<rss xmlns:source="http://source.scripting.com/" version="2.0">
  <channel>
    <title>Threat Intel</title>
    <link>https://threatintel.cc/</link>
    <description></description>
    
    <language>en</language>
    
    <lastBuildDate>Wed, 15 Apr 2026 20:06:34 -0400</lastBuildDate>
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/15/trusted-access-for-the-next.html</link>
      <pubDate>Wed, 15 Apr 2026 20:06:34 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/15/trusted-access-for-the-next.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://openai.com/index/scaling-trusted-access-for-cyber-defense/&#34;&gt;Trusted access for the next era of cyber defense | OpenAI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;OpenAI is expanding its Trusted Access for Cyber (TAC) program to provide thousands of verified defenders and hundreds of teams with access to advanced AI models, including the new GPT-5.4-Cyber, specifically fine-tuned for defensive cybersecurity use cases. This initiative emphasizes democratized access, iterative deployment, and ecosystem resilience to accelerate cyber defense efforts while implementing robust safeguards and verification processes to prevent misuse.&lt;/p&gt;
</description>
      <source:markdown>[Trusted access for the next era of cyber defense | OpenAI](https://openai.com/index/scaling-trusted-access-for-cyber-defense/)

OpenAI is expanding its Trusted Access for Cyber (TAC) program to provide thousands of verified defenders and hundreds of teams with access to advanced AI models, including the new GPT-5.4-Cyber, specifically fine-tuned for defensive cybersecurity use cases. This initiative emphasizes democratized access, iterative deployment, and ecosystem resilience to accelerate cyber defense efforts while implementing robust safeguards and verification processes to prevent misuse.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/15/microsoft-raises-prices-for-all.html</link>
      <pubDate>Wed, 15 Apr 2026 20:03:16 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/15/microsoft-raises-prices-for-all.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.macrumors.com/2026/04/14/microsoft-surface-pc-price-hike/&#34;&gt;Microsoft Raises Prices for All Surface PCs, Making Them More Expensive Than Equivalent Macs - MacRumors&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Microsoft has raised prices for all its Surface PCs, citing increased memory and component costs due to global memory shortages. These price hikes now make most Surface models, including the Surface Pro and Surface Laptop, more expensive than their equivalent Mac counterparts.&lt;/p&gt;
</description>
      <source:markdown>[Microsoft Raises Prices for All Surface PCs, Making Them More Expensive Than Equivalent Macs - MacRumors](https://www.macrumors.com/2026/04/14/microsoft-surface-pc-price-hike/)

Microsoft has raised prices for all its Surface PCs, citing increased memory and component costs due to global memory shortages. These price hikes now make most Surface models, including the Surface Pro and Surface Laptop, more expensive than their equivalent Mac counterparts.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/14/apple-removes-fake-crypto-wallet.html</link>
      <pubDate>Tue, 14 Apr 2026 16:44:00 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/14/apple-removes-fake-crypto-wallet.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.macrumors.com/2026/04/14/apple-mac-app-store-fake-crypto-wallet/&#34;&gt;Apple Removes Fake Crypto Wallet App That Stole $9.5 Million From Mac Users - MacRumors&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A fake crypto wallet app disguised as Ledger Live was available on the Mac App Store, successfully scamming Mac users out of $9.5 million in cryptocurrency before being removed by Apple. The fraudulent app, which operated for about two weeks, tricked users into revealing their seed phrases, a tactic not used by legitimate crypto wallets.&lt;/p&gt;
</description>
      <source:markdown>[Apple Removes Fake Crypto Wallet App That Stole $9.5 Million From Mac Users - MacRumors](https://www.macrumors.com/2026/04/14/apple-mac-app-store-fake-crypto-wallet/)

A fake crypto wallet app disguised as Ledger Live was available on the Mac App Store, successfully scamming Mac users out of $9.5 million in cryptocurrency before being removed by Apple. The fraudulent app, which operated for about two weeks, tricked users into revealing their seed phrases, a tactic not used by legitimate crypto wallets.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/14/backblaze-has-quietly-stopped-backing.html</link>
      <pubDate>Tue, 14 Apr 2026 15:43:30 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/14/backblaze-has-quietly-stopped-backing.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://rareese.com/posts/backblaze/&#34;&gt;Backblaze has quietly stopped backing up your data | Robert Reese&amp;rsquo;s Website&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Article claims : Backblaze has quietly stopped backing up user data from cloud storage folders like OneDrive and Dropbox, and also .git folders, despite previously promising to back up all data. This change, implemented without direct user notification, means Backblaze is no longer fulfilling its core function of comprehensive data backup, eroding user trust.&lt;/p&gt;
</description>
      <source:markdown>[Backblaze has quietly stopped backing up your data | Robert Reese&#39;s Website](https://rareese.com/posts/backblaze/)

