{
	"version": "https://jsonfeed.org/version/1",
	"title": "Threat Intel",
	"icon": "https://avatars.micro.blog/avatars/2025/35/1555731.jpg",
	"home_page_url": "https://threatintel.cc/",
	"feed_url": "https://threatintel.cc/feed.json",
	"items": [
			{
				"id": "http://threatintel.micro.blog/2026/04/15/trusted-access-for-the-next.html",
				
				"content_html": "<p><a href=\"https://openai.com/index/scaling-trusted-access-for-cyber-defense/\">Trusted access for the next era of cyber defense | OpenAI</a></p>\n<p>OpenAI is expanding its Trusted Access for Cyber (TAC) program to provide thousands of verified defenders and hundreds of teams with access to advanced AI models, including the new GPT-5.4-Cyber, specifically fine-tuned for defensive cybersecurity use cases. This initiative emphasizes democratized access, iterative deployment, and ecosystem resilience to accelerate cyber defense efforts while implementing robust safeguards and verification processes to prevent misuse.</p>\n",
				
				"date_published": "2026-04-15T20:06:34-04:00",
				"url": "https://threatintel.cc/2026/04/15/trusted-access-for-the-next.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/15/microsoft-raises-prices-for-all.html",
				
				"content_html": "<p><a href=\"https://www.macrumors.com/2026/04/14/microsoft-surface-pc-price-hike/\">Microsoft Raises Prices for All Surface PCs, Making Them More Expensive Than Equivalent Macs - MacRumors</a></p>\n<p>Microsoft has raised prices for all its Surface PCs, citing increased memory and component costs due to global memory shortages. These price hikes now make most Surface models, including the Surface Pro and Surface Laptop, more expensive than their equivalent Mac counterparts.</p>\n",
				
				"date_published": "2026-04-15T20:03:16-04:00",
				"url": "https://threatintel.cc/2026/04/15/microsoft-raises-prices-for-all.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/14/apple-removes-fake-crypto-wallet.html",
				
				"content_html": "<p><a href=\"https://www.macrumors.com/2026/04/14/apple-mac-app-store-fake-crypto-wallet/\">Apple Removes Fake Crypto Wallet App That Stole $9.5 Million From Mac Users - MacRumors</a></p>\n<p>A fake crypto wallet app disguised as Ledger Live was available on the Mac App Store, successfully scamming Mac users out of $9.5 million in cryptocurrency before being removed by Apple. The fraudulent app, which operated for about two weeks, tricked users into revealing their seed phrases, a tactic not used by legitimate crypto wallets.</p>\n",
				
				"date_published": "2026-04-14T16:44:00-04:00",
				"url": "https://threatintel.cc/2026/04/14/apple-removes-fake-crypto-wallet.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/14/backblaze-has-quietly-stopped-backing.html",
				
				"content_html": "<p><a href=\"https://rareese.com/posts/backblaze/\">Backblaze has quietly stopped backing up your data | Robert Reese&rsquo;s Website</a></p>\n<p>Article claims : Backblaze has quietly stopped backing up user data from cloud storage folders like OneDrive and Dropbox, and also .git folders, despite previously promising to back up all data. This change, implemented without direct user notification, means Backblaze is no longer fulfilling its core function of comprehensive data backup, eroding user trust.</p>\n",
				
				"date_published": "2026-04-14T15:43:30-04:00",
				"url": "https://threatintel.cc/2026/04/14/backblaze-has-quietly-stopped-backing.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/iranlinked-cyberavngers-sets-sights-on.html",
				
				"content_html": "<p><a href=\"https://cybersecuritynews.com/iran-linked-cyberav3ngers-sets-sights/\">Iran-Linked CyberAv3ngers Sets Sights on Water Utilities and Industrial Controllers - Cyber Security News</a></p>\n<p>The Iran-linked CyberAv3ngers group, formally connected to the IRGC-CEC, has evolved into a significant threat targeting U.S. critical infrastructure, including water and wastewater systems and energy facilities. They have exploited vulnerabilities in programmable logic controllers (PLCs) and deployed custom malware like IOCONTROL, causing operational disruption and financial losses.</p>\n",
				
