Cybersecurity

Feeds last updated @: UTC - 18:45 - 10/04/2026

Security.nl






Slashdot

Google News Now Prominently Featuring Polymarket Bets

  Openen als pagina
Futurism found that Google News is surfacing Polymarket betting pages alongside traditional news sources. "The bets often appear in the 'For you' section of Google News, which is tailored to a user's personal interests," the publication reports. "In one instance, it was even the very top result, as with this bet on the price of Bitcoin." From the report: In our testing, Polymarket bets are also showing up on the Google News home page. But links from the prediction market can pop up all over Google News, including in searches. In further tests, looking up "will ships transit the strait," referring to the Strait of Hormuz, returned numerous credible sources like Financial Times, The Guardian, and Reuters. Just below them, however, was a Polymarket bet on the number of ships that would be allowed to pass through the critical oil passageway. This doesn't appear to be an accident. When searching "Polymarket" in its search bar, Google News now allows users to choose it as a "source," directing them to a page that aggregates other Polymarket hits. It's not the only non-news site that's selectable as a source -- looking up "Reddit" and "X" offers the option, too -- but searching for "Kalshi," another prediction market and Polymarket's main competitor, doesn't give the option to use it as a source. [...] In light of all this, Polymarket appearing in Google News is a major victory for the prediction platform -- rubber-stamping its image as an authority on developing real-world events right alongside genuine real publishers of journalism.

Read more of this story at Slashdot.

https://news.slashdot.org/story/26/04/10/1640225/google-news-now-prominently-featuring-polymarket-bets?utm_source=rss1.0mainlinkanon&utm_medium=feed


Google Rolls Out Gmail End-To-End Encryption On Mobile Devices

  Openen als pagina
Gmail's end-to-end encryption is now available on all Android and iOS devices, letting enterprise users send and read encrypted emails directly in the app without any extra tools. "This launch combines the highest level of privacy and data encryption with a user-friendly experience for all users, enabling simple encrypted email for all customers from small businesses to enterprises and public sector," Google announced in a blog post. BleepingComputer reports: Starting this week, encrypted messages will be delivered as regular emails to Gmail recipients' inboxes if they use the Gmail app. Recipients who don't have the Gmail mobile app and use other email services can read them in a web browser, regardless of the device and service they're using. [...] This feature is now available for all client-side encryption (CSE) users with Enterprise Plus licenses and the Assured Controls or Assured Controls Plus add-on after admins enable the Android and iOS clients in the CSE admin interface via the Admin Console. Gmail's end-to-end encryption (E2EE) feature is powered by the client-side encryption (CSE) technical control, which allows Google Workspace organizations to use encryption keys they control and are stored outside Google's servers to protect sensitive documents and emails.

Read more of this story at Slashdot.

https://it.slashdot.org/story/26/04/10/1620217/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices?utm_source=rss1.0mainlinkanon&utm_medium=feed


France's Government Is Ditching Windows For Linux

  Openen als pagina
France says it plans to move some government computers from Windows to Linux as part of a broader push for digital sovereignty and reduced dependence on U.S. technology. TechCrunch reports: In a statement, French minister David Amiel said (translated) that the effort was to "regain control of our digital destiny" by relying less on U.S. tech companies. Amiel said that the French government can no longer accept that it doesn't have control over its data and digital infrastructure. The French government did not provide a specific timeline for the switchover, or which distributions it was considering. Microsoft did not immediately comment on the news. [...] France's decision to ditch Windows comes months after the government announced it would stop using Microsoft Teams for video conferencing in favor of French-made Visio, a tool based on the open source end-to-end encrypted video meeting tool Jitsi. The French government said it also plans to migrate its health data platform to a new trusted platform by the end of the year.