Article claims : Backblaze has quietly stopped backing up user data from cloud storage folders like OneDrive and Dropbox, and also .git folders, despite previously promising to back up all data. This change, implemented without direct user notification, means Backblaze is no longer fulfilling its core function of comprehensive data backup, eroding user trust.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/iranlinked-cyberavngers-sets-sights-on.html</link>
      <pubDate>Mon, 13 Apr 2026 13:21:03 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/iranlinked-cyberavngers-sets-sights-on.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://cybersecuritynews.com/iran-linked-cyberav3ngers-sets-sights/&#34;&gt;Iran-Linked CyberAv3ngers Sets Sights on Water Utilities and Industrial Controllers - Cyber Security News&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Iran-linked CyberAv3ngers group, formally connected to the IRGC-CEC, has evolved into a significant threat targeting U.S. critical infrastructure, including water and wastewater systems and energy facilities. They have exploited vulnerabilities in programmable logic controllers (PLCs) and deployed custom malware like IOCONTROL, causing operational disruption and financial losses.&lt;/p&gt;
</description>
      <source:markdown>[Iran-Linked CyberAv3ngers Sets Sights on Water Utilities and Industrial Controllers - Cyber Security News](https://cybersecuritynews.com/iran-linked-cyberav3ngers-sets-sights/)

The Iran-linked CyberAv3ngers group, formally connected to the IRGC-CEC, has evolved into a significant threat targeting U.S. critical infrastructure, including water and wastewater systems and energy facilities. They have exploited vulnerabilities in programmable logic controllers (PLCs) and deployed custom malware like IOCONTROL, causing operational disruption and financial losses.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/the-silent-storm-new-infostealer.html</link>
      <pubDate>Mon, 13 Apr 2026 13:20:02 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/the-silent-storm-new-infostealer.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/&#34;&gt;The silent “Storm”: New infostealer hijacks sessions, decrypts server-side&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The new Storm infostealer operates by hijacking browser sessions and decrypting data server-side, a shift from traditional methods that evaded endpoint security. For a monthly fee, it harvests credentials, session cookies, and crypto wallets, enabling attackers to gain authenticated access to SaaS platforms and cloud environments without triggering alerts.&lt;/p&gt;
</description>
      <source:markdown>[The silent “Storm”: New infostealer hijacks sessions, decrypts server-side](https://www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/)

The new Storm infostealer operates by hijacking browser sessions and decrypting data server-side, a shift from traditional methods that evaded endpoint security. For a monthly fee, it harvests credentials, session cookies, and crypto wallets, enabling attackers to gain authenticated access to SaaS platforms and cloud environments without triggering alerts.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/hackers-claim-breach-of-rockstar.html</link>
      <pubDate>Mon, 13 Apr 2026 13:19:02 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/hackers-claim-breach-of-rockstar.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://therecord.media/rockstar-hackers-cyberattack-cloud&#34;&gt;Hackers claim breach of Rockstar Games via cloud analytics platform | The Record from Recorded Future News&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The cybercrime group ShinyHunters claims to have breached Rockstar Games systems through a cloud analytics platform, threatening to release stolen data if a ransom is not paid. Rockstar Games confirmed a limited data breach but stated it has no impact on the company or its players.&lt;/p&gt;
</description>
      <source:markdown>[Hackers claim breach of Rockstar Games via cloud analytics platform | The Record from Recorded Future News](https://therecord.media/rockstar-hackers-cyberattack-cloud)