				"date_published": "2026-04-13T13:21:03-04:00",
				"url": "https://threatintel.cc/2026/04/13/iranlinked-cyberavngers-sets-sights-on.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/the-silent-storm-new-infostealer.html",
				
				"content_html": "<p><a href=\"https://www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/\">The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</a></p>\n<p>The new Storm infostealer operates by hijacking browser sessions and decrypting data server-side, a shift from traditional methods that evaded endpoint security. For a monthly fee, it harvests credentials, session cookies, and crypto wallets, enabling attackers to gain authenticated access to SaaS platforms and cloud environments without triggering alerts.</p>\n",
				
				"date_published": "2026-04-13T13:20:02-04:00",
				"url": "https://threatintel.cc/2026/04/13/the-silent-storm-new-infostealer.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/hackers-claim-breach-of-rockstar.html",
				
				"content_html": "<p><a href=\"https://therecord.media/rockstar-hackers-cyberattack-cloud\">Hackers claim breach of Rockstar Games via cloud analytics platform | The Record from Recorded Future News</a></p>\n<p>The cybercrime group ShinyHunters claims to have breached Rockstar Games systems through a cloud analytics platform, threatening to release stolen data if a ransom is not paid. Rockstar Games confirmed a limited data breach but stated it has no impact on the company or its players.</p>\n",
				
				"date_published": "2026-04-13T13:19:02-04:00",
				"url": "https://threatintel.cc/2026/04/13/hackers-claim-breach-of-rockstar.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/apache-tomcat-vulnerabilities-enables-bypass.html",
				
				"content_html": "<p><a href=\"https://cybersecuritynews.com/apache-tomcat-vulnerabilities-encryptinterceptor/\">Apache Tomcat Vulnerabilities Enables Bypass of EncryptInterceptor</a></p>\n<p>Multiple Apache Tomcat vulnerabilities have been disclosed, including a critical EncryptInterceptor bypass (CVE-2026-34486) resulting from a flawed security patch, and issues related to padding oracle attacks and certificate authentication (CVE-2026-34500). Administrators are urged to update to the latest secure releases to mitigate these risks.</p>\n",
				
				"date_published": "2026-04-13T13:18:02-04:00",
				"url": "https://threatintel.cc/2026/04/13/apache-tomcat-vulnerabilities-enables-bypass.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/marimo-rce-vulnerability-exploited-in.html",
				
				"content_html": "<p><a href=\"https://cybersecuritynews.com/marimo-rce-vulnerability-exploited/\">Marimo RCE Vulnerability Exploited in the Within 10 Hours of Disclosure</a></p>\n<p>A critical pre-authentication RCE vulnerability (CVE-2026-39987) in the Marimo Python notebook platform was exploited within 10 hours of its disclosure, allowing attackers to steal cloud credentials. The flaw affects the /terminal/ws endpoint, and users are advised to update to version 0.23.0 or later immediately.</p>\n",
				
				"date_published": "2026-04-13T13:16:42-04:00",
				"url": "https://threatintel.cc/2026/04/13/marimo-rce-vulnerability-exploited-in.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/apt-delivers-undetectable-backdoor-to.html",
				
				"content_html": "<p><a href=\"https://www.darkreading.com/cloud-security/apt41-zero-detection-backdoor-harvest-cloud-credentials\">APT41 Delivers &lsquo;Undetectable&rsquo; Backdoor to Steal Cloud Credentials</a></p>\n<p>The China-backed threat group APT41 is utilizing a &lsquo;zero-detection&rsquo; backdoor to target cloud environments like AWS, Google, Azure, and Alibaba, aiming to harvest credentials. This sophisticated malware, written in ELF format, employs typosquatting and uses SMTP port 25 for covert command-and-control (C2), making its activity exceptionally difficult to detect.</p>\n",
				
