17/2026/ONS: Financial analysis and investigation - Protection of EU Funds
The aim of this onsite activity is to improve the fight against fraud on EU funds by exchanging knowledge on recent fraud schemes and sharing good intelligence, risk analysis methods and investigative practices.EMPACT training activity Combating new forms of organised crime requires more cooper...
3032/2026/WEB 'Operational OSINT: Intelligence collection and analysis’
The aim of this webinar is to improve the operational capabilities of online investigators by presenting advanced attribution methods, automated data extraction, and techniques to transform online data into intelligence.By the end of this webinar, participants will be able to:Deploy dynamic Managed ...
3031/2026/WEB 'Emerging trends and tools in OSINT investigations’
The aim of this webinar is to enhance the ability of law enforcement officers to identify and apply emerging OSINT techniques and tools used in online investigations.By the end of this webinar, the audience will be able to:Use AI‑driven tools and LLMs for automated data collection and analysis.Ident...
51/2026/ONS: Schengen evaluation – Internal security measures
The aim of this onsite activity is to support the implementation of the Schengen evaluation and monitoring mechanism (SEMM) established under Council Regulation (EU) 2022/922, while promoting the conduct of objective and comprehensive evaluation visits, by preparing experts for Schengen evaluation v...
28/2026/ONS: Artificial Intelligence - Advanced prompting
The aim of this onsite activity is to equip law enforcement specialists with advanced prompt engineering skills that enable them to effectively integrate Artificial Intelligence (AI) tools into everyday investigative work. Emphasis is placed on solid understanding of core prompting principles and te...
This AI Broke the Rules: How Darwin-27B-Opus Beat Bigger Models Without Training
Introduction: A Radical Shift in How AI Improves For years, the artificial intelligence industry has followed a simple belief: bigger models, more data, and longer training cycles lead to better performance. This formula has driven the rise of massive systems with hundreds of billions of parameters,...
Weekly Report - 2026-04-13
StratIntel Briefing (7 days)
Generated: 2026-04-13 04:20 UTC | Articles: 13
Sweden (K1) — 4 articles
- [P1] [D2] – Regeringsärenden vecka 15, 2026
- [P1] [C2] [2 src] – Kommunikationsstrategier för cybersäkerhet, 15 april
- [P1] [C2] ↓ Insiderproblematik är en förbisedd risk i svenska organisationer
- [P1] [C2] ↑ Nytt teknikpris riktar ljuset mot innovation för säkerhet och försvar
EU / Europe (K2) — 4 articles
- [P1] [B2] [11 src] ↓ 6th April – Threat Intelligence Report
- [P1] [D2] ↓ 17/2026/ONS: Financial analysis and investigation - Protection of EU Funds
- [P1] [D2] ↓ 40/2026/ONS: Foreign terrorist fighters and traveling terrorists - Train the trainers
- [P1] [D2] ↑ 51/2026/ONS: Schengen evaluation – Internal security measures
Global (K3) — 5 articles
- [P1] [A2] [11 src] ↓ CISA Adds One Known Exploited Vulnerability to Catalog
- [P1] [A2] [15 src] ↑ OpenSSL security advisory (AV26-329)
- [P1] [C2] [4 src] ↓ Hackare har utnyttjat allvarlig sårbarhet i Acrobat Reader sedan december
- [P1] [C2] [4 src] ↓ Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs
- [P1] [C2] ↓ TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)
Anthropic's mysterious Mythos AI threatens to upend the infosec world
Or it's a bunch of pre-IPO hype. Either way, we're giving it the once-over on this week's episode Kettle Anthropic dropped a doozy on us this week with the launch of Mythos, an AI model it says is able to find and exploit zero-day vulnerabilities with a shocking level of ability. …
Daily Report - 2026-04-12
StratIntel Briefing (24h)
Generated: 2026-04-12 01:23 UTC | Articles: 6
Sweden (K1) — 2 articles
- [P1] [C2] – Kommunikationsstrategier för cybersäkerhet, 15 april
- [P1] [A2] – Erik Slottner: ”Inga beslut om att klippa banden till amerikanska techbolag”
Global (K3) — 4 articles
- [P1] [C2] ↓ BREAKING CYBER NIGHTMARE: NIGHTSPIRE RANSOMWARE STRIKES SAHARA AIR PRODUCTS IN A SHOCKING DARK WEB ESCALATION
- [P1] [C2] ↓ Ransomware Surge Escalates: Qilin Strikes Nan Liu Enterprises While Industrial Cyberwar Intensifies Globally
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//iienie1[.]weebly[.]com 🧬 Analysis at: https:...
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//abgbnjuygv[.]weebly[.]com 🧬 Analysis at: htt...
‘Snoopy’, ‘Adolf’ and ‘Password’: The Hungarian Government Passwords Exposed Onl...
‘Snoopy’, ‘Adolf’ and ‘Password’: The Hungarian Government Passwords Exposed Online - bellingcat https://www. bellingcat.com/news/2026/04/09 /the-hungarian-government-passwords-exposed-online/ Read on HackerWorkspace: https:// hackerworkspace.com/article/sn oopy-adolf-and-password-the-hungarian-gove...
Kan AI snart hacka in sig överallt? Nya modellen Mythos väcker oro
Säkerhetsexperten Benjamin Särkkä varnar för att it-branschen befinner sig i en kritisk övergångsperiod.
🔴 Iranian-linked actors are actively disrupting internet-facing Rockwell and All...
🔴 Iranian-linked actors are actively disrupting internet-facing Rockwell and Allen-Bradley PLCs. 🟡 CPUID served malware via CPU-Z and HWMonitor downloads. 🟡 GlassWorm used a fake VS Code extension to hit dev IDEs. solomonneas.dev/intel # CyberSecurity # ThreatIntel # ICS # SupplyChain
Kommunikationsstrategier för cybersäkerhet, 15 april
Välkommen till Cybernodes webbinarium den 15 april, 13.00-14.00 med Petra Jonsson, marknadschef och specialist på cyber- och kriskommunikation på Secify. Cybersäkerhet misslyckas ofta inte pga teknik utan snarare mänskligt beteende, och det är där kommunikation kommer in. I detta webinarium fokuser...
Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise
Time to start dropping SBOMs FEATURE Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from tens of thousands – if not more – organizations. We won't know the full blast radius for months.…
Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask
The real question about Anthropic’s new Claude Mythos Preview AI model is whether it (and future models like it) will be more helpful to defensive cybersecurity or to hackers. To find out, Fast Company asked a number of cybersecurity pros. Claude Mythos, released in “preview” on April 9, is Anthropi...
Studies: Banks Penalize Bad Cybersecurity With Higher Rates
CFOs Should Know: Lackadaisical Security Carries a Price Bad cybersecurity is bad for business. A badly secured business may pay as much as ten extra basis points for a loan than its posture had been up to scratch, find academic studies examining how U.S. banks price debt. The bill for poor cybersec...
Information om IT-incidenten - Uppdateras löpande
[Ekstra] EU-land advarer: Elbiler utgjør en økende IT-sikkerhetsrisiko
Moderne «datamaskiner på hjul» rommer alvorlige potensielle sårbarheter, fra manipulerte veiskilt til skjulte «kill switch»-funksjoner.
Glasswing Is the Confirmation: The ‘Manhattan Project’ for AI Arrived on April 7, 2026
And the Predictive Framework That Called It Author: Berend Watchus. Independent non-profit AI & Cyber Security Researcher. [Publication for: OSINT Team] Author’s Note: Glasswing and Mythos represent what a private corporate coalition is openly disclosing. This article does not claim knowledge of cla...
European Commision Breach Ironically Via Trivy Supply Chain Attack
https://privacyinsightsolutions.com/the-shield How a Security Scanner Breached the Institution Writing Europe’s Cybersecurity Laws On April 2, 2026, CERT-EU published a detailed advisory confirming that the European Commission’s cloud infrastructure had been breached through a supply chain compromis...
Daily Report - 2026-04-11
StratIntel Briefing (24h)
Generated: 2026-04-11 04:24 UTC | Articles: 8
Sweden (K1) — 3 articles
- [P1] [C2] [3 src] ↓ Hackare har utnyttjat allvarlig sårbarhet i Acrobat Reader sedan december
- [P1] [C2] ↑ Europeisk lagringsteknik utmanar molnberoende – fokus på kontroll och cybersäkerhet
- [P1] [C2] ↓ Temporary decline in cyberattacks – but threat level remains high
EU / Europe (K2) — 1 articles
- [P1] [C2] [2 src] ↓ European Commision Breach Ironically Via Trivy Supply Chain Attack
Global (K3) — 4 articles
- [P1] [A2] ↑ CERT-SE:s veckobrev v.15
- [P1] [A2] ↓ Critical Vulnerability in “Ninja Forms – File Upload” WordPress Plugin (CVE-2026-07409)
- [P1] [C2] ↓ Ransomware Surge Escalates: Qilin Strikes Nan Liu Enterprises While Industrial Cyberwar Intensifies Globally
- [P1] [C2] ↓ TrueConf Update Channel Breach Leads to Supply Chain Attack (CVE-2026–3502)
FBI retrieved deleted Signal messages from iPhone notification storage
A federal courtroom in Texas became the setting for an unexpected cybersecurity lesson when FBI investigators showed they could pull copies of encrypted Signal conversations off a suspect's iPhone, despite the app having been completely wiped from the device. The technique, disclosed during sworn te...
Claude Mythos: Preparing for a World Where AI Finds and Exploits Vulnerabilities Faster Than Ever
Anthropic's new model can autonomously discover zero-days and develop working exploits. While access is currently limited to responsible actors, now is the time to strengthen response playbooks, reduce exposure, and incorporate AI into security programs.
Experterna: Anthropics nya ai-modell kan bli ett digitalt maktmedel för USA
”Ett kvantsprång inom cybersäkerhet” – så beskriver svenska experter Anthropics nya ai-modell. Men många frågor är ännu obesvarade om hur kraftfull Mythos egentligen är – samt om tekniken kan bli ett geopolitiskt vapen.
Så skapar it-attacken problem i Vilhelmina och Dorotea
Dagen efter hackerattacken mot Dorotea kommun och Vilhelmina kommun återstår många problem. Det finns risk för försenade fakturor, annorlunda undervisning på skolor och tillbaka till papper och penna på förvaltningarna.
Varning för falska sms om låsbyte
Det har förekommit falska sms från någon som vill komma hem till kommuninvånare för att byta lås i bostaden. Vi uppmanar alla att vara uppmärksamma om ni får sms från okänd avsändare gällande detta. Alingsås kommun är just nu i ett projekt där vi inför digitala lås hos brukare med hemtjänst. Du kan ...