Read more of this story at Slashdot.

https://linux.slashdot.org/story/26/04/10/1545234/frances-government-is-ditching-windows-for-linux?utm_source=rss1.0mainlinkanon&utm_medium=feed


AI Is Coming for Car Salesmen

  Openen als pagina
An anonymous reader quotes a report from The Drive: An auto dealer software company is pitching AI-powered kiosks designed to replace car salesmen on showroom floors. Automotive News says the industry is "skeptical." But be honest -- would you really rather deal with the average car lot shark than a computer? Epikar, a South Korean company that cooks up digital management solutions for car dealers, has named its new AI invention the Pikar Genie. The idea is that customers can talk to this device, ask it product questions, and basically do everything you'd do with a car salesman except for actually closing the deal and signing paperwork. Renault, BMW, and Volvo are already using some Epikar products at South Korean dealerships, but this new customer-facing AI product is still in its infancy. AN reported that "Renault assigns three salespeople to its Seoul showroom enhanced with Epikar automation compared with six for other Renault showrooms in South Korea," according to Epikar CEO Bosuk Han. The company's now looking to expand into America and is apparently already testing its products at at least one dealership stateside. Car-dealer consultant Fleming Ford (Director of Strategic Growth at NCM Associates) said U.S. dealerships "aren't ready for fully automated showrooms." "The showroom isn't just where you buy a car," Automotive News quoted him saying. "It's where you decide who to trust to help you to choose the right car."

Read more of this story at Slashdot.

https://tech.slashdot.org/story/26/04/10/0123204/ai-is-coming-for-car-salesmen?utm_source=rss1.0mainlinkanon&utm_medium=feed


Meta Removes Ads For Social Media Addiction Litigation

  Openen als pagina
Meta has started removing ads from law firms seeking clients for social media addiction lawsuits, just weeks after a jury found Meta and YouTube negligent in a landmark case involving harm to a young user. "Lawyers across the country now are seeking new plaintiffs, in the hopes of bringing a class action lawsuit that could result in lucrative verdicts," reports Axios. From the report: Axios has identified more than a dozen such ads that were deactivated today, some of which came from large national firms like Morgan & Morgan and Sokolove Law. Almost all of them ran on both Facebook and Instagram. Some also appeared on Threads and Messenger, plus Meta's Audience Network -- which distributes ads to thousands of third-party sites. One such ad read: "Anxiety. Depression. Withdrawal. Self-harm. These aren't just teenage phases -- they're symptoms linked to social media addiction in children. Platforms knew this and kept targeting kids anyway." A few of the ads still remain active, including some that were posted earlier today. "We're actively defending ourselves against these lawsuits and are removing ads that attempt to recruit plaintiffs for them," a Meta spokesperson said in a statement. "We will not allow trial lawyers to profit from our platforms while simultaneously claiming they are harmful."

Read more of this story at Slashdot.

https://meta.slashdot.org/story/26/04/10/0113243/meta-removes-ads-for-social-media-addiction-litigation?utm_source=rss1.0mainlinkanon&utm_medium=feed


theregister.com/security


Project Glasswing and open source software: The good, the bad, and the ugly

  Openen als pagina
Just what FOSS developers need – a flood of AI-discovered vulnerabilities

Opinion Anthropic describes Project Glasswing as a coalition of tech giants committing $100 million in AI resources to hunt down and fix long-hidden vulnerabilities in critical open source software that it's finding with its new Mythos AI program. Or as The Reg put it, "an AI model that can generate zero-day vulnerabilities."...

https://go.theregister.com/feed/www.theregister.com/2026/04/10/project_glasswing/



Unpacking AI security in 2026 from experimentation to the agentic era

  Openen als pagina
Cut through the noise and understand the real risks, responsibilities, and responses shaping enterprise AI today.

Webinar Promo 2025 was the year of AI experimentation. In 2026, the bills are coming due. AI adoption has moved from isolated pilots to autonomous, enterprise wide deployment, bringing with it a sophisticated new generation of security challenges....

https://go.theregister.com/feed/www.theregister.com/2026/04/10/unpacking_ai_security_2026/


Crypto? Huh. Good gawd y'all, what is it good for? $45M in this case

  Openen als pagina
Cops bust latest scam, return $12m to bilked victims

US, UK, and Canadian law enforcement Thursday said that they disrupted a $45 million global cryptocurrency scam, freezing $12 million in stolen funds and identifying more than 20,000 cryptocurrency wallet addresses linked to fraud victims across 30 countries....

https://go.theregister.com/feed/www.theregister.com/2026/04/09/crypto_fraud_scam_45_million/


CISO2CISO.com



The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com

  Openen als pagina

Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool [...]

La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-defending-medtech-from-software-supply-chain-threats-source-www-cyberdefensemagazine-com/


Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com

  Openen als pagina

Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s [...]

