i-been-pwned-s-apis-3775.html</guid>
                <pubDate>Fri, 17 Apr 2026 03:00:10 +0300</pubDate>
                <media:thumbnail url="https://storage.ghost.io/c/fb/33/fb3391dc-723d-4e74-b95a-d641b5feb38e/content/images/size/w1200/2026/04/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg"/>
            </item>
                    <item>
                <title>RCE by design: MCP architectural choice haunts AI agent ecosystem</title>
                <link>https://www.scamalert24.co.za/rce-by-design-mcp-architectural-choice-haunts-ai-agent-ecosystem-3774.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Unsafe defaults in MCP configs open servers to possible remote code execution, as evidenced by several commercial services and open-source projects.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						
<div id="remove_no_follow">
<div>
					  <div>
						<div>




<p>AI agent building tools enable users to configure Model Context Protocol (MCP) servers may be exposing systems to remote code execution due to an architectural decision in Anthropic&rsquo;s reference implementation.</p>



<p>At issue are unsafe defaults in how MCP configuration works over the STDIO interface, with broad implications for the agent ecosystem, according to a new report.</p>



<p>&ldquo;The blast radius is massive,&rdquo; researchers from application security firm OX Security wrote in <a href="https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/">their report on the design issue</a>. &ldquo;This exploit allowed us to directly execute commands on six official services of real companies with real paying customers, and to take over thousands of public servers spanning over 200 popular open-source GitHub projects with hundreds of millions of downloads.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>According to Anthropic and other MCP adapter developers, the STDIO command execution behavior is by design and the responsibility of sanitizing MCP configurations falls with developers of client applications. While this might be true, in practice OX Security found that few developers have attempted to filter commands in MCP configs and even those who did failed to catch all potential bypasses.</p>

		

			


<h2 id="the-root-of-the-issue">The root of the issue</h2>



<p>MCP provides a standardized method for applications to expose data sources and tools to LLMs, improving their context and effectiveness in completing automated workflows. Originally developed by Anthropic, MCP has become a widely adopted technology in the agentic AI space.</p>



<p>Anthropic provides reference MCP implementations in the form of SDKs for a variety of programming languages, including TypeScript, Python, Java, Kotlin, C#, Go, PHP, Ruby, Rust, and Swift. Furthermore, other frameworks and functionality providers &mdash; such as FastMCP, LangChain&rsquo;s mcp-adapters, Microsoft&rsquo;s agent-framework, mcp-agent, browser-use, Amazon&rsquo;s run-model-context-protocol-servers-with-aws-lambda, and NVIDIA&rsquo;s NeMo-Agent-Toolkit &mdash; have Anthropic&rsquo;s modelcontextprotocol reference implementation as a dependency.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>MCP supports two transport interfaces between servers and clients: Streamable HTTP with Server-Sent Events (SSE), which is typically used for remote MCP servers and web services, and Standard Input/Output (STDIO), for MCP servers and applications that run locally on the same machine.</p>



<p>With STDIO, client applications can start MCP servers on demand as a subprocess and pass parameters to them. These parameters can include custom commands that get executed on the system with the permissions of the parent process. While in theory these commands are meant to tell the SDK&rsquo;s StdioServerParameters function how to start the MCP server, they can technically be anything if no filtering is in place.</p>



<p>The OX Security researchers consider this a design flaw that should be mitigated, but Anthropic disagrees, as do the creators of other frameworks that enable MCP functionality, such as LangChain and FastMCP. The argument is that the responsibility for making sure malicious user input doesn&rsquo;t reach the SDK&rsquo;s command execution function resides with the developers of the client applications that integrate these MCP frameworks.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The pattern of allowing user-supplied strings to flow directly into a shell execution environment is an anti-pattern that should be deprecated,&rdquo; the OX Security researchers said. Anthropic&rsquo;s SDKs should implement a command allowlist by default that blocks sh, bash, powershell, curl, rm, and other high-risk binaries, they added.</p>



<p>The core issue is that there&rsquo;s currently no check in place to verify that a STDIO command is intended to initialize an MCP server rather than perform a malicious task. Furthermore, the researchers observed that even if the sent command fails to start the server, the SDK returns an error after the command has already been executed.</p>



<p>All modern IDEs such as VS Code, Cursor, and Windsurf, as well as agentic coding CLIs like Claude Code, OpenAI Codex, and Gemini CLI, have built-in support for local MCP servers over STDIO. But so do countless other agentic AI frameworks and open-source tools and few of them implement STDIO command allow lists.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="rce-in-real-world-applications">RCE in real-world applications</h2>



<p>The OX Security researchers have spent the past few months testing MCP support in numerous tools, including live production services. <a href="https://www.ox.security/blog/mcp-supply-chain-advisory-rce-vulnerabilities-across-the-ai-ecosystem/">They found and reported more than 30 RCE issues</a> stemming from this STDIO design decision to multiple projects and 10 have received CVE IDs so far.</p>



<p>Depending on how a tool implements MCP support and how it accepts user input, there are multiple attack vectors that exploit the lack of STDIO command filtering.</p>



<p>For example, some services and tools have not disabled STDIO internally even though their user interfaces only allow configuring MCP servers with Streamable HTTP. This was the case for Letta AI and DocsGPT, two platforms that enable companies to create AI agents via both cloud services and local deployments.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;An attacker crafting a network request for an MCP server configuration, and changing the transport type in the configured JSON to contain an STDIO type instead of SSE or HTTP, also adding an arbitrary command to the request&rsquo;s payload, can achieve remote command execution,&rdquo; the researchers said.</p>



<p>Another attack vector is prompt injection leading to malicious MCP configurations. While all IDEs are technically vulnerable to this &mdash; websites may contain hidden instructions for LLM agents to modify local files &mdash; most IDEs prompt users before making modifications to MCP configuration files. The exception was Windsurf, which directly modified the MCP config by default, resulting in a zero-interaction command injection attack.</p>



<p>Many other tools don&rsquo;t apply filtering to MCP STDIO parameters, meaning any user with access to configure an MCP server gains code execution on the underlying server, including production servers in the case of SaaS deployments. Tools found vulnerable to this include LangFlow, GPT Researcher, LiteLLM, Agent Zero, LangBot, Fay Digital Human Framework, Bisheng, Jaaz, Langchain-Chatchat, and several others the researchers are not yet able to disclose.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Some developers were aware of the issue and did attempt to harden their implementations with command whitelisting. However, the hardening was insufficient, and the OX Security researchers found simple bypasses.</p>



<p>For example, Upsonic, an open-source framework for building AI agents, implements an allowlist that includes npx, which supports -c (&mdash;call), a flag that allows custom commands and shell scripts to be passed for npx to execute. The same bypass was observed in Flowise, another UI-based AI agent building framework that also restricts MCP configuration commands but allows npx.</p>



<p>Anthropic (modelcontextprotocol), LangChain (langchain-mcp-adapters), FastMCP, the browser-use project, AWS (run-model-context-protocol-servers-with-aws-lambda), NVIDIA (NeMo-Agent-Toolkit), OpenHands, PromptFoo, Firebase Studio, Gemini CLI, Claude Code, GitHub Copilot, and Cursor technically include the MCP STDIO code that allows for arbitrary command execution.</p>
</div>
							</div>
							</div>
							
							
</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[AI agent building tools enable users to configure Model Context Protocol (MCP) servers may be exposing systems to remote code execution due to an architectural decision in Anthropic’s reference implementation. At issue are unsafe defaults in how MCP configuration...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/rce-by-design-mcp-architectural-choice-haunts-ai-agent-ecosystem-3774.html</guid>
                <pubDate>Fri, 17 Apr 2026 02:00:18 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159889-0-73230200-1776377874-alexas_fotos-halloween-1746354.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Cisco Systems issues three advisories for critical vulnerabilities in Webex, ISE</title>
                <link>https://www.scamalert24.co.za/cisco-systems-issues-three-advisories-for-critical-vulnerabilities-in-webex-ise-3773.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				The cloud-based Webex service has already been patched, but admins must replace an identity provider certificate in Webex Control Hub to complete the fix.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Admins who use Cisco Webex Services configured to use trust anchors within the SSO integration with Control Hub must install a new identity provider certificate to close a critical vulnerability, or risk losing access control.</p>



<p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL" target="_blank" rel="noreferrer noopener">Cisco said in an advisory this week</a> that admins must upload a new identity provider (IdP) SAML certificate to Webex Control Hub, the web-based management portal where IT administrators can control all Cisco Webex services, including certificate management, meetings, messaging and calling. Failure to close this hole will allow an unauthenticated, remote attacker to impersonate any user within the service.</p>



<p>The vulnerability, CVE-2026-20184, carries a CVSS score of 9.8.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Because Webex is a cloud service, Cisco can, and has, patched its side of the application. But admins using single-sign on (SSO) still need to install the new certificate. There are no workarounds.</p>

		

			


<p><a href="https://help.webex.com/en-us/article/nstvmyo/Manage-single-sign-on-integration-in-Control-Hub#task_394598AFBCD3D73A488E6DBB99AD3214" target="_blank" rel="noreferrer noopener">A Webex support article on managing SSO integration</a> says that information about certificates is found in the Webex Control Hub Alerts center, where customers can view which ones are installed, and their status. The Control Hub also contains an SSO wizard to aid in updating certificates. The article contains step-by-step details on the process.</p>



<p>Asked for comment, and for more details about the vulnerability, a Cisco spokesperson didn&rsquo;t go beyond the advisory.&nbsp;&ldquo;Cisco published a security advisory disclosing a vulnerability in the integration of single sign-on with Control Hub in Cisco Webex Services,&rdquo; the spokesperson said. &ldquo;At the time of publication (April 15) Cisco had addressed the vulnerability, and was not aware of any malicious use of this vulnerability. Affected customers must update their SAML certificate to ensure uninterrupted services.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Gartner analyst <a href="https://www.gartner.com/en/experts/peter-firstbrook" target="_blank" rel="noreferrer noopener">Peter Firstbrook</a> noted in an email that, since Cisco has applied the patch to the cloud service, this is more of a configuration change.&nbsp;But that doesn&rsquo;t minimize the possible damage. &ldquo;While we are not aware of exploits using this vulnerability, users can lose SSO access to Webex without this change,&rdquo; he said.&nbsp;</p>



<p>&ldquo;This does illustrate a bigger trend that identity and access management is the corporate perimeter,&rdquo; he added, &ldquo;and the majority of attacks include an identity and access management component.&nbsp;CISOs must increase their focus on IAM hygiene, particularly as agentic computing is accelerating.&rdquo;&nbsp;</p>



<p><a href="https://www.csoonline.com/identity-and-access-management/" target="_blank">Identity and access management</a> is, of course, the keystone of cybersecurity. As Crowdstrike observed in its<a href="https://go.crowdstrike.com/2026-global-threat-report.html" target="_blank" rel="noreferrer noopener"> 2026 Global Threat Report</a>, abuse of valid accounts accounted for 35% of cloud incidents it investigated last year, &ldquo;reinforcing that identity has become central to intrusion.&rdquo; Single sign-on allows a user to authenticate to multiple applications through one set of credentials. It&rsquo;s efficient, and, of more importance to a CSO, strengthens security.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="additional-critical-fixes">Additional critical fixes</h2>



<p>The Webex flaw is one of three critical vulnerabilities Cisco identified and issued patches for this week. In addition, multiple vulnerabilities have to be patched in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC). </p>



<p>These holes (<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ" target="_blank" rel="noreferrer noopener">CVE-2026-20147 and CVE-2026-20148</a>, which carry CVSS scores of 9.9), could allow an authenticated, remote attacker to perform remote code execution or conduct path traversal attacks on an affected device. To exploit these vulnerabilities, the attacker must have valid administrative credentials, and send a crafted HTTP request to an affected device. There are no workarounds.</p>



<p>Separately, two more vulnerabilities were found in ISE that could lead to remote code execution on the underlying operating system of an affected device. To exploit these vulnerabilities (<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv" target="_blank" rel="noreferrer noopener">CVE-2026-20180 and CVE-2026-20186</a>), the attacker would only need Read Only Admin credentials.</p>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Admins who use Cisco Webex Services configured to use trust anchors within the SSO integration with Control Hub must install a new identity provider certificate to close a critical vulnerability, or risk losing access control. Cisco said in an...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/cisco-systems-issues-three-advisories-for-critical-vulnerabilities-in-webex-ise-3773.html</guid>
                <pubDate>Fri, 17 Apr 2026 02:00:18 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159827-0-76612000-1776378601-shutterstock_180216653.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>NIST cuts down CVE analysis amid vulnerability overload</title>
                <link>https://www.scamalert24.co.za/nist-cuts-down-cve-analysis-amid-vulnerability-overload-3772.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				The agency will only add enrichment details to CVEs in limited cases going forward, prioritizing known exploited flaws and vaguely defined &lsquo;critical software.&rsquo;			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Overwhelmed by an escalating volume of security flaws, the National Institute of Standards and Technology (NIST) has announced significant changes to how it handles cybersecurity vulnerabilities and exposures (CVEs).</p>



<p>Rather than commit to providing enrichment for all entries in its National Vulnerability Database (NVD), the agency will <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">focus on just the most critical CVEs</a>, which will &ldquo;allow us to stabilize the program while we develop the automated systems and workflow enhancements required for long-term sustainability.&rdquo;</p>



<p>Starting immediately, NIST will focus on CVEs appearing in <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA&rsquo;s Known Exploited Vulnerabilities (KEV) catalog</a>. &ldquo;Our goal is to enrich these within one business day of receipt,&rdquo; the agency said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Other high-priority CVEs will also include those for software used in the federal government and <a href="https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/critical-software-definition-explanatory">for other critical software</a>.</p>

		

			


<p>All the other CVEs will still be added to the NVD, but will be categorized as &ldquo;not scheduled,&rdquo; meaning that NIST will no longer prioritize their enrichment.</p>



<h2 id="broken-by-backlog">Broken by backlog</h2>



<p>According to NIST, a backlog of CVEs <a href="https://www.csoonline.com/article/2106228/backlogs-at-national-vulnerability-database-prompt-action-from-nist-and-cisa.html">started to accumulate in early 2024</a>, and the agency has been unable to clear it due to increasing submissions.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Submissions grew by 263% between 2020 and 2025, according to the agency, with nearly one-third more vulnerabilities reported in Q1 2026 than the same time last year.</p>



<p>The agency, which enriched nearly 42,000 CVEs in 2025, 45% more than any previous year, now faces a total backlog of more than 30,000 CVEs, said Harold Booth, a technical and program lead at NIST, at <a href="https://www.first.org/resources/papers/vulncon26/TLPCLEAR-NIST-s-National-Vulnerability-Database-Update-and-the-Vulnerability-Enrichment-Ecosystem/index">this week&rsquo;s VulnCon cybersecurity conference</a>.</p>


<div><figure><img decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2026/04/Total-CVEs-Published.png?w=1024" alt="Total CVE records published" width="1024" height="641" sizes=" 1024px) 100vw, 1024px" loading="lazy"><p>SOURCE: https://www.cve.org/about/Metrics</p>
</figure><p>CSO</p></div>



<p>As a result, NIST will now forego enrichment for all but the most critical of vulnerabilities.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Backlogged CVEs received prior to March 1 will also be labeled &ldquo;not scheduled.&rdquo; None of those are critical vulnerabilities, NIST said, because those have always been handled first.</p>



<p>&ldquo;They&rsquo;ve just come out and publicly stated, &lsquo;We are never going to get through this backlog,&rsquo;&ldquo; Dustin Childs, head of threat awareness at Trend Micro&rsquo;s Zero Day Initiative, told CSO.</p>



<p>In addition, NIST will no longer calculate severity scores for CVEs submitted with scores provided by the reporting organization.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Security leaders reliant on NIST enrichment will need to take stock of their technology inventories to see whether they fall under NIST&rsquo;s priority list, Childs said. That&rsquo;s not easy.</p>



<p>&ldquo;Discovery is one of the most difficult problems we&rsquo;re dealing with,&rdquo; he noted, adding that it&rsquo;s also not clear what software actually falls into the priority category. &ldquo;Software used by the federal government is a very vague statement.&rdquo;</p>



<h2 id="mounting-cve-counts-with-ai-flaw-discovery-on-the-rise">Mounting CVE counts &mdash; with AI flaw discovery on the rise</h2>



<p>Childs is not surprised that CVEs numbers have been going up, citing AI as part of the reason why.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;We&rsquo;re already seeing more garbage CVEs &mdash; and more real CVEs &mdash; related to AIs,&rdquo; he says.</p>



<p>Dealing with these CVEs is going to be a massive problem for companies. &ldquo;People still don&rsquo;t patch,&rdquo; he says. &ldquo;And we&rsquo;re going to quadruple the number of patches they&rsquo;re going to have to deploy. How do we build our defenses across the entire enterprise? I don&rsquo;t know if we&rsquo;ll get there before the bad guys do.&rdquo;</p>



<p>According to the Forum of Incident Response and Security Teams (FIRST), 59,427 CVEs are expected to be submitted this year, up from a little over 48,000 in 2025. That makes 2026 the first year that CVEs will pass the 50,000 milestone.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The sheer velocity of vulnerability discovery and exploitation is unlike anything we&rsquo;ve seen before,&rdquo; FIRST CEO Chris Gibson told CSO.</p>



<p>FIRST has also modeled &ldquo;realistic scenarios&rdquo; in which the <a href="https://www.first.org/blog/20260211-vulnerability-forecast-2026">total number of CVEs cracks 100,000 for 2026</a> &mdash; but <a href="https://www.csoonline.com/article/4130453/cisos-must-separate-signal-from-noise-as-cve-volume-soars.html">that was in February</a>, before Anthropic announced Mythos, its vulnerability-finding AI model many foresee as a <a href="https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html">structural shift for the cybersecurity industry</a>.</p>