The cybercrime group ShinyHunters claims to have breached Rockstar Games systems through a cloud analytics platform, threatening to release stolen data if a ransom is not paid. Rockstar Games confirmed a limited data breach but stated it has no impact on the company or its players.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/apache-tomcat-vulnerabilities-enables-bypass.html</link>
      <pubDate>Mon, 13 Apr 2026 13:18:02 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/apache-tomcat-vulnerabilities-enables-bypass.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://cybersecuritynews.com/apache-tomcat-vulnerabilities-encryptinterceptor/&#34;&gt;Apache Tomcat Vulnerabilities Enables Bypass of EncryptInterceptor&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Multiple Apache Tomcat vulnerabilities have been disclosed, including a critical EncryptInterceptor bypass (CVE-2026-34486) resulting from a flawed security patch, and issues related to padding oracle attacks and certificate authentication (CVE-2026-34500). Administrators are urged to update to the latest secure releases to mitigate these risks.&lt;/p&gt;
</description>
      <source:markdown>[Apache Tomcat Vulnerabilities Enables Bypass of EncryptInterceptor](https://cybersecuritynews.com/apache-tomcat-vulnerabilities-encryptinterceptor/)

Multiple Apache Tomcat vulnerabilities have been disclosed, including a critical EncryptInterceptor bypass (CVE-2026-34486) resulting from a flawed security patch, and issues related to padding oracle attacks and certificate authentication (CVE-2026-34500). Administrators are urged to update to the latest secure releases to mitigate these risks.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/marimo-rce-vulnerability-exploited-in.html</link>
      <pubDate>Mon, 13 Apr 2026 13:16:42 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/marimo-rce-vulnerability-exploited-in.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://cybersecuritynews.com/marimo-rce-vulnerability-exploited/&#34;&gt;Marimo RCE Vulnerability Exploited in the Within 10 Hours of Disclosure&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A critical pre-authentication RCE vulnerability (CVE-2026-39987) in the Marimo Python notebook platform was exploited within 10 hours of its disclosure, allowing attackers to steal cloud credentials. The flaw affects the /terminal/ws endpoint, and users are advised to update to version 0.23.0 or later immediately.&lt;/p&gt;
</description>
      <source:markdown>[Marimo RCE Vulnerability Exploited in the Within 10 Hours of Disclosure](https://cybersecuritynews.com/marimo-rce-vulnerability-exploited/)

A critical pre-authentication RCE vulnerability (CVE-2026-39987) in the Marimo Python notebook platform was exploited within 10 hours of its disclosure, allowing attackers to steal cloud credentials. The flaw affects the /terminal/ws endpoint, and users are advised to update to version 0.23.0 or later immediately.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/apt-delivers-undetectable-backdoor-to.html</link>
      <pubDate>Mon, 13 Apr 2026 13:15:15 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/apt-delivers-undetectable-backdoor-to.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.darkreading.com/cloud-security/apt41-zero-detection-backdoor-harvest-cloud-credentials&#34;&gt;APT41 Delivers &amp;lsquo;Undetectable&amp;rsquo; Backdoor to Steal Cloud Credentials&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The China-backed threat group APT41 is utilizing a &amp;lsquo;zero-detection&amp;rsquo; backdoor to target cloud environments like AWS, Google, Azure, and Alibaba, aiming to harvest credentials. This sophisticated malware, written in ELF format, employs typosquatting and uses SMTP port 25 for covert command-and-control (C2), making its activity exceptionally difficult to detect.&lt;/p&gt;
</description>
      <source:markdown>[APT41 Delivers &#39;Undetectable&#39; Backdoor to Steal Cloud Credentials](https://www.darkreading.com/cloud-security/apt41-zero-detection-backdoor-harvest-cloud-credentials)

The China-backed threat group APT41 is utilizing a &#39;zero-detection&#39; backdoor to target cloud environments like AWS, Google, Azure, and Alibaba, aiming to harvest credentials. This sophisticated malware, written in ELF format, employs typosquatting and uses SMTP port 25 for covert command-and-control (C2), making its activity exceptionally difficult to detect.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/bitter-apt-uses-signal-google.html</link>
      <pubDate>Mon, 13 Apr 2026 13:14:00 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/bitter-apt-uses-signal-google.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://hackread.com/bitter-apt-signal-google-zoom-prospy-spyware/&#34;&gt;BITTER APT Uses Signal, Google, and Zoom Lures to Spread ProSpy Spyware&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The BITTER APT group is using Signal, Google, and Zoom lures in spearphishing attacks to spread ProSpy and ToSpy spyware, targeting journalists and activists in the Middle East. These attacks trick victims into downloading malware that can steal photos, messages, and files by impersonating legitimate login pages and using malicious QR codes.&lt;/p&gt;
</description>
      <source:markdown>[BITTER APT Uses Signal, Google, and Zoom Lures to Spread ProSpy Spyware](https://hackread.com/bitter-apt-signal-google-zoom-prospy-spyware/)