CERT-SE:s veckobrev v.15
I veckobrevet kan du bland annat läsa om en kritisk sårbarhet i Fortinet FortiClient EMS och om att säkerhetstjänster i bland annat Europa och USA varnar för att hotaktören APT28 utnyttjar sårbara routrar för att stjäla känslig information. Du hittar även information om hur du anmäler dig till MISP-...
Først blev Teams smidt på porten – nu vil Frankrig også af med Windows
Efter først at have sagt farvel til amerikanske videomødeløsninger som Teams tager Frankrig nu næste store skridt. Windows skal erstattes som led i et bredere opgør med afhængigheden af udenlandsk teknologi.
Cybersäkerhetslagen – vilka åtgärder krävs?
Cybersäkerhetslagen (2025:1506, hädanefter CSL) är Sveriges genomförande av E uropaparlamentets och rådets direktiv (EU) 2022/2555 om åtgärder för en hög gemensam cybersäkerhetsnivå i hela unionen (NIS2-direktivet) och innebär skärpta krav på verksamhetsutövare som är leverantörer av samhällsviktiga...
OpenAI lanserar nytt AI-säkerhetsprogram – vill stärka extern forskning
Bilden är AI-genererad. Det nya programmet riktar sig till externa forskare, ingenjörer och specialister som vill arbeta med frågor kopplade till AI-säkerhet och så kallad alignment – hur system kan utvecklas i linje med mänskliga värderingar och kontrollmekanismer. Fellowship-programmet löper från ...
Flere hundredetusinder togrejsende ramt: Stjålne persondata sat til salg efter cyberangreb
Et cyberangreb mod Eurail i slutningen af 2025 har ramt mindst mere end 300.000 personer. Ifølge selskabet omfatter lækagen blandt andet følsomme personoplysninger, der sidenhen er blevet sat til salg på dark web.
Mythos and Like AI Tools Raise Stakes for Healthcare Cyber
Experts Warn of Faster and Higher Volume Attacks, Rising Patient Safety Worries Emerging powerful AI tools - such as Anthropic's new Claude Mythos - that are capable of autonomously identifying and exploiting software bugs in a flash could reshape the healthcare cyber landscape by accelerating attac...
Attorneys Are Learning Useful AI Habits That Become Part Of Their Lawyering Muscle Memory
Lawyers need to learn useful AI habits, else they won't be getting the best results out of AI. They also need to steer clear of bad habits. An AI Insider scoop.
Rapporterade 30-tal allvarliga fel i Cosmic – inget svar från cheferna
Flera gånger i fjol försökte läkarfacket i Ångermanland få till ett möte med regionens chefer om allvarliga problem i journalsystemet Cosmic. Men ingenting hände.
How I Used OSINT to Gather Information Like a Hacker
I found my company’s exposed secrets in two hours. No hacking required. Continue reading on OSINT Team »
A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data
A hacker has allegedly stolen a massive trove of sensitive data – including highly classified defense documents and missile schematics – from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China. The dataset, which allegedly contains more ...
Milla Jovovich Goes Open Source Guns Blazing With Top AI Memory Code
The open source community has already started toimprove the code Milla posted of the best AI memory system in the world. That is the real magic of open source, you can use Milla’s code, but if you make improvements you are expected to reshare it.
Daily Report - 2026-04-10
StratIntel Briefing (24h)
Generated: 2026-04-10 04:22 UTC | Articles: 10
EU / Europe (K2) — 5 articles
- [P1] [D2] ↓ 17/2026/ONS: Financial analysis and investigation - Protection of EU Funds
- [P1] [D2] ↓ 40/2026/ONS: Foreign terrorist fighters and traveling terrorists - Train the trainers
- [P1] [D2] ↑ 51/2026/ONS: Schengen evaluation – Internal security measures
- [P1] [A2] ↓ Zammad: multiple vulnerabilities
- [P1] [D2] ↓ 22/2026/ONS: Drug crime and markets - Strategic analysis
Global (K3) — 5 articles
- [P1] [C2] [7 src] ↑ The agentic SOC—Rethinking SecOps for the next decade
- [P1] [A2] ↓ Google Chrome Multiple Vulnerabilities
- [P1] [C2] [6 src] ↓ Hackers have been exploiting an unpatched Adobe Reader vulnerability for months
- [P1] [A2] [3 src] ↑ Tenable security advisory (AV26-336)
- [P1] [D2] – UNC6783 Turns BPO Providers into Cyberattack Gateways
Sources: Anthropic is weighing the possibility of designing its own chips, but it has yet to commit to a design or put together a dedicated team for the project (Reuters)
Reuters : Sources: Anthropic is weighing the possibility of designing its own chips, but it has yet to commit to a design or put together a dedicated team for the project — Artificial intelligence lab Anthropic is exploring the possibility of designing its own chips, three sources said …
Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs
The fallout and potential exposure from Iran’s state-backed targeting of U.S. critical infrastructure extends to more than 5,200 internet-connected devices, researchers at Censys said in a threat intelligence brief Wednesday. Of the programmable logic controllers manufactured by Rockwell Automation/...
AI on the couch: Anthropic gives Claude 20 hours of psychiatry
The AI company Anthropic released a 244-page "system card" (PDF) this week describing its newest model, Claude Mythos. The model is "our most capable frontier model to date," the company says, and supposedly is so good that Anthropic has decided "not to make it generally available." (The company cla...
Anthropic will let your agents sleep on its couch
Want to run your business on autopilot? For better or worse, Managed Agents might help with that If you need AI agents to do a lot of ongoing tasks for your business, Anthropic has a new answer for you. The Claude maker has introduced Managed Agents, a service to help organizations create and deploy...
Cyberattack Cripples Signature Healthcare: Ambulances Diverted Amid Ongoing Disruptions
Introduction: A Growing Threat to Healthcare Infrastructure A major cyberattack has struck Signature Healthcare in Brockton, Massachusetts, causing widespread disruption across its hospital and medical group operations. While emergency services continue, ambulance diversions, canceled chemotherapy s...
What Project Glasswing Means for Security Leaders
Anthropic’s Project Glasswing matters because it offers an early look at how quickly software flaws may soon be found, validated, and potentially turned into viable attack paths, even if that capability is currently limited to a closed partner program. Anthropic says its restricted Claude Mythos Pre...
EDPB annual report 2025: supporting stakeholders through guidance and dialogue
Brussels, 09 April - The European Data Protection Board (EDPB) has published its 2025 Annual Report. The report provides an overview of the EDPB work carried out in 2025 and reflects on important milestones, such as the adoption of the Helsinki Statement on Enhanced Clarity, Support, and E...
Anthropic just dropped something that should be on every security team's radar r...
Anthropic just dropped something that should be on every security team's radar right now. Claude Mythos Preview converts 72% of discovered vulnerabilities into working exploits across major operating systems and browsers, including zero-days. Read more: https:// steelefortress.com/lyacdk Encryption ...
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs
The Expanding Role of Cyberattacks in Modern Conflicts
Defense of Democracies' Mark Montgomery on Warfare Trends, Geopolitical Threats Cyber operations now support military strategy rather than just acting alone. Mark Montgomery of the Foundation for Defense of Democracies warns that as militaries integrate cyber and kinetic action, private sector enter...
AI Is Accelerating Cyberattacks Faster Than Defenses
Okta's Brett Winterford on Identity Threats and Agentic AI Risks AI is accelerating cyberattacks, collapsing timelines and exposing new identity risks. Okta's Brett Winterford explains how attackers are using AI to scale phishing, exploit credentials and infiltrate enterprises - and what CIOs must d...
Daily Report - 2026-04-09
StratIntel Briefing (24h)
Generated: 2026-04-09 04:30 UTC | Articles: 15
Sweden (K1) — 5 articles
- [P1] [D2] – Regeringsärenden vecka 15, 2026
- [P1] [C2] ↑ Nytt teknikpris riktar ljuset mot innovation för säkerhet och försvar
- [P1] [C2] ↑ Ny lagringsteknik kan stärka motståndskraften i datakritisk infrastruktur
- [P1] [B2] [2 src] – EU-reglering av teknik, dataskydd och ekonomi
- [P1] [A2] ↑ Nyhetsbrev MISP-SE april 2026
EU / Europe (K2) — 5 articles
- [P1] [D2] ↓ 17/2026/ONS: Financial analysis and investigation - Protection of EU Funds
- [P1] [A2] ↓ Zammad: multiple vulnerabilities
- [P1] [D2] ↓ 40/2026/ONS: Foreign terrorist fighters and traveling terrorists - Train the trainers
- [P1] [D2] ↑ 51/2026/ONS: Schengen evaluation – Internal security measures
- [P1] [D2] ↓ 22/2026/ONS: Drug crime and markets - Strategic analysis
Global (K3) — 5 articles
- [P1] [A2] [7 src] ↓ CISA Adds One Known Exploited Vulnerability to Catalog
- [P1] [C2] ↓ TeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory, (Wed, Apr 8th)
- [P1] [A2] ↑ OpenSSL security advisory (AV26-329)
- [P1] [A2] ↓ Google Chrome Multiple Vulnerabilities
- [P1] [A2] [2 src] ↓ Fortinet FortiClientEMS Remote Code Execution Vulnerability
Hackers Use AI to Bypass Passwords in Large Scale Phishing Attack
Microsoft this week says it has uncovered a large-scale, sophisticated AI-driven phishing campaign that uses automation and legitimate authentication processes to compromise accounts more effectively than traditional phishing attacks.
Iran-linked hackers disrupt operations at US critical infrastructure sites
Hackers working on behalf of the Iranian government are disrupting operations at multiple US critical infrastructure sites, likely in response to the country's ongoing war with the US, a half-dozen government agencies are warning. In an advisory published Tuesday, the FBI, Cybersecurity and Infrastr...
New by me: Russia’s router campaign should be a wake-up call for every office. T...
New by me: Russia’s router campaign should be a wake-up call for every office. This was not just a Microsoft story. It was a reminder that neglected routers and edge devices can become a path to stolen credentials, token abuse, and serious business risk. I wrote about why this matters for SMBs, MSPs...
EU-reglering av teknik, dataskydd och ekonomi
EU-reglering av teknik, dataskydd och ekonomi 15 HP sysapp ons 8/4 2026 – 16:46 I kursen behandlas samspelet mellan det svenska rättssystemet och EU-rätten. Kursens materiella innehåll tar sin utgångspunkt i förordning om artificiell intelligens, förordningen om digitala tjänster, förordningen om di...
Russians hijacking routers for cyber spying
George Allison reports: In a new advisory, the NCSC warned that APT28, a cyber group linked to Russia’s GRU Military Unit 26165, has been exploiting vulnerabilities in edge network devices to conduct Domain Name System hijacking operations. DNS is the system that translates website addresses into th...