				"date_published": "2026-04-13T13:15:15-04:00",
				"url": "https://threatintel.cc/2026/04/13/apt-delivers-undetectable-backdoor-to.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/bitter-apt-uses-signal-google.html",
				
				"content_html": "<p><a href=\"https://hackread.com/bitter-apt-signal-google-zoom-prospy-spyware/\">BITTER APT Uses Signal, Google, and Zoom Lures to Spread ProSpy Spyware</a></p>\n<p>The BITTER APT group is using Signal, Google, and Zoom lures in spearphishing attacks to spread ProSpy and ToSpy spyware, targeting journalists and activists in the Middle East. These attacks trick victims into downloading malware that can steal photos, messages, and files by impersonating legitimate login pages and using malicious QR codes.</p>\n",
				
				"date_published": "2026-04-13T13:14:00-04:00",
				"url": "https://threatintel.cc/2026/04/13/bitter-apt-uses-signal-google.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/adobe-rolls-out-emergency-fix.html",
				
				"content_html": "<p><a href=\"https://www.bleepingcomputer.com/news/security/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw/\">Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw</a></p>\n<p>Adobe has released an emergency fix for a zero-day vulnerability (CVE-2026-34621) in Acrobat and Reader that allowed malicious PDFs to bypass sandbox restrictions and execute arbitrary code. The flaw, exploited since December, enabled attackers to read and steal local files, and was discovered by Haifei Li after a suspicious PDF sample was submitted for analysis.</p>\n",
				
				"date_published": "2026-04-13T13:12:54-04:00",
				"url": "https://threatintel.cc/2026/04/13/adobe-rolls-out-emergency-fix.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/hackers-abuse-github-and-jira.html",
				
				"content_html": "<p><a href=\"https://cybersecuritynews.com/hackers-abuse-github-and-jira-notifications/\">Hackers Abuse GitHub and Jira Notifications to Deliver Phishing Through Trusted SaaS Channels</a></p>\n<p>Cybercriminals are exploiting GitHub and Jira notification systems to deliver phishing emails, bypassing traditional security measures by using the platforms' own verified infrastructure. This tactic, termed Platform-as-a-Proxy (PaaP), leverages automated notifications for fake invoices or alerts to harvest user credentials.</p>\n",
				
				"date_published": "2026-04-13T13:11:43-04:00",
				"url": "https://threatintel.cc/2026/04/13/hackers-abuse-github-and-jira.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/fbi-indonesia-take-down-wll.html",
				
				"content_html": "<p><a href=\"https://therecord.media/phishing-takedown-indonesia-fbi\">FBI, Indonesia take down W3LL phishing tool | The Record from Recorded Future News</a></p>\n<p>The FBI and Indonesian law enforcement have dismantled the W3LL phishing tool, a platform that enabled hackers to create fake login portals for $500, leading to the arrest of its alleged developer and seizure of critical domains. This sophisticated cybercrime service facilitated the theft of over 25,000 compromised accounts and was used in attacks targeting more than 56,000 corporate Microsoft 365 accounts globally.</p>\n",
				
				"date_published": "2026-04-13T13:10:07-04:00",
				"url": "https://threatintel.cc/2026/04/13/fbi-indonesia-take-down-wll.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/claude-ai-reportedly-down-for.html",
				
				"content_html": "<p><a href=\"https://cybersecuritynews.com/claude-ai-reportedly-down/\">Claude AI Reportedly Down for Hundreds of Users With Intermittent 500 Errors - Cyber Security News</a></p>\n<p>Hundreds of users reported Claude AI experiencing intermittent 500 errors on April 13, 2026, affecting its website, API, and Claude Code, despite the official status page indicating all systems are operational. This incident adds to a pattern of recurring disruptions for Anthropic&rsquo;s AI services throughout March and April.</p>\n",
				