La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-source-www-cyberdefensemagazine-com/


French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com

  Openen als pagina

Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 11

La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-source-www-darkreading-com/


Hackread.com






Vuldb

CVE-2026-3446 | Python CPython up to 3.13.12/3.14.3/3.15.0a7 b64decode

  Openen als pagina
A vulnerability, which was classified as problematic, was found in Python CPython up to 3.13.12/3.14.3/3.15.0a7. Affected by this issue is the function b64decode. Such manipulation leads to an unknown weakness. This vulnerability is listed as CVE-2026-3446. The attack may be performed from remote. There is no available exploit. You should upgrade the affected component.

https://vuldb.com/vuln/356919


CVE-2026-33703 | Chamilo LMS up to 2.0.0-RC.2 personal-data userId authorization

  Openen als pagina
A vulnerability, which was classified as problematic, has been found in Chamilo LMS up to 2.0.0-RC.2. Affected by this vulnerability is an unknown functionality of the file /social-network/personal-data/. This manipulation of the argument userId causes authorization bypass. This vulnerability is tracked as CVE-2026-33703. The attack is possible to be carried out remotely. No exploit exists. It is advisable to upgrade the affected component.

https://vuldb.com/vuln/356918


CVE-2026-33702 | Chamilo LMS up to 1.11.37/2.0.0-RC.2 lp_ajax_save_item.php authorization

  Openen als pagina
A vulnerability classified as problematic was found in Chamilo LMS up to 1.11.37/2.0.0-RC.2. Affected is an unknown function of the file lp_ajax_save_item.php. The manipulation results in authorization bypass. This vulnerability is identified as CVE-2026-33702. The attack can be executed remotely. There is not any exploit available. Upgrading the affected component is advised.

https://vuldb.com/vuln/356917



CVE-2026-33618 | Chamilo LMS up to 2.0.0-RC.2 /platform-config/list decodeSettingArray eval injection

  Openen als pagina
A vulnerability described as critical has been identified in Chamilo LMS up to 2.0.0-RC.2. This affects the function PlatformConfigurationController::decodeSettingArray of the file /platform-config/list. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code. The identification of this vulnerability is CVE-2026-33618. The attack may be launched remotely. There is no exploit available. Upgrading the affected component is recommended.

https://vuldb.com/vuln/356915


advisories.ncsc.nl

NCSC-2026-0110 [1.00] [M/H] Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem

  Openen als pagina
Cisco heeft een kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem. Een kwaadwillende kan deze kwetsbaarheid misbruiken doordat in Cisco Smart Software Manager On-Prem (SSM On-Prem) een intern servicecomponent onbedoeld extern toegankelijk is. Hierdoor kan een aanvaller op afstand via een gemanipuleerde API-request commando’s uitvoeren op het onderliggende besturingssysteem met root-rechten.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0110


NCSC-2026-0109 [1.00] [M/H] Kwetsbaarheden verholpen in Synology SSL VPN Client

  Openen als pagina
Synology heeft kwetsbaarheden verholpen in Synology SSL VPN Client. Een kwaadwillende kan deze kwetsbaarheden misbruiken doordat Synology SSL VPN Client met versie vóór 1.4.5-0684 de PIN-code onveilig opslaat en bestanden via een lokaal HTTP-servercomponent onvoldoende afschermt. Dit kan leiden tot ongeautoriseerde configuratiewijzigingen aan de VPN-client en onderschepping van VPN-verkeer. De kwetsbaarheid beïnvloedt mogelijk de vertrouwelijkheid en integriteit van VPN-sessies.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0109


NCSC-2026-0108 [1.00] [M/H] Kwetsbaarheid verholpen in Juniper Networks Junos OS Evolved

  Openen als pagina
Juniper heeft een kwetsbaarheid verholpen in Junos OS Evolved draaiend op PTX Series apparaten. Een kwaadwillende kan deze kwetsbaarheid misbruiken om zijn rechten te verhogen. De kwetsbaarheid zit in de Flexible PIC Concentrators (FPC’s) van Juniper Networks Junos OS Evolved op PTX-systemen. De kwetsbaarheid kan leiden tot volledige compromittering van de Flexible PIC Concentrator component. De oorzaak ligt in onvoldoende access controls binnen de Junos OS Evolved omgeving op PTX Series hardware.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0108


NCSC-2026-0107 [1.00] [H/H] Kwetsbaarheid verholpen in FortiClient EMS van Fortinet