Financial cyberthreats in 2025 and the outlook for 2026
In 2025, the financial cyberthreat landscape continued to evolve. While traditional PC banking malware declined in relative prevalence, this shift was offset by the rapid growth of credential theft by infostealers. Attackers increasingly relied on aggregation and reuse of stolen data, rather than de...
Anthropic Calls Its New Model Too Dangerous to Release
Anthropic Limits Access to New AI Model Amid Concerns Over Misuse Anthropic asserted Tuesday that it's created a new era for cybersecurity after developing an artificial intelligence model too dangerous to release to public. The company's unreleased Claude Mythos Preview model has already found thou...
UK exposes Russian cyber unit hacking home routers to hijack internet traffic
British security officials warned Tuesday that hackers linked to Russian military intelligence have been exploiting vulnerable internet routers to hijack web traffic and spy on victims, in what authorities described as a broad and ongoing cyberespionage campaign. Officials said the activity centers...
Anthropic is giving companies, including Amazon, Apple, and Microsoft, access to its unreleased Claude Mythos model to prepare cybersecurity defense
Anthropic is giving a group of Big Tech and cybersecurity firms access to a preview version of Claude Mythos—its unreleased and most advanced AI model—in an attempt to bolster cybersecurity defenses across some of the world’s most critical systems. In just the past few weeks, Anthropic says its Myt...
Daily Report - 2026-04-08
StratIntel Briefing (24h)
Generated: 2026-04-08 04:18 UTC | Articles: 10
Sweden (K1) — 3 articles
- [P1] [B2] ↑ ARC@ORU: When Information Security Policies Don’t Work: Are We Using the Right (or Wrong) words?
- [P1] [C2] ↓ Kriget i Ukraina blottar sårbarheter i livsmedelsförsörjningen – fokus skiftar till lokala kedjor
- [P1] [C2] ↑ IT-Total lanserar 90-dagarsplan för att möta snabbare cyberattacker
EU / Europe (K2) — 2 articles
- [P1] [C2] ↓ Qilin ransomware claims attack on Germany’s Die Linke • IT systems compromised •...
- [P1] [A2] ↑ OpenSSL Security Advisory
Global (K3) — 5 articles
- [P1] [A2] [10 src] ↑ Fortinet security advisory (AV26-313)
- [P1] [C2] ↑ CIPHR: Cryptography Inspired IP Protection through Fine-Grain Hardware Redaction
- [P1] [A2] ↑ IBM security advisory (AV26-316)
- [P1] [A2] [2 src] ↓ Fortinet FortiClientEMS Remote Code Execution Vulnerability
- [P1] [A2] ↑ Ubuntu Linux Kernel Multiple Vulnerabilities
Regeringsärenden vecka 15, 2026
Förordning om ändring i lönegarantiförordningen (2024:1329) Ändring av regleringsbrev för budgetåret 2026 avseende Arbetsförmedlingen Uppdrag att delta i en nationell samverkansstruktur och utveckla arbetet mot våld, förtryck och utnyttjande Uppdrag om uppföljning av delmålen mot våld, förtryck och ...
Iranian hackers are targeting US energy and water sectors, federal agencies warn
Iranian hackers are exploiting cyber vulnerabilities in key software systems at U.S. water and energy providers, according to a new advisory released by the Cybersecurity and Infrastructure Security Agency on Tuesday. The guidance warns that Iran-linked hackers are targeting internet-connected progr...
Massachusetts hospital turning ambulances away after cyberattack
Signature Healthcare and Signature Healthcare Brockton Hospital said on Monday that the cyber incident is impacting many of their information systems.
Så kom hackare över 350 gigabyte data från EU-kommissionen
Den 24 mars lyckades den ökända hackargruppen Shiny Hunters komma åt 350 gigabyte data från plattformen Europa.eu , däribland namn, mejladresser och meddelanden. Nu har EU:s Computer Emergency Response Team (CERT-EU) undersökt hur intrånget gick till och kan konstatera att Shiny Hunters använt sig a...
IT-Total lanserar 90-dagarsplan för att möta snabbare cyberattacker
Cyberhoten mot svenska verksamheter ökar i rekordfart och kravet på kortare tidshorisont i cybersäkerhetsarbetet växer. För att möta den nya verkligheten lanserar IT-Total nu 90-dagarsplanen. Konceptet kompletterar det traditionella årshjulet och ger verksamheter den snabbhet som krävs när antagonis...
Daily Report - 2026-04-07
StratIntel Briefing (24h)
Generated: 2026-04-07 04:23 UTC | Articles: 8
Sweden (K1) — 3 articles
- [P1] [A2] ↑ Landsbygden mer sårbar än förr – samarbete stärker beredskapen
- [P1] [B2] [2 src] ↓ DEBATT: Regeringen duckar kritiken för att hålla SD nöjda
- [P1] [C2] ↑ Ubuntu har nu högre systemkrav än Windows 11
EU / Europe (K2) — 3 articles
- [P1] [C2] ↓ Lapsus$ Strikes Again: France’s Agriculture Ministry Hit in Alarming Ransomware Breach
- [P1] [C2] ↓ UK Law Firm Hit by Play Ransomware Attack Sparks Data Breach Fears
- [P1] [C2] ↓ UK Businesses Are Being Targeted Through Their Middle East Supply Chains — What to Do Now
Global (K3) — 2 articles
- [P1] [C2] [3 src] ↓ Tesla Systems and Nightspire Ransomware Attacks: Unpacking the Rising Threats in Cybersecurity
- [P1] [B2] [7 src] ↓ CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild
Iran threatens to destroy OpenAI’s $30bn Stargate data centre in Abu Dhabi
In short: Iran’s Islamic Revolutionary Guard Corps has released a video threatening “complete and utter annihilation” of OpenAI’s $30bn Stargate AI campus in Abu Dhabi, singling out the facility by name for the first time and warning it will strike if the US proceeds with threatened attacks on Irani...
Microsoft links Medusa ransomware affiliate to zero-day attacks
Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity attacks.
Pro-Iran Cyberattacks on Financial Services: 144 Incidents
Pro-Iran Cyberattacks on Financial Services: 144 Incidents Financial services is the #2 most targeted sector in the entire campaign , and for reasons that are deliberate, documented, and rooted in more than a decade of Iranian cyber doctrine. Between February 28 and April 6, 2026, SOCRadar tracked 1...
Complicated vs. Complex: Why Modern Healthcare Demands a Unique Approach to Cybersecurity
As the healthcare industry undergoes rapid digital transformation, learn how to secure your organization against evolving cyber threats and align with the updated HIPAA Security Rule through Cisco’s specialized Zero Trust approach.
We are turning digital policy into tangible benefits for all EU citizens. Our up...
We are turning digital policy into tangible benefits for all EU citizens. Our updated Digital Europe Programme focuses on: 👉 Online safety: an app for victims of cyberbullying to report incidents. 👉 Education: €10 million to keep school data safe and independent from non-EU platforms. 👉 A new call f...
How to Leak a $340B Secret: The Anthropic “Claude Code” Incident
I genuinely thought this was an April Fool’s prank. Every year, companies like Google pull some elaborate stunt, so when I saw the “Claude Code leak” trending on April 1st, I kept scrolling. But out of curiosity, I checked the npm registry for @anthropic-ai/claude-code. The version everyone was talk...
Weekly Report - 2026-04-06
StratIntel Briefing (7 days)
Generated: 2026-04-06 04:23 UTC | Articles: 13
Sweden (K1) — 4 articles
- [P1] [A2] [4 src] ↓ [Video] The TTP Ep 21: When Attackers Become Trusted Users
- [P1] [C2] – Svenska Yubico rekryterar ny marknadschef
- [P1] [C2] ↓ Startup Linx Secures $50M as Identity Threats Intensify
- [P1] [A2] [2 src] – CERT-SE:s veckobrev v.14
EU / Europe (K2) — 5 articles
- [P1] [A2] ↓ Progress ShareFile Storage Zones Controller v5 critical vulnerabilities lead to unauth RCE
- [P1] [C2] [2 src] ↓ Lapsus$ Strikes Again: France’s Agriculture Ministry Hit in Alarming Ransomware Breach
- [P1] [C2] ↑ The Academic Bubble That Forgot How the World Works: (1) AI Data Laundering Research and (2) the EU…
- [P1] [C2] ↓ UK Law Firm Hit by Play Ransomware Attack Sparks Data Breach Fears
- [P1] [C2] ↑ 🛡️New Cyber Mind Brief: The Trivy worm breaches the EU, Stryker hit by an Intune...
Global (K3) — 4 articles
- [P1] [C2] [2 src] ↓ CVE-2026-20093: Critical Cisco IMC Flaw Allows Unauthenticated Admin Access to UCS Servers
- [P1] [A2] [10 src] ↑ Cesanta security advisory (AV26-311)
- [P1] [C2] ↓ APERION releases SmartFlow SDK for secure, on-prem AI governance without cloud reliance
- [P1] [B2] ↑ Elastic Security Integrations Roundup: Q1 2026
🛡️New Cyber Mind Brief: The Trivy worm breaches the EU, Stryker hit by an Intune...
🛡️New Cyber Mind Brief: The Trivy worm breaches the EU, Stryker hit by an Intune "remote wipe," & Lazarus drains $285M. Passive tooling is dead. Are your "Atoms" secure? Read the latest on supply chain integrity & 5 key initiatives to implement today. # CyberSecurity https:// thecybermind.co/umsy ht...
Daily Report - 2026-04-05
StratIntel Briefing (24h)
Generated: 2026-04-05 01:04 UTC | Articles: 2
EU / Europe (K2) — 1 articles
- [P1] [A2] [2 src] ↓ Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist
Global (K3) — 1 articles
Han kan ”släcka halva internet”: Vi måste skydda oss
För två år sedan var världen ett par klick ifrån digital undergång i en cyberattack. I Huddinge sitter en man som enligt en expert, på liknande premisser, skulle kunna ”släcka halva internet”. – Förtroende är allt jag har här. Jag kan inte bryta det eller riskera det, säger han om sitt projekt som ...
Hackers Are Posting the Claude Code Leak With Bonus Malware
Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as part of an ongoing supply chain hacking spree, and more.
Cristie lanserar recovery-plattform för MSP:er baserad på Zero Trust
Cristie Recovery Solution för MSP lanseras som en heltäckande recovery-plattform särskilt utvecklad för Managed Service Providers. Lösningen är byggd på Rubriks Zero Trust-baserade backup och recovery-teknologi och kombinerar cyber recovery, disaster recovery och automatiserad verifiering av återstä...
European Commission breach exposed data of 30 EU entities, CERT-EU says
CERT-EU says a European Commission cloud hack exposed data from 30 EU entities and links the breach to the TeamPCP group. CERT-EU attributed a European Commission cloud breach to the TeamPCP threat group, revealing that data from at least 30 EU entities was exposed. The incident was publicly disclos...