<p>&ldquo;And if it&rsquo;s not Mythos, or whatever else is coming out now, something is going to come out next week,&rdquo; said Empirical Security founder Jay Jacobs, who also leads the Exploit Prediction Scoring System special interest group at FIRST.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Still, Jacobs is optimistic that turning to technology will help NIST deal with rising CVE volumes.</p>



<p>&ldquo;Harold Booth has a lot of experience and skill working with AI over the last few years,&rdquo; Jacobs told CSO. &ldquo;So I&rsquo;m expecting him to bring some expertise and I hope we do see some AI news there.&rdquo;</p>



<p>Both large language models and AI agents are on the agency&rsquo;s to-do list, as is old-fashioned robotic process automation (RPA), Booth said in his presentation at VulnCon, which Jacobs chairs. NIST also plans to delegate some of the work to CVE Numbering Authorities (CNAs), which includes security vendors and researchers.</p>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Overwhelmed by an escalating volume of security flaws, the National Institute of Standards and Technology (NIST) has announced significant changes to how it handles cybersecurity vulnerabilities and exposures (CVEs). Rather than commit to providing enrichment for all entries in...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/nist-cuts-down-cve-analysis-amid-vulnerability-overload-3772.html</guid>
                <pubDate>Fri, 17 Apr 2026 01:00:33 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159882-0-23374500-1776376704-shutterstock_2443662393.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>North Korea Uses ClickFix to Target macOS Users&apos; Data</title>
                <link>https://www.scamalert24.co.za/north-korea-uses-clickfix-to-target-macos-users-data-3771.html</link>
                                <content:encoded><![CDATA[Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.]]></content:encoded>
                                <description><![CDATA[Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/north-korea-uses-clickfix-to-target-macos-users-data-3771.html</guid>
                <pubDate>Fri, 17 Apr 2026 00:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5cc61f368315b744/69e10ffdc8863fd06c049539/Mac_Mouse_Click_Edwin_Remsberg_Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>&apos;Harmless&apos; Global Adware Transforms Into an AV Killer</title>
                <link>https://www.scamalert24.co.za/harmless-global-adware-transforms-into-an-av-killer-3770.html</link>
                                <content:encoded><![CDATA[A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.]]></content:encoded>
                                <description><![CDATA[A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/harmless-global-adware-transforms-into-an-av-killer-3770.html</guid>
                <pubDate>Thu, 16 Apr 2026 23:00:06 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltcc23cf58a0283b13/69e0fbb3eb41a9b573b1d155/Adware-Artem_Medvediev-Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic</title>
                <link>https://www.scamalert24.co.za/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic-3769.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Botnet / Cryptomining</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1/s1700-e365/powmix.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1/s1700-e365/powmix.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet&nbsp;dubbed <strong>PowMix</strong> since at least December&nbsp;2025.</p>
<p>"PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos researcher Chetan Raghuprasad <a href="https://blog.talosintelligence.com/powmix-botnet-targets-czech-workforce/">said</a> in a report published&nbsp;today.</p>
<p>"PowMix embeds the encrypted heartbeat data along with unique identifiers of the victim machine into the C2 URL paths, mimicking legitimate REST API URLs.&nbsp;PowMix has the capability&nbsp;to remotely update the new C2 domain to the botnet configuration file dynamically."</p>
<p>The attack chain begins with a malicious ZIP file, likely delivered via a phishing email, to activate a multi-stage infection chain that drops PowMix. Specifically, it involves a Windows Shortcut (LNK) that's used to launch a PowerShell loader, which then extracts the malware embedded within the archive, decrypts it, and runs it in&nbsp;memory.</p>
<div><p><a href="https://thehackernews.uk/ai-agentic-guide-d-3" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00/s728-e100/nudge-d-3.jpg" width="729" height="91"></a></p></div>
<p>The never-before-seen botnet is designed to facilitate remote access, reconnaissance, and remote code execution, while establishing persistence by means of a scheduled task. At&nbsp;the same time, it verifies the process tree to ensure that another instance of the same malware is not running on the compromised&nbsp;host.</p>
<p>PowMix's remote management logic allows it to process two different kinds of commands sent from the C2 server. Any&nbsp;non #-prefixed response causes PowMix to shift to arbitrary execution mode, and decrypt and run the obtained&nbsp;payload.&nbsp;</p>
<ul>
<li>#KILL, to initiate a self-deletion routine and wipe traces of all malicious artifacts</li>
<li>#HOST, to enable C2 migration to a new server URL.</li>
</ul>

<p>In parallel, it also opens a decoy document with compliance-themed lures as a distraction mechanism. The&nbsp;lure documents reference legitimate brands like Edeka and include compensation data and valid legislative references, potentially in an effort to enhance their credibility and trick recipients, like job aspirants.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX/s1700-e365/attack.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX/s1700-e365/attack.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="555" data-original-width="1000"></a></p>
<p>Talos said the campaign shares some level of tactical overlap with a campaign&nbsp;dubbed <a href="https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html">ZipLine</a> that was disclosed by Check Point in late August 2025 as targeting supply chain-critical manufacturing companies with an in-memory malware called&nbsp;MixShell.</p>
<p>This includes the use of the same ZIP-based payload delivery, scheduled task persistence, and the abuse of Heroku for C2. That&nbsp;said, no final payloads have been observed beyond the botnet malware itself, leaving questions about its exact motives unanswered.</p>
<p>"PowMix avoids persistent connections to the C2 server," Talos said. "Instead, it implements a jitter via the Get-Random PowerShell command to vary the beaconing intervals initially between 0 and 261 seconds, and subsequently between 1,075 and 1,450 seconds. This&nbsp;technique attempts to prevent detection of C2 traffic through predictable network signatures."</p>
<p>The disclosure comes as Bitsight sheds light on the infection chain associated with&nbsp;the <a href="https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html">RondoDox</a> botnet, highlighting the malware's evolving capabilities to illicitly mine cryptocurrency on infected systems using XMRig on top of the existing distributed denial-of-service (DDoS) attack functionality.</p>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>The findings paint the picture of an actively maintained malware that offers improved evasion, better resilience, aggressive competition removal, and an expanded feature&nbsp;set.</p>
<p>RondoDox is capable of exploiting over 170 known vulnerabilities in various internet-facing applications to obtain initial access and drop a shell script that performs basic anti-analysis and removes competing malware before dropping the appropriate botnet binary for the architecture.</p>
<p>The malware "does multiple checks and implements techniques to hinder analysis, which include the usage of nanomites, renaming/removing files, killing processes, and actively checking for debuggers during execution," Bitsight Principal Research Scientist Jo&atilde;o&nbsp;Godinho <a href="https://www.bitsight.com/blog/rondodox-botnet-malware-analysis">said</a>.</p>
<p>"The&nbsp;bot is able&nbsp;to run DoS&nbsp;attacks at the internet,&nbsp;transport and application layer, depending on the command and arguments issued by the&nbsp;C2."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic-3769.html</guid>
                <pubDate>Thu, 16 Apr 2026 22:00:09 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1/s1700-e365/powmix.jpg"/>
            </item>
                    <item>
                <title>APK Malformation Found in Thousands of Android Malware Samples</title>
                <link>https://www.scamalert24.co.za/apk-malformation-found-in-thousands-of-android-malware-samples-3768.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-46a9adc8-6455-43bb-8cc8-2437d288c0ea" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Android Package (APK) malformation has emerged as a standard Android malware evasion tactic, with the technique identified in more than 3000 malicious samples across families including Teabot, TrickMo,<a href="https://www.infosecurity-magazine.com/news/godfather-upgraded-hijack-mobile/" target="_blank"> Godfather</a> and SpyNote.</p>

<p>According to new<a href="https://www.cleafy.com/cleafy-labs/malformed-apks-as-an-anti-analysis-technique-malfixer-tool" target="_blank"> research</a> from Cleafy's Threat Intelligence and Incident Response team, the APK malformation involves the deliberate creation of broken or non-standard APK&nbsp;structures that still install and run on devices but cause static analysis tools to crash or misinterpret the file.</p>

<p>The researchers said attackers are exploiting the leniency of an Android installer that tolerates inconsistencies strict parsers cannot, allowing malicious apps to function normally while frustrating reverse engineering efforts.</p>

<h2><strong>How APK Malformation Bypasses Static Analysis</strong></h2>

<p>An APK is essentially a ZIP archive containing the code, resources and manifest required to run an Android app.</p>

<p>Each file inside the archive sits behind a Local File Header, and a Central Directory near the end of the package acts as a table of contents. Attackers introduce conflicts between those two structures. Tools such as JADX crash on the inconsistency, while the Android installer quietly proceeds with the app.</p>

<p>In their analysis, the researchers cataloged several techniques currently in active use:</p>

<ul>
	<li>
	<p>Directory-file name collisions that confuse parsers about which entry to load</p>
	</li>
	<li>
	<p>Unsupported compression methods that Android safely treats as uncompressed, but cause analysis tools to fail</p>
	</li>
	<li>
	<p>False password protection flags placed inconsistently across headers</p>
	</li>
	<li>
	<p>Mismatched checksums, file sizes and offset references between header structures</p>
	</li>
	<li>
	<p>AndroidManifest.xml corruption through magic header changes, string pool manipulation and malicious offset injection</p>
	</li>
</ul>

<p><em><a href="https://www.infosecurity-magazine.com/news/android-malware-uses-net-maui/" target="_blank">Read more on Android malware evasion: New Android Malware Uses .NET MAUI to Evade Detection</a></em></p>

<p>Another method abuses the assets/directory by storing payloads under filenames containing non-ASCII or control characters, triggering path traversal errors during decompilation. Researchers said the technique forces analysts to manually extract and inspect archive contents.</p>

<h2><strong>Defenders Push Back With Open-Source Tooling</strong></h2>

<p>In response, the Cleafy team has released Malfixer, a Python utility that detects and repairs malformed APKs and rebuilds them into a form conventional reverse engineering tools can parse.</p>

<p>The project,<a href="https://github.com/Cleafy/Malfixer" target="_blank"> published on GitHub</a>, was developed after the analysis of more than 70 malformed samples drawn primarily from the TrickMo, Teabot, Godfather and SpyNote families.</p>

<p>The release reflects a wider arms race between Android malware developers and analysts. Cleafy noted that earlier incidents had failed to classify samples later linked to TrickMo precisely because malformation techniques prevented standard static analysis from processing the file.</p>

<p>"As defenders, we must evolve our tools and techniques to counter these evasive tactics," the researchers wrote, urging the community to contribute new samples and malformation methods as they emerge in the wild.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[APK malformation tactic now appears in over 3000 Android malware samples evading static analysis]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/apk-malformation-found-in-thousands-of-android-malware-samples-3768.html</guid>
                <pubDate>Thu, 16 Apr 2026 20:00:13 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/75249b38-75a3-4ad4-9c03-dc8b80cb13c0.jpg"/>
            </item>
                    <item>
                <title>US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea</title>
                <link>https://www.scamalert24.co.za/us-nationals-jailed-for-operating-fake-remote-worker-laptop-farms-for-north-korea-3767.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-2b0eacd4-88de-4f11-86a7-79047d6333e2" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Two US nationals have been imprisoned for their role in helping to facilitate laptop farms for North Korean remote IT worker scams on behalf of Pyongyang.</p>

<p>On April 15, the US Justice Department, announced that Kejia Wang, 42, and Zhenxing Wang, 39, had been sentenced for their part in a scheme which, over several years, deceived more than one hundred American companies into <a href="https://www.infosecurity-magazine.com/interviews/nk-it-worker-scam-sophos-ciso/">employing North Korean workers posing as US residents</a>.</p>

<p>The scheme used the stolen identities of at least 80 American citizens to generate more than $5m in illicit revenue for the government of the Democratic People&rsquo;s Republic of Korea (DPRK). The activity also allowed the perpetrators to access and steal sensitive data and source code from firms including from military contractors and AI companies.</p>

<p>Kejia Wang, of Edison, New Jersey, was sentenced to 108 months in prison, while Zhenxing Wang, of New Brunswick, New Jersey, was sentenced to 92 months in prison. Both had pleaded guilty to charges of conspiracy to commit wire fraud and conspiracy to commit money laundering. Zhenxing Wang&nbsp;also pleaded guilty to conspiracy to commit identity theft.</p>

<h2><strong>Fortune 500 Companies Fell Victim</strong></h2>

<p>According to the released court documents, the stolen identities were used to apply for and obtain remote IT worker roles at more than 100 organizations, including several Fortune 500 companies.</p>

<p>Keija Wang is said to have acted as manager of the scheme within the US, supervising at least five individuals involved in working in fake roles.</p>

<p>Both Kejia Wang and Zhenxing Wang used their home addresses to receive laptops which were intended for use by who the companies believed were the legitimate remote workers they had hired</p>

<p>In addition, both individuals provided overseas IT workers in North Korea remote access to the laptops.</p>

<p><a href="https://www.infosecurityeurope.com/en-gb/blog/threat-vectors/how-to-protect-business-from-north-korean-it-workers.html"><em>Read more: </em><em>How to Protect Your Business From North Korean IT Worker Scams</em></a></p>







<p>To hide the scheme, shell companies with corresponding financial accounts were created. This helped to make it appear as though the overseas IT workers were affiliated with legitimate US businesses.</p>

<p>This allowed Kejia Wang and Zhenxing Wang to receive hundreds of millions of dollars from legitimate US businesses who believed they were transferring the salaries of remote workers. Much of this money was laundered and sent to North Korea.</p>

<p>&ldquo;Today&rsquo;s announcement sends a clear message: US nationals who facilitate DPRK IT worker schemes and funnel revenue to North Korea will face FBI investigation and potential prison time,&rdquo; said Assistant Director Brett Leatherman of the FBI&rsquo;s Cyber Division.</p>

<p>&ldquo;Working closely with our partners, the FBI will pursue their co-conspirators and hold accountable those who seek to empower the DPRK by defrauding American companies and stealing the identities of private citizens.&rdquo;</p>

<p>Eight other individuals who have been indicated for their part in the scheme remain at large and wanted by the FBI.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/us-nationals-jailed-for-operating-fake-remote-worker-laptop-farms-for-north-korea-3767.html</guid>
                <pubDate>Thu, 16 Apr 2026 20:00:13 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/d0efbe60-5ffb-4798-afe7-e7b8d0c0fd29.jpg"/>
            </item>
                    <item>
                <title>Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack</title>
                <link>https://www.scamalert24.co.za/cookeville-medical-center-notifies-patients-after-july-2025-ransomware-attack-3766.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-b3f148b5-1188-4d14-9aad-6d28c6701c3b" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>More than 337,000 patients of Cookeville Regional Medical Center (CRMC) in Tennessee have been notified that their personal and medical data was compromised in a July 2025 ransomware attack, the hospital confirmed this week.</p>

<p>The 309-bed facility began mailing breach notification letters on April 14, 2026, roughly nine months after the intrusion was detected.</p>

<p>Files were accessed or acquired by an unathorized party between July 11 and July 14, 2025, according to a<a href="https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/fb04ea66-92bb-4a15-b02c-8d1a9f783461.html" target="_blank"> filing</a> with the Maine Attorney General's Office. A total of&nbsp;337,917 individuals have been affected.&nbsp;</p>

<h2><strong>Inside the Rhysida Attack on CRMC</strong></h2>

<p>Rhysida, a ransomware-as-a-service operation linked to Russia and<a href="https://www.infosecurity-magazine.com/news/rhysida-vice-society-connection/" target="_blank"> active since May 2023</a>, claimed responsibility on August 2, 2025. The gang demanded a ransom of 10 Bitcoin, worth roughly $1.15m at the time, and posted sample files on its dark web leak site. It is unclear whether any ransom was paid.</p>

<p>Information accessed may include names, addresses, dates of birth, Social Security numbers, driver's license numbers, financial account details, medical record numbers, treatment information and health insurance data.</p>

<p>CRMC, which serves around 250,000 patients annually across 14 counties in the Upper Cumberland region, is offering 12 months of free identity theft protection through Experian.</p>

<p><em><a href="https://www.infosecurity-magazine.com/news/rhysida-vice-society-connection/" target="_blank">Read more on Rhysida's healthcare targeting: Rhysida Ransomware Analysis Reveals Vice Society Connection</a></em></p>

<h2><strong>A Year of Pressure on US Healthcare</strong></h2>

<p>The CRMC incident ranks as the eighth-largest US healthcare ransomware breach of 2025 by records compromised, according to<a href="https://www.comparitech.com/news/cookeville-regional-medical-center-warns-338000-people-of-data-breach/" target="_blank"> Comparitech</a>, which logged 134 confirmed attacks on US healthcare providers last year, exposing 11.7 million records.</p>

<p>Rhysida alone claimed 91 attacks across all sectors in 2025, with 23 confirmed and an average demand of $1.2m.</p>

<p>Other recent Rhysida healthcare victims include:</p>

<ul>
	<li>Florida Lung, Asthma &amp; Sleep Specialists (FL), May 2025, $639,000 demand</li>
	<li>MedStar Health (MD), September 2025, $3.09m demand</li>
	<li>Spindletop Center (TX), September 2025, $1.65m demand</li>
	<li>MACT Health Board (CA), November 2025, $662,000 demand</li>
	<li>Heart South Cardiovascular Group (AL), November 2025, $630,000 demand</li>
</ul>

<p>Rebecca Moody, head of data research at Comparitech, said the lengthy investigation timeline reflects the scale of forensic work required after a hospital ransomware hit.</p>

<p>"It can take a considerable amount of time for organizations to investigate what data has been impacted in these breaches," Moody explained.</p>

<p>"While some organizations avoid using the word 'ransomware' and don't issue any form of data breach notification for months," she added, "this lack of clarity and confirmation can leave those affected open to identity theft and phishing campaigns."</p>