The BITTER APT group is using Signal, Google, and Zoom lures in spearphishing attacks to spread ProSpy and ToSpy spyware, targeting journalists and activists in the Middle East. These attacks trick victims into downloading malware that can steal photos, messages, and files by impersonating legitimate login pages and using malicious QR codes.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/adobe-rolls-out-emergency-fix.html</link>
      <pubDate>Mon, 13 Apr 2026 13:12:54 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/adobe-rolls-out-emergency-fix.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw/&#34;&gt;Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Adobe has released an emergency fix for a zero-day vulnerability (CVE-2026-34621) in Acrobat and Reader that allowed malicious PDFs to bypass sandbox restrictions and execute arbitrary code. The flaw, exploited since December, enabled attackers to read and steal local files, and was discovered by Haifei Li after a suspicious PDF sample was submitted for analysis.&lt;/p&gt;
</description>
      <source:markdown>[Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw](https://www.bleepingcomputer.com/news/security/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw/)

Adobe has released an emergency fix for a zero-day vulnerability (CVE-2026-34621) in Acrobat and Reader that allowed malicious PDFs to bypass sandbox restrictions and execute arbitrary code. The flaw, exploited since December, enabled attackers to read and steal local files, and was discovered by Haifei Li after a suspicious PDF sample was submitted for analysis.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/hackers-abuse-github-and-jira.html</link>
      <pubDate>Mon, 13 Apr 2026 13:11:43 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/hackers-abuse-github-and-jira.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://cybersecuritynews.com/hackers-abuse-github-and-jira-notifications/&#34;&gt;Hackers Abuse GitHub and Jira Notifications to Deliver Phishing Through Trusted SaaS Channels&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Cybercriminals are exploiting GitHub and Jira notification systems to deliver phishing emails, bypassing traditional security measures by using the platforms&#39; own verified infrastructure. This tactic, termed Platform-as-a-Proxy (PaaP), leverages automated notifications for fake invoices or alerts to harvest user credentials.&lt;/p&gt;
</description>
      <source:markdown>[Hackers Abuse GitHub and Jira Notifications to Deliver Phishing Through Trusted SaaS Channels](https://cybersecuritynews.com/hackers-abuse-github-and-jira-notifications/)

Cybercriminals are exploiting GitHub and Jira notification systems to deliver phishing emails, bypassing traditional security measures by using the platforms&#39; own verified infrastructure. This tactic, termed Platform-as-a-Proxy (PaaP), leverages automated notifications for fake invoices or alerts to harvest user credentials.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/fbi-indonesia-take-down-wll.html</link>
      <pubDate>Mon, 13 Apr 2026 13:10:07 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/fbi-indonesia-take-down-wll.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://therecord.media/phishing-takedown-indonesia-fbi&#34;&gt;FBI, Indonesia take down W3LL phishing tool | The Record from Recorded Future News&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The FBI and Indonesian law enforcement have dismantled the W3LL phishing tool, a platform that enabled hackers to create fake login portals for $500, leading to the arrest of its alleged developer and seizure of critical domains. This sophisticated cybercrime service facilitated the theft of over 25,000 compromised accounts and was used in attacks targeting more than 56,000 corporate Microsoft 365 accounts globally.&lt;/p&gt;
</description>
      <source:markdown>[FBI, Indonesia take down W3LL phishing tool | The Record from Recorded Future News](https://therecord.media/phishing-takedown-indonesia-fbi)