Unit 42: Amazon Bedrock multi-agent systems can be chain-compromised via prompt...
Unit 42: Amazon Bedrock multi-agent systems can be chain-compromised via prompt injection. Discover agents → deliver payloads → invoke tools with malicious inputs. Guardrails work when enabled. One unguarded agent in the chain compromises the entire swarm. 🤖⛓️ # AI # AWS # cybersecurity # promptinje...
Behind the scenes of another Supply-Chain Attack
On 17th March, Wordpress Plugin BuddyBoss was compromised. Ctrl-Alt-Intel got a behind the scene look at how this was possible and who performed the malice. -> CI/CD secrets stolen via Github Actions -> SSH keys, secrets, tokens stolen -> SSH pivoting to deployment infrastructure for further credent...
What Happens When Data Centers Become Military Targets?
On Wednesday, Bahrain's interior ministry confirmed that civil defense teams were extinguishing a fire at a facility after an Iranian airstrike. The company was identified as Batelco, the country's largest telecom operator and host of AWS cloud. Then on Thursday, the Islamic Revolutionary Guard Corp...
Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks
In a new report, CERT-UA said attackers are revisiting previously breached infrastructure to check whether access is still available, whether exploited vulnerabilities have been patched and whether previously obtained credentials remain valid. The trend reflects a broader shift in attackers’ tactic...
European Commission cloud breach: a supply-chain compromise
In the interest of transparency, and in full agreement with the European Commission, CERT-EU is publishing this blog post to inform the wider community about a cybersecurity incident affecting the European Commission’s public website platform “europa.eu” hosted on Amazon Web Services (AWS) cloud inf...
Daily Report - 2026-04-04
StratIntel Briefing (24h)
Generated: 2026-04-04 04:26 UTC | Articles: 15
Sweden (K1) — 5 articles
- [P1] [D2] ↓ Kustbevakningen har bordat fartyg – igen
- [P1] [B2] ↓ Fartyg under sanktioner bordat – misstänks för utsläpp av olja i Östersjön
- [P1] [A2] ↓ Misstänkt fartyg bordat utanför Ystad
- [P1] [B2] ↓ Kustbevakningen har bordat en oljetanker på väg från Ryssland
- [P1] [A2] ↓ Hundratusentals blir utan elstöd
EU / Europe (K2) — 5 articles
- [P1] [C2] ↓ CERT-EU blames Trivy supply chain attack for Europa.eu data breach
- [P1] [A2] ↑ European Commission cloud breach: a supply-chain compromise
- [P1] [A2] [2 src] ↓ Die Linke German political party confirms data stolen by Qilin ransomware
- [P1] [C2] ↓ Dark Web Alert: Krybit and Netrunner Ransomware Strike New Targets
- [P1] [D2] ↓ The Cyber Express Weekly Roundup: Ransomware, and Supply Chain Breaches Surge
Global (K3) — 5 articles
- [P1] [C2] – 🔴 New security advisory: CVE-2026-26135 affects multiple systems. • Impact: Remo...
- [P1] [C2] – 🔴 New security advisory: CVE-2026-34563 affects multiple systems. • Impact: Remo...
- [P1] [C2] ↓ Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)
- [P1] [C2] ↓ Claude Code is still vulnerable to an attack Anthropic has already fixed
- [P1] [C2] ↓ High-Severity Vulnerabilities, Supply Chain Breaches, and AI Threats Redefine Cybersecurity This Week
EU cyber agency attributes major data breach to TeamPCP hacking group
Iran hotar med attacker mot amerikanska techjättar
”Evakuera så snart ni kan”, det är budskapet från det iranska revolutionsgardet när de nu hotar att attackera en rad stora amerikanska techbolag. – Det skulle kunna leda till temporära störningar och att någon global tjänst störs, säger David Olgart, föreståndare för Cyberkampus på Kungliga teknisk...
Europe’s cyber agency blames hacking gangs for massive data breach and leak
CERT-EU blamed the cybercrime group TeamPCP for the recent hack on the European Commission, and said the notorious ShinyHunters gang was responsible for leaking the stolen data online.
Trump budget proposal would cut hundreds of millions more from CISA
President Donald Trump’s fiscal 2027 budget would slash the Cybersecurity and Infrastructure Security Agency’s total by $707 million , according to a summary released Friday, which would deeply chop down an agency that already took a big hit in Trump’s first year. Another budget document suggests a ...
Claude Code Found a Linux Vulnerability Hidden for 23 Years
submitted by /u/mtlynch [link] [comments]
Massachusetts emergency communications system impacted by cyberattack
Nigerian romance scammer jailed after being caught out by fellow fraudster
A Nigerian fraudster spent years posing as a woman online, romancing unsuspecting American men out of their savings - until he accidentally tried the same trick on a fellow scammer, who told him to "learn how to do a clean job." The recovered chat logs helped put him behind bars for 15 years. Read...
Massive Cybersecurity Breaches Shake Global Tech and Government Sectors
Cybersecurity threats are escalating at an alarming rate, targeting both corporate giants and government institutions worldwide. Recent incidents highlight the sophistication of attackers and the growing need for robust digital defense strategies. From corporate data theft to state-sponsored espiona...
Daily Report - 2026-04-03
StratIntel Briefing (24h)
Generated: 2026-04-03 04:26 UTC | Articles: 47
EU / Europe (K2) — 3 articles
- [P1] [C2] ↓ Qilin Ransomware Strikes Again: Die Linke and Jursaconsulting Targeted
- [P2] [D2] ↓ World-first quantum-safe drones tested to protect UAV data from future cyber threats
- [P2] [A2] ↓ Drupal SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031
Global (K3) — 44 articles
- [P1] [C2] ↓ North Korea-Linked Hackers Exploit Popular NPM Package, Anthropic Code Leak Sparks Malware Surge
- [P1] [C2] ↓ Massive Data Breaches Shake the Cybersecurity World: Insurance, AI, and Personal Data at Risk
- [P1] [C2] ↓ Massive Data Breaches Shake US Tech and Real Estate: Lincoln Property and Anthropic Under Siege
- [P2] [A2] ↓ Several Cisco vulnerabilities patched
- [P1] [C2] ↓ Cybersecurity Threats on the Rise: How Hackers Are Outsmarting Networks and Devices
- [P1] [C2] ↓ From Exposure to RCE: Inside the Wing FTP Server Attack Chain
- [P2] [C2] ↓ Massive Cybersecurity Breaches Shake L’Oreal Morocco and Anthropic
- [P2] [C2] ↓ Cybersecurity Risk Assessment for CubeSat Missions: Adapting Established Frameworks for Resource-Constrained Environments
- [P2] [C2] ↑ Automated Generation of Cybersecurity Exercise Scenarios
- [P1] [C2] ↓ Escalating Cyber Threats: TA416 and NoVoice Malware Shake Europe and the Middle East
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//accesscontrolemailtermiantionnotice[.]weebly...
- [P1] [C2] ↓ Massive VPN and Android Security Breaches Shake Cybersecurity World
- [P2] [C2] – Cybercrime as a Service: A Scoping Review
- [P2] [C2] ↓ Dragonforce Ransomware Strikes Again: Elara Engineering and Fountain Targeted in Latest Cyber Attack
- [P2] [C2] ↑ Automated Framework to Evaluate and Harden LLM System Instructions against Encoding Attacks
- [P2] [C2] ↓ Efficient Software Vulnerability Detection Using Transformer-based Models
- [P2] [C2] ↓ Ransomware Strikes US Healthcare Provider Amid Major AI Code Leak
- [P2] [C2] ↓ RAGShield: Provenance-Verified Defense-in-Depth Against Knowledge Base Poisoning in Government Retrieval-Augmented Generation Systems
- [P2] [C2] ↑ Massive Crypto Heist and Android Malware Shake Digital Security: Key Insights
- [P2] [C2] ↑ Multi-Agent LLM Governance for Safe Two-Timescale Reinforcement Learning in SDN-IoT Defense
- [P2] [C2] ↓ Chrome zero-day CVE-2026-5281 is actively exploited in the wild—a use-after-free...
- [P2] [C2] ↓ Latest Anthropic Miscue Puts AI and Cyber Firms at Odds
- [P2] [C2] ↑ Massive Data Breaches Rock Nissan and Android Users: What You Need to Know
- [P2] [A2] [2 src] ↑ New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
- [P2] [C2] ↓ AutoEG: Exploiting Known Third-Party Vulnerabilities in Black-Box Web Applications
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//cuymmmdeot[.]weebly[.]com 🧬 Analysis at: htt...
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//originsteam[.]weebly[.]com 🧬 Analysis at: ht...
- [P3] [C2] ↓ Claude AI wrote a full FreeBSD remote kernel RCE with root shell (CVE-2026-4747)...
- [P2] [C2] ↑ Alarming Android Malware Strikes Millions While AI Startup Secures Smart Contracts
- [P3] [D2] ↑ Federal Cyber Experts Thought Microsoft’s Cloud Was “A Pile Of Shit.” They Approved It Anyway.
- [P2] [A2] [2 src] ↓ Apple expands iOS 18 updates to more iPhones to block DarkSword attacks
- [P2] [A2] ↓ Google Drive ransomware detection now on by default for paying users
- [P2] [B2] ↑ Prioritizing Alerts Triage with Higher-Order Detection Rules
- [P3] [C2] ↓ China hacked into FBI surveillance system under the watch of Kash Patel https://...
- [P2] [C2] ↑ Simplify Security, Strengthen Recovery
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//roblox[.]com[.]ge/users/7427849886/profile 🧬...
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//www[.]robiox[.]com[.]py/users/333607681674/p...
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//mymts334493795[.]weebly[.]com 🧬 Analysis at:...
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//bdvdbdbgdbgdb[.]carrd[.]co/ 🧬 Analysis at: h...