<p>Ransomware incidents at US hospitals routinely<a href="https://www.infosecurity-magazine.com/news/university-mississippi-medical/" target="_blank"> force extended downtime</a>,<a href="https://www.infosecurity-magazine.com/news/london-ransomware1500-cancelled/" target="_blank"> canceled appointments</a> and<a href="https://www.infosecurity-magazine.com/news/ransomware-forces-umc-divert/" target="_blank"> patient diversions</a> even where clinical systems hold up. CRMC said it has put additional security measures in place since the attack.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/cookeville-medical-center-notifies-patients-after-july-2025-ransomware-attack-3766.html</guid>
                <pubDate>Thu, 16 Apr 2026 19:00:18 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/46006bb6-86c0-4c55-bdb2-a6eac22f3646.jpg"/>
            </item>
                    <item>
                <title>Microsoft&apos;s Original Windows Secure Boot Certificate Is Expiring</title>
                <link>https://www.scamalert24.co.za/microsoft-s-original-windows-secure-boot-certificate-is-expiring-3765.html</link>
                                <content:encoded><![CDATA[The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.]]></content:encoded>
                                <description><![CDATA[The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/microsoft-s-original-windows-secure-boot-certificate-is-expiring-3765.html</guid>
                <pubDate>Thu, 16 Apr 2026 19:00:07 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltcf80cca68990f44f/67db1175b6f1566998db1a71/laptop_windows_desktop_Wachiwit_Alamy.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>Two-Factor Authentication Breaks Free from the Desktop</title>
                <link>https://www.scamalert24.co.za/two-factor-authentication-breaks-free-from-the-desktop-3764.html</link>
                                <content:encoded><![CDATA[Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.]]></content:encoded>
                                <description><![CDATA[Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/two-factor-authentication-breaks-free-from-the-desktop-3764.html</guid>
                <pubDate>Thu, 16 Apr 2026 19:00:07 +0300</pubDate>
                <media:thumbnail url="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltda93213c910e1221/69dfbf29f06161c424ab3b28/R5PNG0.jpg?width=1280&amp;auto=webp&amp;quality=80&amp;disable=upscale"/>
            </item>
                    <item>
                <title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</title>
                <link>https://www.scamalert24.co.za/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories-3763.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Hacking News / Cybersecurity News</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1700-e365/bull-main.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1700-e365/bull-main.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>

<p>You&nbsp;know that feeling when you open your feed on a Thursday morning and it's just... a&nbsp;lot? Yeah. This&nbsp;week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow still ruining people's days, and enough supply chain drama to fill a season of television nobody asked&nbsp;for.</p>
<p>Not&nbsp;all bad though. Some&nbsp;threat actors got exposed with receipts, a few platforms finally tightened things up, and there's research in here that's genuinely worth your time. Grab&nbsp;your coffee and keep scrolling.</p>


<div>

<ol role="list">

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Targeted wallet breach</span></p>
    <p>
      Cryptocurrency wallet service Zerion has <a href="https://x.com/zerion/status/2044167535231414727">disclosed</a> that one of its team member's devices was compromised, resulting in the theft of approximately $100K in stolen funds from internal company hot wallets. The company noted that user funds, Zerion apps, or infrastructure were not impacted by the breach. The team member is said to have been the target of an artificial intelligence (AI)-enabled social engineering attack carried by a North Korean threat actor tracked as <a href="https://thehackernews.com/2026/04/n-korean-hackers-spread-1700-malicious.html">UNC1069</a>. The hacking group was recently attributed to the poisoning of the popular Axios npm package. "This allowed the attacker to gain access to some of the team members' logged-in sessions and credentials as well as private keys to company hot wallets used for testing and internal purposes," Zerion said. "This was not an opportunistic attack. The actor is clearly sophisticated and well-resourced. They planned the attack thoroughly."
    </p>
  </div>
</li>
  
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Anonymous age checks</span></p>
    <p>
      The European Union has announced that it will soon roll out a new online age verification app to allow users to prove their age when accessing online platforms. Users can set it up by downloading the app on their Android or iOS device using a passport or ID card. The Commission has emphasized that the app will respect users' privacy. "Users will prove their age without revealing any other personal information," President of the European Commission, Ursula von der Leyen, <a href="https://ec.europa.eu/commission/presscorner/detail/en/statement_26_817">said</a>. "Put simply, it is completely anonymous: users cannot be tracked. Third, the app works on any device &ndash; phone, tablet, computer, you name it. And, finally, it is fully open source &ndash; everyone can check the code." The development comes as countries around the world are undertaking various stages of regulatory action to keep cyberspace a safer place for children and minors and protect them from serious harm.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>New Defender zero-day</span></p>
    <p>
      A researcher using the alias "Chaotic Eclipse" released a zero-day exploit called <a href="https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html">BlueHammer</a> earlier this month following Microsoft's handling of the vulnerability disclosure process. Although the issue appears to have been fixed as of this month's Patch Tuesday release (CVE-2026-33825), the researcher has since <a href="https://x.com/ChaoticEclipse0/status/2044550275692642782">disclosed</a> a new unpatched <a href="https://deadeclipse666.blogspot.com/2026/04/public-disclosure-response-for-cve-2026.html">Microsoft Defender privilege escalation vulnerability</a>. The exploit has been codenamed <a href="https://github.com/Nightmare-Eclipse/RedSun">RedSun</a>. "This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled," security researcher Will Dormann <a href="https://infosec.exchange/@wdormann/116412019416916182">said</a>.
    </p>
  </div>
</li>
<a name="more"></a>
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Legacy Excel RCE active</span></p>
    <p>
      The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has <a href="https://www.cisa.gov/news-events/alerts/2026/04/14/cisa-adds-two-known-exploited-vulnerabilities-catalog">added</a> an old remote code execution vulnerability impacting Microsoft Office to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the shortcoming by April 28, 2026. The vulnerability in question is CVE-2009-0238, which has a CVSS score of 8.8. "Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object," CISA <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">said</a>.
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>sudo now requires password</span></p>
    <p>
      Raspberry Pi has released version 6.2 of its Raspberry Pi OS, which introduces one significant change: it disables passwordless sudo by default. As a result, users who run a sudo command for administrator-level access will be prompted to enter the current user's password. The change affects only new installations; existing setups are untouched. "Given the ever-increasing threat of cybercrime, we continually review the security of Raspberry Pi OS to ensure it is sufficiently robust to withstand potential attacks," Raspberry Pi <a href="https://www.raspberrypi.com/news/a-security-update-for-raspberry-pi-os/">said</a>. "This is always a tricky balance, as anything that makes the operating system more secure will invariably inconvenience legitimate users to some extent, so we try to keep such changes to a minimum. This particular security update is one that many users may not even notice, but it will affect some."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Stealth C2 frameworks uncovered</span></p>
    <p>
      A previously undocumented command-and-control (C2) framework dubbed ObsidianStrike has been deployed on infrastructure belonging to a Brazilian law firm. "Only two instances of ObsidianStrike exist on the entire internet," Breakglass Intelligence <a href="https://intel.breakglass.tech/post/obsidianstrike-c2-compromised-brazilian-law-firm-9-months">said</a>. "The framework has zero presence on GitHub, zero samples on VirusTotal or MalwareBazaar, and near-zero vendor detection. This is a fully private, Portuguese-language C2 built for targeted Windows operations, hidden behind a victim organization's domain." Also discovered by the security vendor is <a href="https://intel.breakglass.tech/post/archangelc2-innocreed-screenconnect-fraud">ArchangelC2</a>, a C2 panel behind an industrial-scale ScreenConnect remote-access fraud campaign that has been operational since November 2024.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Fake app drains $9.5M</span></p>
    <p>
      A fake Ledger app <a href="https://www.coindesk.com/business/2026/04/14/a-fake-ledger-app-on-the-apple-app-store-just-drained-usd9-5-million-in-crypto">managed</a> to slip onto the Apple App Store, <a href="https://t.me/investigations/313">draining $9.5 million in cryptocurrency</a> from more than 50 victims between April 7 and April 13, 2026. The app, named <a href="https://archive.ph/4RVLf">Ledger Live</a>, was released by a developer, "SAS Software Company," and published under "Leva Heal Limited." Users who downloaded the fraudulent app were tricked into entering their seed phrases, giving attackers full access to their wallets and allowing them to send digital assets to external addresses under their control. While Apple has since removed the macOS app from the store, questions remain as to how it managed to pass the company's review process. In more Apple-related news, the company has also <a href="https://techcrunch.com/2026/04/14/how-the-rewards-app-freecash-scammed-its-way-to-the-top-of-the-app-stores/">removed</a> a data harvesting app called Freecash from its App Store after it was <a href="https://www.wired.com/story/no-the-freecash-app-wont-pay-you-to-scroll-tiktok/">deceptively</a><a href="https://www.malwarebytes.com/blog/news/2026/01/get-paid-to-scroll-tiktok-the-data-trade-behind-freecash-ads">advertised</a> as a way to "make money just by scrolling TikTok," while collecting sensitive information from users. This included details about a user's race, religion, sex life, sexual orientation, health, and other biometrics. Once installed, however, instead of the promised functionality, users were routed to a roster of mobile games where they are offered cash rewards for completing time-limited in-game challenges. The app continues to be available on the Google Play Store.
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Localized ransomware campaign</span></p>
    <p>
      Cybercriminals are using a new ransomware strain called JanaWare to target people in Turkey, according to Acronis. The attack leverages phishing emails containing a Google Drive link that paves the way for the download and subsequent execution of a malicious JAR file via javaw.exe. The payload is a customized <a href="https://thehackernews.com/2024/06/warning-new-adware-campaign-targets.html">Adwind</a> (aka AlienSpy, jRAT, or Sockrat) variant with polymorphic characteristics that's used to deliver the ransomware module. The malware implements geofencing and environment filtering to ensure that the compromised systems match the Turkish language and region. While none of these tricks are particularly novel or advanced, they continue to work against unprotected small targets. It's unclear how many people or businesses might have fallen prey to the scheme. The low-stakes, localized approach has allowed the campaign to persist since at least 2020 without any major disruption. "Victimology appears to primarily include home users and small to medium-sized businesses. Initial access is assessed to occur via phishing emails delivering malicious Java archives," the company <a href="https://www.acronis.com/en/tru/posts/new-janaware-ransomware-targets-turkey-via-adwind-rat/">said</a>. "Ransom demands observed in analyzed samples range from $200&ndash;$400, consistent with a low-value, high-volume monetization approach."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Crackdown on navigation abuse</span></p>
    <p>
      Google said it's introducing a new spam policy for "back button hijacking," which occurs when a site interferes with a user's browser navigation and prevents them from using their back button to immediately get back to the page they came from. Instead, the hijack could redirect users to sketchy sites or other pages they have never visited before. "Back button hijacking interferes with the browser's functionality, breaks the expected user journey, and results in user frustration," Google <a href="https://developers.google.com/search/blog/2026/04/back-button-hijacking">said</a>. "Pages that are engaging in back button hijacking may be subject to manual spam actions or automated demotions, which can impact the site's performance in Google Search results. To give site owners time to make any needed changes, we're publishing this policy two months in advance of enforcement on June 15, 2026."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Stealth cloud credential theft</span></p>
    <p>
      The China-linked hacking group known as <a href="https://thehackernews.com/2025/09/china-linked-apt41-hackers-target-us.html">APT41</a> has been attributed to an undetectable, purpose-built ELF backdoor targeting Linux cloud workloads across Amazon Web Services (AWS), Google Cloud, Microsoft Azure, and Alibaba Cloud environments. "The implant uses SMTP port 25 as a covert command-and-control channel, harvests cloud provider credentials and metadata, and phones home to three Alibaba-themed typosquat domains hosted on Alibaba Cloud infrastructure in Singapore," Breakglass Intelligence <a href="https://intel.breakglass.tech/post/apt41-winnti-elf-cloud-credential-harvester-alibaba-typosquat">said</a>. "A selective C2 handshake validation mechanism renders the server invisible to conventional scanning tools like Shodan and Censys."
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>RDP phishing hardening</span></p>
    <p>
      Starting with the April 2026 security update (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26151">CVE-2026-26151</a>), Microsoft has introduced new Windows protections to defend against phishing attacks that abuse Remote Desktop connection (RDP) files, adding security warnings and turning off redirections by default. "Malicious actors misuse this capability by sending RDP files through phishing emails," Microsoft <a href="https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/remotepc/understanding-security-warnings">said</a>. "When a victim opens the file, their device silently connects to a server controlled by the attacker and shares local resources, giving the attacker access to files, credentials, and more." Russian hacking groups like APT29 have <a href="https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html">weaponized</a> RDP configuration files to target Ukrainian government agencies, enterprises, and military entities in the past.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Plugin supply chain breach</span></p>
    <p>
      Unknown threat actors have staged a supply chain attack on a WordPress plug-in maker called Essential Plugin (formerly WP Online Support) after acquiring it in early 2025 from the original developers in a six-figure deal to plant a backdoor in August and subsequently weaponize it early this month to distribute malicious payloads to any website with the plug-ins installed. WordPress has since permanently closed all the plugins. "The plugin's wpos-analytics module had phoned home to analytics.essentialplugin.com, downloaded a backdoor file called wp-comments-posts.php (designed to look like the core file wp-comments-post.php), and used it to inject a massive block of PHP into wp-config.php," Anchor Hosting <a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">said</a>. "The injected code was sophisticated. It fetched spam links, redirects, and fake pages from a command-and-control server. It only showed the spam to Googlebot, making it invisible to site owners." In addition, it resolved the command-and-control (C2) domain through an Ethereum smart contract to make it resilient to takedown efforts. Prior to their removal, the plugins collectively had more than 180,000 installs. "This is a classical case of supply chain compromise that happened because the original vendor sold their plugins to a third-party, which turned out to be a malicious threat actor," Patchstack <a href="https://patchstack.com/articles/critical-supply-chain-compromise-on-20-plugins-by-essentialplugin/">said</a>.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Sanctioned crypto market persists</span></p>
    <p>
      Telegram has continued to host Xinbi Guarantee, an illicit marketplace that has <a href="https://thehackernews.com/2026/02/weekly-recap-ai-skill-malware-31tbps.html#:~:text=Xinbi%20Marketplace%20Accounts%20for%20%2417%2E9B%20in%20Total%20Volume">processed</a> over $21 billion in total transaction volume, despite sanctions <a href="https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=U%2EK%2E%20Sanctions%20Xinbi">issued</a> by the U.K. last month. The development has raised questions about the platform's willingness to police its own ecosystem and suspend bad actors. The Chinese-language bazaar is <a href="https://thehackernews.com/2025/05/xinbi-telegram-market-tied-to-84b-in.html">known to offer</a> money laundering solutions to cryptocurrency scammers, harassment services, and products like electrified batons and tasers that cater to investment scams operating out of Southeast Asia. "Xinbi is still going strong," Elliptic's cofounder and chief scientist, Tom Robinson, <a href="https://www.wired.com/story/telegram-is-still-hosting-a-sanctioned-21-billion-crypto-scammer-black-market/">told</a> WIRED. "They're on track to become the largest market of this kind that has ever existed."
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Malvertising leads to ransomware</span></p>
    <p>
      Orange Cyberdefense has <a href="https://www.orangecyberdefense.com/global/blog/cert-news/smoking-out-an-affiliate-smokedham-qilin-a-few-google-ads-and-some-bossware">revealed</a> that threat actors used malvertising in three separate incidents observed between early February and early April 2026 to deliver the SmokedHam (aka Parcel RAT, SharpRhino, and WorkersDevBackdoor) backdoor by masquerading it as installers for RVTools or Remote Desktop Manager (RDM). The malware is assessed to be a modified version of the open-source trojan known as ThunderShell. In at least one case, the attack led to the deployment of Qilin ransomware, but not before dropping employee monitoring and remote desktop solutions like Controlio, TeraMind, and Zoho Assist for persistent access, exfiltrating KeePass password databases, and conducting discovery and lateral movement. The adoption of <a href="https://censys.com/blog/netsupport-manager-tracking-dual-use-remote-administration-infrastructure/">legitimate dual-use tools</a> is a concerning trend as it allows attackers to blend their actions into legitimate activity and reduce the risk of detection. The activity has been attributed with medium confidence to <a href="https://thehackernews.com/2021/05/colonial-pipeline-paid-nearly-5-million.html">UNC2465</a>, an affiliate of DarkSide, LockBit, and Hunters International. It also overlaps with a campaign detailed by <a href="https://www.synacktiv.com/en/publications/case-study-how-hunters-international-and-friends-target-your-hypervisors">Synacktiv</a> and <a href="https://thehackernews.com/2025/04/cryptocurrency-miner-and-clipper.html">Field Effect</a> in early 2025.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>APT lineage link uncovered</span></p>
    <p>
      New research has discovered that the threat actor known as <a href="https://thehackernews.com/2024/02/darkme-malware-targets-traders-using.html">Water Hydra</a> (aka DarkCasino) is still active in 2026, with new evidence uncovering a previously unreported connection between evilgrou-tech, a commodity operator, and the hacking group. "The handle 'evilgrou' is assessed with moderate confidence to be a deliberate reference to <a href="https://thehackernews.com/2023/08/winrar-security-flaw-exploited-in-zero.html">EvilNum</a> (Evil + [num -&gt; grou]p), the predecessor APT group from which WaterHydra/DarkCasino splintered in late 2022," Breakglass Intelligence <a href="https://intel.breakglass.tech/post/multi-rat-operation-dismantled-waterhydra-apt-nexus-five-aes-keys-recovered-and-live-c2-infrastructure-mapped-across-three-continents">said</a>. The strongest attribution indicator is a shared developer workspace path embedded in binaries associated with EvilNum and Water Hydra: "C:\Users\Administrator\Desktop\vaeeva\shellrundll.tlb." These two artifacts are separated by two years, one in July 2022 and the other in January 2024.
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Scientific software RCE risk</span></p>
    <p>
      Cybersecurity researchers have <a href="https://www.threatleap.com/publications/Finding-Critical-Security-Vulnerabilities-In-Widely-Used-Research-And-Scientific-Software-For-Fun-Not-Profit-HDF5-Story">disclosed</a> security flaws in HDF5 software, a file format to manage, process, and store heterogeneous data, that could be exploited to compromise a vulnerable system. "The discovered vulnerabilities, based on a stack buffer overflow, could allow threat actors to overwrite memory and compromise target systems for stealing highly classified research data, industrial espionage, or a foothold into the internal network," ThreatLeap's co-founder, Leon Juranic, said. "In practice, this means the vulnerability could be exploited by a single specially crafted malicious input file and, as a result, an entire system could get compromised." The issues were addressed in October 2025 following responsible disclosure.
    </p>
  </div>
</li>
  