				"date_published": "2026-04-13T13:09:32-04:00",
				"url": "https://threatintel.cc/2026/04/13/claude-ai-reportedly-down-for.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/pwc-cybersecurity-risk-outpaces-corporate.html",
				
				"content_html": "<p><a href=\"https://www.govinfosecurity.com/pwc-cybersecurity-risk-outpaces-corporate-ability-to-manage-a-31405\">PwC: Cybersecurity Risk Outpaces Corporate Ability to Manage</a></p>\n<p>A recent PwC survey reveals that cybersecurity is a top three risk for 60% of American corporations, yet only 6% feel capable of addressing it. Despite increased investments in technology and AI, companies often operate defensively, with attackers leveraging AI to exploit vulnerabilities at an unprecedented speed and scale.</p>\n",
				
				"date_published": "2026-04-13T13:08:23-04:00",
				"url": "https://threatintel.cc/2026/04/13/pwc-cybersecurity-risk-outpaces-corporate.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/rockstar-confirms-it-was-hacked.html",
				
				"content_html": "<p><a href=\"https://www.kitguru.net/gaming/matthew-wilson/rockstar-confirms-it-was-hacked-as-attackers-threaten-to-leak-data/\">Rockstar confirms it was hacked as attackers threaten to leak data | KitGuru</a></p>\n<p>Rockstar Games has confirmed it was the victim of a recent cyber-attack, where a hacking group called ShinyHunters gained access to a limited amount of non-material company information from cloud-based servers. The attackers are threatening to leak the stolen data, which includes financial information and player habit studies, after their ransom demand went unpaid.</p>\n",
				
				"date_published": "2026-04-13T13:06:21-04:00",
				"url": "https://threatintel.cc/2026/04/13/rockstar-confirms-it-was-hacked.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/13/bookingcom-warns-customers-of-hack.html",
				
				"content_html": "<p><a href=\"https://www.theguardian.com/technology/2026/apr/13/booking-com-customers-hack-exposed-data\">Booking.com warns customers of hack that exposed their data | Hacking | The Guardian</a></p>\n<p>Booking.com has alerted customers to a data breach where unauthorised parties accessed booking details, including names, emails, addresses, and phone numbers, but not financial information. This incident is the latest in a series of cybercrime attempts targeting the platform.</p>\n",
				
				"date_published": "2026-04-13T13:05:10-04:00",
				"url": "https://threatintel.cc/2026/04/13/bookingcom-warns-customers-of-hack.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/11/fbi-recovers-deleted-signal-messages.html",
				
				"content_html": "<p><a href=\"https://hackread.com/fbi-recover-deleted-signal-messages-iphone-notifications/\">FBI Recovers Deleted Signal Messages Through iPhone Notifications</a></p>\n<p>The FBI has discovered a method to recover deleted Signal messages from iPhones by accessing notification data, even after the app is deleted. This loophole, which affects other messaging apps like WhatsApp and Telegram as well, can be mitigated by disabling message previews in both iPhone and app notification settings.</p>\n",
				
				"date_published": "2026-04-11T18:25:07-04:00",
				"url": "https://threatintel.cc/2026/04/11/fbi-recovers-deleted-signal-messages.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/11/glassworm-evolves-with-zig-dropper.html",
				
				"content_html": "<p><a href=\"https://securityaffairs.com/190638/malware/glassworm-evolves-with-zig-dropper-to-infect-multiple-developer-tools.html\">GlassWorm evolves with Zig dropper to infect multiple developer tools</a></p>\n<p>The GlassWorm campaign has evolved to use a Zig-compiled dropper hidden within a fake IDE extension to infect multiple developer tools, including VS Code, Cursor, and VSCodium. This sophisticated attack chain allows threat actors to stealthily compromise developer environments at scale by installing a second-stage dropper that steals data and deploys a persistent RAT.</p>\n",
				