- [P3] [D2] ↓ AI Just Hacked One Of The World's Most Secure Operating Systems
- [P2] [C2] ↓ When Safe Models Merge into Danger: Exploiting Latent Vulnerabilities in LLM Fusion
- [P2] [C2] ↓ WhatsApp Spyware Alert: Fake App Used to Infect Users with Government-Grade Surveillance Tools
- [P2] [C2] ↓ CrystalRAT Malware-as-a-Service Emerges: A Dangerous Blend of Surveillance, Theft, and Digital Harassment
- [P2] [C2] – NFC based inventory control system for secure and efficient communication
Weekly Report - 2026-04-03
StratIntel Briefing (7 days)
Generated: 2026-04-03 07:37 UTC | Articles: 9
EU / Europe (K2) — 5 articles
- [P1] [D2] ↓ How Europe Is Building Its Cyber Resilience
- [P1] [C2] ↑ National Cyber Resilience Demands Unified Defense
- [P1] [A2] ↓ F5 K000156741: BIG-IP APM vulnerability CVE-2025-53521 increased severity, active exploitation
- [P2] [D2] ↑ EU Commission investigates cyberattack on its public websites platform
- [P1] [D2] ↓ InfoSec News Nuggets 03/31/2026
Global (K3) — 4 articles
- [P2] [D2] ↓ The Stryker 2026 Breach: Why State-Sponsored Cyber Warfare Now Demands A Proactive Defense Strategy + Video - Undercode Testing
- [P1] [C2] ↓ Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)
- [P1] [C2] ↓ North Korea-Linked Hackers Exploit Popular NPM Package, Anthropic Code Leak Sparks Malware Surge
- [P1] [A2] ↓ CISA Adds One Known Exploited Vulnerability to Catalog
US military contractor open sources tool for validating hidden communications networks
Maude-HCS from RTX (formerly Raytheon) helps model and validate hidden communication systems A software toolkit built for DARPA to test and validate covert communication networks is now open source, and it could help orgs who want to experiment with new kinds of secure, anonymous communications tool...
Google's Gemma 4 model goes fully open-source and unlocks powerful local AI - even on phones
Now open-source under Apache 2.0, Gemma 4 brings offline, multimodal AI to servers, phones, and Raspberry Pi - giving developers total local control over edge and on-premises deployments.
Medtech giant Stryker says it’s back up after Iranian cyberattack
Medtech company Stryker says it’s back to being “fully operational,” three weeks after it became the most prominent victim to date of Iranian hackers, who said they attacked the Michigan-based company in retaliation over the conflict with the United States and Israel. A March 11 wiper attack from th...
EU blames major cybercrime group for cloud infrastructure breach
A cybercriminal group called ShinyHunters stole personal data in a recent cyberattack on the European Commission’s cloud infrastructure, the European Union’s in-house cybersecurity team said on Thursday. The EU’s Computer Emergency Response Team (CERT-EU) said attackers took personal data including ...
CERT-SE:s veckobrev v.14
Den senaste tiden har det noterats flera leveranskedjeangrepp, senast genom Axios JavaScript-bibliotek. Australiens cybersäkerhetscenter har tagit fram en bra sammanfattning om den senaste tidens händelser, som finns att läsa nedan. Trevlig helg och glad påsk önskar CERT-SE! Nyheter i veckan I samba...
Massive Data Breaches Shake the Cybersecurity World: Insurance, AI, and Personal Data at Risk
In an alarming surge of cyber incidents, two major data breaches have recently made headlines, highlighting the growing vulnerabilities in cloud infrastructure and AI software. From exposing sensitive insurance records to leaking thousands of lines of proprietary AI code, these events underscore the...
Daily Report - 2026-04-02
StratIntel Briefing (24h)
Generated: 2026-04-02 04:29 UTC | Articles: 41
EU / Europe (K2) — 5 articles
- [P1] [C2] ↑ Vulta Intelligence Launches as Credential Lookup Service With 14.2 Billion Indexed Records, Telegram Bot, and Pay-Per-Query ULP Extraction
- [P1] [A2] ↑ Cyber Brief 26-04 - March 2026
- [P1] [C2] ↓ Cybersecurity Threats on the Rise: How Hackers Are Outsmarting Networks and Devices
- [P1] [C2] ↓ Escalating Cyber Threats: TA416 and NoVoice Malware Shake Europe and the Middle East
- [P1] [B2] ↓ Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More
Global (K3) — 36 articles
- [P1] [C2] – ⛔ New security advisory: CVE-2026-34449 affects multiple systems. • Impact: Remo...
- [P1] [C2] ↑ 🔶 New security advisory: CVE-2026-28228 affects multiple systems. • Impact: Sign...
- [P1] [C2] ↑ 🔒 Security News Digest - 2026-04-02 📊 15 updates from 5 sources: 🔹 Security Boul...
- [P1] [A2] ↑ Cisco security advisory (AV26-307)
- [P1] [C2] ↓ Massive Data Breaches Shake US Tech and Real Estate: Lincoln Property and Anthropic Under Siege
- [P1] [C2] ↓ Massive Cybersecurity Breaches Shake L’Oreal Morocco and Anthropic
- [P1] [C2] ↓ Chrome Zero-Day CVE-2026-5281: A Use-After-Free in Dawn's WebGPU Layer
- [P1] [C2] ↓ Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281)
- [P1] [C2] [2 src] ↓ Google fixes fourth actively exploited Chrome zero-day of 2026
- [P1] [C2] ↓ Chrome zero-day CVE-2026-5281 is actively exploited in the wild—a use-after-free...
- [P1] [C2] ↓ Critical Chrome Zero-Day CVE-2026-5281 Sparks Urgent Global Security Response + Video
- [P1] [A2] [2 src] ↑ New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
- [P1] [C2] – Cybercrime as a Service: A Scoping Review
- [P1] [C2] ↓ Best Tools for Digital Threat Monitoring and Cyber Threat Visibility
- [P1] [C2] ↓ Anthropic-medarbejder har ved et uheld lækket hele Claude Codes kildekode: 500.000 linier kode sluppet fri
- [P1] [C2] ↓ Källkoden för Claude Code har läckt ut av misstag
- [P1] [C2] ↓ Anthropic har råkat läcka källkoden till Claude Code
- [P1] [C2] ↓ 🟡 THREAT INTELLIGENCE Claude Code Source Leaked via npm Packaging Error, Anthrop...
- [P1] [D2] – Anthropic Rushes to Limit Leak of Claude Code Source Code
- [P1] [B2] ↓ Anthropic Claude Code Leak
- [P1] [A2] ↑ Google Chrome security advisory (AV26-306) – Update 1
- [P1] [C2] ↓ Everest and Qilin Ransomware Strike Major Corporations: Nissan and Seeing Machines Targeted
- [P1] [C2] ↑ Automated Framework to Evaluate and Harden LLM System Instructions against Encoding Attacks
- [P1] [C2] ↑ Security awareness is not a control: Rethinking human risk in enterprise security
- [P1] [C2] ↓ Efficient Software Vulnerability Detection Using Transformer-based Models
- [P1] [C2] ↓ Massive VPN and Android Security Breaches Shake Cybersecurity World
- [P2] [C2] ↓ Keitaro Tracking Platform and Critical Editor Vulnerabilities: A Growing Cybersecurity Storm
- [P1] [C2] ↓ Dragonforce Ransomware Strikes Again: Elara Engineering and Fountain Targeted in Latest Cyber Attack
- [P2] [C2] ↓ Dark Web’s New Threat: Leak Bazaar Turns Stolen Data into Cashable Intelligence
- [P2] [B2] – Inside the Axios supply chain compromise - one RAT to rule them all
- [P1] [C2] ↓ Latest Anthropic Miscue Puts AI and Cyber Firms at Odds
- [P1] [C2] ↓ AutoEG: Exploiting Known Third-Party Vulnerabilities in Black-Box Web Applications
- [P1] [C2] – NIST SP 800-81r3: A Long-Overdue Wake-Up Call for DNS Security
- [P2] [C2] – CivicShield: A Cross-Domain Defense-in-Depth Framework for Securing Government-Facing AI Chatbots Against Multi-Turn Adversarial Attacks
- [P1] [A2] ↑ Drupal security advisory (AV26-308)
- [P1] [A2] ↓ Drupal SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031
”Stärkt infrastruktur och ökad energiberedskap i totalförsvaret”
Debattartikel av Carl-Oskar Bohlin, Andreas Carlson, Oscar Sjöstedt och Gulan Avci, publicerad i Svenska Dagbladet den 2 april 2026.
Uppdrag till Statens skolverk att ta fram stödmaterial om att förmedla och förankra respekt för lagar och andra föreskrifter
Regeringen ger Statens skolverk i uppdrag att ta fram stödmaterial om förskolans, skolans och fritidshemmets uppdrag i läroplanerna om att förmedla och förankra respekt för att lagar och andra föreskrifter som gäller i samhället ska följas.
Sverige ligger fortsatt i framkant i utbyggnaden av laddinfrastruktur
Regeringen har överlämnat Sveriges handlingsprogram enligt EU:s förordning om utbyggnad av infrastruktur för alternativa drivmedel (AFIR) till EU-kommissionen. Handlingsprogrammet visar att Sverige ligger bra till när det gäller att uppfylla EU målen för utbyggnaden av publik laddinfrastruktur och a...
AI maps science papers to predict research trends two to three years ahead
The number of scientific papers is growing so rapidly that scientists are no longer able to keep track of all of them, even in their own research area. Researchers from the Karlsruhe Institute of Technology (KIT), in collaboration with scientific partners, have shown how new research ideas can still...
FBI declares suspected Chinese hack of US surveillance system a ‘major cyber incident’
The FBI last week deemed a recent, China-linked cyber intrusion into a sensitive agency surveillance system a “major incident,” meaning it poses significant risks to U.S. national security, according to one congressional aide and two U.S. officials with knowledge of the matter. The bureau first told...
Top EU officials’ Signal group chat shut down over hacking fears
BRUSSELS — The European Commission has told some of its most senior officials to shut down a Signal group they were using to exchange information over fears it was a hacking target. Department chiefs and deputy chiefs were members of the group chat on the encrypted messaging app, according to three ...
Cyber Brief 26-04 - March 2026
Cyber Briefs are monthly executive reports that aim to present an overview of the most relevant developments in cyber security, based exclusively on open sources, with a view to inform political leadership and senior management in its constituency. Additional information on any item in this Brief ca...
Is “Hackback” Official US Cybersecurity Strategy?
The 2026 US “ Cyber Strategy for America ” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone. But one sentence stood out: “We will unleash the private sector by creating incentives to identify and disrupt adversary networks and sca...
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE. As part of the attacks, the threat actors, tracked as UAC-0255, sent ema...
Från vägledning till verklighet: Så tar din kommun kontroll över identiteter och behörigheter
Kontrollen över vem som har tillgång till vilka system och vilken information är en grundförutsättning för en säker och effektiv kommunal verksamhet. Med SKR:s nya rekommendationer för identitets- och behörighetshantering finns nu en tydlig karta för resan framåt. Men hur går vi från teori till prak...
Trivy-Linked Cisco Breach & ShinyHunters’ Stolen Data Claim
Trivy-Linked Cisco Breach & ShinyHunters’ Stolen Data Claim Cisco is facing fresh scrutiny after a breach of its internal development environment was linked to the Trivy supply chain compromise. A ShinyHunters extortion claim has since surfaced, alleging theft of Salesforce data, GitHub repositories...
FBI warns against using Chinese mobile apps due to privacy risks. That's hilario...