<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Brute-force surge on edge devices</span></p>
    <p>
      Security researchers have detected a "sharp rise" in brute-force attempts to hijack SonicWall and FortiGate devices between January and March 2026, with the vast majority (88%) appearing to originate from the Middle East. Most attempts were unsuccessful, either blocked outright by security tools or directed at invalid usernames. "Attackers are aggressively scanning and testing perimeter devices for weak or exposed credentials," Barracuda Networks <a href="https://blog.barracuda.com/2026/04/14/soc-threat-radar-april-2026">said</a>. "Even when attacks fail, persistent probing raises the risk that a single weak password or misconfiguration could lead to compromise."
    </p>
  </div>
</li>

<li>
  <span aria-hidden="true"></span>
  <div>
    <p><span>Fraud network evades sanctions</span></p>
    <p>
      Triad Nexus, a sprawling cybercrime ecosystem acting as the backbone of scams, money laundering, and illicit gambling operations since at least 2020, has been observed using geographic fencing and laundering its infrastructure through "clean" front companies to acquire accounts at major enterprise cloud providers (Amazon, Cloudflare, Google, and Microsoft) and <a href="https://thehackernews.com/2025/05/us-sanctions-funnull-for-200m-romance.html">avoid sanctions</a>. Besides engaging in fraud, the group specializes in high-fidelity brand impersonation, weaponizing the digital identities of Global 2000 companies to dupe victims. "The network has industrialized brand theft on a global scale; its catalog includes 'pixel-perfect' clones of everything from high-end luxury goods to public services," Silent Push <a href="https://www.silentpush.com/blog/triad-nexus-funnull-2026/">said</a>. "Despite federal sanctions in 2025, the group has reinstated its global fraud engine, shifting its focus toward emerging markets while maintaining a persistent threat to Western enterprise assets." Triad Nexus is estimated to be responsible for over $200 million in reported losses, primarily fueled by pig butchering and virtual currency scams.
    </p>
  </div>
</li>
  
</ol>

</div>

  
<p>That's a wrap for this week. If&nbsp;anything here made you pause, good. Go&nbsp;check your patches, side-eye your dependencies, and maybe don't trust that app just because it's sitting in an official store. The&nbsp;basics still matter more than most people want to&nbsp;admit.</p>
<p>We'll be back next Thursday with whatever fresh chaos the internet cooks up. Until&nbsp;then, stay sharp and keep your logs close. See&nbsp;you on the other&nbsp;side.</p>





<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories-3763.html</guid>
                <pubDate>Thu, 16 Apr 2026 17:00:10 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1700-e365/bull-main.jpg"/>
            </item>
                    <item>
                <title>NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities</title>
                <link>https://www.scamalert24.co.za/nist-drops-nvd-enrichment-for-pre-march-2026-vulnerabilities-3762.html</link>
                                <content:encoded><![CDATA[<div id="layout-70c12307-76d1-40ae-b181-36a097f3ea27" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>The team behind the US National Vulnerability Database (NVD) can&rsquo;t keep up with the explosion of new reported vulnerabilities, said a top official of the US National Institute of Standards and Technology (NIST), which hosts the database.</p>

<p>Speaking at VulnCon26's in Scottsdale, Arizona, on April 15, Harold Booth, a NIST computer scientist, said the NVD had to make operational adjustments in how its data analyst enrich vulnerabilities to address the &ldquo;record growth&rdquo; of reported common vulnerabilities and exposures (CVEs).</p>

<p>&ldquo;CVE reporting keeps increasing &ndash; and trust me, at the NVD, we see them all &ndash; and our ability to keep up is just not there, so <a href="https://www.infosecurity-magazine.com/news/nvd-revamps-operations-cve-surge/" target="_blank">our backlog</a> keeps increasing too,&rdquo; Booth said.</p>

<p>The data analyst will thus shift to a risk-based approach that will guide how they prioritize which CVE to process and enrich first.</p>

<p>This new approach implies bold moves, including the NVD dropping enrichment for all vulnerabilities reported before March 1, 2026.</p>

<p>Additionally, the NVD will prioritize enriching vulnerabilities found in software used by the US federal government or in critical software as defined by the Executive Order 14028, published in 2021.</p>

<p>The NVD will also give precedence to vulnerabilities included in the US Cybersecurity and Infrastructure Agency&rsquo;s (CISA) Known Exploited Vulnerabilities (KEV) list.</p>

<p>&ldquo;All submitted CVEs will still be added to the NVD. However, those that do not meet the criteria above will be categorized as &lsquo;Not Scheduled,&rsquo;&rdquo; said Booth.</p>

<p>&ldquo;Vulnerabilities are a way for an attacker to gain access to a system that they should not and we want to close those holes as quickly, efficiently and effectively as possible. We want to focus on the ones that are important, not the ones that are unimportant,&rdquo; he added.</p>

<p>Users can request enrichment of any unscheduled CVEs by emailing the NVD at nvd@nist.gov.</p>

<h2><strong>The CVE Surge Threatens NVD Capacity</strong></h2>

<p>This change is driven by a surge in CVE submissions, which has increased by 263% between 2020 and 2025, according to a <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth" target="_blank">NIST statement</a> published on April 15.</p>

<p>Booth said the NVD is &ldquo;working faster than ever&rdquo; and enriched nearly 42,000 CVEs in 2025, 45% more than any prior year. However, they cannot catch up with the speed at which CVE&rsquo;s get reported.</p>

<p>&ldquo;Submissions during the first three months of 2026 are nearly one-third higher than the same period last year. We&rsquo;ve been trying to develop new tools to help with this, but with our current methods, I will admit this is just something we can&rsquo;t keep up with,&rdquo; Booth said during VulnCon.</p>
</div><div id="layout-d6c26385-b996-4cde-90d3-6bf5207666ac" data-layout-id="2" data-edit-folder-name="text" data-index="2"><p>This is trend is likely to accelerate. In February 2026, the Forum of Incident Response and Security Teams (FIRST) <a href="https://www.infosecurity-magazine.com/news/first-forecasts-record-50000-cve/" target="_blank">forecast a record-breaking 50,000 additional CVEs to be reported in 2026</a>.</p>

<p>Jerry Gamblin, principal engineer at Cisco Threat Detection &amp; Response, expects an even bigger growth, with a forecast of<a href="https://cveforecast.org/" target="_blank">&nbsp;70,135 CVEs by the end of this year</a>. This&nbsp;would reflect a 45.6% growth rate compared to 48,171 in 2025.</p>

<p>These forecasts do not consider recent announcements by Anthropic and OpenAI of new generative AI models &ndash; namely <a href="https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/" target="_blank">Claude Mythos</a> and <a href="https://www.infosecurity-magazine.com/news/openai-unveils-gpt-54-cyber-defense/" target="_blank">GPT-5.4-Cyber</a> &ndash; that promise to autonomously find and fix cybersecurity vulnerabilities at scale.</p>

<p>Booth acknowledged that his team also faced a growth in the number of Common Platform Enumeration (CPE) identifiers largely due to new vulnerability discovery tools based on large language models (LLMs).</p>

<p>CPE is a standardized naming scheme used to uniquely identify hardware, operating systems and software applications.</p>

<h2><strong>New Rules for CVE Scoring and Analysis</strong></h2>

<p>Booth also revealed other changes in how the NVD will now enrich CVEs, following the same risk-based approach.</p>

<p>The NVD will no longer provide its own severity scores (CVSS) for CVEs already scored by the submitting authority, unless they deem the score doesn&rsquo;t align with the vulnerability.</p>

<p>Additionally, the NVD will only reanalyze modified CVEs if changes materially impact enrichment data.</p>

<p>Users can request a score change or a new CVE analysis by contacting the NVD, which will review the submission and decide how to process on a case-by-case basis.</p>

<p>Finally, Booth also announced updated status labels for CVEs to &ldquo;make them clearer.&rdquo; For instance, the NVD will drop the previous &lsquo;Deferred&rsquo; status and replace it with &lsquo;Not scheduled&rsquo; to indicate the NVD will not enrich the corresponding CVE.</p>

<p>The NVD has published <a href="https://nvd.nist.gov/vuln/vulnerability-status" target="_blank">a document explaining CVE and NVD status labels</a>, what they mean and how they compare.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/nist-drops-nvd-enrichment-for-pre-march-2026-vulnerabilities-3762.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:18 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/e694a494-7a34-42e1-b690-a1c03c8ee7e3.jpg"/>
            </item>
                    <item>
                <title>Microsoft’s Windows Recall still allows silent data extraction</title>
                <link>https://www.scamalert24.co.za/microsoft-s-windows-recall-still-allows-silent-data-extraction-3761.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				A cybersecurity researcher says Recall&rsquo;s redesigned security model does not stop same-user malware from accessing plaintext screenshots and extracted text, without admin rights or exploits.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Microsoft&rsquo;s Windows Recall feature remains vulnerable to complete data extraction despite a major security overhaul, according to a cybersecurity researcher who says malware running in a user&rsquo;s context can quietly siphon off everything Recall has captured, without administrator privileges, kernel exploits, or breaking encryption.</p>



<p>Alexander Hagenah, executive director at Z&uuml;rich-based financial infrastructure operator SIX Group, made the claim in a LinkedIn post, where he also published a proof-of-concept tool called TotalRecall Reloaded to demonstrate the issue.</p>



<p>Hagenah first exposed Recall&rsquo;s security flaws in 2024, forcing Microsoft to <a href="https://www.computerworld.com/article/2140187/microsoft-makes-windows-recall-opt-in-after-privacy-security-backlash.html" target="_blank">pull the feature from preview</a> and rebuild it. Microsoft relaunched Recall in April 2025, saying the new architecture would restrict &ldquo;attempts by latent malware trying to &lsquo;ride along&rsquo; with a user authentication to steal data.&rdquo; Hagenah said it does not.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;When you use Recall normally, TotalRecall Reloaded silently holds the door open behind you and then extracts what Recall has ever captured. That is precisely the scenario Microsoft&rsquo;s architecture is supposed to restrict,&rdquo; he <a href="https://www.linkedin.com/posts/alexhagenah_breaking-%F0%9D%90%96%F0%9D%90%A2%F0%9D%90%A7%F0%9D%90%9D%F0%9D%90%A8%F0%9D%90%B0%F0%9D%90%AC-%F0%9D%90%91%F0%9D%90%9E%F0%9D%90%9C%F0%9D%90%9A%F0%9D%90%A5%F0%9D%90%A5-again-activity-7447864305460547585-P72P/" target="_blank" rel="noreferrer noopener">wrote in the post</a>.</p>

		

			


<p>Hagenah wrote in the post that he disclosed the research to Microsoft&rsquo;s Security Response Center on March 6, submitting full source code and reproduction steps. Microsoft reviewed the case for a month and closed it on April 3, telling him the behavior &ldquo;does not represent a bypass of a security boundary or unauthorized access to data.&rdquo;</p>



<p>&ldquo;Microsoft says this is by design,&rdquo; Hagenah wrote. &ldquo;That worries me.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Hagenah&rsquo;s research does not challenge Microsoft&rsquo;s encryption, which he said is sound. The gap, he told CSO, is in how decrypted data is handled once it leaves the enclave.</p>



<p>&ldquo;Plaintext screenshots and extracted text end up in an unprotected process for display,&rdquo; he told CSO. &ldquo;As long as decrypted content crosses into a process that same-user code can access, someone will find a way in.&rdquo;</p>



<h2 id="what-a-fix-would-require">What a fix would require</h2>



<p>A fix is technically feasible, Hagenah said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The short-term fix is fairly straightforward. Microsoft could add stronger code integrity and process protections to AIXHost.exe, the process that renders the Recall timeline. Right now, it has none, which makes the injection path possible. That would block the specific technique I demonstrated and materially raise the bar,&rdquo; he said.</p>



<p>The longer-term problem runs deeper, he said. &ldquo;Microsoft should rethink how decrypted data is handled after it leaves the enclave. The cryptography and enclave design are genuinely well done, and I want to be clear about that. The problem is that plaintext screenshots and extracted text end up in an unprotected process for display. As long as decrypted content crosses into a process that same-user code can access, someone will find a way in,&rdquo; he said.</p>



<p>&ldquo;A durable fix would mean either rendering inside a protected process or adopting a compositing model where raw data never leaves the trust boundary. That is a bigger effort, but it is the only way to close this class of issue properly,&rdquo; he said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="exploitation-risk">Exploitation risk</h2>



<p>The barrier to weaponizing this technique is lower than Microsoft&rsquo;s security messaging would suggest, Hagenah said.</p>



<p>&ldquo;They only need code running in the user&rsquo;s context and a way to reuse the authorized Recall session,&rdquo; he said. &ldquo;That is a much lower bar than many people would assume from Microsoft&rsquo;s security messaging.&rdquo;</p>



<p>While Recall&rsquo;s limitation to Copilot+ PCs and its opt-in status reduce the scale of exposure, targeted abuse is a realistic near-term risk, he said. &ldquo;For targeted abuse, surveillance, or high-value user collection, this is absolutely realistic,&rdquo; he said.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Hagenah said he published the source code deliberately so defenders, EDR vendors, and security teams could build detections before threat actors operationalize the technique independently. &ldquo;In my view, that gives the defensive side a valuable head start,&rdquo; he said.</p>



<p>Independent security researcher Kevin Beaumont reached a similar conclusion after separately testing the current Recall implementation. &ldquo;Yep, you can just read the database as a user process,&rdquo; Beaumont <a href="https://cyberplace.social/@GossiTheDog/116211359321826804" target="_blank" rel="noreferrer noopener">wrote on Mastodon on March 11</a>. &ldquo;The database also contains all manner of fields that aren&rsquo;t publicly disclosed for tracking the user&rsquo;s activity. No AV or EDR alerts triggered,&rdquo; he wrote.</p>



<p>Microsoft did not immediately respond to a request for comment.</p>
</div>
							</div>
							</div>
							
							</div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Microsoft’s Windows Recall feature remains vulnerable to complete data extraction despite a major security overhaul, according to a cybersecurity researcher who says malware running in a user’s context can quietly siphon off everything Recall has captured, without administrator privileges,...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/microsoft-s-windows-recall-still-allows-silent-data-extraction-3761.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:11 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159643-0-51209200-1776341906-Man-working-on-a-Windows-11-laptop-clearly-on-screen.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</title>
                <link>https://www.scamalert24.co.za/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment-3760.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>The Hacker News</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Artificial Intelligence / Enterprise Security</span></p></div><div id="articlebody"><p><a href="https://thehacker.news/ghost-in-the-machine?source=article"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6vJpO9kksCQDpSksNkqDFNUCbXD70dMGYqI6P9S_XPMY5d8BR8PVdrsVQP1ZJO_-nzL6eQShM3Cap9heQ5kAglsPjfxwIcXPSsf_cfgUVnGQ2XzIWVOuo7JhxMjnHYDN6r9KlQ6LqZJisRZkjatnWChuzUkSlXRa1hFseUPq28PZ5gjGR7L2WzTFdZ3fM/s1700-e365/ghost.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not&nbsp;phishing. Not&nbsp;weak passwords. Unmanaged non-human identities that nobody was&nbsp;watching.</p>
<p>For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections,&nbsp;andOAuth grants. When&nbsp;projects end or employees leave, most of these stay active. Fully&nbsp;privileged. Completely unmonitored.</p>
<p>Attackers don't need to break in. They&nbsp;just pick up the keys you left&nbsp;out.</p>
<p><a href="https://thehacker.news/ghost-in-the-machine?source=article" target="_blank">Join our upcoming webinar</a> where we&rsquo;ll show you how to find and eliminate these "Ghost Identities" before they become a back door for&nbsp;hackers.</p>
<p>AI agents and automated workflows are multiplying these credentials at a pace security teams can't manually track. Many&nbsp;carry admin-level access they never needed. One&nbsp;compromised token can give an attacker lateral movement across your entire environment, and the average dwell time for these intrusions is over 200&nbsp;days.</p>
<p>Traditional IAM wasn't built for this. It&nbsp;manages people. It&nbsp;ignores&nbsp;machines.</p>
<p><a href="https://thehacker.news/ghost-in-the-machine?source=article"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEindtCyTTR5rYFNMOx6rmlkqElz7M20B-k6bUXLIvFGIO9OjuhjcqloQtBqT1ormi8Lf5TxyKs0D4ZRJPbtTTQLj64IPZEQLe6UHNkjOWN-NAO5SgjlC2-Y5cPeq_HrkhW899AHXh9IWyE33_j5k52WdgukCfSIffwBmFYGXUi0H0Sy2fldvJmX9hpivc00/s1700-e365/bi.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="400" data-original-width="770"></a></p>
<p><strong>What we'll walk you through in this&nbsp;session:</strong></p>
<ul>
<li>How to run a full discovery scan of every non-human identity in your environment</li>
<li>A framework for right-sizing permissions across service accounts and AI integrations</li>
<li>An automated lifecycle policy so dead credentials get revoked before attackers find them</li>
<li>A ready-to-use Identity Cleanup Checklist you'll get during the live session</li>
</ul>
<p>This isn't a product demo. It's a working playbook you can take back to your team the same&nbsp;week.</p>
<p>Don't let hidden keys compromise your data. We&rsquo;re hosting a live session to walk you through securing these non-human identities step-by-step.</p>

&#128197; <strong>Save Your Spot Today:</strong> <a href="https://thehacker.news/ghost-in-the-machine?source=article" rel="noopener" target="_blank">Register for the Webinar Here</a>.