  Openen als pagina
Fortinet heeft een kwetsbaarheid verholpen in FortiClient EMS. De kwetsbaarheid betreft een onjuiste toegangscontrole in FortiClient EMS. Ongeauthenticeerde aanvallers kunnen door het versturen van speciaal opgemaakte verzoeken beveiligingscontroles omzeilen en ongeautoriseerde code of commando's uitvoeren. De kwetsbaarheid kan op afstand worden misbruikt zonder authenticatie, wat kan leiden tot ongeautoriseerde manipulatie van het systeem. Fortinet meldt informatie te hebben dat de kwetsbaarheid actief wordt misbruikt. Er is (nog) geen publieke Proof-of-Concept-code of exploit bekend. Het NCSC verwacht op korte termijn wel publieke Proof-of-Concept-code of exploits, waardoor de kans op scanverkeer en grootschalig misbruik toeneemt.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0107


NCSC-2026-0106 [1.00] [M/H] Kwetsbaarheden verholpen in Cisco Integrated Management Controller

  Openen als pagina
Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Integrated Management Controller (IMC). De kwetsbaarheden bevinden zich in de webgebaseerde managementinterface van Cisco IMC. Een onbevoegde externe aanvaller kan via de functionaliteit voor het wijzigen van wachtwoorden de authenticatie omzeilen door speciaal opgemaakte HTTP-verzoeken te versturen, wat leidt tot ongeautoriseerde administratieve toegang. Daarnaast kunnen geauthenticeerde aanvallers, waaronder gebruikers met alleen leesrechten, door onvoldoende inputvalidatie command injection uitvoeren en willekeurige root-commando's of code uitvoeren, wat resulteert in privilege-escalatie en volledige controle over het systeem. Verder zijn er meerdere cross-site scripting (XSS) kwetsbaarheden, waaronder opgeslagen en gereflecteerde XSS, die geauthenticeerde gebruikers met administratieve rechten in staat stellen om kwaadaardige scripts te injecteren en uit te voeren in browsers van gebruikers die met de interface werken. Ook kunnen onbevoegde externe aanvallers via gereflecteerde XSS kwetsbaarheden kwaadaardige scripts injecteren door gebruikers te verleiden op speciaal opgemaakte links te klikken, wat kan leiden tot sessiekaping en ongeautoriseerde acties binnen de context van de getroffen gebruikers. Alle kwetsbaarheden zijn het gevolg van onvoldoende inputvalidatie in de webinterface van Cisco IMC. Voor succesvol misbruik moet de kwaadwillende toegang hebben tot de management-interface. Het is goed gebruik een dergelijke interface niet publiek toegankelijk te hebben, maar af te steunen in een separate beheeromgeving.

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0106


NCSC Nieuws



Ruim twee miljoen bezoeken aan kwaadaardige websites voorkomen in pilot

  Openen als pagina
Dagelijks worden Nederlanders misleid met nepberichten en valse websites. Phishing is nog altijd één van de grootste vormen van online criminaliteit. Om internetgebruikers hier beter tegen te beschermen, hebben publieke en private partijen samen een nieuwe aanpak getest in een pilot. Het zogeheten Anti Phishing Shield laat zien dat de aanpak werkt: sinds de start van de pilot in juli 2025 zijn ruim twee miljoen pogingen om phishing- en frauduleuze websites te bezoeken geblokkeerd, onder een groep van ruim 200.000 gebruikers.

https://www.ncsc.nl/nieuws/ruim-twee-miljoen-bezoeken-aan-kwaadaardige-websites-voorkomen-in-pilot



Ernstige kwetsbaarheden in Cisco Secure Firewall Management Center

  Openen als pagina
Er zijn twee ernstige kwetsbaarheden ontdekt in de webinterface van Cisco Secure Firewall Management Center, aangeduid als CVE-2026-20079 en CVE-2026-20131, beide met een maximale CVSS-score van 10.0. Hoewel webinterfaces van dit soort producten niet publiekelijk toegankelijk horen te zijn, is het raadzaam zo spoedig mogelijk actie te ondernemen en de beschikbaar gestelde updates uit te voeren.*

https://www.ncsc.nl/alerts/ernstige-kwetsbaarheden-in-cisco-secure-firewall-management-center