				"date_published": "2026-04-11T18:23:57-04:00",
				"url": "https://threatintel.cc/2026/04/11/glassworm-evolves-with-zig-dropper.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/11/openai-warns-macos-users-to.html",
				
				"content_html": "<p><a href=\"https://cybersecuritynews.com/openai-macos-users/\">OpenAI Warns macOS Users to Update ChatGPT and Codex Immediately</a></p>\n<p>OpenAI is warning macOS users to update ChatGPT and other applications immediately due to a software supply chain attack that compromised a third-party library, potentially exposing code-signing certificates. While no user data or systems were compromised, updating is crucial as older versions will become non-functional after May 8, 2026.</p>\n",
				
				"date_published": "2026-04-11T18:22:34-04:00",
				"url": "https://threatintel.cc/2026/04/11/openai-warns-macos-users-to.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/11/over-crypto-fraud-victims-identified.html",
				
				"content_html": "<p><a href=\"https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/\">Over 20,000 crypto fraud victims identified in international crackdown</a></p>\n<p>An international law enforcement operation named Operation Atlantic has identified over 20,000 victims of cryptocurrency fraud across Canada, the UK, and the US, freezing over $12 million in criminal proceeds and identifying over $45 million in stolen crypto. This operation highlights the success of public-private partnerships in combating fraud, a model that will be central to the UK&rsquo;s new Fraud Strategy.</p>\n",
				
				"date_published": "2026-04-11T18:21:37-04:00",
				"url": "https://threatintel.cc/2026/04/11/over-crypto-fraud-victims-identified.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/11/censys-finds-devices-exposed-to.html",
				
				"content_html": "<p><a href=\"https://securityaffairs.com/190646/ics-scada/censys-finds-5219-devices-exposed-to-attacks-by-iranian-apts-majority-in-u-s.html\">Censys finds 5,219 devices exposed to attacks by Iranian APTs, majority in U.S.</a></p>\n<p>Censys has identified 5,219 internet-exposed Rockwell Automation PLCs, with the majority located in the U.S., that are vulnerable to attacks by Iranian APTs. These devices are being targeted to disrupt critical infrastructure sectors, prompting urgent calls for defenders to secure or disconnect them.</p>\n",
				
				"date_published": "2026-04-11T18:20:21-04:00",
				"url": "https://threatintel.cc/2026/04/11/censys-finds-devices-exposed-to.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/10/the-art-of-the-gray.html",
				
				"content_html": "<p><a href=\"https://kiledjian.com/2026/04/10/the-art-of-the-gray.html\">The Art of the Gray Man: How to Travel Smart, Stay Safe, and Experience More of the World | Edward Kiledjian</a></p>\n<p>A practical guide to the “gray man” approach to travel—how to blend in, stay aware, and reduce risk without paranoia. Learn how behaviour, mindset, and digital hygiene can make you less of a target and more in control wherever you go.</p>\n",
				
				"date_published": "2026-04-10T08:54:53-04:00",
				"url": "https://threatintel.cc/2026/04/10/the-art-of-the-gray.html"
			},
			{
				"id": "http://threatintel.micro.blog/2026/04/10/critical-marimo-flaw-exploited-hours.html",
				
				"content_html": "<p><a href=\"https://www.securityweek.com/critical-marimo-flaw-exploited-hours-after-public-disclosure/\">Critical Marimo Flaw Exploited Hours After Public Disclosure - SecurityWeek</a></p>\n<p>A critical remote code execution (RCE) vulnerability in the Marimo notebook, CVE-2026-39987, was exploited by a threat actor just nine hours after its public disclosure. The unauthenticated flaw allows arbitrary system command execution, and the attacker successfully used it to steal credentials and exfiltrate files.</p>\n",
				
				"date_published": "2026-04-10T08:51:24-04:00",
				"url": "https://threatintel.cc/2026/04/10/critical-marimo-flaw-exploited-hours.html"
			}
	]
}