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials: service accounts,...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment-3760.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:10 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6vJpO9kksCQDpSksNkqDFNUCbXD70dMGYqI6P9S_XPMY5d8BR8PVdrsVQP1ZJO_-nzL6eQShM3Cap9heQ5kAglsPjfxwIcXPSsf_cfgUVnGQ2XzIWVOuo7JhxMjnHYDN6r9KlQ6LqZJisRZkjatnWChuzUkSlXRa1hFseUPq28PZ5gjGR7L2WzTFdZ3fM/s1700-e365/ghost.jpg"/>
            </item>
                    <item>
                <title>2026-2175 - Responsable RH International H/F</title>
                <link>https://www.scamalert24.co.za/2026-2175-responsable-rh-international-h-f-3759.html</link>
                                <content:encoded><![CDATA[<div id="contenu-ficheoffre" data-class="ts-offer-details-content">&#13;
&#13;
        &#13;
&#13;
            <h2>&#13;
                Informations g&eacute;n&eacute;rales&#13;
            </h2>&#13;
&#13;
            <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_entityBlock">&#13;
                &#13;
                <p><img id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_Logo" title="Entité légale (HRRO) - Clé Oracle (logo)" src="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183" alt="Entité légale (HRRO) - Clé Oracle (logo)">&#13;
                </p>&#13;
&#13;
                <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_divEntityDesc">&#13;
                    <h3>&#13;
                        Entit&eacute; de rattachement&#13;
                    </h3><p>&#13;
                    Parmi les leaders du march&eacute; des services maritimes &agrave; l'offshore, BOURBON propose aux producteurs d'&eacute;nergie en mer les plus exigeants une vaste gamme de services maritimes de surface et sous-marins, sur les champs p&eacute;troliers, gaziers et &eacute;oliens. Cette offre de services repose sur une flotte moderne et standardis&eacute;e de 223 navires et sur plus de 5 842 professionnels hautement qualifi&eacute;s. En recherche permanente d'excellence op&eacute;rationnelle, le groupe offre &agrave; ses clients un service de proximit&eacute; dans ses 37 pays d'intervention, en garantissant les plus hauts standards de qualit&eacute; et de s&eacute;curit&eacute;. En 2024, BOURBON a r&eacute;alis&eacute; un chiffre d'affaires ajust&eacute; de plus de 733 M&euro;.&nbsp;&nbsp;&#13;
                </p></div>&#13;
&#13;
                &#13;
        &#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
            </div><h3>&#13;
	Type d'offre (personnel s&eacute;dentaire/navigant)&#13;
</h3><p id="fldoffer_customcodetablevalue1">Personnel s&eacute;dentaire</p><h2>Description du poste</h2><h3>&#13;
	Intitul&eacute; du poste&#13;
</h3><p id="fldjobdescription_jobtitle">Responsable RH International H/F</p><h3>&#13;
	Contrat&#13;
</h3><p id="fldjobdescription_contract">CDI</p><h3>&#13;
	R&ocirc;les et responsabilit&eacute;s&#13;
</h3><div id="fldjobdescription_description1">&#13;
	<p>BOURBON recrute une(e)</p><p><span><strong>Responsable RH International H/F</strong></span></p><p>En tant que Responsable RH (ROW), vous pilotez la strat&eacute;gie RH des pays hors si&egrave;ge, avec une forte composante de mobilit&eacute; internationale. Vous intervenez sur l&rsquo;ensemble du cycle RH, de la planification des effectifs jusqu&rsquo;&agrave; l&rsquo;accompagnement des expatriations.</p><p><span><strong>VOS MISSIONS ET RESPONSABILITES&nbsp;:</strong></span></p><p><strong>Pilotage RH international (ROW)</strong></p><p>Vous accompagnez la croissance des &eacute;quipes et structurez les pratiques RH &agrave; l&rsquo;international :</p><p>&bull;&nbsp; Planification des effectifs en lien avec la strat&eacute;gie business / anticipation des projections d&rsquo;effectifs</p><p>&bull;&nbsp; Pilotage et suivi de la masse salariale (labour cost planning)</p><p>&bull;&nbsp; Pilotage des recrutements &agrave; l&rsquo;international</p><p>&bull;&nbsp; D&eacute;ploiement et gestion de la politique de r&eacute;mun&eacute;ration</p><p>&bull;&nbsp; Mise en place des processus RH, incluant la gestion de la campagne annuelle de performance</p><p><strong>Mobilit&eacute; internationale &amp; expatriation</strong></p><p>En parall&egrave;le, vous pilotez l&rsquo;ensemble de la politique de mobilit&eacute; internationale du groupe :</p><p>&bull; D&eacute;ployer et faire &eacute;voluer la politique de mobilit&eacute; internationale</p><p>&bull; N&eacute;gocier/ optimiser les packages et contrats d&rsquo;expatriation</p><p>&bull; Assurer le suivi de l&rsquo;ex&eacute;cution des contrats</p><p>&bull; Superviser l&rsquo;administration des expatri&eacute;s (paie, avantages, conformit&eacute;)</p>&#13;
</div><h3>&#13;
	Profil&#13;
</h3><div id="fldjobdescription_description2">&#13;
	<p><span><strong>VOTRE PROFIL</strong></span></p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez un bac + 3/4 en Ressources Humaines et justifiez d&eacute;j&agrave; d&rsquo;une exp&eacute;rience r&eacute;ussie de 7 &agrave; 10 ann&eacute;es &agrave; un poste RH &eacute;quivalent.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous justifiez d&eacute;j&agrave; d&rsquo;une solide exp&eacute;rience en HR Business Partner ou HR Manager multi-pays</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez d&eacute;j&agrave; au moins une premi&egrave;re exp&eacute;rience en mobilit&eacute; internationale / expatriation valid&eacute;e&nbsp;; vous avez par ailleurs une excellente capacit&eacute; &agrave; mettre en place des processus.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dot&eacute; d&rsquo;une forte autonomie, vous avez un tr&egrave;s bon sens du business et un esprit collaboratif.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Rigoureux, vous avez de solides connaissances des principes et des bonnes pratiques en mati&egrave;re de ressources humaines ainsi que des r&egrave;gles et des bonnes pratiques en mati&egrave;re de mobilit&eacute; internationale.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez un bel esprit d&rsquo;&eacute;quipe et faites preuve d&rsquo;un fort engagement&nbsp;et d&rsquo;excellentes qualit&eacute;s relationnelles&nbsp;; vous &ecirc;tes un tr&egrave;s bon communiquant (oral et &eacute;crit) et vous savez animer des r&eacute;unions avec aisance.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; En contexte international, vous avez une excellente maitrise du fran&ccedil;ais et de l&rsquo;anglais (lu, &eacute;crit et oral), ainsi que des outils informatiques (Outlook, EXCEL, BI, PowerPoint&hellip;)</p><p>Poste en CDI bas&eacute; &agrave; Marseille, &agrave; pourvoir d&egrave;s que possible.</p><p>Dans le cadre de notre politique d&rsquo;emploi, ce poste est ouvert aux personnes en situation de handicap.</p>&#13;
</div><h2>Localisation du poste</h2><h3>&#13;
	Localisation du poste&#13;
</h3><p id="fldlocation_location_geographicalareacollection">Europe, France, Marseille Joliette</p><h2>Crit&egrave;res candidat</h2><h3>&#13;
	Niveau d'&eacute;tudes min. requis&#13;
</h3><p id="fldapplicantcriteria_educationlevel">4. Niveau Bac + 4/5</p><h3>&#13;
	Niveau d'exp&eacute;rience min. requis&#13;
</h3><p id="fldapplicantcriteria_experiencelevel">6-10 ans</p><h3>&#13;
	Langues&#13;
</h3><ul><li>French (Native)</li><li>English (Advanced +++)</li></ul>&#13;
&#13;
        &#13;
    </div>
]]></content:encoded>
                                <description><![CDATA[Contract type : Permanent Contract Position description : BOURBON recrute une(e) Responsable RH International H/F En tant que Responsable RH (ROW), vous pilotez la stratégie RH des pays hors siège, avec une forte composante de mobilité internationale. Vous intervenez...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/2026-2175-responsable-rh-international-h-f-3759.html</guid>
                <pubDate>Thu, 16 Apr 2026 16:00:09 +0300</pubDate>
                <media:thumbnail url="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183"/>
            </item>
                    <item>
                <title>Behind the Mythos hype, Glasswing has just one confirmed CVE</title>
                <link>https://www.scamalert24.co.za/behind-the-mythos-hype-glasswing-has-just-one-confirmed-cve-3758.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				As hype builds around Anthropic&rsquo;s offensive AI model, VulnCheck&rsquo;s analysis finds just one confirmed CVE tied directly to Project Glasswing, raising questions about how Mythos&rsquo; real-world impact should be measured.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Efforts to cut through the buzz surrounding Anthropic&rsquo;s Mythos are emerging. As OpenAI moves to counter the hype around it with its own cybersecurity model, VulnCheck is reporting that the model&rsquo;s publicly attributable output amounts to just one confirmed CVE.</p>



<p>While <a href="https://www.csoonline.com/article/4155342/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery.html" target="_blank">Project Glasswing</a>, the controlled access program for Mythos, promises a powerful offensive capability, gated behind vetted organizations, VulnCheck&rsquo;s recent findings reveal what those capabilities actually represent in practice.</p>



<p>&ldquo;Anthropic&rsquo;s Project Glasswing has generated significant attention&mdash;but very little concrete data,&rdquo; said Patrick Garrity, researcher at VulnCheck, in a blog <a href="https://www.vulncheck.com/blog/anthropic-glasswing-cves#key-takeaways" target="_blank" rel="noreferrer noopener">post</a>. &ldquo;While Anthropic researchers are actively contributing to vulnerability discovery and appear to be promising, the publicly attributable impact of Glasswing itself remains limited so far.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Anthropic did not immediately respond to CSO&rsquo;s request for comments.</p>

		

			


<h2 id="only-one-cve-is-attributable-to-glasswing">Only one CVE is attributable to Glasswing</h2>



<p>VulnCheck&rsquo;s analysis of Project Glasswing drills into the numbers behind the claims by looking into public CVE attribution. &ldquo;I started by re-reading the <a href="https://www.anthropic.com/glasswing" target="_blank" rel="noreferrer noopener">Glasswing report</a> and the advisories published at <a href="https://red.anthropic.com/" target="_blank" rel="noreferrer noopener">red.anthropic.com</a>,&rdquo; Garrity said. &ldquo;Neither source provides a comprehensive CVE list of vulnerabilities discovered by Anthropic. So I decided to search the full CVE record database, and searched every CVE record containing the term &ldquo;anthropic&rdquo; and reviewed each one.&rdquo;</p>



<p>Garrity identified 75 CVE records that mention Anthropic. But only 40 of those were actually credited to Anthropic researchers, with the rest tied to affected products or unrelated references. Of those 40, 10 originated from external collaboration programs, such as <a href="http://calif.io" target="_blank" rel="noreferrer noopener">Calif.io&rsquo;s</a> MADBugs initiatives.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The 40 CVEs attributed to Anthropic researchers span multiple products, including 28 affecting Firefox, nine tied to wolfSSL, and one each impacting NGINX Plus, FreeBSD, and OpenSSL.</p>



<p>When narrowed down further, the number that mattered the most showed up. Only one CVE is explicitly attributed to Project Glasswing itself, <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-4747" target="_blank" rel="noreferrer noopener">CVE-2026-4747</a>. This is a FreeBSD NFS remote code execution (RCE) flaw described as autonomously identified and exploited.</p>



<p>Garrity did not include the three vulnerabilities without CVE numbers mentioned on the Glasswing page. These include a 27-year-old OpenBSD flaw, a 16-year-old FFmpeg bug, and Linux kernel privilege escalation chains, all under embargo pending patches.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2><a></a>Why is Glasswing still a big deal</h2>



<p>VulnCheck&rsquo;s findings reframe Glasswing&rsquo;s capabilities. The limited number of directly attributable CVEs is just one way of measuring its impact. Industry observers are interpreting <a href="https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html">Mythos</a> much differently.</p>



<p>Melissa Bischoping, a SANS Technology Institute board member and senior Director of security and product research at Tanium, thinks Mythos potential lies elsewhere. According to a breakdown of the Claude Mythos Preview <a href="https://www-cdn.anthropic.com/08ab9158070959f88f296514c21b7facce6f52bc.pdf" target="_blank" rel="noreferrer noopener">System Card</a>, which Bischoping and her colleagues at Tanium reviewed, the model achieved an unseen exploit success rate. &ldquo;Jumping from near-zero success to ~72% on the same class of targets suggests exploit development is no longer a high-skill, high-effort bottleneck,&ldquo; she said, adding that it&rsquo;s only a matter of time before every other model catches up.</p>



<p>While Mythos is being regulated under Glasswing, it has already shown the world what is possible. &ldquo;The gap between frontier models and open-weight models has compressed from more than a year to a matter of weeks, which means this level of capability is poised to spread rapidly, likely without the same safety guardrails,&rdquo; Bischoping noted.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Bischoping is also concerned about whether organizations can act on what Mythos finds before Mythos is out in the wild. &ldquo;Agentic patch workflows are possible and can match pace with adversarial AI in a lot of cases, but org politics and change control don&rsquo;t run at the speed of AI today.&rdquo;</p>



<p>The full picture about the model&rsquo;s true capability won&rsquo;t be known before July 2026, when Anthropic will make a full public accounting of what Glasswing found and fixed, Garrity said.</p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Efforts to cut through the buzz surrounding Anthropic’s Mythos are emerging. As OpenAI moves to counter the hype around it with its own cybersecurity model, VulnCheck is reporting that the model’s publicly attributable output amounts to just one confirmed...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/behind-the-mythos-hype-glasswing-has-just-one-confirmed-cve-3758.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159617-0-65128100-1776340487-AI-security-spending-primary-shutterstock_2690527813.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</title>
                <link>https://www.scamalert24.co.za/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu-3757.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>The Hacker News</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Data Privacy / Compliance</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSzIRGweO7UJkqOLQTUDsqPy53XtIWCzyLklGJLfFxhneZiFpxg8zJRXukUqEsT4TbdFwUZbvTfwuexfGuiYjcDQ-iZDjqwZ2lDlCIhgopZWevBpdi4rr6GxgXpU6MmFnzdMpq_WGdA9PRfaNw_7eDAOugAV1tccfmREgbXveM1N15G2_L9lFxCq1Pv0/s1700-e365/reflectiz.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSzIRGweO7UJkqOLQTUDsqPy53XtIWCzyLklGJLfFxhneZiFpxg8zJRXukUqEsT4TbdFwUZbvTfwuexfGuiYjcDQ-iZDjqwZ2lDlCIhgopZWevBpdi4rr6GxgXpU6MmFnzdMpq_WGdA9PRfaNw_7eDAOugAV1tccfmREgbXveM1N15G2_L9lFxCq1Pv0/s1700-e365/reflectiz.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A&nbsp;bank approved a Taboola pixel. That&nbsp;pixel quietly redirected logged-in users to a Temu tracking endpoint. This&nbsp;occurred without the bank&rsquo;s knowledge, without user consent, and without a single security control registering a violation.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9pKdAzKjL5V6CEuPbA7CD5xFjBpkOqL-XxkYEvvSv9XSHemsGnzmRwSEJJW8RPM0SGUDDo1T-aoBkjLSoE7WV8nO0qL-GESYQhpLOjkdzDycq9wL-ito6RIvHdc7JTyoP8cswyTsgr6B83ZcvmKPYYaQxmrUHDeuS0pauvY58Rv7d6ui91uCI8w3VtdA/s1700-e365/11.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9pKdAzKjL5V6CEuPbA7CD5xFjBpkOqL-XxkYEvvSv9XSHemsGnzmRwSEJJW8RPM0SGUDDo1T-aoBkjLSoE7WV8nO0qL-GESYQhpLOjkdzDycq9wL-ito6RIvHdc7JTyoP8cswyTsgr6B83ZcvmKPYYaQxmrUHDeuS0pauvY58Rv7d6ui91uCI8w3VtdA/s1700-e365/11.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="426" data-original-width="1200"></a></p>
<h3><strong>Read the full technical breakdown in the Security Intelligence&nbsp;Brief.&nbsp;<a href="https://www.reflectiz.com/learning-hub/taboola-temu-redirect-report/">Download now&nbsp;&rarr;</a><a href="https://www.reflectiz.com/learning-hub/taboola-temu-redirect-report/"></a></strong></h3>
<h2><strong>The "First-Hop Bias" Blind&nbsp;Spot</strong></h2>
<p>Most&nbsp;security stacks, including WAFs, static analyzers, and standard CSPs, share a common failure mode: they evaluate&nbsp;the <strong>declared&nbsp;origin</strong> of a script, not&nbsp;the <strong>runtime destination</strong> of its request&nbsp;chain.</p>
<p>If&nbsp;sync.taboola.com&nbsp;is in your Content Security Policy (CSP) allow-list, the browser considers the request legitimate. However, it does not re-validate against the terminal destination of&nbsp;a <strong>302&nbsp;redirect</strong>. By&nbsp;the time the browser reaches temu.com, it has inherited the trust granted to&nbsp;Taboola.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0QbtOoK8MI7htCehD5WBa4SBQnzWJK2E6JMG9Smn7sYrBan5GgjPfSewxt_4lw2D8jDB7SD-IWOdidlzZZP5y2GLbQpeKuuVNyqmT26KvQaA8vTJuq1ln31UhlIzAP62P5joyBfbe5PTcRSL1gPHt9cnYpLTFC1KPrCpSgHUW3aAdDDDZFIuVLwamyWo/s1700-e365/2.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0QbtOoK8MI7htCehD5WBa4SBQnzWJK2E6JMG9Smn7sYrBan5GgjPfSewxt_4lw2D8jDB7SD-IWOdidlzZZP5y2GLbQpeKuuVNyqmT26KvQaA8vTJuq1ln31UhlIzAP62P5joyBfbe5PTcRSL1gPHt9cnYpLTFC1KPrCpSgHUW3aAdDDDZFIuVLwamyWo/s1700-e365/2.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="565" data-original-width="1200"></a></p>
<h2><strong>The Forensic&nbsp;Trace</strong></h2>
<p>During&nbsp;a February 2026 audit of a European financial platform, Reflectiz identified the following redirect chain executing on logged-in account&nbsp;pages:</p>
<ol>
<li><strong>Initial Request:</strong> A GET request to https://sync.taboola.com/sg/temurtbnative-network/1/rtb/.</li>
<li><strong>The Redirect:</strong> The server responded with a <strong>302 Found</strong>, redirecting the browser to https://www.temu.com/api/adx/cm/pixel-taboola?....</li>
<li><strong>The Payload:</strong> The redirect included the critical header Access-Control-Allow-Credentials: true.</li>
</ol>
<p>This&nbsp;header specifically instructs the browser to include cookies in the cross-origin request to Temu&rsquo;s domain. This&nbsp;is the mechanism by which Temu can read or write tracking identifiers against a&nbsp;browser it now knows visited an authenticated banking&nbsp;session.</p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzs0lr9XSw76U9Nq7NYo7jXlgjd5XFWzvYdKnInNQBIS4igd8IisDchWo7BaVmKZN8Kf56B8JLMxpOZucb1gjeQto-4Uyf3k6piBd73Y9bf_q49-K497hPi6yelC8ZmPFktUQqmRUGI7-M44-RRwUMV9G9w5v48Hgsids5rEF7dnsnuNzuL385iCVklTI/s1700-e365/for.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzs0lr9XSw76U9Nq7NYo7jXlgjd5XFWzvYdKnInNQBIS4igd8IisDchWo7BaVmKZN8Kf56B8JLMxpOZucb1gjeQto-4Uyf3k6piBd73Y9bf_q49-K497hPi6yelC8ZmPFktUQqmRUGI7-M44-RRwUMV9G9w5v48Hgsids5rEF7dnsnuNzuL385iCVklTI/s1700-e365/for.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="533" data-original-width="1200"></a></p>
<h3><strong>Why Conventional Tools Missed&nbsp;It</strong></h3><p>

```html
</p><table readabilitydatatable="0">
  <tbody>
    <tr>
      <td>Tool</td>
      <td>Why it Fails</td>
    </tr>
    <tr>
      <td>WAF</td>
      <td>Inspects inbound traffic only; misses outbound browser-side redirects.</td>
    </tr>
    <tr>
      <td>Static Analysis</td>
      <td>Sees the Taboola code in the source but cannot predict runtime 302 destinations.</td>
    </tr>
    <tr>
      <td>CSP Allow-lists</td>
      <td>Trust is transitive; the browser follows the redirect chain automatically once the first hop is approved.</td>
    </tr>
  </tbody>
</table><p>
```