The FBI and Indonesian law enforcement have dismantled the W3LL phishing tool, a platform that enabled hackers to create fake login portals for $500, leading to the arrest of its alleged developer and seizure of critical domains. This sophisticated cybercrime service facilitated the theft of over 25,000 compromised accounts and was used in attacks targeting more than 56,000 corporate Microsoft 365 accounts globally.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/claude-ai-reportedly-down-for.html</link>
      <pubDate>Mon, 13 Apr 2026 13:09:32 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/claude-ai-reportedly-down-for.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://cybersecuritynews.com/claude-ai-reportedly-down/&#34;&gt;Claude AI Reportedly Down for Hundreds of Users With Intermittent 500 Errors - Cyber Security News&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Hundreds of users reported Claude AI experiencing intermittent 500 errors on April 13, 2026, affecting its website, API, and Claude Code, despite the official status page indicating all systems are operational. This incident adds to a pattern of recurring disruptions for Anthropic&amp;rsquo;s AI services throughout March and April.&lt;/p&gt;
</description>
      <source:markdown>[Claude AI Reportedly Down for Hundreds of Users With Intermittent 500 Errors - Cyber Security News](https://cybersecuritynews.com/claude-ai-reportedly-down/)

Hundreds of users reported Claude AI experiencing intermittent 500 errors on April 13, 2026, affecting its website, API, and Claude Code, despite the official status page indicating all systems are operational. This incident adds to a pattern of recurring disruptions for Anthropic&#39;s AI services throughout March and April.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/pwc-cybersecurity-risk-outpaces-corporate.html</link>
      <pubDate>Mon, 13 Apr 2026 13:08:23 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/pwc-cybersecurity-risk-outpaces-corporate.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.govinfosecurity.com/pwc-cybersecurity-risk-outpaces-corporate-ability-to-manage-a-31405&#34;&gt;PwC: Cybersecurity Risk Outpaces Corporate Ability to Manage&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A recent PwC survey reveals that cybersecurity is a top three risk for 60% of American corporations, yet only 6% feel capable of addressing it. Despite increased investments in technology and AI, companies often operate defensively, with attackers leveraging AI to exploit vulnerabilities at an unprecedented speed and scale.&lt;/p&gt;
</description>
      <source:markdown>[PwC: Cybersecurity Risk Outpaces Corporate Ability to Manage](https://www.govinfosecurity.com/pwc-cybersecurity-risk-outpaces-corporate-ability-to-manage-a-31405)

A recent PwC survey reveals that cybersecurity is a top three risk for 60% of American corporations, yet only 6% feel capable of addressing it. Despite increased investments in technology and AI, companies often operate defensively, with attackers leveraging AI to exploit vulnerabilities at an unprecedented speed and scale.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/rockstar-confirms-it-was-hacked.html</link>
      <pubDate>Mon, 13 Apr 2026 13:06:21 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/rockstar-confirms-it-was-hacked.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.kitguru.net/gaming/matthew-wilson/rockstar-confirms-it-was-hacked-as-attackers-threaten-to-leak-data/&#34;&gt;Rockstar confirms it was hacked as attackers threaten to leak data | KitGuru&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rockstar Games has confirmed it was the victim of a recent cyber-attack, where a hacking group called ShinyHunters gained access to a limited amount of non-material company information from cloud-based servers. The attackers are threatening to leak the stolen data, which includes financial information and player habit studies, after their ransom demand went unpaid.&lt;/p&gt;
</description>
      <source:markdown>[Rockstar confirms it was hacked as attackers threaten to leak data | KitGuru](https://www.kitguru.net/gaming/matthew-wilson/rockstar-confirms-it-was-hacked-as-attackers-threaten-to-leak-data/)

Rockstar Games has confirmed it was the victim of a recent cyber-attack, where a hacking group called ShinyHunters gained access to a limited amount of non-material company information from cloud-based servers. The attackers are threatening to leak the stolen data, which includes financial information and player habit studies, after their ransom demand went unpaid.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/13/bookingcom-warns-customers-of-hack.html</link>
      <pubDate>Mon, 13 Apr 2026 13:05:10 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/13/bookingcom-warns-customers-of-hack.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.theguardian.com/technology/2026/apr/13/booking-com-customers-hack-exposed-data&#34;&gt;Booking.com warns customers of hack that exposed their data | Hacking | The Guardian&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Booking.com has alerted customers to a data breach where unauthorised parties accessed booking details, including names, emails, addresses, and phone numbers, but not financial information. This incident is the latest in a series of cybercrime attempts targeting the platform.&lt;/p&gt;
</description>
      <source:markdown>[Booking.com warns customers of hack that exposed their data | Hacking | The Guardian](https://www.theguardian.com/technology/2026/apr/13/booking-com-customers-hack-exposed-data)

