The Gentlemen ransomware now uses SystemBC for bot-powered attacks
https://www.bleepingcomputer.com/news/security/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks/
https://www.bleepingcomputer.com/news/security/the-gentlemen-ransomware-now-uses-systembc-for-bot-powered-attacks/
BleepingComputer
The Gentlemen ransomware now uses SystemBC for bot-powered attacks
A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an investigation into a Gentlemen ransomware attack carried out by a gang affiliate.
Vercel’s security breach started with malware disguised as Roblox cheats
https://cyberscoop.com/vercel-security-breach-third-party-attack-context-ai-lumma-stealer/
https://cyberscoop.com/vercel-security-breach-third-party-attack-context-ai-lumma-stealer/
CyberScoop
Vercel's security breach started with malware disguised as Roblox cheats
The attack, which originated at Context.ai, showcases the pitfalls of interconnected cloud applications and SaaS integrations with overly privileged permissions.
The FTC’s AI portfolio is about to get bigger
https://cyberscoop.com/ftc-ai-portolio-getting-bigger-take-it-down-voice-cloning/
https://cyberscoop.com/ftc-ai-portolio-getting-bigger-take-it-down-voice-cloning/
CyberScoop
The FTC’s AI portfolio is about to get bigger
The FTC is preparing to enforce key parts of a new law against sexual deepfakes and searching for ways to block AI-driven scamming using voice clones.
Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution
https://cyberscoop.com/google-antigravity-pillar-security-agent-sandbox-escape-remote-code-execution/
https://cyberscoop.com/google-antigravity-pillar-security-agent-sandbox-escape-remote-code-execution/
CyberScoop
Vuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution
Google’s highest security setting for its agents runs command operations through a sandbox and throttles network access, but is still vulnerable to prompt injection.
China's Apple App Store infiltrated by crypto-stealing wallet apps
https://www.bleepingcomputer.com/news/security/chinas-apple-app-store-infiltrated-by-crypto-stealing-wallet-apps/
https://www.bleepingcomputer.com/news/security/chinas-apple-app-store-infiltrated-by-crypto-stealing-wallet-apps/
KelpDAO suffers $290 million heist tied to Lazarus hackers
https://www.bleepingcomputer.com/news/security/kelpdao-suffers-290-million-heist-tied-to-lazarus-hackers/
https://www.bleepingcomputer.com/news/security/kelpdao-suffers-290-million-heist-tied-to-lazarus-hackers/
BleepingComputer
KelpDAO suffers $290 million heist tied to Lazarus hackers
State-sponsored North Korean hackers are likely behind the $290 million crypto-heist that impacted the KelpDAO DeFi project on Saturday.
Personal Data Exposed on ANTS Portal, French Authorities Investigate
https://thecyberexpress.com/ants-data-breach-impacts-user-personal-details/
https://thecyberexpress.com/ants-data-breach-impacts-user-personal-details/
The Cyber Express
ANTS Data Breach Impacts User Personal Details In France
The ANTS data breach adds to a growing list of incidents affecting public sector systems in France.
Bluesky hit by 24-hour DDoS attack as pro-Iran group claims responsibility
https://securityaffairs.com/191059/security/bluesky-hit-by-24-hour-ddos-attack-as-pro-iran-group-claims-responsibility.html
https://securityaffairs.com/191059/security/bluesky-hit-by-24-hour-ddos-attack-as-pro-iran-group-claims-responsibility.html
Security Affairs
Bluesky hit by 24-hour DDoS attack as pro-Iran group claims responsibility
Bluesky suffered a 24-hour DDoS attack that caused outages. A pro-Iran hacker group claimed responsibility for the disruption.
CISA Adds 8 Exploited Vulnerabilities Affecting Cisco, Zimbra, TeamCity
https://thecyberexpress.com/cisa-kev-catalog-vulnerabilities/
https://thecyberexpress.com/cisa-kev-catalog-vulnerabilities/
The Cyber Express
CISA Adds 8 Flaws To KEV Catalog, Cisco Catalyst Included
CISA updates KEV catalog with 8 actively exploited flaws, including Cisco Catalyst issues, CVE-2023-27351, and CVE-2024-27199 threats.
🔥1
U.S. CISA adds Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to its Known Exploited Vulnerabilities catalog
https://securityaffairs.com/191080/hacking/u-s-cisa-adds-cisco-catalyst-kentico-xperience-papercut-ng-mf-synacor-zcs-quest-kace-sma-and-jetbrains-teamcity-flaws-to-its-known-exploited-vulnerabilities-catalog.html
https://securityaffairs.com/191080/hacking/u-s-cisa-adds-cisco-catalyst-kentico-xperience-papercut-ng-mf-synacor-zcs-quest-kace-sma-and-jetbrains-teamcity-flaws-to-its-known-exploited-vulnerabilities-catalog.html
Security Affairs
U.S. CISA adds Cisco Catalyst, Kentico Xperience, PaperCut NG/MF, Synacor ZCS, Quest KACE SMA, and JetBrains TeamCity flaws to…
US CISA adds Cisco, Kentico Xperience, PaperCut NG/MF, Synacor, Quest, and TeamCity flaws to its Known Exploited Vulnerabilities catalog
Bad Apples: Weaponizing native macOS primitives for movement and execution
https://blog.talosintelligence.com/bad-apples-weaponizing-native-macos-primitives-for-movement-and-execution/
https://blog.talosintelligence.com/bad-apples-weaponizing-native-macos-primitives-for-movement-and-execution/
Cisco Talos
Bad Apples: Weaponizing native macOS primitives for movement and execution
Cisco Talos documents several macOS living-off-the-land (LOTL) techniques, demonstrating that native pathways for movement and execution remain accessible to those who understand the underlying architecture.
