Post

Cybersecurity Newsfeed - 04/05/26

Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.

Cybersecurity Newsfeed - 04/05/26

Cybersecurity Newsfeed

📅 04/05/26

🛡️ Vulnerabilities

  • CISA KEV Update (May 2026): CISA has added a new vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, signaling active exploitation in the wild. Federal agencies are mandated to remediate the flaw within specific timeframes. More info

  • SonicWall SonicOS Critical Patches: SonicWall released critical patches for three vulnerabilities affecting SonicOS firmware in Generation 6, 7, and 8 firewalls. These flaws could allow unauthenticated DoS or arbitrary code execution. More info

  • Microsoft Defender False Positive: Microsoft addressed an issue where Defender erroneously flagged legitimate DigiCert security certificates as Trojan:Win32/Cerdigent!adha, causing significant operational disruption. More info

🎯 Adversaries

  • Salt Typhoon Targets IBM Subsidiary: The breach of an IBM subsidiary in Italy underscores the persistent threat of Chinese state-sponsored actors against European critical infrastructure and telecommunications. More info

  • VECT 2.0 Ransomware Acting as Wiper: Researchers identified a destructive trend where VECT 2.0 often destroys victim data even after payment, functioning more as a wiper than traditional ransomware. More info

  • ConsentFix v3 Azure Attacks: A sophisticated campaign targeting Microsoft Azure environments through automated OAuth consent abuse to gain persistent, high-level access without credentials. More info

  • Massive Chinese Cybercrime Operation: An operation involving over 45,000 attacks and 53,000 backdoors globally has been identified, utilizing automated scanning to exploit public-facing servers. More info

  • China-Linked Espionage in Asia: State-linked hackers are targeting Asian government and financial institutions using custom malware and advanced social engineering for strategic data exfiltration. More info

  • Jenkins Servers Abused for DDoS: Threat actors are exploiting Jenkins servers to build a powerful DDoS botnet specifically targeting gaming infrastructure. More info

  • 86% of Phishing is AI-Driven: KnowBe4 research indicates that the vast majority of modern phishing attacks are now enhanced by AI to craft more convincing and personalized social engineering messages. More info

  • Telegram Mini Apps Abused: Cybercriminals are increasingly exploiting Telegram Mini Apps to orchestrate crypto scams and deliver Android malware via “earn-to-play” games and bots. More info

  • SaaS Abuse (Google AppSheet): A phishing campaign is utilizing Google AppSheet to host “AccountDumpling” scams aimed at harvesting Facebook credentials through legitimate infrastructure. More info

  • Abuse of AI Platforms (Hugging Face/ClawHub): Platforms like Hugging Face and ClawHub are being leveraged by threat actors to distribute malware disguised as legitimate datasets or models. More info

💥 Breaches & Leaks

  • Trellix Internal Code Repository Breach: Trellix disclosed unauthorized access to one of its internal code repositories. The company stated the incident was limited and did not impact customer-facing products. More info

  • 15-Year-Old Detained in French Govt Breach: French authorities detained a teenager in connection with a data breach at a government agency that exposed sensitive administrative data. More info

  • Vercel Supply Chain Vulnerability: A breach at Vercel exposed a supply chain vulnerability involving OAuth token abuse, potentially allowing unauthorized modifications to hosted projects. More info

📚 Others

  • Strategic Collaboration: Criminal IP, Securonix, and ThreatQ announced a partnership to integrate threat intelligence and security analytics platforms for enhanced detection. More info

⬅ Back to Archive

This post is licensed under CC BY 4.0 by the author.