Booking.com has alerted customers to a data breach where unauthorised parties accessed booking details, including names, emails, addresses, and phone numbers, but not financial information. This incident is the latest in a series of cybercrime attempts targeting the platform.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/11/fbi-recovers-deleted-signal-messages.html</link>
      <pubDate>Sat, 11 Apr 2026 18:25:07 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/11/fbi-recovers-deleted-signal-messages.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://hackread.com/fbi-recover-deleted-signal-messages-iphone-notifications/&#34;&gt;FBI Recovers Deleted Signal Messages Through iPhone Notifications&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The FBI has discovered a method to recover deleted Signal messages from iPhones by accessing notification data, even after the app is deleted. This loophole, which affects other messaging apps like WhatsApp and Telegram as well, can be mitigated by disabling message previews in both iPhone and app notification settings.&lt;/p&gt;
</description>
      <source:markdown>[FBI Recovers Deleted Signal Messages Through iPhone Notifications](https://hackread.com/fbi-recover-deleted-signal-messages-iphone-notifications/)

The FBI has discovered a method to recover deleted Signal messages from iPhones by accessing notification data, even after the app is deleted. This loophole, which affects other messaging apps like WhatsApp and Telegram as well, can be mitigated by disabling message previews in both iPhone and app notification settings.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/11/glassworm-evolves-with-zig-dropper.html</link>
      <pubDate>Sat, 11 Apr 2026 18:23:57 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/11/glassworm-evolves-with-zig-dropper.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://securityaffairs.com/190638/malware/glassworm-evolves-with-zig-dropper-to-infect-multiple-developer-tools.html&#34;&gt;GlassWorm evolves with Zig dropper to infect multiple developer tools&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The GlassWorm campaign has evolved to use a Zig-compiled dropper hidden within a fake IDE extension to infect multiple developer tools, including VS Code, Cursor, and VSCodium. This sophisticated attack chain allows threat actors to stealthily compromise developer environments at scale by installing a second-stage dropper that steals data and deploys a persistent RAT.&lt;/p&gt;
</description>
      <source:markdown>[GlassWorm evolves with Zig dropper to infect multiple developer tools](https://securityaffairs.com/190638/malware/glassworm-evolves-with-zig-dropper-to-infect-multiple-developer-tools.html)

The GlassWorm campaign has evolved to use a Zig-compiled dropper hidden within a fake IDE extension to infect multiple developer tools, including VS Code, Cursor, and VSCodium. This sophisticated attack chain allows threat actors to stealthily compromise developer environments at scale by installing a second-stage dropper that steals data and deploys a persistent RAT.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/11/openai-warns-macos-users-to.html</link>
      <pubDate>Sat, 11 Apr 2026 18:22:34 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/11/openai-warns-macos-users-to.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://cybersecuritynews.com/openai-macos-users/&#34;&gt;OpenAI Warns macOS Users to Update ChatGPT and Codex Immediately&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;OpenAI is warning macOS users to update ChatGPT and other applications immediately due to a software supply chain attack that compromised a third-party library, potentially exposing code-signing certificates. While no user data or systems were compromised, updating is crucial as older versions will become non-functional after May 8, 2026.&lt;/p&gt;
</description>
      <source:markdown>[OpenAI Warns macOS Users to Update ChatGPT and Codex Immediately](https://cybersecuritynews.com/openai-macos-users/)

OpenAI is warning macOS users to update ChatGPT and other applications immediately due to a software supply chain attack that compromised a third-party library, potentially exposing code-signing certificates. While no user data or systems were compromised, updating is crucial as older versions will become non-functional after May 8, 2026.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/11/over-crypto-fraud-victims-identified.html</link>
      <pubDate>Sat, 11 Apr 2026 18:21:37 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/11/over-crypto-fraud-victims-identified.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/&#34;&gt;Over 20,000 crypto fraud victims identified in international crackdown&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;An international law enforcement operation named Operation Atlantic has identified over 20,000 victims of cryptocurrency fraud across Canada, the UK, and the US, freezing over $12 million in criminal proceeds and identifying over $45 million in stolen crypto. This operation highlights the success of public-private partnerships in combating fraud, a model that will be central to the UK&amp;rsquo;s new Fraud Strategy.&lt;/p&gt;
</description>
      <source:markdown>[Over 20,000 crypto fraud victims identified in international crackdown](https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/)