The US NSA is using Anthropic’s Claude Mythos despite supply chain risk
https://securityaffairs.com/191087/ai/the-us-nsa-is-using-anthropics-claude-mythos-despite-supply-chain-risk.html
https://securityaffairs.com/191087/ai/the-us-nsa-is-using-anthropics-claude-mythos-despite-supply-chain-risk.html
Security Affairs
The US NSA is using Anthropic’s Claude Mythos despite supply chain risk
Axios reports the NSA uses Anthropic Claude Mythos model despite Department of Defense concerns, blurring AI risk vs defense lines.
NGate Android malware uses HandyPay NFC app to steal card data
https://www.bleepingcomputer.com/news/security/ngate-android-malware-uses-handypay-nfc-app-to-steal-card-data/
https://www.bleepingcomputer.com/news/security/ngate-android-malware-uses-handypay-nfc-app-to-steal-card-data/
BleepingComputer
NGate Android malware uses HandyPay NFC app to steal card data
A new variant of the NGate malware that steals NFC payment data is targeting Android users by hiding in a trojanized version of HandyPay, a legitimate mobile payments processing tool.
Mythos can find the vulnerability. It can’t tell you what to do about it.
https://cyberscoop.com/anthropic-mythos-vulnerability-discovery-op-ed/
https://cyberscoop.com/anthropic-mythos-vulnerability-discovery-op-ed/
CyberScoop
Mythos can find the vulnerability. It can't tell you what to do about it.
Anthropic’s Mythos model marks a leap in AI-assisted vulnerability discovery, but is it a security game-changer? Andesite CTO Alex Thaman breaks down the real enterprise challenge: operationalizing defense.
Former ransomware negotiator pleads guilty to BlackCat attacks
https://www.bleepingcomputer.com/news/security/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/
https://www.bleepingcomputer.com/news/security/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/
BleepingComputer
Former ransomware negotiator pleads guilty to BlackCat attacks
41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023.
Actively exploited Apache ActiveMQ flaw impacts 6,400 servers
https://www.bleepingcomputer.com/news/security/actively-exploited-apache-activemq-flaw-impacts-6-400-servers/
https://www.bleepingcomputer.com/news/security/actively-exploited-apache-activemq-flaw-impacts-6-400-servers/
BleepingComputer
Actively exploited Apache ActiveMQ flaw impacts 6,400 servers
Nonprofit security organization Shadowserver found that over 6,400 Apache ActiveMQ servers exposed online are vulnerable to ongoing attacks exploiting a high-severity code injection vulnerability.
Phishing and MFA exploitation: Targeting the keys to the kingdom
https://blog.talosintelligence.com/phishing-and-mfa-exploitation-targeting-the-keys-to-the-kingdom/
https://blog.talosintelligence.com/phishing-and-mfa-exploitation-targeting-the-keys-to-the-kingdom/
Cisco Talos
Phishing and MFA exploitation: Targeting the keys to the kingdom
In 2025, attackers increasingly targeted weaknesses in multi-factor authentication (MFA) workflows, and phishing attacks leveraged valid, compromised credentials to launch lures from trusted accounts. The trends focused entirely on trust, or the lack thereof…
[Podcast] It's not you, it's your printer: State-sponsored and phishing threats in 2025
https://blog.talosintelligence.com/podcast-its-not-you-its-your-printer-state-sponsored-and-phishing-threats-in-2025/
https://blog.talosintelligence.com/podcast-its-not-you-its-your-printer-state-sponsored-and-phishing-threats-in-2025/
Cisco Talos
[Podcast] It's not you, it's your printer: State-sponsored and phishing threats in 2025
In this episode of Talos Takes, Amy and Martin Lee unpack state-sponsored and phishing trends from the 2025 Talos Year in Review.
‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/
https://krebsonsecurity.com/2026/04/scattered-spider-member-tylerb-pleads-guilty/
Krebs on Security
‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in…
Detection strategies across cloud and identities against infiltrating IT workers
https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/
https://www.microsoft.com/en-us/security/blog/2026/04/21/detection-strategies-cloud-identities-against-infiltrating-it-workers/
Microsoft News
Detection strategies across cloud and identities against infiltrating IT workers
The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access.