</p><h2><strong>The Regulatory&nbsp;Fallout</strong></h2>

<p>For&nbsp;regulated entities, the absence of direct credential theft does not limit the compliance exposure. Users&nbsp;were never informed their banking session behavior would be associated with a tracking profile held by PDD Holdings &mdash; a transparency failure under GDPR Art. 13. The&nbsp;routing itself involves infrastructure in a non-adequate country, and without Standard Contractual Clauses covering this specific fourth-party relationship, the transfer is unsupported under GDPR Chapter V. "We didn't know the pixel did that" is not a defense available to a data controller under Art.&nbsp;24.</p>
<p>The&nbsp;PCI DSS exposure compounds this. A&nbsp;redirect chain terminating at an unanticipated fourth-party domain falls outside the scope of any review that evaluated only the primary vendor &mdash; which is precisely&nbsp;what <a href="https://www.reflectiz.com/blog/pci-6-4-3/">Req.&nbsp;6.4.3</a> was written to&nbsp;close.</p>
<h2><strong>Inspect Runtime, Not Just Declarations</strong></h2>
<p>Right&nbsp;now, the same Taboola pixel configuration runs on thousands of websites. The&nbsp;question isn't whether redirect chains like this are happening. They&nbsp;are. The&nbsp;question is whether your security stack can see past the first hop &mdash; or whether it stops at the domain you approved and calls it&nbsp;done.</p>
<p><strong>For security&nbsp;teams:</strong> inspect runtime behavior, not just declared vendor&nbsp;lists.&nbsp;</p>
<p><strong>For legal and privacy&nbsp;teams:</strong> browser-level tracking chains on authenticated pages warrant the same rigor as backend integrations.</p>
<p><strong>The threat entered through the front door. Your&nbsp;CSP let it&nbsp;in.</strong></p>
<p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJhTv9HGat1e2aZraBNEqPJQHwXEKBeaQgbLREvE2RMChvPSgHns8vBaYiuM385B5FoBqQ03bRUduV1WwVsXhp0-uvW_oTdAp5J_ueagyDYyrdKWpgwZYUXZBG6otrtNLIwFS8nDDTLNqGAUo-gqMKhWuZYxp8hjlxUDyKF_EosAyBpWgCBkch8Fbem-o/s1700-e365/3.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJhTv9HGat1e2aZraBNEqPJQHwXEKBeaQgbLREvE2RMChvPSgHns8vBaYiuM385B5FoBqQ03bRUduV1WwVsXhp0-uvW_oTdAp5J_ueagyDYyrdKWpgwZYUXZBG6otrtNLIwFS8nDDTLNqGAUo-gqMKhWuZYxp8hjlxUDyKF_EosAyBpWgCBkch8Fbem-o/s1700-e365/3.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="879" data-original-width="1200"></a></p>
<h3><strong><a href="https://www.reflectiz.com/learning-hub/taboola-temu-redirect-report/">The full technical evidence log is in the Security Intelligence Brief. Download it here&nbsp;&rarr;</a></strong></h3>

<p>Found this article interesting? <span class="">This article is a contributed piece from one of our valued partners.</span> Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without a single security control registering a violation. Read the full technical breakdown in the...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu-3757.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSzIRGweO7UJkqOLQTUDsqPy53XtIWCzyLklGJLfFxhneZiFpxg8zJRXukUqEsT4TbdFwUZbvTfwuexfGuiYjcDQ-iZDjqwZ2lDlCIhgopZWevBpdi4rr6GxgXpU6MmFnzdMpq_WGdA9PRfaNw_7eDAOugAV1tccfmREgbXveM1N15G2_L9lFxCq1Pv0/s1700-e365/reflectiz.jpg"/>
            </item>
                    <item>
                <title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</title>
                <link>https://www.scamalert24.co.za/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution-3755.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Vulnerability / Network Security</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdjDVphpsoBIBjhimILabg28ZsD4p-xNzJol1uD3SSIRBvkp-juko45B2sjKpQmJi-h2tHZf2yWAvuCOZRs3m3q4w5sj7x-MyXWosuKglLblipF_94T8f8OQ8_peVgqZTrnjxF8dPRLfv63K8zrbQYqh898b31p_2C37UO0DNAuR8cESZeo4XTFlsDs0C/s1700-e365/cisco-flaws.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdjDVphpsoBIBjhimILabg28ZsD4p-xNzJol1uD3SSIRBvkp-juko45B2sjKpQmJi-h2tHZf2yWAvuCOZRs3m3q4w5sj7x-MyXWosuKglLblipF_94T8f8OQ8_peVgqZTrnjxF8dPRLfv63K8zrbQYqh898b31p_2C37UO0DNAuR8cESZeo4XTFlsDs0C/s1700-e365/cisco-flaws.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the&nbsp;service.</p>
<p>The details of the vulnerabilities are below&nbsp;-</p>
<ul>
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL">CVE-2026-20184</a></strong> (CVSS score: 9.8) - An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services.</li>
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ">CVE-2026-20147</a></strong> (CVSS score: 9.9) - An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests.</li>
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv">CVE-2026-20180 and CVE-2026-20186</a></strong> (CVSS scores: 9.9) - Multiple insufficient validation of user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker in possession of read only admin credentials to execute arbitrary commands on the underlying operating system of an affected device by sending crafted HTTP requests.</li>
</ul>

<p>"A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root," Cisco said in an advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.</p>
<div><p><a href="https://thehackernews.uk/ai-agentic-guide-d-3" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKLSgj9Smgyqpn4Kj-zAzWxJG1LUku8TpOERMxD6_hmMZQtXRFYXU-NA2ocnjrRafjkLtrxujKRuBstSZ4Il5z6hOu4oa7UM1FjkNoRQqrF5MWlShygYIqpnMGxHX2RHEBh9Y40x-p4PKn3cSlaWTEwKiVBDSoJgLPzR09dmp8HBffLlIqro73HVD30D00/s728-e100/nudge-d-3.jpg" width="729" height="91"></a></p></div>
<p>"In single-node ISE deployments, successful exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In&nbsp;that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored."</p>
<p>CVE-2026-20184 requires no customer action as it's cloud-based. However, customers who are using SSO&nbsp;are <a href="https://help.webex.com/en-us/article/nstvmyo/Manage-single-sign-on-integration-in-Control-Hub#task_394598AFBCD3D73A488E6DBB99AD3214">advised</a> to upload a new identity provider (IdP) SAML certificate to Control Hub. The&nbsp;remaining vulnerabilities have been addressed in the following versions&nbsp;-</p>
<ul>
<li><strong>CVE-2026-20147</strong>
<ul>
<li>Cisco ISE or ISE-PIC Release earlier than 3.1&nbsp;(Migrate to a fixed release)</li>
<li>Cisco ISE Release 3.1&nbsp;(3.1&nbsp;Patch 11)</li>
<li>Cisco ISE Release 3.2&nbsp;(3.2&nbsp;Patch 10)</li>
<li>Cisco ISE Release 3.3&nbsp;(3.3&nbsp;Patch 11)</li>
<li>Cisco ISE Release 3.4&nbsp;(3.4&nbsp;Patch 6)</li>
<li>Cisco ISE Release 3.5&nbsp;(3.5&nbsp;Patch 3)</li>
</ul>
</li>
<li><strong>CVE-2026-20180 and CVE-2026-20186</strong>
<ul>
<li>Cisco ISE Release earlier than 3.2&nbsp;(Migrate to a fixed release)</li>
<li>Cisco ISE Release 3.2&nbsp;(3.2&nbsp;Patch 8)</li>
<li>Cisco ISE Release 3.3&nbsp;(3.3&nbsp;Patch 8)</li>
<li>Cisco ISE Release 3.4&nbsp;(3.4&nbsp;Patch 4)</li>
<li>Cisco ISE Release 3.5&nbsp;(Not Vulnerable)</li>
</ul>
</li>
</ul>
<p>While Cisco noted that it is not aware of any of these shortcomings being exploited in the&nbsp;wild, it's essential that users&nbsp;update their instances to the latest version for optimal protection.</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution-3755.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdjDVphpsoBIBjhimILabg28ZsD4p-xNzJol1uD3SSIRBvkp-juko45B2sjKpQmJi-h2tHZf2yWAvuCOZRs3m3q4w5sj7x-MyXWosuKglLblipF_94T8f8OQ8_peVgqZTrnjxF8dPRLfv63K8zrbQYqh898b31p_2C37UO0DNAuR8cESZeo4XTFlsDs0C/s1700-e365/cisco-flaws.jpg"/>
            </item>
                    <item>
                <title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</title>
                <link>https://www.scamalert24.co.za/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks-3756.html</link>
                                <content:encoded><![CDATA[<div>
<p><span><i>&#59396;</i><span>Ravie Lakshmanan</span><i>&#59394;</i><span>Apr 16, 2026</span></span><span>Application Security / Threat Intelligence</span></p></div><div id="articlebody"><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNoBvtFhZbLfNE2AsVSzuOt5V9YMzAumIA2M9c7QVbp_i-xMwDIgVtDgCIi2bCYgH_PviS8P-Ap1k-8aVmHABqLzNGE9g014MM1gnfJEJPKbKczoCjPoI6PxZ77bNlz2dSlv8XqoVFyZZqQ6SWBue3rpRegb_k62HJkfMl39GHTBIIzZOGrv_iKbxOYV8E/s1700-e365/el.jpg"><img data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNoBvtFhZbLfNE2AsVSzuOt5V9YMzAumIA2M9c7QVbp_i-xMwDIgVtDgCIi2bCYgH_PviS8P-Ap1k-8aVmHABqLzNGE9g014MM1gnfJEJPKbKczoCjPoI6PxZ77bNlz2dSlv8XqoVFyZZqQ6SWBue3rpRegb_k62HJkfMl39GHTBIIzZOGrv_iKbxOYV8E/s1700-e365/el.jpg" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" alt="" data-original-height="470" data-original-width="900"></a></p>
<p>A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency&nbsp;sectors.</p>
<p>Dubbed <a href="https://www.elastic.co/security-labs/phantom-in-the-vault"><strong>REF6598</strong></a> by Elastic Security Labs, the activity has been found to leverage elaborate social engineering tactics through LinkedIn and Telegram to breach both Windows and macOS systems, approaching prospective individuals under the guise of a venture capital firm and then moving the conversation to a Telegram group where several purported partners are&nbsp;present.</p>
<p>The Telegram group chat is engineered to lend the operation a smidgen of credibility, with the members discussing topics related to financial services and cryptocurrency liquidity solutions. The&nbsp;target is then instructed to use Obsidian to access what appears to be a shared dashboard by connecting to&nbsp;a <a href="https://obsidian.md/help/vault">cloud-hosted&nbsp;vault</a> using the credentials provided to&nbsp;them.</p>
<div><p><a href="https://thehackernews.uk/ai-blindspot-d-2" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu/s728-e100/nudge-d-2.jpg" width="729" height="91"></a></p></div>
<p>It's this vault that triggers the infection sequence. As&nbsp;soon as the vault is opened in the note-taking application, the target is asked to enable "Installed community plugins" sync, effectively causing malicious code to be&nbsp;executed.</p>
<p>"The threat actors abuse Obsidian's legitimate community plugin ecosystem, specifically&nbsp;the <a href="https://github.com/Taitava/obsidian-shellcommands">Shell&nbsp;Commands</a>&nbsp;and <a href="https://github.com/kepano/obsidian-hider">Hider</a> plugins, to silently execute code when a victim opens a shared cloud vault," researchers Salim Bitam, Samir Bousseaden, and Daniel Stepanic said in a technical breakdown of the&nbsp;campaign.</p>
<p>Given that the option is disabled by default and cannot be remotely turned on, the attacker must convince the target to manually toggle the community plugin sync on their device so that the malicious vault configuration can trigger the execution of commands through the Shell Commands plugin. Also&nbsp;used in conjunction with Shell Commands is another plugin named Hider to hide certain user interface elements of Obsidian, such as status bar, scrollbar, tooltips, and&nbsp;others.</p>
<p>"While this attack requires social engineering to cross the community plugin sync boundary, the technique remains notable: it abuses a legitimate application feature as a persistence and command execution channel, the payload lives entirely within JSON configuration files that are unlikely to trigger traditional AV [antivirus] signatures, and execution is handed off by a signed, trusted Electron application, making parent-process-based detection the critical layer," the researchers&nbsp;said.</p>
<p>Dedicated execution paths are activated depending on the operating system. On&nbsp;Windows, the commands are used to invoke a PowerShell script to drop an intermediate loader codenamed PHANTOMPULL that decrypts and launches PHANTOMPULSE in&nbsp;memory.</p>
<p>PHANTOMPULSE is an artificial intelligence (AI)-generated backdoor that uses the Ethereum blockchain for resolving its command-and-control (C2) server by fetching&nbsp;the <a href="https://etherscan.io/tx/0x4ad9923ede3ba2dab91cd37a733c01a08d91caaa4a867b77a3597acb28d40c31">latest transaction</a> associated with&nbsp;a <a href="https://etherscan.io/address/0xc117688c530b660e15085bF3A2B664117d8672aA">hard-coded wallet&nbsp;address</a>. Upon&nbsp;obtaining the C2 address, the malware uses WinHTTP for communications, allowing it to send system telemetry data, fetch commands and transmit the execution results, upload files or screenshots, and capture keystrokes.</p>
<p>The supported commands are designed to facilitate comprehensive remote access&nbsp;-</p>
<ul>
<li><strong>inject</strong>, to inject shellcode/DLL/EXE into target process</li>
<li><strong>drop</strong>, to drop a file to disk and execute it</li>
<li><strong>screenshot</strong>, to capture and upload a screenshot&nbsp;</li>
<li><strong>keylog</strong>, to start/stop a keylogger</li>
<li><strong>uninstall</strong>, to initiate removal of persistence and perform cleanup</li>
<li><strong>elevate</strong>, to escalate privileges to SYSTEM via the <a href="https://learn.microsoft.com/en-us/windows/win32/com/the-com-elevation-moniker">COM elevation moniker</a></li>
<li><strong>downgrade</strong>, to transition from SYSTEM to elevated admin</li>
</ul>
<div><p><a href="https://thehackernews.uk/fast-response-not-fast-d" rel="nofollow noopener sponsored" target="_blank"><img alt="Cybersecurity" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=" data-src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A/s728-e100/tl-d.jpg" width="729" height="91"></a></p></div>
<p>On macOS, the Shell Commands plugin delivers an obfuscated AppleScript dropper that iterates over a hard-coded domain list, while employing Telegram as a dead drop resolver for fallback C2 resolution. This&nbsp;approach also offers added flexibility as it makes it possible to easily rotate C2 infrastructure, rendering domain-based blocking insufficient.</p>
<p>In the final step, the dropper script contacts the C2 domain to download and execute a second-stage payload via osascript. The&nbsp;exact nature of this payload remains unknown given that the C2 servers are currently offline. The&nbsp;intrusion was ultimately unsuccessful, as the attack was detected and blocked before the adversary could accomplish their goals on the infected&nbsp;machine.</p>
<p>"REF6598 demonstrates how threat actors continue to find creative initial access vectors by abusing trusted applications and employing targeted social engineering," Elastic said. "By abusing Obsidian's community plugin ecosystem rather than exploiting a software vulnerability, the attackers bypass traditional security controls entirely, relying on the application's intended functionality to execute arbitrary&nbsp;code."</p>