NIST Cybersecurity

wid.cert-bund.de






cert.ssi.gouv.fr






theHackerNews

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

  Openen als pagina
Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine. The technique has been discovered in an Open VSX extension named "specstudio.code-wakatime-activity-tracker," which masquerades as WakaTime, a

https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html


Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

  Openen als pagina
While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open window nobody's guarding: AI browser extensions. A new report from LayerX exposes just how deep this blind spot goes, and why AI extensions may be the most dangerous AI threat surface in your network that isn't on anyone's

https://thehackernews.com/2026/04/browser-extensions-are-new-ai.html


Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

  Openen als pagina
Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta. The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release. "This project represents a significant

https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html


Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

  Openen als pagina
A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within 10 hours of public disclosure, according to findings from Sysdig. The vulnerability in question is CVE-2026-39987 (CVSS score: 9.3), a pre-authenticated remote code execution vulnerability impacting all versions of Marimo prior to and including

https://thehackernews.com/2026/04/marimo-rce-flaw-cve-2026-39987.html


Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

  Openen als pagina
Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla to push a poisoned version containing a backdoor. The incident impacts Smart Slider 3 Pro version 3.5.1.35 for WordPress, per WordPress security company Patchstack. Smart Slider 3 is a popular WordPress slider plugin with more than 800,000 active installations across its free and Pro

https://thehackernews.com/2026/04/backdoored-smart-slider-3-pro-update.html


Techrepublic






BleepingComputer.com






securityboulevard.com

The AI Supply Chain is Actually an API Supply Chain: Lessons from the LiteLLM Breach

  Openen als pagina

The recent supply chain attack involving Mercor and the LiteLLM vulnerability serves as a massive wake-up call for enterprise security teams. While the security industry has spent the last year fixating on prompt injections and model jailbreaks, this breach highlights a far more systemic vulnerability.

The weakest link in enterprise AI is not necessarily the model itself. It is the middleware connecting the models to your data.

As organizations race to adopt AI, they are relying heavily on proxies, gateways, and Model Context Protocol (MCP) servers to route traffic between their proprietary internal systems and external Large Language Models (LLMs). These integration points form the "Agentic Action Layer." When an API gateway like LiteLLM is compromised, attackers gain the keys to the kingdom, bypassing the model entirely to access the raw data streams flowing underneath.

The Anatomy of an AI Supply Chain Attack.

Tools like LiteLLM are incredibly popular because they solve a real engineering problem. They act as a universal proxy, allowing developers to standardize API calls across dozens of different LLM providers (such as OpenAI, Anthropic, and Google) using a single, unified format.

However, this creates a highly sensitive, centralized chokepoint. If an attacker compromises this middleware, they do not need to trick the AI model with a clever prompt. Instead, they gain direct access to the API keys, the unencrypted prompts containing proprietary data, and the raw model responses. The attacker can intercept, exfiltrate, or manipulate the data in transit.

This is the stark reality of the Agentic Era. The AI supply chain is fundamentally an API supply chain.

The Blind Spot: Why Legacy Tools Fail Here.

When a third-party proxy or MCP server is compromised, the resulting lateral movement is entirely machine-to-machine.

As highlighted in the newly released 1H 2026 State of AI and API Security Report, organizations are completely unprepared for this architectural shift:

  • 60.2% of organizations admit a profound lack of control over the security of the AI models driving their applications.
  • 48.9% are essentially blind to non-human, machine-to-machine traffic.

When an attacker hijacks a legitimate AI proxy, legacy Web Application Firewalls (WAFs) and standard API gateways fail completely. These tools are designed to inspect inbound external traffic from human users. They are architecturally blind to internal machine identities communicating with external LLM endpoints.

To a legacy WAF, a compromised LiteLLM server exfiltrating data looks exactly like a legitimate AI workload executing a scheduled task.

Securing the Middleware with the Salt Agentic Security Platform

To defend against these next-generation supply chain attacks, organizations must secure the Agentic Action Layer. You cannot secure an infrastructure you cannot see, and you cannot rely on static signatures to catch compromised machine identities acting maliciously.