FBI warns against using Chinese mobile apps due to privacy risks. That's hilarious for the FBI to say that 🤣 https://www. bleepingcomputer.com/news/secu rity/fbi-warns-against-using-chinese-mobile-apps-over-to-data-security-risks/ # privacy # security # infosec
European-Chinese geopolitical issues drive renewed cyberespionage campaign
A Chinese cyberespionage group has shifted its gaze back to Europe after years of focusing on other parts of the world, Proofpoint research published Wednesday found. The surge began in mid-2025, with a bevy of issues bubbling up between China and Europe, the company said . Proofpoint labels the gov...
Beslut: Integritetsskydd vid signalspaning i försvarsunderrättelseverksamhet
Beslut: Integritetsskydd vid signalspaning i försvarsunderrättelseverksamhet 2026-04-01 16:08:28
Internrevision inom informationssäkerhet: Vad kräver NIS2 och GDPR?
Internrevision inom informationssäkerhet: Vad kräver NIS2 och GDPR? Digitalisering och cyberhot gör att krav på informationssäkerhet ökar snabbt. Två regelverk som påverkar många företag i Europa är NIS2-direktivet och GDPR. Båda ställer höga krav på hur organisationer hanterar data, skyddar system ...
Iran hotar attackera amerikanska techbolag
Irans revolutionsgarde (IRGC) hotar att attackera en rad stora amerikanska techbolag, däribland Nvidia, Apple, Microsoft och Google, som en del av konflikten med USA och Israel, rapporterar CNBC . Totalt pekas 18 företag ut som mål och IRGC uppger att attackerna kan inledas från och med kvällen den ...
@ sparta FBI warns against using Chinese mobile apps due to privacy risks Also,...
@ sparta FBI warns against using Chinese mobile apps due to privacy risks Also, don't use U.S. mobile apps due to privacy risks. https://www. 404media.co/apple-gives-fbi-a- users-real-name-hidden-behind-hide-my-email-feature/ https://www. 404media.co/ice-to-buy-tool-th at-tracks-locations-of-hundred...
Sats om hackerattacken: “Välkomna att träna som vanligt”
Efter förra veckans larm om ett allvarligt it-intrång kommer nu gymjätten Sats med en uppdatering. Medlemssystemet med kreditkortsdata har klarat sig – men känsliga bokföringsdokument och personuppgifter om anställda har läckt ut.
Skadlig kod sprids via populärt javascript-bibliotek
Om du planerar att ladda ner det populära javascript-biblioteket Axios bör du vara på din vakt. Enligt säkerhetsforskare från Stepsecurity och Googles Threat Intelligence Group har nämligen nordkoreanska hackare börjat sprida versioner av Axios som innehåller skadlig kod. – Nordkoreanska hackare har...
Ny utrustning och mjukvara godkänd för användning i Rakel
Myndigheten för civilt försvar har godkänt nya terminaler och ny mjukvara som får användas i Rakelsystemet.
Axios npm supply chain attack: 83M weekly downloads, maintainer account compromi...
Axios npm supply chain attack: 83M weekly downloads, maintainer account compromised, cross-platform RAT for Win/Mac/Linux. Pre-staged 18hrs early. Anti-forensic self-destruct. Rotate credentials NOW. 🔓💥 # supplychain # npm # cybersecurity # axios # infosec Source: https:// thehackernews.com/2026/03/...
European Commission Reports Hack and Data Breach
Axios Front-End Library npm Supply Chain Poisoning Alert
Overview On March 31, NSFOCUS CERT detected that the npm repository of the HTTP client library Axios was poisoned by the supply chain. The attacker bypassed the normal GitHub Actions CI/CD pipeline of the project, changed the account email address of the axios maintainer to an anonymous ProtonMail a...
Beyond the Regime: How Iran Weaponizes Cybercrime and Ransomware Tactics
When U.S. organizations think of ransomware, the immediate image is often a financially motivated, Eastern European cybercriminal cartel operating a massive Ransomware-as-a-Service (RaaS) empire. However, a different, hybrid threat has emerged from the Middle East. While Iran may not operate traditi...
axios Compromised on npm - Malicious Versions Drop Remote Access Trojan
axios is the most popular JavaScript HTTP client library with over 100 million weekly downloads. On March 30, 2026, StepSecurity identified two malicious versions of the widely used axios HTTP client library published to npm: axios@1.14.1 and axios@0.30.4. The malicious versions inject a new depende...
Daily Report - 2026-04-01
StratIntel Briefing (24h)
Generated: 2026-04-01 04:22 UTC | Articles: 46
Sweden (K1) — 11 articles
- [P1] [A2] ↑ Security and privacy controls and assurance activities catalogue (ITSP.10.033)
- [P1] [C2] ↓ Sverige riskerar att bli den kokande grodan i cyberkriget
- [P1] [C2] ↓ Foxit flags hidden security risks in PDFs with new tool
- [P1] [D2] [2 src] ↓ TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats
- [P1] [C2] ↓ The European Commission got hit with a cyberattack, again. 350 GB allegedly take...
- [P1] [C2] ↓ The Modern Threat Landscape and The Partner’s New Burden
- [P1] [B2] ↑ Samarbete avgörande för motståndskraftiga samhällen i norr
- [P1] [C2] ↓ Flint24 cybercrime network dismantled - 26 members sentenced in large-scale card...
- [P1] [C2] – Gap-analys för cybersäkerhetslagen
- [P1] [C2] ↓ GMA-SAWGAN-GP: A Novel Data Generative Framework to Enhance IDS Detection Performance
- [P1] [C2] ↓ Beyond Corner Patches: Semantics-Aware Backdoor Attack in Federated Learning
EU / Europe (K2) — 2 articles
- [P1] [D2] ↓ SonicWall Email Security Affected By Multiple Vulnerabilities
- [P1] [C2] – European Commission Reports Hack and Data Breach
Global (K3) — 33 articles
- [P1] [A2] ↑ [Control systems] ABB security advisory (AV26-303)
- [P2] [C2] ↑ TeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
- [P1] [A2] ↑ Symantec security advisory (AV26-304)
- [P1] [A2] ↓ EtherHiding: The trojan in your toolchain
- [P1] [C2] ↑ The New Playground for Cybercriminals: Securing the Microsoft Teams Frontier
- [P1] [C2] ↑ Design Principles for the Construction of a Benchmark Evaluating Security Operation Capabilities of Multi-agent AI Systems
- [P1] [C2] ↑ KAN-LSTM: Benchmarking Kolmogorov-Arnold Networks for Cyber Security Threat Detection in IoT Networks
- [P1] [A2] ↓ How SentinelOne’s AI EDR Autonomously Discovered and Stopped Anthropic’s Claude from Executing a Zero Day Supply Chain Attack, Globally
- [P1] [C2] ↓ Pondurance MDR Essentials uses autonomous SOC to tackle AI-driven attacks
- [P1] [C2] ↓ Agentic AI Uncertainty Dominates Dialog at RSAC Conference
- [P1] [D2] ↓ Beyond alert fatigue, European SOCs are struggling with prioritization, visibili...
- [P1] [C2] ↓ Why 'Emerging Threats' Are Harder to Prioritize in the AI Era
- [P1] [D2] [2 src] – How to Categorize AI Agents and Prioritize Risk
- [P1] [D2] – AI delivers enterprise value — but not for everyone
- [P1] [A2] ↓ Anritsu Remote Spectrum Monitor
- [P1] [C2] – 🚨 CRITICAL alert: CVE-2026-34448 in SiYuan (<3.6.2) enables stored XSS, escalati...
- [P1] [C2] ↑ 🔒 Security News Digest - 2026-04-01 📊 13 updates from 6 sources: 🔹 iTnews - Secu...
- [P1] [C2] ↑ ️ SQL Injection for Beginners: The Complete Guide
- [P1] [C2] ↓ curl: HackerOne Vulnerability Report: libcurl SSL/TLS Identity Leakage via Insecure Connection Reuse
- [P2] [D2] ↓ Am I missing something or are Flock cameras a massive national security threat ripe for social engineering attacks?
- [P1] [D2] [2 src] ↓ USN-8089-2: Go Networking vulnerabilities
- [P1] [D2] ↑ openSUSE Security Update freerdp Important 6 Issues Fixed 2026-1160-1
- [P1] [D2] ↑ Depthfirst, which aims to build a "general security intelligence" for finding and fixing company vulnerabilities, raised an $80M Series B at a $580M valuation (Thomas Brewster/Forbes)
- [P1] [C2] ↑ Amazon sends AI agents into pen testing and DevOps
- [P1] [C2] ↑ AI SOC Firm Tenex Raises $250M to Drive Faster Response
- [P2] [B2] ↓ Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
- [P1] [C2] ↓ SNEAKDOOR: Stealthy Backdoor Attacks against Distribution Matching-based Dataset Condensation
- [P1] [C2] ↑ Check Point Research Reveals ChatGPT Data Exfiltration Flaw
- [P3] [D2] ↑ Last Week in Security (LWiS) - 2026-03-30
- [P1] [A2] ↓ Threat hunting training continues – fourth course completed
- [P1] [B2] ↑ VRP 2025 Year in Review
- [P3] [D2] [2 src] – The Real Risk of Vibecoding
- [P1] [C2] – Malware detectors trained on one dataset often stumble on another
Elastic releases detections for the Axios supply chain compromise
Elastic Security Labs is releasing an initial triage and detection rules for the Axios supply-chain compromise. We have released a detailed analysis on the Axios compromise RAT and payloads. Elastic Security Labs filed a GitHub Security Advisory to the axios repository on March 31, 2026 at 01:50 AM ...
Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack
Attackers compromised the npm account of the lead maintainer of Axios, a widely used JavaScript HTTP client library, and used it to publish malicious versions of the package that deployed a cross-platform remote access trojan on developer machines. The incident represents the highest-impact npm supp...
Axios npm Attack Deploys Cross-Platform RAT
A brief compromise of the popular Axios npm package shows how quickly a trusted dependency can become a widespread threat. Attackers hijacked a maintainer account and published malicious versions that silently installed a remote access trojan (RAT) during routine package installs, putting developer ...
Gap-analys för cybersäkerhetslagen
Gap-analys för cybersäkerhetslagen: så kartlägger ni er beredskap Varför gap-analysen är första steget Många organisationer vet att de omfattas av den nya cybersäkerhetslagen men färre vet exakt var de står. Vilka krav uppfyller ni redan? Var finns luckorna? Och vad kostar det att täppa till dem? De...
West Tallinn Central Hospital Data Breach via USB Media West Tallinn Central Hos...
West Tallinn Central Hospital Data Breach via USB Media West Tallinn Central Hospital in Estonia inadvertently disclosed the personal and medical records of multiple patients by providing a USB drive containing legacy data to a third party. The leak included names, ID codes, and medical histories da...