An international law enforcement operation named Operation Atlantic has identified over 20,000 victims of cryptocurrency fraud across Canada, the UK, and the US, freezing over $12 million in criminal proceeds and identifying over $45 million in stolen crypto. This operation highlights the success of public-private partnerships in combating fraud, a model that will be central to the UK&#39;s new Fraud Strategy.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/11/censys-finds-devices-exposed-to.html</link>
      <pubDate>Sat, 11 Apr 2026 18:20:21 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/11/censys-finds-devices-exposed-to.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://securityaffairs.com/190646/ics-scada/censys-finds-5219-devices-exposed-to-attacks-by-iranian-apts-majority-in-u-s.html&#34;&gt;Censys finds 5,219 devices exposed to attacks by Iranian APTs, majority in U.S.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Censys has identified 5,219 internet-exposed Rockwell Automation PLCs, with the majority located in the U.S., that are vulnerable to attacks by Iranian APTs. These devices are being targeted to disrupt critical infrastructure sectors, prompting urgent calls for defenders to secure or disconnect them.&lt;/p&gt;
</description>
      <source:markdown>[Censys finds 5,219 devices exposed to attacks by Iranian APTs, majority in U.S.](https://securityaffairs.com/190646/ics-scada/censys-finds-5219-devices-exposed-to-attacks-by-iranian-apts-majority-in-u-s.html)

Censys has identified 5,219 internet-exposed Rockwell Automation PLCs, with the majority located in the U.S., that are vulnerable to attacks by Iranian APTs. These devices are being targeted to disrupt critical infrastructure sectors, prompting urgent calls for defenders to secure or disconnect them.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/10/the-art-of-the-gray.html</link>
      <pubDate>Fri, 10 Apr 2026 08:54:53 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/10/the-art-of-the-gray.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://kiledjian.com/2026/04/10/the-art-of-the-gray.html&#34;&gt;The Art of the Gray Man: How to Travel Smart, Stay Safe, and Experience More of the World | Edward Kiledjian&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A practical guide to the “gray man” approach to travel—how to blend in, stay aware, and reduce risk without paranoia. Learn how behaviour, mindset, and digital hygiene can make you less of a target and more in control wherever you go.&lt;/p&gt;
</description>
      <source:markdown>[The Art of the Gray Man: How to Travel Smart, Stay Safe, and Experience More of the World | Edward Kiledjian](https://kiledjian.com/2026/04/10/the-art-of-the-gray.html)


A practical guide to the “gray man” approach to travel—how to blend in, stay aware, and reduce risk without paranoia. Learn how behaviour, mindset, and digital hygiene can make you less of a target and more in control wherever you go.
</source:markdown>
    </item>
    
    <item>
      <title></title>
      <link>https://threatintel.cc/2026/04/10/critical-marimo-flaw-exploited-hours.html</link>
      <pubDate>Fri, 10 Apr 2026 08:51:24 -0400</pubDate>
      
      <guid>http://threatintel.micro.blog/2026/04/10/critical-marimo-flaw-exploited-hours.html</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.securityweek.com/critical-marimo-flaw-exploited-hours-after-public-disclosure/&#34;&gt;Critical Marimo Flaw Exploited Hours After Public Disclosure - SecurityWeek&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A critical remote code execution (RCE) vulnerability in the Marimo notebook, CVE-2026-39987, was exploited by a threat actor just nine hours after its public disclosure. The unauthenticated flaw allows arbitrary system command execution, and the attacker successfully used it to steal credentials and exfiltrate files.&lt;/p&gt;
</description>
      <source:markdown>[Critical Marimo Flaw Exploited Hours After Public Disclosure - SecurityWeek](https://www.securityweek.com/critical-marimo-flaw-exploited-hours-after-public-disclosure/)

A critical remote code execution (RCE) vulnerability in the Marimo notebook, CVE-2026-39987, was exploited by a threat actor just nine hours after its public disclosure. The unauthenticated flaw allows arbitrary system command execution, and the attacker successfully used it to steal credentials and exfiltrate files.
</source:markdown>
    </item>
    
  </channel>
</rss>