The Salt Agentic Security Platform neutralizes these proxy breaches through two purpose-built capabilities:

1. Agentic Security Posture Management (AG-SPM) and the Security Graph. To prevent vulnerable middleware from exposing your enterprise, you must first map it. Salt builds a dynamic Agentic Security Graph that continuously maps the multi-pronged relationships between LLMs, external proxies, MCP servers, and foundational APIs. By scanning repositories and runtime environments, Salt identifies risky third-party LLM integrations and uncovers "Shadow AI" infrastructure. If developers spin up an unauthorized or vulnerable LLM proxy, AG-SPM flags it before it can be weaponized by an attacker.

2. Agentic Detection and Response (AG-DR) via Intent Analysis. Even with perfect posture, zero-day supply chain vulnerabilities will occur. When middleware is compromised, security teams need to detect anomalous behavior instantly. Salt AG-DR establishes agentic-aware baselines for all LLM connectivity. It performs Identity-Aware Intent Analysis, correlating 100% of traffic back to the specific machine identity (in this case, the LiteLLM proxy).

If that proxy suddenly begins routing traffic to an unauthorized external IP address or executing massive data pulls that fall outside its expected behavior, Salt recognizes the malicious "Sequence of Intent." The platform immediately interrupts the machine-speed attack and automatically triggers blocking actions, stopping data exfiltration in its tracks.

The Takeaway

The Mercor and LiteLLM incident is not an outlier; it is a preview of the new attacker playbook. Securing AI innovation requires more than just sanitizing prompts. It requires absolute visibility and behavioral control over the API supply chain that connects your data to the models.

If you want to learn more about Salt and how we can help you, please contact us, schedule a demo, or visit our website. You can also get a free API Attack Surface Assessment from Salt Security's research team and learn what attackers already know.

The post The AI Supply Chain is Actually an API Supply Chain: Lessons from the LiteLLM Breach appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/the-ai-supply-chain-is-actually-an-api-supply-chain-lessons-from-the-litellm-breach/


Google Extends Gmail Encryption to Mobile, but Limits Access to Enterprise Tier

  Openen als pagina

Google has expanded its encryption capabilities in Gmail to mobile devices, enabling enterprise customers to transmit encrypted emails directly within the app on both Android and iOS. The update removes a limitation that previously restricted native encrypted email use on mobile devices. The rollout allows eligible users to compose and read encrypted messages natively, without..

The post Google Extends Gmail Encryption to Mobile, but Limits Access to Enterprise Tier appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/google-extends-gmail-encryption-to-mobile-but-limits-access-to-enterprise-tier/



The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks

  Openen als pagina

Flashpoint analysts, working with partner financial institutions, have observed a growing number of PhaaS operations operating with a level of coordination and specialization more commonly associated with legitimate software platforms. These ecosystems bring together phishing kit developers, infrastructure providers, spam delivery services, and financially motivated actors into a single, scalable pipeline for fraud.

The post The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks appeared first on Flashpoint.

The post The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks appeared first on Security Boulevard.

https://securityboulevard.com/2026/04/the-phishing-as-a-service-pipeline-how-a-scalable-fraud-ecosystem-is-driving-global-attacks/



CXSecurity.com






Brian Krebs

Russia Hacked Routers to Steal Microsoft Office Tokens

  Openen als pagina
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.

https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/


Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

  Openen als pagina
An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021.

https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/



Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

  Openen als pagina
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, JackSkid and Mossad -- are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.

https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/


Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker

  Openen als pagina
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/


Troy Hunt

Weekly Update 498

  Openen als pagina

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

This week, more time than I'd have liked to spend went on talking about the trials of chasing invoices. This is off the back of a customer (who, for now, will remain unnamed), who had invoices stacking back more than 6 months overdue and despite payment terms of

https://www.troyhunt.com/weekly-update-498/



HIBP Mega Update: Passkeys, k-Anonymity Searches, Massive Speed Enhancements and a Bulk Domain Verification API

  Openen als pagina

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, "escalated". Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&

https://www.troyhunt.com/passkeys-k-anonymity-searches-massive-speed-enhancements-bulk-domain-verification-api/



Weekly Update 495

  Openen als pagina

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

In the beginning, it was simple. A website, a database and 150M+ email addresses to search. Time has added serverless functions (which run on servers 🤷‍♂️), code on the edge, new data storage constructs and a completely different mechanism for even just querying a simple email address.

https://www.troyhunt.com/weekly-update-495/


Bruce Schneier


On Microsoft’s Lousy Cloud Security

  Openen als pagina

ProPublica has a scoop:

In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.

The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica.