Iran targets M365 accounts with password-spraying attacks
Researchers say some targets correlate with cities hit by Iranian missile strikes Suspected Iran-linked threat actors are conducting password-spraying attacks against hundreds of organizations, primarily Middle Eastern municipalities, in campaigns that security researchers believe may have been aime...
Attackers hijack # Axios # npm account to spread # RAT # malware https:// securi...
Attackers hijack # Axios # npm account to spread # RAT # malware https:// securityaffairs.com/190221/sec urity/attackers-hijack-axios-npm-account-to-spread-rat-malware.html # securityaffairs # hacking
Attackers hijack Axios npm account to spread RAT malware
Threat actors hijacked the npm account of Axios to distribute RAT malware via malicious package updates. Threat actors compromised the npm account of Axios, a widely used library with over 100M weekly downloads, and published malicious versions to spread remote access trojans across Linux, Windows, ...
Supply chain attack on Axios npm package: Scope, impact, and remediations
The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that downloaded these compromised Axios versions is at risk of severe data theft, including the loss of credentials and API keys. Scan your environ...
Cyber war starts to build up private in battle between U.S., Israel and Iran
OSINT Iranian hackers are in point of fact taking their psychological war ways on to authorities officers and workers at significant companies.Why it matters: Even unproven threats from Iranian hackers can create anguish, uncertainty and doubt — draining consideration and forcing targets to divert ...
Claude Code's Source Code Leaks Via npm Source Maps
Grady Martin writes: A security researcher has leaked a complete repository of source code for Anthropic's flagship command-line tool. The file listing was exposed via a Node Package Manager (npm) mapping, with every target publicly accessible on a Cloudflare R2 storage bucket. There's been a number...
Attack on axios software developer tool threatens widespread compromises
A hacker briefly delivered malware this week through a popular open-source project for software developers that has an estimated 100 million weekly downloads, raising the possibility of compromises spreading widely through a supply-chain attack. Axios is a JavaScript client library used in web reque...
Axios supply chain attack chops away at npm trust
Researchers found that compromised Axios versions installed a Remote Access Trojan. Axios is a promise-based HTTP Client for node.js, basically a helper tool that developers use behind the scenes to let apps talk to the internet. For example, Axios makes requests such as “get my messages from the se...
Why the axios supply chain attack should have Apple worried
The recent supply-chain attack against axios, a widely used open-source HTTP client, highlights a strategic weakness in the global technology stack: critical digital infrastructure is increasingly maintained by under‑resourced individuals, and its failure has systemic economic and national security ...
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
Written by: Austin Larsen, Dima Lenz, Adrian Hernandez, Tyler McLellan, Christopher Gardner, Ashley Zaya, Michael Rudden, Mon Liclican Introduction Google Threat Intelligence Group (GTIG) is tracking an active software supply chain attack targeting the popular Node Package Manager (NPM) package " ax...
Hackers compromise Axios npm equipment to fall substandard-platform malware
Identity theft Hackers hijacked the npm legend of the Axios equipment, a JavaScript HTTP client with 100M+ weekly downloads, to raise a ways off gain admission to trojans to Linux, Windows, and macOS programs. In accordance with experiences from tool offer chain security and application security com...
Hackers Poison Axios npm Package with 100 Million Weekly Downloads
Axios npm Package compromised in a supply chain attack, exposing developers to malware, data theft, and full system takeover risks worldwide.
Object First: 89% av IT-chefer varnar för AI-cyberattacker
Object First, företaget som erbjuder ransomware-säker lokal lagring för säkerhetskopiering, publicerar nu resultaten från sin nya undersökning om AI-cyberattacker i samband med World Backup Day. Object First , företaget som erbjuder ransomware-säker lokal lagring för säkerhetskopiering, publicerar n...
NCSC warns of messaging app targeting
The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.
Understanding OT Cybersecurity: A Practical Guide to Asset Inventory for Industrial Control…
Industrial control systems run the backbone of our modern world — from power grids and water treatment plants to manufacturing floors and… Continue reading on InfoSec Write-ups »
Enkla fel bakom incidenter i molntjänster
Molnteknologi blir allt viktigare, inte minst för att drifta AI-tjänster. Men antalet säkerhetsincidenter ökar och behov kopplade till digital suveränitet blir allt tydligare. Två FOI-forskare har utvärderat incidenter och åtgärder på molnsäkerhetsområdet.
Daily Report - 2026-03-31
StratIntel Briefing (24h)
Generated: 2026-03-31 04:02 UTC | Articles: 34
Sweden (K1) — 8 articles
- [P1] [D3] ↓ When Liability Turns the CISO Into the Fall Guy
- [P1] [C2] ↑ CANGuard: A Spatio-Temporal CNN-GRU-Attention Hybrid Architecture for Intrusion Detection in In-Vehicle CAN Networks
- [P1] [C2] ↑ Building a C2 on AWS: Lessons Learned the Hard Way
- [P1] [C2] ↓ This dumb password rule is from BCV. Username is randomly generated, example: 'H...
- [P1] [D2] – Uppdrag till Trafikverket att redovisa pågående arbete avseende att stärka förmågan till motståndskraft i tågtrafikledningen
- [P1] [D3] – Regeringen vill stärka tågtrafikledningen i kris
- [P2] [C2] ↓ Reentrancy Detection in the Age of LLMs
- [P3] [C2] ↑ EPDQ: Efficient and Privacy-Preserving Exact Distance Query on Encrypted Graphs
EU / Europe (K2) — 6 articles
- [P1] [C2] – # chrome extension ETH-MetaMask App seems malicious. Its # cybersecurity badness...
- [P1] [D3] ↓ Vigilance.fr - Moodle: six vulnerabilities dated 30/06/2025
- [P1] [D3] – Iran steps up cyberattacks against the West
- [P1] [D2] – cve-2026-5102
- [P3] [C2] – # chrome extension YapThread - Record, Bookmark, AI Chat seems malicious. Its #...
- [P3] [D2] ↑ mal-2026-2292
Global (K3) — 20 articles
- [P1] [D3] ↓ Cyberangrepp kopplas till geopolitik – mörkertal kvarstår
- [P1] [D3] ↓ Data Diodes Have Become Essential to Modern OT Cybersecurity
- [P1] [C2] ↓ Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption
- [P1] [D3] ↑ The Multi-Billion Dollar AI Bet: Who Owns the Outcome?
- [P1] [C2] ↓ Inside a 90-Minute SSRF → Admin Panel → RCE Kill Chain
- [P1] [C2] ↑ Knowdit: Agentic Smart Contract Vulnerability Detection with Auditing Knowledge Summarization
- [P1] [C2] – Cryptanalysis of a PIR Scheme based on Linear Codes over Rings
- [P1] [D2] ↑ mal-2026-2294
- [P1] [C2] ↑ PEB Separation and State Migration: Unmasking the New Frontiers of DeFi AML Evasion
- [P1] [C2] ↓ Disguising Topology and Side-Channel Information through Covert Gate- and ML-Enabled IP Camouflaging
- [P1] [C2] ↑ ISC Stormcast For Monday, March 30th, 2026 https://isc.sans.edu/podcastdetail/9870, (Mon, Mar 30th)
- [P1] [D2] ↓ PUTCyberDays CTF 2026
- [P1] [D2] – CVE-2026-4176: Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib
- [P1] [D2] ↓ Re: CVE-2026-4176: Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib
- [P1] [C2] ↓ # Whitehouse app is # spyware How on brand for the criminals nesting in the ruin...
- [P3] [C2] ↓ Possible Phishing 🎣 on: ⚠️hxxps[:]//v0-superoddth2[.]vercel[.]app 🧬 Analysis at:...
- [P1] [C2] ↑ 2026-03-29 RDP # Honeypot IOCs - 398 scans Thread with top 3 features in each ca...
- [P1] [C2] ↓ How Russia’s Dual-Use Cyber Infrastructure Fuels a Destructive Shadow War
- [P3] [C2] ↑ Hermes Seal: Zero-Knowledge Assurance for Autonomous Vehicle Communications
- [P1] [D2] ↑ WWW-Shodan-API-0.021
Uppdrag till Trafikverket att redovisa pågående arbete avseende att stärka förmågan till motståndskraft i tågtrafikledningen
Regeringen ger Trafikverket i uppdrag att redovisa hur pågående arbete med att stärka myndighetens förmåga till motståndskraft i tågtrafikledningen genomförs. Trafikverket ska redovisa vilka åtgärder som bedöms nödvändiga att vidta för att bidra till att stärka verksamhetens förmåga till kontinuitet...
Pressträff om satsningar på svensk rymdförmåga
Tisdag den 31 mars bjuder försvarsminister Pål Jonson, gymnasie-, högskole- och forskningsminister Lotta Edholm, civilminister Erik Slottner och Aron Emilsson, utrikespolitisk talesperson för Sverigedemokraterna, in till en pressträff. På pressträffen presenteras nyheter från 2026 års vårändringsbud...
Monthly Report - 2026-02-23
Intelligence Report
Period: 2026-01-26 to 2026-02-23
Suspected Chinese state-sponsored hackers compromised the Notepad++ update infrastructure for approximately six months during 2025, delivering a backdoored version of the widely used text editor to an unknown number of its tens of millions of users worldwide—a supply chain attack that multiple sources describe as more advanced than initially assessed and that has direct implications for any Swedish organization using the software [44][45][46][47][48][49]. This supply chain compromise, alongside an intensifying wave of fraud targeting Swedish financial systems and a steady drumbeat of critical vulnerabilities in enterprise software, defines the cybersecurity landscape of the past four weeks.
Intelligence Overview
Notepad++ Supply Chain Compromise
The most consequential disclosure of the period centers on Notepad++, the free open-source text editor used by developers and system administrators globally. On February 2, Notepad++ publicly disclosed that its upgrade distribution channel had been compromised by state-sponsored hackers [47][49]. According to reporting from Wired, Ars Technica, and the Swedish outlet Computer Sweden (IDG), suspected Chinese state-backed actors hijacked the Notepad++ update infrastructure beginning in June 2025, exploiting weaknesses in update verification in older versions to redirect update traffic and deliver a backdoored build [44][46][48]. The compromise persisted for nearly six months before detection. Field Effect's subsequent analysis indicates the operation was "more advanced than previously assessed," with updated indicators of compromise now available [45]. Validin published a detailed investigation of the command-and-control infrastructure used in the campaign [47].
This incident represents a classic supply chain attack against ubiquitous developer tooling. For Swedish organizations—particularly in the public sector and critical infrastructure where Notepad++ is commonly installed—the practical risk is that any system that received Notepad++ updates during the affected period may have been backdoored. The Computer Sweden article (rated C2 — Fairly reliable, Probably true) provides the most credible Swedish-language confirmation [46]. Organizations should review software inventories, check installed Notepad++ versions against known-compromised builds, and examine network logs for the published indicators of compromise.
