🚨 Top Stories

CERT-EU Links Trivy Supply Chain Attack to Europa.eu Data Breach

CERT-EU confirmed that a supply chain compromise involving the Trivy vulnerability scanner was used to access AWS infrastructure tied to the Europa.eu platform, resulting in large-scale data exposure.

Source: https://www.csoonline.com/article/4154176/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach.html

💡 Key Takeaway: Treat third-party security tools as part of your attack surface—validate update integrity, restrict execution paths, and monitor for abnormal credential access following tool updates.

Claude Code Leak Weaponized in GitHub Malware Campaigns

Threat actors are leveraging the recent Claude Code leak to create malicious GitHub repositories that deliver Vidar infostealer, targeting developers and security practitioners.

Source: https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github/

💡 Key Takeaway: Monitor developer environments like production assets—detect suspicious repo interactions, outbound connections, and credential harvesting behavior early in the execution chain.

ShinyHunters Claims Theft of Millions of Records in Enterprise Data Exposure Campaigns

The ShinyHunters group continues to claim large-scale data theft tied to cloud and SaaS platforms, highlighting ongoing risk in identity-linked data access paths.

Source: https://hackread.com/shinyhunters-hackers-cisco-records-data-leak/

💡 Key Takeaway: Focus on identity-driven access paths—validate least privilege, monitor abnormal API usage, and ensure SaaS audit logging is enabled and actively reviewed.

🛡️ Vulnerability Spotlight

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

A critical pre-authentication API access bypass in FortiClient EMS (CVSS 9.1) is being actively exploited, allowing attackers to gain unauthorized access to management systems.

Source: https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html

💡 Key Takeaway: Immediately identify exposed EMS instances, apply patches, and review authentication and admin activity logs for signs of pre-patch compromise.

Progress ShareFile Pre-auth RCE Chain (CVE-2026-2699 & CVE-2026-2701)

A chained exploit targeting Progress ShareFile enables pre-auth remote code execution, continuing a pattern of critical vulnerabilities in file transfer platforms.

Source: https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/

💡 Key Takeaway: Prioritize internet-facing file transfer systems for emergency patching and validate that exploit paths are no longer reachable from external networks.

Chrome Zero-day CVE-2026-5281 Exploited in the Wild

Google patched a zero-day use-after-free vulnerability in Chrome that was actively exploited, affecting browser-based attack surfaces across enterprises.

Source: https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html

💡 Key Takeaway: Enforce rapid browser patching and use endpoint telemetry to detect exploitation patterns such as abnormal renderer behavior or suspicious child processes.

📈 Trend to Watch

AI Ecosystem Supply Chain Risk Expands with LiteLLM-linked Breach

A breach impacting an AI firm tied to a LiteLLM supply chain issue highlights growing exposure in AI tooling, integrations, and data pipelines.

Source: https://hackread.com/ai-firm-mercor-breach-hackers-4tb-data/

💡 Key Takeaway: Treat AI integrations like any other third-party dependency—map data flows, restrict access tokens, and monitor for abnormal API usage and data exfiltration patterns.

🏛️ Policy & Regulation Watch

Lawmakers Push Cyber Workforce Development Through Apprenticeship Grants

The Cyber Ready Workforce Act aims to address the cybersecurity talent shortage by funding apprenticeship programs backed by the U.S. Department of Labor.

Source: https://cyberscoop.com/labor-department-cybersecurity-workforce-apprenticeships/

💡 Key Takeaway: Expect continued investment in workforce pipelines—organizations should align internal training and apprenticeship efforts to take advantage of funding and talent opportunities.

⚡ Quick Hits

TrueConf Zero-day Exploited in Government-targeted Campaigns

Attackers exploited a flaw in a video conferencing platform to gain reconnaissance and execution access in targeted environments.

Source: https://www.securityweek.com/trueconf-zero-day-exploited-in-asian-government-attacks/

💡 Key Takeaway: Treat collaboration tools as high-risk entry points—monitor authentication flows and unusual session behavior.

TeamPCP Supply Chain Attacks Expand Amid Threat Actor Infighting

Multiple threat groups are now leveraging or claiming involvement in TeamPCP-related attacks, complicating attribution and response.

Source: https://www.darkreading.com/threat-intelligence/teampcp-attacks-hacker-infighting

💡 Key Takeaway: Focus on behaviors, not attribution—detect execution chains and persistence mechanisms regardless of actor identity.

CERT-UA Impersonation Campaign Delivers Remote Access Malware

Attackers impersonated Ukraine’s CERT to distribute malware via phishing emails targeting large recipient sets.

Source: https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html

💡 Key Takeaway: Validate trusted senders and monitor for abuse of legitimate identities in phishing campaigns.

Qilin Ransomware Targets Political Organizations in Europe

A ransomware attack against a German political party highlights continued targeting of high-value organizational data.

Source: https://www.bleepingcomputer.com/news/security/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/

💡 Key Takeaway: Ensure backups are isolated and tested—recovery readiness is critical in politically motivated ransomware campaigns.

AGEWHEEZE Malware Distributed via CERT-themed Phishing

Large-scale phishing campaigns are delivering remote administration malware using trusted branding.

Source: https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html

💡 Key Takeaway: Detect abuse of legitimate tools and scripting behavior rather than relying on malware signatures alone.

⚔️ Actionable Defense Move of the Week

Run a One-week Tier-zero Validation Loop

For every Tier-Zero system (IAM, VPN, MDM, backup, firewall): verify patch level, confirm exposure reduction, review 14 days of logs, and rotate credentials where compromise risk exists.

💡 Key Takeaway: Patching alone is insufficient—validation and log review close the gap between remediation and real security.

🧠 Final Word

Final Word

This week reinforces a familiar but escalating reality: attackers continue to target trust—whether in software supply chains, identity systems, or third-party integrations. The gap is no longer patching speed alone, but validation depth and visibility across control planes. Defenders who assume compromise and verify controls continuously will be best positioned to contain the next wave.

💡 Key Takeaway: Treat identity, integrations, and supply chain dependencies as active attack surfaces—not passive infrastructure.

Keep Reading