<p>Found this article interesting?  Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</p>
</div>
]]></content:encoded>
                                <description><![CDATA[A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors....]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks-3756.html</guid>
                <pubDate>Thu, 16 Apr 2026 15:00:08 +0300</pubDate>
                <media:thumbnail url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNoBvtFhZbLfNE2AsVSzuOt5V9YMzAumIA2M9c7QVbp_i-xMwDIgVtDgCIi2bCYgH_PviS8P-Ap1k-8aVmHABqLzNGE9g014MM1gnfJEJPKbKczoCjPoI6PxZ77bNlz2dSlv8XqoVFyZZqQ6SWBue3rpRegb_k62HJkfMl39GHTBIIzZOGrv_iKbxOYV8E/s1700-e365/el.jpg"/>
            </item>
                    <item>
                <title>Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads</title>
                <link>https://www.scamalert24.co.za/systemic-flaw-in-mcp-protocol-could-expose-150-million-downloads-3754.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-69526c10-486b-460c-a915-31e880b8b4e9" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Security researchers have warned of a &ldquo;critical, systemic&rdquo; vulnerability in the model context protocol (MCP) which could have a significant impact on the AI supply chain.</p>

<p>MCP is a popular open source standard created by <a href="https://www.infosecurity-magazine.com/news/anthropic-launch-project-glasswing/" target="_self">Anthropic</a> which allows AI models to connect to external data and systems.</p>

<p>However,&nbsp;<a href="https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/?_gl=1*4551xv*_up*MQ..*_ga*MzcwNjU4OTgwLjE3NzYzMzM3NTc.*_ga_BEXTPVWPX8*czE3NzYzMzM3NTUkbzEkZzAkdDE3NzYzMzM3NTUkajYwJGwwJGgw" target="_self">in a&nbsp;report published on April 15</a>, researchers at Ox Security claimed that a flaw in the protocol could enable arbitrary command execution on any vulnerable system, handing attackers access to sensitive user data, internal databases, API keys, and chat histories.</p>

<p>&ldquo;This is not a traditional coding error,&rdquo; warned the vendor.</p>

<p>&ldquo;It is an architectural design decision baked into Anthropic&rsquo;s official MCP SDKs across every supported programming language, including Python, TypeScript, Java, and Rust. Any developer building on the Anthropic MCP foundation unknowingly inherits this exposure.&rdquo;</p>

<p>It said that over 200 open source projects, 150 million downloads, 7000+ publicly accessible servers and up to 200,000 vulnerable instances in total could be exposed by the vulnerability.</p>

<p><a href="https://www.infosecurity-magazine.com/news/mcp-servers-risk-rce-data-leaks/" target="_blank"><em>Read more on MCP: Hundreds of MCP Servers at Risk of RCE and Data Leaks.</em></a></p>

<p>According to Ox Security, the exploit mechanism is fairly straightforward.</p>

<p>&ldquo;MCP&rsquo;s STDIO interface was designed to launch a local server process. But the command is executed regardless of whether the process starts successfully,&rdquo; it explained. &ldquo;Pass in a malicious command, receive an error &ndash; and the command still runs. No sanitization warnings. No red flags in the developer toolchain. Nothing.&rdquo;</p>

<p>In effect, this could result in complete takeover of a target&rsquo;s system.</p>

<h2><strong>Who&rsquo;s to Blame?</strong></h2>

<p>Ox Security said it has repeatedly tried to persuade Anthropic to patch the vulnerability. However, according to the report,&nbsp;the AI giant said that this was &ldquo;expected behavior.&rdquo;</p>

<p>&ldquo;Anthropic confirmed the behavior is by design and declined to modify the protocol, stating the STDIO execution model represents a secure default and that sanitization is the developer&rsquo;s responsibility,&rdquo; Ox Security said.</p>

<p>The company argued that pushing responsibility onto developers for securing their code, instead of securing the infrastructure it runs on, is dangerous given the community&rsquo;s track record on security.</p>

<p>In the meantime, Ox Security has issued over 30 responsible disclosures and discovered over 10 high or critical-severity CVEs, to help patch individual open source projects.</p>

<p><a href="https://www.infosecurity-magazine.com/profile/kevin-curran/" target="_self">Kevin Curran</a>,&nbsp;IEEE&nbsp;senior member and professor of cybersecurity at Ulster University, said the research exposed &ldquo;a shocking gap in the&nbsp;security&nbsp;of foundational AI infrastructure&rdquo; and that the researchers did the right thing.</p>

<p>&ldquo;We are trusting these systems with increasingly sensitive data and real-world actions. If the very protocol meant to connect AI agents is this fragile and its creators will not fix it then every company and developer building on top of it needs to treat this as an immediate wake-up call,&rdquo; he added.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/systemic-flaw-in-mcp-protocol-could-expose-150-million-downloads-3754.html</guid>
                <pubDate>Thu, 16 Apr 2026 14:00:14 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/39d74ef9-10ab-43a2-9887-96ca48a1d701.jpg"/>
            </item>
                    <item>
                <title>Insurance carriers quietly back away from covering AI outputs</title>
                <link>https://www.scamalert24.co.za/insurance-carriers-quietly-back-away-from-covering-ai-outputs-3753.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				Many insurers have begun to exempt AI workloads from cybersecurity and errors and omissions coverage, saying their outputs are too unpredictable to write policies around.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>Several major insurance carriers have begun to back away from providing cybersecurity and other insurance to companies using AI to run internal processes, insiders say.</p>



<p>While there&rsquo;s no standard response to customer use of AI in the insurance market, many carriers are now quietly declining to write policies for claims related to AI-generated outputs in <a href="https://www.cio.com/article/4148261/are-nations-ready-to-be-the-cybersecurity-insurers-of-last-resort.html?utm=hybrid_search">cybersecurity</a> and <a href="https://www.investopedia.com/terms/e/errors-omissions-insurance.asp">errors and omissions</a> (E&amp;O) coverage, these observers say. Other insurance carriers are jacking up prices to cover AI-related claims, they say.</p>



<p>Dozens of insurance carriers appear to be rethinking coverage for mistakes related to AI, says <a href="https://www.linkedin.com/in/connordeeks/">Connor Deeks</a>, CEO of Codestrap, an AI development and consulting firm that works with insurance firms.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Many insurance companies aren&rsquo;t comfortable with covering AI outputs because they can&rsquo;t track the reasoning path the AI took to come up with a result, he says.</p>

		

			


<p>&ldquo;That&rsquo;s playing out downstream with insurance companies basically carving out coverage, whether that&rsquo;s across cybersecurity or E&amp;O,&rdquo; he says. &ldquo;All of these vibe-coded solutions and these AI systems that people have constructed have inherent risk baked into the cake now, and you can&rsquo;t actually see the full process.&rdquo;</p>



<p>The insurance carrier concerns about AI workloads first surfaced in November 2025, when <a href="https://www.ft.com/content/abfe9741-f438-4ed6-a673-075ec177dc62?syn-25a6b1a6=1">Financial Times reported</a> that three major carriers, AIG, Great American, and W.R. Berkley, filed requests with US regulators to offer insurance policies that exclude liabilities tied to AI tools such as chatbots and agents. At the time, those requests appeared to be preemptive moves to be allowed to exclude AI mistakes sometime in the future.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>But now, many carriers seem to be moving forward with plans to exclude <a href="https://www.cio.com/article/190888/5-famous-analytics-and-ai-disasters.html">AI mistakes</a> from policies, Deeks says. Several carriers he&rsquo;s been in contact with are moving to limit or end coverage for AI-related business disruptions and liabilities, he adds. The irony is that many insurance carriers are <a href="https://www.cio.com/article/3812588/3-key-areas-where-ai-is-transforming-insurance-today.html">embracing AI</a> for their own internal purposes.</p>



<p>Deeks&rsquo; company has a vested interest in AI insurance coverage &mdash; Codestrap markets its AI coding platform as traceable and therefore insurable &mdash; but other industry insiders have also seen similar carrier decisions.</p>



<h2 id="carriers-find-exclusions">Carriers find exclusions</h2>



<p>It&rsquo;s still unclear how many carriers will refuse to insure AI workloads, but several carriers are now writing insurance policies that exempt coverage for AI-related business chaos, says <a href="https://nsigroup.org/about-us/leadership/team-member/jason-bishara/">Jason Bishara</a>, financial practice leader at global carrier NSI Insurance Group.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The risk appetite is changing among the carriers, and it&rsquo;s always constantly evolving,&rdquo; he says. &ldquo;With regard to AI, there are carriers that are just removing it from their risk appetite and declining to quote altogether.&rdquo;</p>



<p>While some carriers have declined to cover AI outputs, others are building in rate hikes to cover the increased risk, Bishara says. While he doesn&rsquo;t have numbers on the extent of the rate hikes, they are significant, he adds.</p>



<p>&ldquo;Every business has insurance, and every business now is using AI to some extent,&rdquo; he adds. &ldquo;Are you seeing those liabilities and exclusions within these policies and an aversion to it from the carriers? The answer is yes.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Carriers are also treating AI vendors differently than AI users, he says. In many cases, carriers are declining to cover AI vendors altogether, while they carve out exceptions in policies against covering AI at companies using the technology.</p>



<p>&ldquo;If you&rsquo;re an AI-related company or specifically an AI company, there&rsquo;s a good chance that you&rsquo;ll get a declination at this point,&rdquo; he adds.</p>



<p>In recent months, many carriers have been asking detailed questions about how customers are using AI to better understand the risk of insuring potential mishaps, he says. Ultimately, this increased scrutiny will make it more difficult for companies to buy insurance for AI workloads.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;For everybody leveraging AI right now, you&rsquo;re seeing questions like, &lsquo;What are your AI policies? What are your procedures? How are you leveraging AI within your business?&rsquo;&rdquo; Bishara adds. &ldquo;We&rsquo;re getting a lot of questions from the underwriters on, &lsquo;How do you leverage AI within your business?&rsquo;&rdquo;</p>



<h2 id="coverage-in-flux">Coverage in flux</h2>



<p><a href="https://www.linkedin.com/in/philkarecki/">Phil Karecki</a>, CTO for the insurance sector at managed services provider Ensono, also sees some carriers backing away from covering AI outputs, although he&rsquo;s not sure whether it&rsquo;s a major trend. Insurance carriers continuously experiment with how to provide coverage, he notes.</p>



<p>Carriers have tried to separate tightly governed AI deployments from more experimental projects when determining whether to provide coverage, he says.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;You&rsquo;ve got this bifurcation of AI, the governed generative and the autonomous pieces,&rdquo; he says. &ldquo;It&rsquo;s no longer, &lsquo;Are you using AI?&rsquo; It&rsquo;s asking, &lsquo;Are you using governed AI? How are you governing it? How are you keeping it safe and secure?&rsquo;&rdquo;</p>



<p>Carriers have been trying to determine whether covering AI workloads can be profitable for them, Karecki adds. Governed AI tools operating in a bounded decision-making process will be more insurable, while experimental AI systems with no monitoring and no easy rollback will be difficult to cover, he notes.</p>



<p>&ldquo;There&rsquo;s a repositioning versus a pullback, and that&rsquo;s very common to the industry, and they will at times open up coverage just to see if it&rsquo;s this type of insurance that will sell,&rdquo; he says. &ldquo;They will assess the results and what needs to change so they can decide whether to re-enter this marketplace or abandon it completely.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>In some cases, whether an AI system is insurable may come down to circumstances at individual insurance customers. Carriers in general don&rsquo;t want to get out of the business of providing insurance, Karecki says.</p>



<p>&ldquo;What they&rsquo;re working for right now is, &lsquo;How do I make this profitable, and is this sector insurable?&rsquo;&rdquo; he says. &ldquo;They make those decisions on every application regardless, but now, depending upon what they&rsquo;re being asked to insure, the questions will follow. &lsquo;What are you using AI for? How are you governing it? What risks does that introduce?&rsquo;&rdquo;</p>



<p>It makes sense that some carriers have begun to question whether to cover AI outputs, given the current level of unreliability of most AI systems, says <a href="https://www.linkedin.com/in/dorian-smiley-97a72a14/">Dorian Smiley</a>, CTO at Codestrap.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>&ldquo;The math says these models should be deterministic, like given the same input, you should get the same output,&rdquo; he says. &ldquo;But you can get very different output from the same input, and they can&rsquo;t know if the answer that they&rsquo;re giving you is actually correct.&rdquo;</p>



<p>In most cases, AI models lack inductive reason and can&rsquo;t review their own work, but many organizations are talking about deploying hundreds of <a href="https://www.cio.com/article/4152601/without-controls-an-ai-agent-can-cost-more-than-an-employee.html">autonomous agents</a> and treating them like digital employees, he notes.</p>



<p>&ldquo;The idea that these agents are going to become employees, autonomous people working in your organization, is insane,&rdquo; he says. &ldquo;You would never hire a person that can&rsquo;t learn new information, can&rsquo;t reliably retrieve information, or check their own work.&rdquo;</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>NSI&rsquo;s Bishara has advice for IT and business leaders looking for insurance coverage for their AI workloads: Be honest about how they&rsquo;re using AI. If they try to hide their AI risks, they risk having their claims rejected when something goes wrong, he says.</p>



<p>&ldquo;If you don&rsquo;t fully disclose these things appropriately in the way in which you&rsquo;re functioning and operating, it could be utilized as an excuse to deny a claim at a later date,&rdquo; he says. &ldquo;You don&rsquo;t want a carrier to come back and say, &lsquo;We didn&rsquo;t underwrite to that risk. We asked these questions, and you didn&rsquo;t disclose it.&rsquo;&rdquo;</p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[Several major insurance carriers have begun to back away from providing cybersecurity and other insurance to companies using AI to run internal processes, insiders say. While there’s no standard response to customer use of AI in the insurance market,...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/insurance-carriers-quietly-back-away-from-covering-ai-outputs-3753.html</guid>
                <pubDate>Thu, 16 Apr 2026 14:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4159292-0-25050800-1776333897-ai-misfires-no-roi-shutterstock_2633982077.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>Automotive Ransomware Attacks Double in a Year</title>
                <link>https://www.scamalert24.co.za/automotive-ransomware-attacks-double-in-a-year-3752.html</link>
                                <content:encoded><![CDATA[<div>&#13;
                            &#13;
                            <div>&#13;
                                <div id="layout-a69ecda0-c683-41e3-88b0-a0ef0edae9e9" data-layout-id="2" data-edit-folder-name="text" data-index="0"><p>Ransomware is now the fastest growing and most disruptive cyber threat facing the automotive sector, accounting for 44% of attacks on carmakers in 2025, according to Halcyon.</p>

<p>The security vendor crunched data from multiple sources to compile a new report on the industry. It claimed that ransomware attacks on carmakers more than doubled in 2025.</p>

<p>&ldquo;The surge in attacks reflects a calculated shift by cybercriminals who increasingly view the automotive industry as a lucrative target, driven by its rapid adoption of connected technology, growing reliance on cloud services, and a sprawling network of third-party suppliers that broadens criminals' opportunities to strike,&rdquo; the report noted.</p>

<p>It pointed to connected vehicle platforms, over-the-air (OTA) update mechanisms and cloud-based environments as having expanded the typical corporate attack surface in the sector.</p>

<p>Smaller suppliers with potentially poor security posture often have privileged access to OEMs&rsquo; IT systems, the report added.</p>

<p><a href="https://www.infosecurity-magazine.com/news/jlr-posts-639m-q2-losses/" target="_blank"><em>Read more on ransomware in the automotive sector: Cyber-Attack Costs Carmaker JLR $258m in Q2</em></a></p>

<p>The report also noted that carmakers are an increasingly popular target for attack due to their low tolerance for downtime.</p>

<p>That was highlighted last year when Jaguar Land Rover (JLR) suffered a ransomware-related production outage that stretched to five weeks, costing the firm an estimated &pound;108m per week in fixed costs and lost profit.</p>

<p><a href="https://www.infosecurity-magazine.com/news/jlr-hack-uk-costliest-ever-19bn/" target="_blank">That attack was branded</a> the most expensive in history, hitting the UK economy to the tune of &pound;1.9bn thanks to the significant knock-on effect among smaller supply chain partners that were forced to halt their production lines.</p>

<h2><strong>Halcyon&rsquo;s Mitigation Advice for the Sector</strong></h2>

<p>Halcyon urged automotive sector IT teams to get ahead of the ransomware threat by:</p>

<ul>
	<li>Patching perimeter and edge devices and assets, such as VPNs, RDP endpoints and ERP systems</li>
	<li>Deploying phishing-resistant multi-factor authentication (MFA) with a focus on on VPNs, remote access, and privileged accounts. And auditing third-party access and removing/rotating legacy credentials</li>
	<li>Hardening endpoint detection and response (EDR) tools against tampering and disabling</li>
	<li>Maintaining immutable, offline backups isolated from domain-joined systems, and testing restoration regularly</li>
	<li>Establishing baseline security requirements for supply chain partners, including software providers, and actively monitoring for breaches in third-party tools</li>
	<li>Deploying an anti-ransomware solution that can detect tell-tale behavioral patterns and stop threats before encryption</li>
</ul>

<p>Ransomware incidents over the past year or two have struck all parts of the value chain, from manufacturers and major suppliers to connected vehicle systems, the report said.</p>

<p>&ldquo;Given these escalating threats, companies across the automotive supply chain should prioritize understanding their exposure, strengthening their defenses, and ensuring they are prepared to respond when an attack occurs,&rdquo; Halcyon added.</p>
</div>&#13;
                            </div>&#13;
                        </div>
]]></content:encoded>
                                <description><![CDATA[Halcyon says ransomware now accounts for more than two-fifths of cyber-attacks targeting carmakers]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/automotive-ransomware-attacks-double-in-a-year-3752.html</guid>
                <pubDate>Thu, 16 Apr 2026 13:00:14 +0300</pubDate>
                <media:thumbnail url="https://assets.infosecurity-magazine.com/webpage/og/e40165e0-2e1c-41f4-a0f0-58f62e458291.jpg"/>
            </item>
                    <item>
                <title>The endless CISO reporting line debate — and what it says about cybersecurity leadership</title>
                <link>https://www.scamalert24.co.za/the-endless-ciso-reporting-line-debate-and-what-it-says-about-cybersecurity-leadership-3751.html</link>
                                <content:encoded><![CDATA[
	