Fraud Escalation in Sweden's Financial and Insurance Sectors
A clear trend across the period is the escalation of fraud targeting Swedish financial systems, continuing a pattern noted in previous weekly reports on social engineering and banking fraud. Finansinspektionen (the Swedish Financial Supervisory Authority) reports that Swedes lost up to SEK 1.5 billion in investment fraud during the past year and has announced intensified focus on fraud and criminal economics under new Director-General Johan Almenberg, who stated: "When the banks take their responsibility, it actually makes a difference. They must continue to do so" [2]. Separately, Svensk Försäkring (Insurance Sweden) published a warning that organized crime is increasingly targeting the country's insurance system, framing insurance fraud as a threat to the entire welfare system rather than merely an industry concern [1]. Both articles carry F2 ratings (source reliability cannot be judged, information probably true), though the underlying organizations—Finansinspektionen and Svensk Försäkring—are authoritative Swedish institutions.
This aligns with the historical article from January 28 reporting that Swedish public agencies face growing AI-powered fraud, with many lacking adequate resources to counter the threat. The municipality of Kristianstad's digital safety initiative, reported in early February [Historical context], further underscores the breadth of concern. The converging picture is that fraud—spanning investment scams, insurance fraud, and AI-assisted deception—has become a systemic threat to Swedish society with financial losses measured in the billions of kronor.
Critical Vulnerabilities in Enterprise and AI Infrastructure
Several critical vulnerabilities disclosed during the period merit attention. A critical unauthenticated SQL injection vulnerability in the EverShop e-commerce platform (versions below 2.1.1) allows attackers to inject SQL via the url_key parameter without authentication [3]. A critical authentication bypass in the Milvus vector database (versions below 2.5.27 and 2.6.0–2.6.9) exposes the REST API and a debug endpoint on port 9091, enabling unauthorized access to data and credentials [7]. Both disclosures originate from social media (F2-rated) but reference specific CVE identifiers and provide technical detail. An Ivanti security advisory was also issued by the Canadian Cyber Centre during this period [31], continuing the Ivanti exploitation trend highlighted in the previous weekly report of February 16, where a single threat actor was responsible for 83% of Ivanti Endpoint Manager Mobile exploitation [previous report].
Additionally, a moderate security update for PostgreSQL 16 was released for openSUSE Tumbleweed, addressing four vulnerabilities [8], and new OT security guidance for nuclear reactors was published by the UK's National Cyber Security Centre in partnership with CISA and the FBI [29].
DDoS Targeting and Geopolitical Cyber Activity
A new DDosia configuration was detected targeting predominantly German government and infrastructure websites, including municipal sites, the German Federal Ministry of the Interior (bmi.bund.de), and transit infrastructure [14]. This is consistent with the pro-Russian hacktivist group NoName057(16)'s established pattern of DDoS campaigns against European targets. While no Swedish targets appear in this specific configuration, the activity is relevant context given Sweden's NATO membership and the broader geopolitical backdrop—Russia launched attacks on Ukraine ahead of the invasion's fourth anniversary, a hot topic confirmed by three independent sources this period.
The Italian university La Sapienza in Rome has been offline since February 2 following a cyberattack that disrupted exam booking, tuition payment systems, and faculty contact directories [39]. Separately, Italian authorities intercepted hacking attempts targeting embassies and Olympic venues as the Winter Olympics began, with security groups warning of disinformation and further cyberattack attempts [40].
Emerging Technology and Identity Security Trends
Recorded Future published its 2026 State of Security report covering geopolitical fragmentation, state-sponsored operations, ransomware evolution, and emerging technology risk (rated C2 — Fairly reliable, Probably true) [30]. Multiple articles address the growing challenge of identity security in an era of AI-powered threats, with discussions of Active Directory defense solutions [32], single sign-on best practices [33], and predictions that agentic AI is reshaping security faster than traditional defenses can adapt [50]. The Anthropic AI bug hunting story, covered by 14 independent sources, reflects growing industry attention to AI's dual role as both a cybersecurity tool and a disruptive force.
Key Actors
Chinese state-sponsored threat actors dominate the period's attribution reporting through the Notepad++ supply chain compromise. While no specific APT group name has been publicly confirmed, multiple sources reference the suspected Chinese state nexus, and Notepad++'s prior political stance regarding Uyghurs has been noted as potential context for targeting [44][45][46][48][49].
Finansinspektionen and Svensk Försäkring emerge as key institutional voices on the Swedish fraud crisis, with the former pledging regulatory action and the latter framing the issue as a societal welfare threat [1][2].
NoName057(16) continues its DDoS campaigns via the DDosia tool, with a new configuration targeting German government infrastructure [14].
Lazarus Group (North Korean state-linked APT) features in Group-IB's research on financially motivated campaigns targeting developers through Python scripts and malware variants including CivetQ and BeaverTail [43].
Securitas in Sweden has called for broader background checks for employees in critical societal functions, warning that the government's current investigation focuses too narrowly on traditional criminal record extracts [23].
Trends and Patterns
Supply chain attacks continue to escalate. The Notepad++ compromise is the most prominent example this period, but it follows the pattern noted in the January monthly report of "significant escalation in supply chain attacks." The six-month dwell time before disclosure underscores the difficulty of detecting sophisticated infrastructure-level compromises.
Swedish fraud losses are quantified and rising. Previous reports noted social engineering threats targeting banking customers and AI-powered fraud pressuring Swedish agencies. This period's reporting from Finansinspektionen adds a concrete figure—SEK 1.5 billion in investment fraud losses—and signals regulatory escalation.
Vulnerability exploitation remains concentrated and fast. As reported on February 16, a single IP address drove 83% of Ivanti exploitation. New Ivanti advisories this period [31] suggest the attack surface remains active. Critical vulnerabilities in AI infrastructure (Milvus) and e-commerce platforms (EverShop) indicate the expanding scope of systems requiring patch management attention.
Geopolitical cyber operations persist against European targets. DDoS campaigns against German infrastructure [14], the cyberattack on La Sapienza [39], and Olympic-related hacking attempts [40] form a consistent picture of European institutions under sustained cyber pressure.
AI as a dual-use cybersecurity factor is a strengthening theme. Anthropic's AI-driven vulnerability research (14 sources) and predictions about agentic AI reshaping security [50] indicate the technology is accelerating both offensive and defensive capabilities simultaneously.
Most source material in this period carries F2 or F3 Admiralty ratings (source reliability cannot be judged), with notable exceptions being the Computer Sweden/IDG reporting on Notepad++ (C2), Recorded Future's State of Security report (C2), and the CEPOL training announcement (D2). Assessments and recommendations should be weighted accordingly—the Notepad++ compromise has the strongest multi-source confirmation and highest practical urgency.
Follow-up Items
- Notepad++ supply chain compromise: Organizations should audit installed Notepad++ versions against the compromised builds (June 2025–late 2025), review network logs for C2 indicators published by Validin [47] and Field Effect [45], and verify that current installations use the remediated update mechanism. CVE identifier not yet publicly assigned at time of reporting.
- CVE-2026-25993 (critical unauthenticated SQL injection in EverShop <2.1.1, CWE-89): Upgrade to version 2.1.1 or later; enforce input validation on url_key parameter [3].
- CVE-2026-26190 (critical authentication bypass in Milvus vector database <2.5.27 and 2.6.0–2.6.9, CWE-306): REST API and /expr debug endpoint on port 9091 exposed; patch to 2.5.27 or 2.6.10 [7].
- Ivanti security advisory AV26-113 issued February 10 by Canadian Cyber Centre [31], continuing the exploitation pattern reported February 16 involving CVE-2026-21962 and CVE-2026-24061 in Ivanti Endpoint Manager Mobile [previous report].
- PostgreSQL 16 moderate security update (openSUSE Tumbleweed advisory 2026-10192-1) addressing four vulnerabilities [8].
- Recorded Future 2026 State of Security report (C2 rating) available for download; covers state-sponsored operations, ransomware evolution, and emerging technology risk [30].
- NCSC/CISA OT security guidance "Secure Connectivity Principles for Operational Technology" released January 2026, with eight foundational principles for protecting operational technology networks, particularly relevant for nuclear and critical infrastructure operators [29].
- BeyondTrust Remote Support/Privileged Remote Access vulnerability reported February 22 as actively exploited with web shells and RATs, added to CISA KEV catalog [previous report]—organizations using BeyondTrust products should verify patching status.
This summary was automatically generated 2026-02-23 01:46 based on 50 priority articles, of which the 10 most prominent are:
Sources
[1] Försäkringsbedrägerier hotar vår välfärd –agera nu — di.se https://www.di.se/debatt/forsakringsbedragerier-hotar-var-valfard-agera-nu/ [2] Finansinspektionen ökar fokus på bedrägerier: ”Bankerna måste fortsätta satsa” — dn.se https://www.dn.se/ekonomi/finansinspektionen-okar-fokus-pa-bedragerier-bankerna-maste-fortsatta-satsa/ [3] 🚨 CVE-2026-25993 (CRITICAL): EverShop <2.1.1 allows unauthenticated SQL injectio... — infosec.exchange https://infosec.exchange/@offseq/116050115365469283 [7] 🔴 CVE-2026-26190: CRITICAL auth bypass in Milvus (<2.5.27, 2.6.0-2.6.9). REST AP... — infosec.exchange https://infosec.exchange/@offseq/116067102205969798 [8] openSUSE Tumbleweed postgresql16 Moderate Security Update 2026-10192-1 — linuxsecurity.com https://linuxsecurity.com/advisories/opensuse/postgresql16-16-12-1-1-2026-2003 [14] Untitled — social.circl.lu https://social.circl.lu/@NoName57Bot/116028074260674637 [23] Securitas vill se bredare bakgrundskontroller – varnar för falsk trygghet — aktuellsakerhet.se https://www.aktuellsakerhet.se/securitas-vill-se-bredare-bakgrundskontroller-varnar-for-falsk-trygghet/ [29] New NCSC-Led OT Security Guidance for Nuclear Reactors — ncsc.fi https://www.databreachtoday.com/blogs/new-ncsc-led-ot-security-guidance-for-nuclear-reactors-p-4044 [30] State of Security Report | Recorded Future — recordedfuture.com https://www.recordedfuture.com/research/state-of-security [31] Ivanti security advisory (AV26-113) — cyber.gc.ca https://cyber.gc.ca/en/alerts-advisories/ivanti-security-advisory-av26-113
OODA Loop Methodology
RSS crawling
ML scoring
Prioritization
Feedback loop