Or, as one member of the team put it: “The package is a pile of shit.”

For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn’t vouch for the technology’s security...

https://www.schneier.com/blog/archives/2026/04/on-microsofts-lousy-cloud-security.html


Python Supply-Chain Compromise

  Openen als pagina

This is news:

A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains a malicious .pth file (litellm_init.pth, 34,628 bytes) which is automatically executed by the Python interpreter on every startup, without requiring any explicit import of the litellm module.

There are a lot of really boring things we need to do to help secure all of these critical libraries: SBOMs, SLSA, SigStore. But we have to do them.

https://www.schneier.com/blog/archives/2026/04/python-supply-chain-compromise.html


Cybersecurity in the Age of Instant Software

  Openen als pagina

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted.

AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...

https://www.schneier.com/blog/archives/2026/04/cybersecurity-in-the-age-of-instant-software.html


Hong Kong Police Can Force You to Reveal Your Encryption Keys

  Openen als pagina

According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are just transiting the airport.

In a security alert dated March 26, the U.S. Consulate General said that, on March 23, 2026, Hong Kong authorities changed the rules governing enforcement of the National Security Law. Under the revised framework, police can require individuals to provide passwords or other assistance to access personal electronic devices, including cellphones and laptops.

...

https://www.schneier.com/blog/archives/2026/04/hong-kong-police-can-force-you-to-reveal-your-encryption-keys.html


Security Affairs

Ransomware attack on ChipSoft knocks EHR services offline across hospitals in the Netherlands and Belgium

  Openen als pagina
Dutch healthcare IT firm ChipSoft suffered a ransomware attack, forcing services and its HiX platform offline, impacting hospitals and patients. ChipSoft, a major Dutch provider of EHR systems, was hit by a ransomware attack that forced it to take its website and digital services offline, disrupting access for hospitals, healthcare providers, and patients. EHR (Electronic [...]

https://securityaffairs.com/190615/cyber-crime/ransomware-attack-on-chipsoft-knocks-ehr-services-offline-across-hospitals-in-the-netherlands-and-belgium.html


UAT-10362 linked to LucidRook attacks targeting Taiwan-based institutions

  Openen als pagina
LucidRook is Lua malware used in phishing attacks on NGOs and universities in Taiwan, linked to UAT-10362, spread via password-protected emails. LucidRook is a new Lua-based malware used in targeted phishing attacks against NGOs and universities in Taiwan. Cisco Talos links it to a skilled group tracked as UAT-10362. In Oct 2025, attackers used password-protected [...]

https://securityaffairs.com/190598/security/uat-10362-linked-to-lucidrook-attacks-targeting-taiwan-based-institutions.html


EngageLab SDK flaw opens door to private data on 50M Android devices

  Openen als pagina
A flaw in EngageLab SDK exposed up to 50M Android users, including 30M crypto wallets, letting apps bypass security and access private data. Microsoft researchers found a critical flaw in EngageSDK that lets apps bypass Android sandbox protections and access private data. The flaw put millions of users, including over 30M crypto wallet installs, at [...]

https://securityaffairs.com/190586/hacking/engagelab-sdk-flaw-opens-door-to-private-data-on-50m-android-devices.html


Bitcoin Depot hack leads to $3.6M Bitcoin theft via stolen credentials

  Openen als pagina
Hackers breached Bitcoin Depot, stole credentials, and took about 50 BTC worth $3.6M from its wallets after a March 23 intrusion. Hackers breached the largest US Bitcoin ATM operator, Bitcoin Depot, on March 23, stole login credentials, and drained about 50.9 BTC worth $3.6M from company wallets. Bitcoin Depot told the SEC that a hacker [...]

https://securityaffairs.com/190578/cyber-crime/bitcoin-depot-hack-leads-to-3-6m-bitcoin-theft-via-stolen-credentials.html


Eurail data breach impacted 308,777 people

  Openen als pagina
Hackers breached Eurail in Dec 2025, stole names and passport data, and exposed over 300,000 travelers’ personal information. Threat actors breached Eurail in December 2025 and stole names and passport numbers from its network. The company now notifies 308,777 people that attackers exposed their personal data, raising concerns about identity theft and misuse of sensitive [...]

https://securityaffairs.com/190570/data-breach/eurail-data-breach-impacted-308777-people.html


news.sophos.com