		<div>
			<div>
				<div>
					<div>
						<div>
							<div>
								<div>
											<div>
			<h2>
				It&rsquo;s 2026 and we&rsquo;re still arguing about who the CISO reports to. The truth? The chart matters less than whether the CISO has the actual authority to influence the entire business.			</h2>
			
		</div>
					
											</div>
							</div>
						</div>					
						<div id="remove_no_follow">
		<div>
					  <div>
						<div>




<p>It is difficult to understand why, in 2026, we are still debating the reporting line of the chief information security officer (CISO).</p>



<p>It is one of the first topics I wrote about in <a href="https://corixpartners.com/information-security-the-reporting-line-of-the-ciso-is-key-to-success-blog/">2015</a>, and after more than two decades of high-profile cyber incidents, sustained regulatory pressure, massive technology investments and the steady elevation of cybersecurity to boardroom agendas, one might reasonably expect that this issue would have been settled long ago.</p>



<p>Yet the question persists. And articles like this <a href="https://www.csoonline.com/article/4136293/its-time-to-rethink-ciso-reporting-lines.html">It&rsquo;s time to rethink CISO reporting lines</a> show that the debate is still raw.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The fact that the debate continues tells us something important. It reveals that many organizations still struggle with a more fundamental question: What exactly is the role of the CISO within the enterprise?</p>

		

			


<h2 id="the-reporting-line-matters-but-it-was-never-the-real-question">The reporting line matters &mdash; but it was never the real question</h2>



<p>Let me be clear. The reporting line matters. It matters because it defines the authority, visibility and influence of the security function across the organization. It signals internally how seriously cybersecurity is taken and determines how effectively the CISO can engage with the executive leadership team.</p>



<p>But the reporting line was never the real question.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The real question is whether the CISO has the organizational standing necessary to influence decisions across multiple silos: IT, operations, legal, compliance, HR, procurement, third-party suppliers and increasingly a complex ecosystem of partners and digital platforms.</p>



<p>Cybersecurity is one of the very few corporate functions that touch virtually every part of the enterprise. It is therefore inherently cross-functional. Without sufficient authority and visibility, the CISO cannot hope to influence behaviour across the organization, let alone drive meaningful change.</p>



<p>If we are still debating the reporting line in 2026, it is largely because many organizations still treat cybersecurity as a technical issue rather than a leadership issue.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<h2 id="the-governance-gap-behind-the-debate">The governance gap behind the debate</h2>



<p>The persistence of this debate reflects a broader governance gap.</p>



<p>Historically, information security emerged as a technical discipline embedded within IT departments. Early security teams focused primarily on protecting infrastructure: Firewalls, access controls, network monitoring and vulnerability management. In that environment, it was natural for the security function to sit within the IT organization.</p>



<p>But the nature of cyber risk has evolved dramatically.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Cybersecurity today is not merely about protecting technology infrastructure. It is about protecting digital business models, customer trust, intellectual property, operational resilience and in some sectors even national security interests.</p>



<p>In other words, cybersecurity has become a strategic business issue.</p>



<p>And yet, in many organizations, the governance structures surrounding cybersecurity have not evolved at the same pace.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The continuing debate about the CISO reporting line is therefore less about organizational design and more about whether companies have fully internalised the strategic nature of cyber risk.</p>



<h2 id="there-is-no-universal-reporting-line">There is no universal reporting line</h2>



<p>Another recurring misconception is the search for a universal answer.</p>



<p>Every year, surveys attempt to determine the &ldquo;correct&rdquo; reporting line for the CISO. Some conclude that the CISO should report to the CEO. Others recommend the CRO or the COO. Some insist that independence from IT is essential.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>In reality, there is no universal model. The reporting line remains a means to an end.</p>



<p>Organizations differ widely in their structure, culture, maturity and regulatory environment. What works in one organization may not work in another.</p>



<p>In many organizations, the CIO remains the most natural reporting line for the CISO, particularly where technology transformation and digital innovation are core strategic priorities. In others, the COO or the CEO may be better placed to support the operational changes required to embed security across business processes.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>What matters is not the job title of the executive above the CISO.</p>



<p>What matters is whether that individual has the authority, credibility, organizational reach and personal willingness to support the security agenda.</p>



<h2>Authority matters &mdash; and quite a lot of that is forged in the <a href="https://www.amazon.com/dp/B0G1BLTC2L">first 100 days</a></h2>



<p>When a new CISO joins an organization, their immediate priority is rarely technical. Instead, it is organizational: Understanding the business, mapping stakeholders, assessing governance structures and identifying the cultural barriers that may hinder security improvements.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>During those first months, the CISO must build credibility quickly across multiple constituencies. They must engage with senior executives, operational leaders, technology teams and sometimes regulators or external partners.</p>



<p>None of this can be done effectively if the CISO lacks organizational authority.</p>



<p>A reporting line that leaves the CISO buried several layers below executive leadership severely limits their ability to build the relationships required to succeed. Conversely, a reporting line that provides direct access to senior decision-makers can dramatically accelerate the process.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>The reporting line, therefore, matters not because it determines technical decisions, but because it determines access, influence and credibility.</p>



<h2 id="the-illusion-of-structural-solutions">The illusion of structural solutions</h2>



<p>At the same time, we should be careful not to overstate the importance of organizational charts.</p>



<p>A common mistake is to assume that moving the CISO reporting line will automatically solve cybersecurity challenges.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>It will not.</p>



<p>Cybersecurity failures rarely occur because the organizational chart was incorrect. They occur because of poor governance, weak leadership, unclear accountability or cultural resistance to change.</p>



<p>The most effective CISOs succeed not because of perfect reporting structures but because they build trust, credibility and influence across the organization.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>Which brings us to perhaps the most important factor of all: The relationship between the CISO and their direct superior.</p>



<h2 id="trust-matters-more-than-structure">Trust matters more than structure</h2>



<p>In practice, the success of the CISO depends heavily on the quality of the relationship with the executive to whom they report.</p>



<p>That relationship must be built on trust, alignment and shared understanding of the organization&rsquo;s risk appetite and strategic priorities.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>If the executive above the CISO understands the importance of cybersecurity and is willing to champion the security agenda at the board level and across the firm, the reporting structure can work extremely well.</p>



<p>If that support is absent because the business at large does not see the strategic importance of cybersecurity, no reporting line will magically solve the problem.</p>



<h2 id="the-myth-of-the-cio-ciso-conflict">The myth of the CIO&ndash;CISO conflict</h2>



<p>One final argument frequently raised in these discussions is the supposed &ldquo;conflict of interest&rdquo; between the CIO and the CISO.</p>



<p>According to this theory, the CISO should not report to the CIO because the CIO is responsible for delivering technology projects and operational performance, while the CISO is responsible for enforcing security controls that may slow things down.</p>
</div>
							</div>
							</div>
							
							<div>
								<div>
									<div>


<p>This argument may have had some relevance 20 years ago, when security functions were primarily responsible for auditing IT operations.</p>



<p>But today, it increasingly reflects an outdated understanding of both roles.</p>



<p>Modern cybersecurity is deeply intertwined with technology architecture, cloud platforms, DevOps pipelines, digital transformation programs and operational resilience initiatives. Security cannot be treated as an external oversight function policing IT from a distance.</p>



<p>It must be embedded within technology strategy itself. Any modern CIO should see it that way.</p>



<p>In that environment, close collaboration between the CIO and the CISO is not only desirable &mdash; it is essential.</p>



<p>Framing the relationship as a structural budgetary conflict and a source of friction is counterproductive and outdated. The real objective should not be to avoid friction but to engineer alignment: Ensuring that technology leadership and security leadership work together to support the organization&rsquo;s strategic goals.</p>



<h2 id="moving-beyond-the-debate">Moving beyond the debate</h2>



<p>Ultimately, the continuing debate about the CISO reporting line distracts the security industry from more important questions.</p>



<p>What matters far more is whether cybersecurity is integrated into corporate governance, supported by executive leadership and aligned with business strategy.</p>



<p>If organizations are still arguing about where the CISO should sit in 2026, it may simply indicate that they have not yet fully accepted the strategic nature of cyber risk.</p>



<p>And until that changes, the debate will likely continue.</p>



<p>Not because the answer is difficult &mdash; but because the underlying governance challenge remains unresolved.</p>



<p><strong>This article is published as part of the Foundry Expert Contributor Network.</strong><br><strong><a href="https://www.csoonline.com/expert-contributor-network/">Want to join?</a></strong></p>
</div></div></div></div>					</div>
				</div>
			</div>

			
			<div id="rightrail-wrapper">
				<div>
							
			<div>
					<p>
				SUBSCRIBE TO OUR NEWSLETTER			</p>
							<h3>
				From our editors straight to your inbox			</h3>
							<p>
				Get started by entering your email address below.			</p>
				
	</div>
 			 
				</div>
			</div>
			

		</div>
	

]]></content:encoded>
                                <description><![CDATA[It is difficult to understand why, in 2026, we are still debating the reporting line of the chief information security officer (CISO). It is one of the first topics I wrote about in 2015, and after more than two...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/the-endless-ciso-reporting-line-debate-and-what-it-says-about-cybersecurity-leadership-3751.html</guid>
                <pubDate>Thu, 16 Apr 2026 13:00:10 +0300</pubDate>
                <media:thumbnail url="https://www.csoonline.com/wp-content/uploads/2026/04/4158505-0-21120100-1776330190-vitaly-gariev-y7xUr3aDLXc-unsplash.jpg?quality=50&amp;strip=all&amp;w=1024"/>
            </item>
                    <item>
                <title>2026-2174 - Responsale Supply Chain locale / Head of Local Supply Chain H/F</title>
                <link>https://www.scamalert24.co.za/2026-2174-responsale-supply-chain-locale-head-of-local-supply-chain-h-f-3750.html</link>
                                <content:encoded><![CDATA[<div id="contenu-ficheoffre" data-class="ts-offer-details-content">&#13;
&#13;
        &#13;
&#13;
            <h2>&#13;
                Informations g&eacute;n&eacute;rales&#13;
            </h2>&#13;
&#13;
            <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_entityBlock">&#13;
                &#13;
                <p><img id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_Logo" title="Entité légale (HRRO) - Clé Oracle (logo)" src="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183" alt="Entité légale (HRRO) - Clé Oracle (logo)">&#13;
                </p>&#13;
&#13;
                <div id="ctl00_ctl00_corpsRoot_corps_composantDetailOffre_divEntityDesc">&#13;
                    <h3>&#13;
                        Entit&eacute; de rattachement&#13;
                    </h3><p>&#13;
                    Parmi les leaders du march&eacute; des services maritimes &agrave; l'offshore, BOURBON propose aux producteurs d'&eacute;nergie en mer les plus exigeants une vaste gamme de services maritimes de surface et sous-marins, sur les champs p&eacute;troliers, gaziers et &eacute;oliens. Cette offre de services repose sur une flotte moderne et standardis&eacute;e de 223 navires et sur plus de 5 842 professionnels hautement qualifi&eacute;s. En recherche permanente d'excellence op&eacute;rationnelle, le groupe offre &agrave; ses clients un service de proximit&eacute; dans ses 37 pays d'intervention, en garantissant les plus hauts standards de qualit&eacute; et de s&eacute;curit&eacute;. En 2024, BOURBON a r&eacute;alis&eacute; un chiffre d'affaires ajust&eacute; de plus de 733 M&euro;.&nbsp;&nbsp;&#13;
                </p></div>&#13;
&#13;
                &#13;
        &#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
                &#13;
&#13;
            </div><h3>&#13;
	Type d'offre (personnel s&eacute;dentaire/navigant)&#13;
</h3><p id="fldoffer_customcodetablevalue1">Personnel s&eacute;dentaire</p><h2>Description du poste</h2><h3>&#13;
	Intitul&eacute; du poste&#13;
</h3><p id="fldjobdescription_jobtitle">Responsale Supply Chain locale / Head of Local Supply Chain H/F</p><h3>&#13;
	Contrat&#13;
</h3><p id="fldjobdescription_contract">CDI</p><h3>&#13;
	R&ocirc;les et responsabilit&eacute;s&#13;
</h3><div id="fldjobdescription_description1">&#13;
	<p>BOURBON recrute un(e)</p><p><span><strong>Responsable Supply Chain locale / Head of Local Supply Chain H/F</strong></span></p><p>Rattach&eacute; au Chief Supply Chain Officer &middot; International vous &ecirc;tes garant de la performance op&eacute;rationnelle de la Supply Chain dans les filiales et agences du Groupe &agrave; l'international, vous assurez l'alignement entre la strat&eacute;gie Groupe et l'ex&eacute;cution terrain, en garantissant excellence op&eacute;rationnelle, fiabilit&eacute; et continuit&eacute; de bout en bout.</p><p><span><strong>VOS MISSIONS ET RESPONSABILITES&nbsp;:</strong></span></p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous pilotez la performance E2E des filiales : procurement, logistique, douanes, stock et last-mile</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous managez hi&eacute;rarchiquement les SCM locaux et d&eacute;veloppez leur maturit&eacute; op&eacute;rationnelle</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous d&eacute;finissez et challengez les KPI, animez les revues op&eacute;rationnelles et pilotez les plans d'actions correctifs</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous coordonnez en &eacute;troite collaboration avec les fonctions Groupe : Procurement, Logistique, Douanes, Digitalisation</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous assurez la couverture des agences sans &eacute;quipe SCM d&eacute;di&eacute;e via des mod&egrave;les adapt&eacute;s (mutualis&eacute;s, 3PL, gouvernance &agrave; distance)</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous contribuez activement &agrave; l'am&eacute;lioration continue, &agrave; l'harmonisation des processus et &agrave; la transformation digitale</p>&#13;
</div><h3>&#13;
	Profil&#13;
</h3><div id="fldjobdescription_description2">&#13;
	<p><span><strong>VOTRE PROFIL</strong></span></p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous &ecirc;tes titulaire d'un Bac+5 en Business, Ing&eacute;nierie, Supply Chain ou &eacute;quivalent</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous justifiez d'au moins 10 ans d'exp&eacute;rience en logistique internationale multi-pays</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez une exp&eacute;rience terrain en Afrique obligatoire, dont Afrique de l'Ouest</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous ma&icirc;trisez les environnements logistiques complexes, les proc&eacute;dures douani&egrave;res et les contraintes last-mile</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous exercez un leadership pragmatique, exigeant et orient&eacute; excellence op&eacute;rationnelle</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dans un environnement fortement international, vous avez une excellente maitrise du fran&ccedil;ais et de l&rsquo;anglais.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vous avez un bel esprit d&rsquo;&eacute;quipe, f&eacute;d&eacute;rateur vous faites preuve d&rsquo;un fort engagement&nbsp;et d&rsquo;excellentes qualit&eacute;s relationnelles&nbsp;; vous &ecirc;tes un tr&egrave;s bon communiquant (oral et &eacute;crit) et vous savez animer des r&eacute;unions avec aisance.</p><p>-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; En contexte international, vous avez une parfaite maitrise du fran&ccedil;ais et de l&rsquo;anglais (lu, &eacute;crit et oral), ainsi que des outils informatiques (Outlook, EXCEL, BI, PowerPoint&hellip;).</p><p>Poste en CDI bas&eacute; &agrave; Marseille, &agrave; pourvoir d&egrave;s que possible.</p><p>Dans le cadre de notre politique d&rsquo;emploi, ce poste est ouvert aux personnes en situation de handicap.</p>&#13;
</div><h3>&#13;
	Pourquoi choisir Bourbon ?&#13;
</h3><p id="fldjobdescription_longtext1">Parmi les leaders du march&eacute;, Bourbon propose aux soci&eacute;t&eacute;s p&eacute;troli&egrave;res et gazi&egrave;res les plus exigeantes, une large gamme de services maritimes, de surface et sous-marins, pour les champs offshores et les parcs &eacute;oliens ; en s'appuyant sur une flotte innovante et performante de navires de nouvelle g&eacute;n&eacute;ration ainsi que sur l'expertise de plus de 8 400 employ&eacute;s qualifi&eacute;s.</p><h2>Localisation du poste</h2><h3>&#13;
	Localisation du poste&#13;
</h3><p id="fldlocation_location_geographicalareacollection">Europe, France, Marseille Joliette</p><h2>Crit&egrave;res candidat</h2><h3>&#13;
	Niveau d'&eacute;tudes min. requis&#13;
</h3><p id="fldapplicantcriteria_educationlevel">4. Niveau Bac + 4/5</p><h3>&#13;
	Niveau d'exp&eacute;rience min. requis&#13;
</h3><p id="fldapplicantcriteria_experiencelevel">6-10 ans</p><h3>&#13;
	Langues&#13;
</h3><ul><li>French (Advanced +++)</li><li>English (Advanced +++)</li></ul>&#13;
&#13;
        &#13;
    </div>
]]></content:encoded>
                                <description><![CDATA[Contract type : Permanent Contract Position description : BOURBON recrute un(e) Responsable Supply Chain locale / Head of Local Supply Chain H/F Rattaché au Chief Supply Chain Officer · International vous êtes garant de la performance opérationnelle de la...]]></description>
               <guid isPermaLink="true">https://www.scamalert24.co.za/2026-2174-responsale-supply-chain-locale-head-of-local-supply-chain-h-f-3750.html</guid>
                <pubDate>Thu, 16 Apr 2026 12:00:11 +0300</pubDate>
                <media:thumbnail url="https://bourbon-career.talent-soft.com/Pages/Offre/../../Handlers/Image.ashx?imagetype=logo&amp;entityid=1&amp;fileid=183"/>
            </item>
            </channel>
</rss>
